Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes
Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes
Flying Ad Hoc Networks (FANET) is an emerging area of research due to its low
cost, high coverage and fast transmission features. In these networks, the flying
nodes are connected with ground stations and communicate wirelessly, especially
when the networks are congested and complex. Due to mobility, and lack of
predefined infrastructure, these networks have suffered from various security and
trust issues. The traditional trust and security solutions are designed for ground
networks and are not feasible for these networks. This paper proposes a trust and
authentication model including Trust Establishment Mechanism for FANET (TEM-
FANET) and authentication system by using Block-chain method. The trust is
calculated to evaluate the node’s trust status and ensure the existence of the
trustworthy nodes by using direct, indirect, and cumulative trust values. Whereas the
authentication system is utilizing blockchain technology for nodes authentication and
evaluate its feasibility. The proposed model is lightweight and able to monitor
the node’s behavior and compute the trusted quality and broadcast the node status
with neighbor nodes. The proposed model is also integrated with ground stations for
record keeping and decision-making processes. The proposed model is evaluated in
simulation with state-of-the-art trust solutions where the results show the better
performance in terms of overhead, data delivery, node detection rate, and
computational time.
EXISTING SYSTEM
Authors in [6], proposed a Fuzzy-based novel trust model to handle the node’s
behavior and then classified the nodes using multicriteria fuzzy classification. The
usage of Artificial Intelligence (AI) is also discussed to tackle security attacks and
monitor the country’s borders. The proposed solution also manages and predicts the
disaster performed rescue operation to save lives and property and carry
transportation.
In [17], the authors proposed a novel trust model by using a genetic algorithm for
trust evaluation. To provide secure data communication and trust evaluation, the
authors designed the trust model by using a genetic algorithm and minimized the
weight of different values-based parameters to check the direct trust values of nodes
for secure data communication. Direct trust is aggregated with the recommendation
to evaluate the final trust values of nodes. After this, all nodes that produced the
trusted values come under one group or class, and the others that produced the
variant values come in the risky class and assessment based on risk assessment class.
If a malicious node is found, it can easily separate from regular nodes by using this
direct trust list. However, more than the direct trust evaluation is needed to calculate
the trust of nodes because indirect and cumulative trust is important, especially in
FANET networks.
In another study [18], the authors proposed a trust evaluation model for FANET
networks. The proposed model is designed by using the lightweight and efficient
trust mechanism for secure data communication. The nodes formed a secure self-
organized network and facilitated the users with different applications. Security and
trust are the major challenges due to the open nature of these networks. These
networks need more resources for processing power, battery, and coverage. The
attackers easily enter the network and make a node untrustworthy to imitate the
attacks in the network. Different types of trust and security solutions have been
designed to address security and trust matters. However, the traditional solutions are
different from FANET’s special requirements.
Authors in [19], designed a Trust Based Clustering Scheme (TBCS) by using the
clustering technique for secure data communication. The coordination and
cooperation among nodes are considered an evaluation criterion by adopting the trust
concept. The trust is evaluated based on inter node organization and collaboration for
balance and better data flow. The interaction between nodes is based on the trust
evaluation results of nodes. The proposed solution distinguishes the node’s
incompatibility and interruptions to improve the data reliability.
Disadvantages
An existing trust evaluation solutions use any single or two factors, like direct or
indirect trust to evaluate the node’s trustworthiness. Most solutions have been
developed for ground networks or fixed devices like cloud or edge servers.
In an existing system, the system didn't calculate the trust value of drone nodes and
finds the more trustworthy routes for data forwarding. The trust model identifies the
malicious or selfish node status in the network and updates the status in the network.
The proposed trust model contains four main phases including the attack model, trust
analysis model, and trust decision model.
Proposed System
This paper proposed a trust Establishment Mechanism for FANET (TEM-FANET) to
tackle internal and external attacks, monitor or judge the nodes, prevent the network
from malicious nodes, and eliminate such nodes from the network. The proposed
solution provides the best and most secure path to the drones for data combination.
the proposed trust evaluation model design and development phases discuss in the
detailed process. The proposed model calculates the trust value of drone nodes and
finds the more trustworthy routes for data forwarding. The trust model identifies the
malicious or selfish node status in the network and updates the status in the network.
The proposed trust model contains four main phases including the attack model, trust
analysis model, and trust decision model. The first attack model is used to initiate the
internal attacks to identify the selfish and malicious nodes. The trust decision model
is used to analyze the node’s behavior and store all the data for further analysis. All
the recorded data is further forwarded towards the trust decision model to rectify
and identify the malicious and selfish nodes in the network. This model is also useful
to decide the trustworthy path for data communication in the presence of an attack
model. After completing the process from three models, the next and last process is
broadcasting the malicious nodes updates in the network. All the information is
stored in routing tables for reliable and feasible data communication. The proposed
system shows the proposed trust model’s four modules.
Advantages
To calculate the trust values of the nodes and isolate the malicious nodes from the
network
• To broadcast the node’s status about malicious nodes in FANET and ground
networks.
• To keep a record of malicious and untrustworthy nodes for future reference
• To authenticate the FANET nodes by using Blockchain technology
• The proposed TEM-FANET model is evaluated in terms of false positive rate,
malicious nodes detection rate, data throughput, data delay and blocktime.
SYSTEM REQUIREMENTS
Software Requirements:
Operating System - Windows XP
Coding Language - Java/J2EE(JSP,Servlet)
Front End - J2EE
Back End - MySQL