You are on page 1of 6

BLOCKCHAIN-ENVISIONED DRONES: REALIZING 5G-ENABLED

FLYING AUTOMATION

Analysis of Using Blockchain to Protect the Privacy of Drone Big Data


Zhihan Lv, Liang Qiao, M. Shamim Hossain, and Bong Jun Choi

Abstract have become more sophisticated with different


sensors and actuators. However, little attention
In order to solve the problem of privacy pro- is given to its security implications. For example,
tection of unmanned aerial vehicle (UAV) big the UAV industry in China is mainly focusing
data, it is necessary to design a privacy protec- on the production quantity, market share, and
tion scheme that guarantees safe sharing of UAV growth [4]. Such a focus on rapid development
big data. In this work, blockchain technology is may create many unforeseen complications. One
adopted to solve the privacy protection prob- of the biggest problems is the UAV cloud data
lem of UAV big data. In particular, the proposed management system. The UAV has now become
privacy protection scheme uses a number theo- an essential component in the development of
ry research unit cryptosystem for encryption of services, manufacturing, and public safety. As a
blockchain data. Privacy analysis is provided to result, UAV big data is tightly integrated with our
validate the security requirements. The perfor- society. Hence, the leakage of big data may even
mance evaluation results show that the proposed have an impact on national security [5]. There-
UAV big data privacy protection scheme based fore, the privacy protection of UAV big data is
on blockchain technology has low computing attracting more and more attention.
cost in terms of key production, encryption, and Recently, blockchain technology has emerged.
decryption. It also outperforms the conventional It is regarded as a technology to realize data
approaches. This work aims to provide a guide- storage with tamper-proof, traceable, and decen-
line for future research on the privacy protection tralized features, which can effectively improve
of UAV data. the efficiency of data processing. Moreover, the
technology integrates distributed data storage, a
Introduction consensus mechanism, a point-to-point (P2P) net-
With the continuous progress in advanced tech- work, and an encryption algorithm [6]. Moreover,
nology and evolution in social structure, peo- blockchain technology provides a new direction
ple’s pursuit of new technology also changes. in information security and privacy. Many studies
An unmanned aerial vehicle (UAV), an aircraft have shown that blockchain technology can effec-
without a human pilot, is one of the latest techno- tively solve various security and privacy problems
logical advances and is gradually penetrating our [7, 8].
lifestyle [1, 2]. As the market scale of UAVs con- Therefore, in this work, the advantages of
tinuously increases, and different applications of blockchain technology in information security and
UAVs emerge, the privacy protection of the vast privacy is adopted to solve the privacy protection
amount of data that can be generated by UAVs problem of UAV big data. The article is organized
has become a critical security issue. as follows. In the following section, related work
Fueled by the rapid development of informa- is presented. Following that, preliminaries of the
tion and communication technologies, big data blockchain technology, P2P network, number the-
is influencing all sectors of society. Nowadays, no ory research unit (NTRU) cryptographic algorithm,
matter which industry you are in, you are using and other related technologies are introduced.
big data in one way or the other, and the UAV Following that, a privacy protection scheme for
is no exception. However, providing information UAV big data based on blockchain technology is
security and privacy of big data is still a great chal- proposed. Then the performance of the UAV big
lenge [3]. Currently, big data privacy is the big- data privacy protection scheme is evaluated. The
gest bottleneck in the development of big data conclusion is given in the final section.
applications. Due to various networks, different
types of information and data stored on various Literature Review
distributed devices (e.g., user terminals, network UAVs are expected to help innovate many dif-
servers, and clouds), the level of security threat ferent sectors of society. However, data priva-
has increased overall, making the data more vul- cy protection of UAVs remains a critical issue
nerable to attackers. Even now, the data leakage in its development. Before the development of
problem has continuously been popping up one blockchain technology, Zhang et al. (2018) [9]
after another in many different countries. proposed an access control scheme for secure-
The big data privacy of drones will also ly storing data for information security protec-
become a critical issue as drones can collect tion. This scheme combines access control and
data from a wide geographical area, and drones an identity-based encryption mechanism. This

Digital Object Identifier: Zhihan Lv and Liang Qiao are with Qingdao University; M. Shamim Hossain (corresponding author) is with the Chair of Pervasive and Mobile Computing,
10.1109/MNET.011.2000154 King Saud University; Bong Jun Choi is with Soongsil University.

44 0890-8044/21/$25.00 © 2021 IEEE IEEE Network • January/February 2021

LV_LAYOUT.indd 44 1/29/21 4:16 PM


Authorized licensed use limited to: American University of the Middle East. Downloaded on September 27,2021 at 08:22:50 UTC from IEEE Xplore. Restrictions apply.
scheme requires the generation of public keys, Application Programmable Programmable Programmable
which are based on the user’s identity, condition, layer
and purpose. The corresponding private key is currency finance society
used to authenticate the user. Hue et al. (2019) Smart Algorithm
[10] enabled each encryption item to gener- Contract layer Script code
contract mechanism
ate its own access control strategy to achieve
fine-grained information sharing. The protection
of information is realized using attribute-based Incentive layer Issuing mechanism Distribution mechanism
encryption on mobile devices. As such, various
data protection mechanisms can be used to
achieve data sharing and protection. However, Consensus layer POW POS DPOS ...
there remain challenges when applying them to
UAV applications. Communication Verification
Network layer P2P network
Since the introduction of blockchain technolo- mechanism mechanism
gy, researchers have found that blockchain tech-
nology has excellent prospects in user information
Block data Chain structure Timestamp
privacy protection. Hence, there has been a rapid
development of blockchain technology in var- Data layer
ious application areas. Awan et al. [11] (2019) Hash Asymmetric
Merkel tree
presented a new consensus mechanism to real- function encryption
ize the sharing of medical information. Gueain
et al. [12] (2018) presented various privacy pro- FIGURE 1. Blockchain technical framework diagram.
tection mechanisms in private chain networks by
using blockchain technology and an evaluation block only after being verified by other nodes.
framework of medical information privacy. The The verification failure does not affect the distribu-
mechanism can share model parameters between tion structure or paralyze the distributed database
different institutions without exposing the private system. Thus, the blockchain data system can con-
information of patients. It can be applied in dis- tinue to operate.
tributed online machine learning algorithms to Blockchain technology has the characteristics
increase operability between different institutions. of an encryption algorithm, a consensus mecha-
In summary, the initial effort using convention- nism, the distributed node for data storage, and
al encryption mechanisms for data information P2P transmission [14]. The consensus mechanism
protection has many limitations. The blockchain is an essential component of the blockchain. It
technology has been successfully applied in many uses a mathematical algorithm to build trust
different applications, including medical infor- and gain rights between different nodes in the
mation security, to solve security and privacy blockchain system. Blockchain collectively uses a
problems effectively. Therefore, blockchain tech- decentralized approach to maintain the reliability
nology has high potential to solve privacy protec- of a distributed ledger. A blockchain system can
tion problems of UAV big data. verify transactions without the requirement of a
trusted third party. Blockchain can record trans-
Preliminaries actions between two parties efficiently and make
them permanently verifiable [15]. Blockchain has
The Blockchain Method a data layer, a network layer, a consensus layer,
Blockchain technology has many advantages over an incentive layer, a contract layer, and an appli-
conventional security technologies. The main cation layer, as shown in Fig. 1.
goal of blockchain technology is to protect the
information in the database from being tampered NTRU Cryptographic Algorithm
with or stolen. Asymmetric encryption is a form of The NTRU cryptosystem was first introduced
encryption where a pair of keys (i.e., a public key in the 1990s as a polynomial public key cryp-
and a private key) are used. For example, when tosystem based on the polynomial convolution
a public key is used to encrypt a block of data, ring. In recent years, it is one of the most pop-
the corresponding private key must be used to ular cryptosystems in the public-key cryptosys-
decrypt the encrypted information. Conversely, tem. NTRU cryptography includes the NTRU
when a private key is used for encryption, the cor- encryption algorithm and the NTRU signature
responding public key must be used for decryp- algorithm. The NTRU algorithm has lower com-
tion. There is a relation between the public and plexity than the other lattice-based cryptosys-
private keys. In a database system, the private tems. The privacy protection mechanism of UAV
key is generated by random selection, while the big data is adopted based on the advantages
public key is generated using multiple encryp- of the NTRU cryptographic algorithm. NTRU is
tion functions, which prevents data from being a public key cryptosystem, which is based on
changed. Therefore, the asymmetric encryption the hard problem of CVP or SVP in NTRU lat-
on the blockchain provides extremely high securi- tice. In the NTRU algorithm, not only ring size M
ty performance [13]. and “large modulus” Q are used, but also “small
In the process of data storage, the decen- modulus” P, which is basically integer 2 or 3 or
tralized and distributed structure of blockchain polynomial 2 + X, is used. The numbers P, Q,
distributes and stores blocks, containing records, and XN – 1 are chosen so that they are relatively
across many network nodes. Hence, information prime in the ring Z[X]. Parameters include dis-
is not centrally stored in the same host. Since tributed D f , D g , D m , and D r . NTRU algorithm
many nodes are involved in the information stor- includes the process of key generation, encryp-
age process, the information is recorded on a tion, and decryption.

IEEE Network • January/February 2021 45

LV_LAYOUT.indd 45 1/29/21 4:16 PM


Authorized licensed use limited to: American University of the Middle East. Downloaded on September 27,2021 at 08:22:50 UTC from IEEE Xplore. Restrictions apply.
each of whom retains only his or her key. The
threshold algorithm reconstructs the decryption
key to recover the original data.
Block chain Definition 3: In the blockchain system, user
Recording on the blockchain Read on the blockchain C uses the NTRU and cryptographic algorithm
to encrypt transaction information and give users
digital currency. Other users do not know wheth-
Cloud layer er the digital currency has been included in user
Transaction

C’s account. Hence, payment privacy is also pro-


vided in the blockchain.
Cloud layer The design objectives of the privacy protection

Read
of UAV big data are twofold. First, the mechanism
has high performance in security services, such as
key issuance and verification. Second, the execu-
tion times of storing data, releasing the key, and
Upload download Upload download Upload download
verification are within a specified period.

Data layer
dAtA ProtectIon PrIvAcy scheme
The proposed privacy protection scheme of UAV
big data is executed in four stages. In the first
stage, user data is encrypted. In the second stage,
User layer
files are uploaded and downloaded. In the third
stage, data is recorded in the blockchain, and user
data is read from the blockchain. In the fourth
FIGURE 2. Privacy protection model for UAV data.
stage, data is exchanged. The recording operation
in the third stage is the most crucial stage, which
contains two parts. The first part is the data block
desIgn of PrIvAcy ProtectIon scheme for uAv of the blockchain, and the other part is the smart
bIg dAtA bAsed on bLockchAIn technoLogy contract.
To ensure that the recorded content is secure
system modeLs And desIgn obJectIves in blocks, the hash value of the information is
The privacy protection model of UAV big data is stored in the corresponding blockchain structure.
shown in Fig. 2. The model includes a user layer, Since the data in the blockchain is composed of
a data layer, a cloud layer, and a blockchain many message blocks, it is necessary to calculate
layer. In the user layer, users use blockchain the Merkle root of the data block according to
technology to prevent shared data from being the corresponding hash value algorithm. There-
stolen or tampered with. In addition, they can fore, tampering with the data is not possible. The
also use blockchain technology to track transac- message blocks processed in this way are natural-
tions. In the data layer, the information that the ly advantageous in the P2P network, and the cost
user wants to protect is stored. An NTRU pass- of data verification can be significantly reduced.
word is used to encrypt and protect the data.
The data layer is interfaced with the cloud layer PrIvAcy AnALysIs
to share the data. When users need to store As for the privacy protection of UAV big data, the
data, they use a decryption algorithm to recov- data should not be leaked. In the privacy protec-
er the original data. The cloud is a medium for tion of data, the data exchange is carried out only
downloading, uploading, writing, and reading between users and the data center. Information
data. The blockchain layer can provide a pow- is encrypted, and the NTRU password protection
erful abstraction for distributed protocols. The mechanism is used in the blockchain system. The
operations performed in the cloud are recorded protocol guarantees that other users cannot gain
by the blockchain. Once recorded by the block- any information about the encrypted data, and
chain system, the data cannot be deleted or the data center alone cannot decrypt the cipher-
tampered with. This is one of the most valuable text nor deduce the private key of each user.
features of blockchain. Therefore, data privacy protection is provided,
The proposed system model has the follow- and the privacy of the private keys of each user
ing assumptions. First, the number of penetration is preserved.
attacks on semi-honest users is at most (t – 1). In detail, only the ciphertexts are transmit-
Second, there are less than (t – 1) colluding users ted, and they are only transmitted between the
trying to decrypt the ciphertext, which means that user and the data center. If there is no collusion
less than or equal to (t – 1) users cannot unscram- between users, they will not be able to decrypt
ble the ciphertext. The following definitions are the ciphertext because the (p, t) -threshold NTRU
used in the proposed model. cryptography system is used. Therefore, even
Definition 1: When decrypting data, each user if some user or data center gets the ciphertext
needs to provide a valid key value that is kept for the sum Epk( Kk=1 k) , it cannot be decrypted
secret from other users. Therefore, at least t users, unless there is cooperation between t or more
called a threshold, are needed to decrypt the users having their share of the private key.
K
ciphertext collectively. Also, even if the data center has the  k=1k, it
Definition 2: The NTRU cryptosystem is used cannot decrypt the ciphertext Epk(k) as the indi-
to encrypt and store user data in the cloud. The vidual private key  k is kept secret by each user.
data is then hashed and stored in the blockchain. Therefore, the privacy of each user’s private key
The encryption key is distributed to the P users, is well protected.

46 IEEE Network • January/February 2021

LV_LAYOUT.indd 46 1/29/21 4:16 PM


Authorized licensed use limited to: American University of the Middle East. Downloaded on September 27,2021 at 08:22:50 UTC from IEEE Xplore. Restrictions apply.
Compatible X9.98
Optimal broadband
Security level Balance broadband
and speed The best broadband Max speed
and speed

Military level: 256-bit symmetric


NTRU_EES743EP1 NTRU_EES1087EP2 NTRU_EES1171EP1 NTRU_EES1499EP1
code/RSA-15360/ECC-512

Commercial level: 112-bit symmetric


NTRU_EES401EP2 NTRU_EES401EP1 NTRU_EES541EP1 NTRU_EES659EP1
code/RSA-2048/ECC-224

Industrial level: 128-bit symmetric


NTRU_EES439EP1 NTRU_EES449EP1 NTRU_EES613EP1 NTRU_EES761EP1
code/RSA-4096/ECC-256

192-bit symmetric code/RSA-7680/


NTRU_EES593EP1 NTRU_EES677EP1 NTRU_EES887EP1 NTRU_EES1087EP2
ECC-384
TABLE 1. NTRU parameters.

Performance Evaluation of Uav Big Data Parameter set


NTRU_ NTRU_ NTRU_
EES401EP2 EES439EP1 EES593EP1
Privacy Protection Scheme
The length of the public key 557 609 821
The Selection of the Key
The private key length 607 659 891
In this work, the NTRU cryptographic algo-
rithm is adopted to improve the performance Encryption and decryption speed 10638/8064 9900/7299 6849/4694
of the system without compromising data secu-
Key length 256 512 960
rity. Table 1 shows the parameters used in RSA
NTRU. These parameters are used to generate Encryption and decryption speed 3050/109 788/16 219/25
the keys. In this work, the key that is compat-
ible with X9.98 protocol and having the best Key length 28 32 48
ECC
broadband speed is selected experimentally, Encryption and decryption speed 686/951 439/650 184/285
and the NTRU key NTRU_EES401EP2, NTRU_
EES439EP1, and NTRU_EES593EP1 with the TABLE 2. NTRU key length and comparison.
corresponding security levels of 112 bits, 128
bits, and 192 bits are used. The lengths of keys, and 821 bytes are used. The time required for
and the execution speeds of RSA and ECC cryp- the homomorphic encryption of the NTRU public
tography are shown for corresponding NTRU key cryptosystem is evaluated. Six different cases
security levels in Table 2. of homomorphic encryptions are evaluated, as
shown in Fig. 4.
Key Generation and The following are the descriptions of the six
E ncryption and Decryption Performance Evaluation different cases: Case 1: homomorphic encryp-
After selecting the key, the performance of the tion of a single plaintext, Case 2: multiplicative
key generation is evaluated. In the NTRU crypto- homomorphic encryption after random encryp-
system, three public keys are generated accord- tion of two plaintexts, Case 3: two kinds of
ing to the sequence of the cryptosystem function random homomorphic encryption of a single
library. Their sizes are 557 bytes, 609 bytes, and plaintext, Case 4: polynomial homomorphic
821 bytes, respectively. Public and private keys encryption of a single plaintext, Case 5: addi-
are required in the process of encryption and tive homomorphic encryption of two plaintexts,
decryption. Figure 3 shows the generation time of and Case 6: multiplicative homomorphism
an NTRU key, the encryption time of NTRU, and encryption of two plaintexts. As shown in Fig.
the decryption time of NTRU for different lengths 4, the execution times of NTRU homomorphic
of the public key. To validate the result, two differ- encryption generally increase as the complex-
ent experiments were conducted for each group. ity of the homomorphic encryption increases.
The experiment result shows that the key gen- As expected, the time consumed by NTRU
eration time increases with the increase in key homomorphic encryptions increases with the
length. In NTRU, it is evident that the encryption increase in key length. We can also observe that
took longer than the decryption. The decryptions the time required for multiplicative homomor-
took less than 3 ms, while the encryptions took phic encryption is shorter than that for additive
more than 4 ms. In decryption, the difference in homomorphic encryption. Therefore, the exper-
the execution time between 557 bytes and 821 imental results show that the proposed privacy
bytes is only 1.5 ms, and the difference between protection mechanism of UAV big data has high
609 bytes and 821 bytes is negligible. Therefore, security performance.
the comparison results demonstrate the high
encryption and decryption efficiency of the NTRU Conclusions
cryptosystem. With the massive growth of data, new data infor-
mation security problems have been emerging.
Analysis of Homomorphic Encryption of the With the development of UAVs, the privacy
NTRU Cryptosystem need of UAV big data information is inevitable.
In addition, an analysis of homomorphic encryp- Therefore, in this work, blockchain technology
tion for the NTRU cryptosystem is presented. is adopted to solve the big data privacy prob-
The public key lengths of 557 bytes, 609 bytes, lem of UAVs. The privacy analysis is presented to

IEEE Network • January/February 2021 47

LV_LAYOUT.indd 47 1/29/21 4:16 PM


Authorized licensed use limited to: American University of the Middle East. Downloaded on September 27,2021 at 08:22:50 UTC from IEEE Xplore. Restrictions apply.
[2] M. Z. Bhuiyan et al., “Blockchain and Big Data to Transform
the Healthcare,” Proc. Int’l. Conf. Data Processing and Appli-
20 NTRU decryption time 1 cations, May 12, 2018, pp. 62–68.
NTRU decryption time 2 [3] E. Bertino, A. Kundu, and Z. Sura, “Data Transparency With
18 NTRU encryption time 1 Blockchain and AI Ethics,” J. Data and Info. Quality, vol. 11,
NTRU encryption time 2 no. 4, 2019, p. 16.
16 [4] R. Wang et al., “A Medical Data Sharing Platform Based on
Key generation time 1
Permissioned Blockchains,” Proc. 2018 Int’l. Conf. Block-
14 Key generation time 2 chain Technology and Application, Dec. 10, 2018, pp.
12–16.
Time/ms

12 [5] T. Tien et al., “Untangling Blockchain: A Data Processing


View of Blockchain Systems,” IEEE Cloud Computing, vol. 8,
10 no. 11, 2017, pp. 193–97.
[6] T. Dasu, Y. Kanza, and D. Srinifastava, “Geofences in the
8 Sky: Herding Drones With Blockchains and 5G,” Proc. 26th
ACM SIGSPATIAL Int’l. Conf. Advances in Geographic Info.
6 Systems, 2018, Nov. 6, pp. 73–76.
[7] Z. B. Zheng et al., “An Overview of Blockchain Technology:
4 Architecture, Consensus, and Future Trends,” Proc. IEEE 6th
Int’l. Congress on Big Data, June 2017, pp. 557–64.
2 [8] Q. Xia et al., ”MeDShare: Trust-Less Medical Data Shar-
557Byte 583Byte 609Byte 635Byte 821Byte ing Among Cloud Service Providers via Blockchain,” IEEE
Access, vol. 5, no. 1, 2017, pp. 14,757–67.
Public key length [9] B. K. Zhang et al., “Blockchain: A Panacea for Healthcare
Cloud-Based Data Security and Privacy?” IEEE Cloud Com-
FIGURE 3. Graph of NTRU key generation time, NTRU encryption time, and puting, vol. 5, no. 1, 2018, pp. 31–37.
NTRU decryption time depending on public key length. [10] T. G. Hue, H. Fang, and H. G. Wang, “Blockchain-Based
Internet of Vehicles: Distributed Network Architecture and
Performance Analysis,” IEEE Internet of Things J., vol. 6, no.
3, 2019, pp. 4640–49.
[11] S. Awan et al., “Poster: A Reliable and Accountable Pri-
vacy-Preserving Federated Learning Framework Using the
Blockchain,” ACM, vol. 5, no. 1, 2019, pp. 2561–63.
[12] M. Gueain and D. Sutter, “The Blockchain and Increasing
Cooperative Efficacy,” IEEE Internet of Things J., vol. 22, no.
2, 2018, pp. 1287–96.
[13] Y. Q. Zhao et al., “Secure Pub-Sub: Blockchain-Based Fair
Payment with Reputation for Reliable Cyber Physical Sys-
tems,” IEEE Access, vol. 6, no. 1, 2018, pp. 12,295–12,303.
[14] H. Q. Wang et al., “BBARS: Blockchain-Based Anonymous
Rewarding Scheme for V2G Networks,” IEEE Internet of
Things J., vol. 6, no. 2, 2019, pp. 3676–87.
[15] P. Jin et al., “PostMan: Rapidly Mitigating Bursty Traffic by
Offloading Packet Processing,” Proc. 2019 USENIX Annual
Technical Conf., July 10, 2019, pp. 849–62.

Biographies
Zhihan Lv [SM’19] is currently an associate professor at Qingd-
ao University, China. He was an assistant professor at Shenzhen
Institutes of Advanced Technology, Chinese Academy of Sci-
ences from 2012 to 2016. He received his Ph.D. from Ocean
University of China and Paris7 University in 2012. He worked
at CNRS, France, as a research engineer; Umea University,
Sweden, as a postdoctoral research fellow; Fundacion FIVAN,
FIGURE 4. Homomorphic encryption time of NTRU. Spain, as an experienced researcher; University College London,
United Kingdom, as a research associate; and the University of
show that the proposed threshold scheme effec- Barcelona, Spain, as a postdoctoral researcher. He was a Marie
tively protects the privacy of data and user keys. Curie Fellow in the European Union’s Seventh Framework Pro-
gram LANPERCEPT. His research mainly focuses on the Internet
The performance evaluation results show that of Things, blockchain, multimedia, augmented reality, virtual
the scheme is effective at generating keys and reality, computer vision, 3D visualization and graphics, serious
executing encryptions/decryptions. Moreover, games, HCI, big data, and GIS. He has contributed 200+ papers
the homomorphic property of the NTRU crypto- in the related fields on journals such as IEEE TII, IEEE TITS, IEEE
TFS, ACM TOMM, ACM TOIT, and ACM TIST, among others, and
system shows that the proposed scheme provides conferences such as ACM MM, ACM CHI, ACM Siggraph Asia,
good security performance. We believe that the ICCV, and IEEE Virtual Reality. He is an Associate Editor of Plos
work has good theoretical significance for the one (since 2016), IEEE Access (since 2016), Neurocomputing
privacy protection of UAV big data. In addition, (2016–2018), and IET Image Processing (since 2017). He has
been lead Guest Editor of IEEE Transactions on Industrial Infor-
we expect that the presented work can give matics, IEEE Transactions on Intelligent Transportation Systems,
insights into providing a good practical idea for IEEE Network, IEEE Sensors, IEEE Consumer Electronics Magazine,
the research of blockchain technology in UAV and Future Generation Computer Systems. He was a Program
data protection. Committee member of ACM IUI2015, 2016, 2019, and 2020,
IEEE CHASE Workshop on BIGDATA4HEALTH 2016, 2017,
Acknowledgment IEEE/CIC WIN Workshop 2016, IIKI2016 2019, WASA2016,
2017, IEEE PDGC2016, ACM SAC2017-WCN Track, and more.
The authors are grateful to the Deanship of Sci-
entific Research at King Saud University, Riyadh, Liang Qiao [S’20] is currently a graduate student in the School
Saudi Arabia, for funding this work through the of Data Science and Software Engineering at Qingdao Universi-
Vice Deanship of Scientific Research Chairs: Chair ty. His research interests include machine learning, blockchain,
and virtual reality. In 2019, he obtained a bachelor’s degree
of Pervasive and Mobile Computing. from Qingdao University. In 2018, he won the second prize of
the National Software and Information Technology Competition
References in China. He has rich experience in algorithm design.
[1] R. Y. Zheng, “A Blockchain Based Privacy-Preserving Incen-
tive Mechanism in Crowdsensing Applications,” IEEE Access, M. Shamim Hossain [SM’09] (mshossain@ksu. edu.sa), corre-
vol. 6, no. 1, 2018, pp. 17,545–56. sponding author, is currently a professor with the Chair of Per-

48 IEEE Network • January/February 2021

LV_LAYOUT.indd 48 1/29/21 4:16 PM


Authorized licensed use limited to: American University of the Middle East. Downloaded on September 27,2021 at 08:22:50 UTC from IEEE Xplore. Restrictions apply.
vasive and Mobile Computing and the Department of Software Bong Jun Choi [M] is an associate professor at the School of
Engineering, College of Computer and Information Sciences, Computer Science & Engineering and jointly at the School of Elec-
King Saud University, Riyadh, Saudi Arabia. His research inter- tronic Engineering, Soongsil University, Seoul, Korea. Previously,
ests include cloud networking, smart environment (smart city, he was an assistant professor at the Department of Computer
smart health), AI, deep learning, edge computing, the Internet Science, State University of New York Korea, and concurrently
of Things (IoT), multimedia for health care, and multimedia big a research assistant professor with the Department of Comput-
data. He has authored and co authored more than 300 pub- er Science, Stony Brook University, New York. He received his
lications. He is on the Editorial Boards of IEEE Transactions on B.Sc. and M.Sc. degrees from Yonsei University, Korea, both in
Multimedia, IEEE Multimedia, IEEE Network, IEEE Wireless Com- electrical and electronics engineering, and his Ph.D. degree from
munications, IEEE Access, the Journal of Network and Computer the University of Waterloo, Canada, in electrical and computer
Applications, and the International Journal of Multimedia Tools engineering. His current research focuses on energy-efficient net-
and Applications. He is a Senior Member of ACM. He is an IEEE works, distributed mobile wireless networks, smart grid communi-
ComSoc Distinguished Lecturer for 2021–2022. cations, and network security. He is a member of ACM.

IEEE Network • January/February 2021 49

LV_LAYOUT.indd 49 1/29/21 4:16 PM


Authorized licensed use limited to: American University of the Middle East. Downloaded on September 27,2021 at 08:22:50 UTC from IEEE Xplore. Restrictions apply.

You might also like