A semi-autonomous distributed blockchain-based framework for UAVs system

Abstract The impact of the Internet of Things (IoT) to our daily life has become bigger than ever, which can be witnessed from smart homes, smart transportation, and smart personal care. With widespread applications of UAVs in IoT contexts such as delivery and military, protecting communications between UAVs and ground control system is needed so as to resist potential vulnerabilities and optimize the coordination between distributed UAVs. In this work, to secure communications during data acquisition and transmission, as well as diminish the probability of attacking by malicious manipulated UAVs, we propose a distributed UAVs scheme harnessing blockchain technology whose network has similar topology to IoT along with cloud server. Instead of directly using the typical blockchain technique which requires expensive computation and high bandwidth overhead, we propose a novel, secure, and lightweight blockchain architecture which mitigates the computation and storage overhead while retaining its privacy and security benefits. Moreover, multiples types of transactions are defined to describe various data access and a novel reputation-based consensus protocol is designed to ensure the reliability of the decentralized network. Finally, performance evaluation demonstrates our blockchain-based distributed scheme is secure and efficient.

[1]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[2]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[3]  Camelia Avram,et al.  Flying Ad Hoc Network for Emergency Applications Connected to a Fog System , 2018, EIDWT.

[4]  Alex R. Pinto,et al.  Pattern Recognition in Thermal Images of Plants Pine Using Artificial Neural Networks , 2013, International Conference on Engineering Applications of Neural Networks.

[5]  Aaron Burmeister,et al.  An Automated UAV Mission System , 2003 .

[6]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[7]  Inwhee Joe,et al.  An Adaptive Security Approach According to the Reliability Level of Drones Using Blockchain , 2018 .

[8]  Anis Koubaa,et al.  Poster: Dronemap - A Cloud-based Architecture for the Internet-of-Drones , 2016, EWSN.

[9]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[10]  Burkhard Stiller,et al.  Blockchains everywhere - a use-case of blockchains in the pharma supply-chain , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[11]  Andrey Bogdanov,et al.  spongent: A Lightweight Hash Function , 2011, CHES.

[12]  Zhihui Lu,et al.  Smart-toy-edge-computing-oriented data exchange based on blockchain , 2018, J. Syst. Archit..

[13]  Jin Sun,et al.  Improving Availability of Multicore Real-Time Systems Suffering Both Permanent and Transient Faults , 2019, IEEE Transactions on Computers.

[14]  Soo Young Shin,et al.  BUS: A Blockchain-Enabled Data Acquisition Scheme With the Assistance of UAV Swarm in Internet of Things , 2019, IEEE Access.

[15]  Lui Sha,et al.  A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems , 2018, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[16]  Bin Cao,et al.  Securing commercial WiFi-based UAVs from common security attacks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[17]  Paulo Esteves-Verissimo,et al.  RepuCoin: Your Reputation Is Your Power , 2019, IEEE Transactions on Computers.

[18]  Jin Sun,et al.  Resource Management for Improving Soft-Error and Lifetime Reliability of Real-Time MPSoCs , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[19]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[20]  Kun Cao,et al.  A survey of optimization techniques for thermal-aware 3D processors , 2019, J. Syst. Archit..

[21]  Inseok Hwang,et al.  Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.

[22]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[23]  X. Rong Li,et al.  A New Performance Metric for Search and Track Missions 2: Design and application to UAV search , 2009, 2009 12th International Conference on Information Fusion.

[24]  Tim Güneysu,et al.  Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices , 2012, CARDIS.

[25]  J. Jithish,et al.  Sybil attack in IOT: Modelling and defenses , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[26]  Noureddine Boudriga,et al.  A Blockchain based Secure IoT Solution for the Dam Surveillance , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[27]  Rishi Gupta,et al.  Health Monitoring of Civil Structures with Integrated UAV and Image Processing System , 2015 .

[28]  Zdobysław Goraj,et al.  Security analysis of uav radio communication system , 2009 .

[29]  Ramesh Karri,et al.  Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.

[30]  Alexander Kuzmin,et al.  Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles , 2018, 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).

[31]  María Naya-Plasencia,et al.  Quark: A Lightweight Hash , 2010, CHES.

[32]  Aníbal Ollero,et al.  A cooperative perception system for multiple UAVs: Application to automatic detection of forest fires , 2006, J. Field Robotics.

[33]  Vrizlynn L. L. Thing,et al.  Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[34]  Jianfeng Ma,et al.  Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network , 2019, IEEE Transactions on Vehicular Technology.

[35]  Karthik Dantu,et al.  UB-ANC emulator: An emulation framework for multi-agent drone networks , 2016, 2016 IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots (SIMPAR).

[36]  Rizwan Patan,et al.  An Intelligent approach for UAV and Drone Privacy Security Using Blockchain Methodology , 2019, 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[37]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[38]  Ismail Güvenç,et al.  UAV Air-to-Ground Channel Characterization for mmWave Systems , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[39]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[40]  David R. Jacques Modeling considerations for wide area search munition effectiveness analysis , 2002, Proceedings of the Winter Simulation Conference.

[41]  Dejan Vujičić,et al.  Blockchain technology, bitcoin, and Ethereum: A brief overview , 2018, 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH).

[42]  Robin R. Murphy,et al.  A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).

[43]  Junyong Liu,et al.  Unmanned Aerial Vehicles for Power Line Inspection: A Cooperative Way in Platforms and Communications , 2014, J. Commun..

[44]  Thomas Peyrin,et al.  The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..

[45]  Konstantin Kondak,et al.  Journal of Intelligent and Robotic Systems manuscript No. , 2022 .

[46]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[47]  Bin Yu,et al.  Proof-of-QoS: QoS based blockchain consensus protocol , 2019, Comput. Secur..

[48]  G. Natarajan Ground control stations for unmanned air vehicles (Review Paper) , 2001 .

[49]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[50]  Michael A. Goodrich,et al.  Towards combining UAV and sensor operator roles in UAV-enabled visual search , 2008, 2008 3rd ACM/IEEE International Conference on Human-Robot Interaction (HRI).

[51]  Walid Saad,et al.  A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems , 2018, IEEE Communications Surveys & Tutorials.

[52]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[53]  Mani Golparvar-Fard,et al.  Visual monitoring of civil infrastructure systems via camera-equipped Unmanned Aerial Vehicles (UAVs): a review of related works , 2016 .

[54]  Eduardo Castelló Ferrer The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.

[55]  Laurel D. Riek,et al.  A decomposition of UAV-related situation awareness , 2006, HRI '06.

[56]  Kai-Kit Wong,et al.  Blockchain-Empowered Decentralized Storage in Air-to-Ground Industrial Networks , 2019, IEEE Transactions on Industrial Informatics.

[57]  Xinwen Fu,et al.  Rise of Mini-Drones: Applications and Issues , 2015, PAMCO '15.

[58]  Gyu-In Jee,et al.  Effect of Spoofing on Unmanned Aerial Vehicle using Counterfeited GPS Signal , 2015 .

[59]  Riham Altawy,et al.  Security, Privacy, and Safety Aspects of Civilian Drones , 2016, ACM Trans. Cyber Phys. Syst..

[60]  Ahmad Y. Javaid,et al.  Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation , 2017, Simul..

[61]  P. Venkata Krishna,et al.  A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.