Skip to main content

A Blockchain-Based Reconstruction Framework for UAV Network

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2020)

Abstract

With the popularity of unmanned aerial vehicles (UAVs) and the development of the network technology, the UAV network has become a new research hotspot. However, due to various factors such as terrain, transmission distance, and hacker attacks, UAV network needs to reconstruct the network architecture and restore data according to the actual situation. The blockchain technology can be applied to the UAV network for its high reliability and distributed characteristics. Therefore, this paper proposes a blockchain-based adaptive reconstruction technology framework for UAV networks. Also, to solve possible data damage or missing problems in UAV networks, a data recovery and update approach as well as the corresponding algorithms are given. Furthermore, this paper uses the blockchain to record the behavior of the UAV nodes in the UAV network, and proposes an algorithm to check whether the UAV is malicious or malfunctioning. So that the ground control station (GCS) can reconstruct the UAV network communication link.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sanchez-Garcia, J., Garcia-Campo, J.M., Arzamendia, M., et al.: A survey on unmanned aerial and aquatic vehicle multi-hop networks: wireless communications, evaluation tools and applications. Comput. Commun. 119(2018), 43–65 (2018)

    Article  Google Scholar 

  2. Mehta, P., Gupta, R., Tanwar, S.: Blockchain envisioned UAV networks: challenges, solutions, and comparisons. Comput. Commun. 151(2020), 518–538 (2020)

    Article  Google Scholar 

  3. Shahriar, H., et al.: Data protection labware for mobile security. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds.) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science, vol. 11611. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_15

  4. Kosba, A., Miller, A., Shi, E., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy (SP 2016), San Jose, CA, pp. 839–858 (May 2016)

    Google Scholar 

  5. Gavin, W.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151(2014), 1–32 (2014)

    Google Scholar 

  6. Androulaki, E., Barger, A., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference (EuroSys 2018), Porto, Portugal, p. 15 (April 2018). Article No.: 30

    Google Scholar 

  7. Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington D.C., USA, pp. 231–240 (October 2003)

    Google Scholar 

  8. Deng, Z., Chen, S., Tan, X., Song, D., Wu, F.: An efficient provable multi-copy data possession scheme with data dynamics. In: Wang, G., Chen, J., Yang, L. (eds.) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science, vol. 11342. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05345-1_34

  9. Tian, B., Han, S., Jiankun, H., Dillon, T.: A mutual-healing key distribution scheme in wireless sensor networks. J. Netw. Comput. Appl. 34(1), 80–88 (2011)

    Article  Google Scholar 

  10. Li, X., Wang, Y., Vijayakumar, P., et al.: Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Trans. Veh. Technol. 68(11), 11309–11322 (2019)

    Article  Google Scholar 

  11. Ge, C., Ma, X., Liu, Z., et al.: A semi-autonomous distributed blockchain-based framework for UAVs system. J. Syst. Archit. 107, 101728 (2020)

    Article  Google Scholar 

  12. Sharma, V., You, I., Nalin, D., et al.: Neural-blockchain-based ultrareliable caching for edge-enabled UAV networks. IEEE Trans. Ind. Inf. 15(10), 5723–5736 (2019)

    Article  Google Scholar 

  13. Islam, A.A., Shin, S.Y.: BUAV: a blockchain based secure UAV-assisted data acquisition scheme in Internet of Things. J. Commun. Netw. 21(5), 491–502 (2019)

    Article  Google Scholar 

  14. Lei, K., Zhang, Q., Lou, J., et al.: Securing ICN-based UAV ad hoc networks with blockchain. IEEE Commun. Mag. 57(6), 26–32 (2019)

    Article  Google Scholar 

  15. Islam, A.A., Shin, S.Y.: Bus: a blockchain-enabled data acquisition scheme with the assistance of UAV swarm in Internet of Things. IEEE Access 7, 103231–103249 (2019)

    Article  Google Scholar 

  16. Tanwar, S., Bhatia, Q., Patel, P., et al.: Machine learning adoption in blockchain-based smart applications: the challenges, and a way forward. IEEE Access 8, 474–488 (2019)

    Article  Google Scholar 

  17. Hassija, V., Chamola, V., Han, G., et al.: DAGIoV: a framework for vehicle to vehicle communication using directed acyclic graph and game theory. IEEE Trans. Veh. Technol. 69(4), 4182–4191 (2020)

    Article  Google Scholar 

  18. Yang Chi, X., Xianghua, R.K., et al.: A scalable multi-data sources based recursive approximation approach for fast error recovery in big sensing data on cloud. IEEE Trans. Knowl. Data Eng. 32(5), 841–854 (2019)

    Article  Google Scholar 

  19. Wang, S., Yuan, J., Li, X., et al.: Active data replica recovery for quality-assurance big data analysis in IC-IoT. IEEE Access 7, 106997–107005 (2019)

    Article  Google Scholar 

  20. Jung, H., Park, Y., Song, C.-W., et al.: PCS: a parity-based personal data recovery service in cloud. Clust. Comput. 20(3), 1–4 (2017)

    Article  Google Scholar 

  21. Weihua, Y., Lin, H.: Reliability evaluation of BC networks in terms of the extra vertex and edge-connectivity. IEEE Trans. Comput. 63(10), 2540–2548 (2013)

    MathSciNet  MATH  Google Scholar 

  22. Qiang, Z., Wang, X., Cheng, G.: Reliability evaluation of BC networks. IEEE Trans. Comput. 62(11), 2337–2340 (2012)

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (General Program) under Grant No. 61572253. This work is also supported by Jiangsu Collaborative Innovation Center of Novel Software Technology and Industrialization.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Zhuang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qiao, G., Zhuang, Y. (2021). A Blockchain-Based Reconstruction Framework for UAV Network. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12382. Springer, Cham. https://doi.org/10.1007/978-3-030-68851-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68851-6_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68850-9

  • Online ISBN: 978-3-030-68851-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics