Blockchain Towards Secure UAV-Based Systems

Blockchain Towards Secure UAV-Based Systems

lamia Chaari Fourati, Mohamed Fourati, Bilel Najeh, Aicha Idriss
DOI: 10.4018/978-1-7998-5839-3.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

During this last decade, the blockchain (BC) paradigm has been required in several use cases and scenarios in particular for security, privacy, and trust provisioning. Accordingly, several studies proposed the use of BC technology to secure and to assure the trustworthiness of unmanned aerial vehicles (UAVs). In this context, this chapter highlights several applications and scenarios for the deployment of UAVs within diverse smart systems. In addition, it illustrates the advantages of the integration of the BC within UAVs-based smart systems. This integration reveals new challenges and future research directions that are discussed in this chapter.
Chapter Preview
Top

Introduction

During this last decade, the world witnessed an increasing in the number of Unmanned Aerial Vehicles (UAVs) (Hentati, and Fourati, 2020) with different sizes, models, functionalities, and sensing and communication capabilities responding to the global demand in different domains. Indeed, UAVs are being useful in complex mission and critical scenarios in particular for hostile areas supervision involving multi and cooperative UAVs. In addition, the typical UAV applications in 5G and beyond are mobile relay, aerial internet of things (IoT) data collector, aerial base station, aerial mobile user, aerial helper for traffic offloading or traffic caching. Besides that, the use of multi-UAVs in collaboration with terrestrial networks affords new ways for diverse context such as civilian, military, environmental, commercial, agriculture, smart city, healthcare, disaster monitoring, and telecommunication systems...However, UAVs based system face several technical challenges including cooperative computation offloading, QoE requirements, collision avoidance, mobility management, multi-node task scheduling, failure recovery, and security provisioning. The standard scenario of UAVs network is to have one or multi flying UAVs, which are supervised and managed by the user, via a ground control station (GCS) through a communication link (Krichen et al., 2018). MAVLINK is the standardized communication protocol between an UAV and a GCS and between UAVs. However, this protocol have several vulnerabilities (Chaari & al, 2018). BlockChain (BC) based solutions are the adequate paradigm that could mitigate vulnerabilities, threats and attacks within UAVs based systems. Accordingly, this chapter highlight the importance and the effectiveness of BC for securing UAVs communication. Indeed, the manifolds of this chapter could be summarized into three points:

  • Providing a deep investigation regarding the various applications of BC technology in UAV systems. Indeed, this chapter discusses challenges pertaining UAVs scenarios, pinpoints how BC can enhance UAVs utility in each scenario and illustrates how certain BC features can help to overcome UAV security, trust and privacy issues.

  • Giving a wider outlook to the readers, on how the correlation between BC and UAV technology can enhance the security level for smart systems environments.

  • Highlighting potential open issues and future research directions that can be beneficial for the development and the deployment of BC-based UAV systems.

The rest of this chapter organized as follows: The second section overviews the fundamentals of UAVs with focus on UAVs communication systems, UAVs emerging applications and UAVs attacks. The third section presents the basic concepts related to BC technology with an insight on BC platforms, BC consensus and the role played by BC to enhance the UAVs-based systems security, privacy and trust. The fourth section discusses intensively various applications and scenarios of deploying BC within UAVs based systems. The fifth section affords the readers with a holistic vision of the ongoing research in BC-based UAV systems and assesses involved challenges, possible research opportunities, and future directions. Finally, the last section concludes this chapter and summarizes the lessons learned through this chapter.

Key Terms in this Chapter

Blockchain Transaction: It is the process of data exchange between the nodes on the network. It includes the sender and receiver address for the authentication process. It identifies the transaction amount with the transaction identity number.

6G Networks: In telecommunications, 6G is the sixth-generation standard currently under development for wireless communications technologies supporting cellular data networks. It is the planned successor to 5G and will likely be significantly faster and supporting such as virtual and augmented reality (VR/AR), ubiquitous instant communications, pervasive intelligence, and the internet of things.

Unmanned Aerial Vehicles (UAVs): Commonly known as a drone, is an aircraft without a human pilot on-board. The flight of UAVs may operate under remote control by a human operator via a ground control station.

Consensus: A transaction in the blockchain is considered valid after the network participants have reached a consensus using a consensus algorithm.

Software-Defined Networking (SDN): Is an emerging architecture that is dynamic, manageable, cost-effective, and suitable for the high-bandwidth, dynamic nature of today's applications. SDN decouples the network control and forwarding functions enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services.

Blockchain Network: It consists of a huge number of nodes, and each node on the network has the same status or information to avoid a single point of failure.

Global Ledger: A global ledger is used to store the transaction history at each node on the blockchain network. Each node has its ledger that conserves the data from the first block to the latest block of the blockchain network.

Complete Chapter List

Search this Book:
Reset