You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

15 August 2022

Blockchain-Assisted Adaptive Reconfiguration Method for Trusted UAV Network

,
and
The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
This article belongs to the Special Issue Advanced Security Protection Mechanism in Networks

Abstract

Due to the high mobility of nodes and the complexity of the mission environment, mission-oriented UAV networks are not only subject to frequent topology changes, but also to the risk of being compromised, hijacked and corrupted. As a result, an operating UAV network is essentially a Byzantine distributed system whose physical structure and node trustworthiness change over time. How to implement the global management of UAV networks to achieve a rational allocation of UAV network resources and reconfiguration of trusted networks is a problem worthy of in-depth study. The method proposed in this paper introduces a lightweight storage blockchain in the UAV network through two-stage consensus, firstly performing data consensus on the local state records of the nodes, then performing decision consensus on the data consensus results using algorithms such as fuzzy K-Modes clustering and global trustworthiness assessment, and finally recording the decision consensus results into a new block as the new configuration information of the UAV network. A lightweight storage blockchain-assisted trusted zone routing protocol (BC_TZRP) is designed to dynamically and adaptively build configurable trusted networks in a way that the blockchain continuously adds new blocks. Using QualNet simulation experimental software, an experimental comparison between the classical routing protocol for mobile self-organizing networks and the traditional consensus algorithm for blockchains is conducted. The results show that the approach has significant advantages in terms of packet delivery rate, routing overhead and average end-to-end delay, and can effectively improve the overall working life and fault tolerance of the UAV network.

1. Introduction

Low-cost, miniaturized, scaled-up and networked UAV clusters have been the focus of research and an important development direction at home and abroad. The qualities of low cost, easy and flexible deployment, and high resistance to destruction have made UAV networks widely used in many fields. In recent years, the domestic consumer-grade UAV market has become increasingly saturated, and industrial-grade UAVs have gradually become the mainstay of the emerging industry. Combined with traditional industries, UAV networks, as gradually maturing aerial platforms, have begun to be widely used in the civilian field. They play an irreplaceable and important role in many special environments, such as security monitoring, emergency disaster mitigation, rescue, exploration and digital cities. In terms of military applications, as an emerging combat force, UAVs have more and more types of missions and their complexity is escalating, single UAVs can no longer meet military needs, and UAV cluster operations will become an important means of modern warfare in the future. Therefore, UAV network-related technologies have become the object of high attention and in-depth research by various military powers.
Since 2000, the U.S. Department of Defense has continued to release the “Unmanned Systems Integrated Roadmap” planning, according to the British International Institute for Strategic Studies released the “Military Balance 2022” statistics, the U.S. military under 20 kg micro and small UAVs more than 10,000. Russia’s Concept for the Use of Unmanned Aircraft Systems in the Russian Armed Forces by 2025 comprehensively lays out the development of unmanned aircraft equipment and force construction, and according to the plan, the proportion of unmanned combat systems in the Russian military equipment system will exceed 30% in 2025. In the Israeli-Palestinian conflict in May 2021, the Israeli army used a swarm of miniature multi-rotor drones guided by artificial intelligence systems for the first time, and Israel became the first country to integrate artificial intelligence technology to command a swarm of drones in combat. At India’s Army Day parade in 2021, India demonstrated for the first time an offensive drone cluster system consisting of 75 drones that can autonomously identify and shoot down targets [1].
With the boom in UAV technology, anti-UAV technologies [2,3,4,5] have emerged. In addition to traditional methods such as communication/navigation system jamming and signal intrusion, research into anti-drone technologies such as electronic warfare, cyber warfare, drone countermeasures and laser weapons has been vigorously pursued. These new anti-drone technologies can perform GPS decoys, interfere with the normal operation of drones, and even counteract drones, such as a drone countermeasure system based on drone clustering proposed by Brust et al. [6] from the University of Luxembourg. Although some progress has been made in drone clustering technology, drones are currently vulnerable to jamming, trapping and strikes due to their own limited resources, the open nature of wireless communications and the imperfection of aerial countermeasures. Mission-oriented UAV networks operate in highly dynamic, complex and unstructured environments where the size of the network, topology and trustworthiness of the network nodes change over time. Improving the fault tolerance of the network and maintaining its trustworthiness during missions is a major challenge for distributed UAV networks with limited resources and no central support.
The UAV network in mission execution faces three major unfavorable objective conditions, which are non-security, complex operation environment, no central support and limited resources of nodes. Therefore, the UAV network not only has to solve the routing reconfiguration brought by topology changes, but also needs to tolerate the internal error nodes generated by the UAV nodes due to their own consumption, being damaged and compromised. Unauthorized access by external nodes must of course also be prevented. The decentralized, de-trusted, and tamper-proof nature of blockchain fits well with the objective nature of mission-based drone networks. In this paper, we propose a stateless permission blockchain system that not only makes the UAV network capable of authentication, but also dynamically isolates untrustworthy nodes by releasing detection scores for all nodes. The continuously updated blockchain provides the UAV network to adaptively perform trusted reorganization of the network while providing a reference for routing. The blockchain-assisted hierarchical Trusted Zone Routing Protocol (BC_TZRP) is essentially a lightweight storage blockchain system based on a zone routing protocol. The system performs data consensus on the local state records of nodes through a two-stage consensus and then implements decision consensus on the data consensus results, and adaptively reconfigures the UAV network based on the decision results.
The main contributions of this work are as follows:
  • First, an adaptive configuration method for UAV trusted networks is proposed. The method uses a new block of the blockchain to record the global state assessment of the network nodes at each stage. All UAV nodes reorganize the trusted network based on the updated blockchain and automatically reconfigure the hierarchical logical network based on the newly elected set of delegated authorized nodes to cope with the dynamic nature of the UAV network topology and the time-varying trustworthiness of the network nodes while reducing routing blindness.
  • Second, a lightweight storage blockchain with a two-stage consensus is designed. Nodes monitor all forwarding behavior of their neighboring nodes at the network layer, and different behaviors are given corresponding trustworthiness discounts. Based on the rhythm of the blockchain consensus, each node submits a state transaction including a local trust assessment of neighboring nodes to the upper network. The blockchain system first performs a data consensus on the transactions of the nodes at each stage and then performs a decision consensus on the data consensus results. The decision consensus result is recorded in the solid new block as trusted network configuration information. The blockchain adds only small decision data to each consensus, while the local state transaction dataset at each stage is discarded directly.
  • Third, propose a blockchain-assisted hierarchical zone trusted routing protocol. A K-modes clustering method is used to periodically elect the zone centers of the UAV network using a list of neighboring nodes, combined with a global trustworthiness assessment of the nodes as a non-numerical node feature vector. The upper layer network reconstructed by the dynamically updated zone centers manages the UAV network and takes on the main operations in stages, thus balancing the consumption of network resources and minimizing the involvement of erroneous nodes in consensus operations. This not only increases the efficiency of the use of UAV network resources, but more importantly, the fault tolerance of the entire network allows for the presence of more than a third of errant nodes.
The rest of the paper is organized as follows. The related work is discussed in Section 2. The system model is in Section 3. A specific description of the recommended scheme (BC_TZRP) in Section 4. In Section 5, We discuss the feasibility of the recommended scheme, including complexity analysis, scalability analysis and security analysis. Section 6, Designing a working scenario of a UAV network in a Byzantine environment and performance analysis of the proposed solution through simulation experiments. Finally, the conclusion is presented in Section 7.

3. System Models

According to the discussion in the previous section, existing mobile self-organizing network reconfiguration methods either construct new network routes based on dynamically changing topology information or combine other attributes of nodes, such as location information, reputation, etc. to reduce path blindness during routing. In terms of computation, communication, storage or security, none of the solutions can satisfy the application scenarios of lightweight UAV networks in the context of Byzantine General problem. The adaptive trusted reconfiguration approach for UAV networks recommended in this paper is achieved by a blockchain system deployed on UAV nodes. The blockchain system is a permissioned blockchain for identity authentication based on vector commitment cryptography, which dynamically evaluates the trustworthiness of nodes by using their own state change records as consensus objects. The block system isolates untrustworthy nodes from the network by dynamically aggregating identity vector commitments, periodically recording the global state of the nodes. The drone nodes adaptively reconfigure the trusted hierarchical architecture network through the continuously updated blockchain and construct secure routes based on the blockchain record identity information.
Figure 1 illustrates the system model of a blockchain-assisted dynamically configurable network.
Figure 1. Blockchain-assisted reconfigured trusted network system model for UAVs.

3.1. Threat Model

The UAV network is an ad hoc mission network, which operates in an unknown and non-secure environment. The exploitability of wireless communication and the mobility of UAV nodes make UAV networks face more challenges than ordinary MANETs. The threats that cause the UAV network to fail to accomplish its mission are not to be ignored.
  • Environmental Threats: The UAV network mission execution environment is complex and variable, which may be a distress rescue site or an enemy-occupied area on the battlefield. The interference of unknown terrain topography leads to frequent partitioning of the UAV network and rapidly changing topology information, increasing the overhead of network routing reconfiguration. Multiple anti-drone techniques can not only disrupt communications, but can even cause direct drone damage. UAV networks are thus required to be scalable, adapt to network scaling caused by the environment, and dynamically sense the departure and joining of network nodes.
  • Cyber Attacks: The hostile environment and the openness of wireless communication are the security of the UAV network is vulnerable. External malicious nodes can launch a variety of network attacks, such as DOS attacks, black hole attacks, can collude wormhole attacks, etc. These attacks verify to weaken the availability and scalability of the network. Link layer attacks can achieve intrusion hijacking of legitimate nodes. Internal attacks launched by nodes compromised with legitimate identities can cause more damage to the network. Therefore, in addition to establishing an authentication environment to prevent unauthorized access, the UAV network should also have the ability to detect node trustworthiness in real time and isolate untrustworthy internal nodes from the mission network in a timely manner.
  • Selfish Nodes: Due to their reduced energy, nodes only receive messages and do not forward them out of self-protection. Although such uncooperative zombie nodes do not launch harmful attacks, they interfere with the network routing configuration and generate invalid communications, wasting energy and reducing the overall performance of the network. The system should also have the ability to identify and tag them for isolation.

3.2. Network Model

Drone clustering is an important model for UAV network applications to enhance the destructive resistance of UAV networks with node redundancy and provide mission completion rates. The large-scale mission environment and numerous nodes make the scale UAV network has higher requirements for scalability and security. Based on the threats that exist, the mission-oriented UAV network is essentially an asynchronous network with Byzantine General problem at scale, containing different network models containing two phases of mission preparation and mission execution.
  • Centralized network: The centralized network in the mission preparation phase completes the initialization of the nodes and the network in a secure environment with the registration server as the center. All UAV nodes participating in the mission provide their own unique information, such as IP, NIC address, etc., and submit registration applications to the center. The registration server allocates the corresponding public and private keys of the UAV nodes and generates 48-bit hash values for each UAV node based on the public key as the UAV identity I D i . The registration center will accumulate all IDs into a fixed-size identity vector commitment I D based on the size of I D i , and calculate the witness W i of the identity existence corresponding to I D i , and initialize an empty one for storing the untrusted node word vector commitment, and randomly select M authorized proxy nodes as the consensus committee. The registry creates the Genesis block and deploys the membership information of the consensus committee, the identity vector commitment and the corresponding identity authentication smart contract in it. The blockchain program is deployed on each drone node I D i , allocating the corresponding key pair P K i , S K i , and identity witness W i , and synchronizing the creation block to complete node initialization, and I D i becomes a blockchain network node. The final composition of the UAV network with N nodes is denoted as { I D i } , i { 1 , 2 , , N } .
  • Distributed network: The UAV network in the mission execution phase is an asynchronous distributed network. After the mission starts, the registration server is not involved in the mission and the UAV network is handed over to the blockchain system for management, which is mainly responsible for node identity authentication and node trustworthiness decision during communication. Authorized agent points constitute the upper logical network I D A j , ( j [ M ] ) , which is responsible for consensus computing and inter-zone routing. Combined with the ZRP routing protocol. By detecting the forwarding behavior of nodes, an adaptive reconfigurable network model with hierarchical architecture is constructed based on a continuously updated blockchain.

5. Scheme Feasibility Analysis

From the perspective of routing protocols, the BC_TZRP scheme is a method for secure routing of UAV nodes based on the blockchain’s record of node trustworthiness changes. From the perspective of network reconfiguration, the scheme is a blockchain system for adaptively reconfiguring the trusted network using node state changes. This blockchain system evaluates the trustworthiness of neighboring nodes in real time by monitoring the forwarding behavior of nodes through the ZRP protocol and records the changes in the trustworthiness of network nodes with a shared ledger. However, the timeliness of UAV network tasks and the light weight of UAV nodes require the blockchain system to be feasible in terms of operational overhead, scale management and security when reconstructing the trusted network in order to achieve a reasonable allocation of network resources and ensure the completion rate of tasks. Comparing the classical consensus algorithms POW, POS and PBFT, the following content analyzes the blockchain system in terms of computation, time complexity of communication, network scalability and security in conjunction with traditional blockchain application technologies.

5.1. Complexity Analysis

The consensus algorithm is the core of the blockchain and the main overhead of the system resources. The main purpose of this scheme is to dynamically reconfigure the network according to the nodes’ own state changes, including changes in trustworthiness, energy consumption and location, in order to ensure the availability and feasibility of the drone network. However, the drone nodes in the mission are limited in terms of bandwidth, computation, storage and energy resources, and the consensus algorithm must coordinate the complexity of computation, communication and storage to achieve a reasonable allocation of resources, especially energy consumption. The private blockchain created by the scheme in this paper, the main decentralized data asynchronous provable consensus algorithm used. The consensus algorithm uses a smart contract for authentication and transaction verification in the Genesis block to prove the authenticity of the source of the transaction and the integrity of the data with a computational complexity of O ( 1 ) . The POS and PBFT consensus algorithms do not need to compete for bookkeeping rights, and their computational complexity for verifying transactions is of constant order O ( C ) . The computational complexity of the POW consensus is O ( 1 / 2 N 2 + 2 / 3 N ) , which is as high as O ( N log N ) even after immediate optimization, while the computational complexity of the POW consensus is mainly in the solution of the Hash problem. In terms of communication complexity, the nodes communicate with each other in a similar way as PBFT, and the consensus is completed when 2/3 of the nodes have confirmed the received transaction. The length of the data that requires consensus is | m | , and the required communication complexity is O ( | m | N 3 ) . The decentralized asynchronous provable consensus method of this party divides the transaction data based on the number of proxy agents and the size order of their IDs, and uses decentralized stable broadcast control communication (DRBC), if the number of proxy agents is M and the number of nodes in the whole network is N, M < < N , the communication complexity is O ( M | m | M 2 / N ) . In the POW or POS consensus algorithm, the communication complexity is O ( 1 ) , but its consensus result is probabilistic and requires multiple consensus rounds to determine, with Bitcoin’s POW requiring six consensus rounds to determine a transaction and POS requiring longer consensus rounds. Table 4 shows the performance comparison of different consensus algorithms in terms of their associated complexity.
Table 4. Consensus methods performance comparison.

5.2. Scalability Analysis

Mission-oriented UAV networks use scale, node redundancy to guarantee mission completion rates in complex environments. Thus the scalability of the network is important. There are many factors that affect the scalability of the network, such as routing overhead, transmission delay, DOS attacks, etc. Storage resources also limit the scalability of the network when using blockchain as the management platform.
First, the routing overhead of establishing and maintaining is too large, which not only occupies too many computing resources, but also squeezes the bandwidth space for normal business data. Moreover, the large network range and many network nodes lead to excessive network transmission delay, which cannot meet the requirements of UAV network timeliness. Thus, the reconfiguration methods of UAV networks with planar architecture, such as OLSR, AODV, etc., do not have good scalability. The recommended scheme is based on ZRP routing protocol improvement, which combines intra-zone routing with a small delay, and inter-zone routing with low routing overhead to build a blockchain-managed hierarchical network architecture with good scalability.
Second, DOS attacks make the network process a large number of invalid requests, which seriously affects the availability of UAV networks, and the larger the network size, the more serious the impact. Thus, it is also a key factor limiting the scalability. BC_TRZP scheme builds the authentication environment of the UAV network, for which the requested nodes can be verified quickly with O ( 1 ) complexity by identity vector commitment to stop DOS attacks and improve the scalability of the network.
Finally, the blockchain management platform can effectively provide node trust management, but the continuously growing blockchain ledger is also a challenge to the storage capacity of nodes. Traditional blockchain uses timestamp and hash chain to pack all transactions into blocks, which are uploaded to the chain after consensus. The transactions of the drone network are the nodes’ own state data, and the amount of data is generated all the time and keeps growing. The limited storage capacity of nodes also causes the network to be unscalable, because the larger the network size is, the more transactions there are. This scheme adopts a two-stage consensus approach, where the state data of the cycle is consensual and then processed for decision making. The decision result is only the node trustworthiness of very small size and configuration information such as proxy. This configuration information is used to build new blocks, while a large amount of local state data is discarded after decision consensus, thus guaranteeing the scalability of the UAV network.

5.3. Security Analysis

Security is necessary for UAV networks in insecure environments. The blockchain system in this solution provides the function of node authentication, and each node is assigned public and private keys, a unique identity ID, and an identity witness of the existence network to prevent unauthorized access by external nodes. At the same time, the blockchain keeps updating the trustworthiness of the network nodes and isolates the network from legitimate but untrustworthy nodes to maximize resistance to black hole attacks, gray hole attacks, impersonation attacks, multiple identity attacks, etc. The statistical analysis of the global trustworthiness of block nodes can also detect selfish nodes and malicious lying nodes and prevent collusion attacks by giving high scores to each other. All of the above enables the BC_TZRP scheme to ensure the trustworthiness of participating network nodes through adaptive reconfiguration of the network, which in turn guarantees the security of the UAV network during the entire mission.
The UAV network uses a fuzzy K-Modes clustering approach to cluster the list of neighbor IDs provided by the Neighbor Node Detection Subprotocol (NDP) to select the trusted central nodes in the partition. These central nodes constitute the upper logical network for consensus operations and for completing inter-partition routing. Through each consensus of the blockchain, the members of the upper logical network are updated periodically. This not only increases the scalability, but also allocates resources rationally, improves the lifetime of the whole network, and ensures the safe use of the UAV network.

6. Simulation Experiments and Effectiveness Analysis

The dynamic reconfiguration of UAV trusted networks relies on the blockchain-assisted Trusted Zone Routing Protocol (BC_TZRP), which is implemented as new blocks are chained during the growing blockchain. Through simulation experiments, the performance of the classical Ad Hoc network routing protocol in terms of data transmission delay, packet delivery rate and routing overhead is verified and compared with that of the classical Ad Hoc network routing protocol when the number of error nodes gradually increases.
The simulation software uses Qualnet network simulation software, which uses the standard OSI seven-layer model framework and is optimized for wireless mobile communication networks. During the simulation, the behavior of each node of the network is calculated independently to match realistic network operation and provides detailed and varied statistical data analysis functions. This paper designs mission scenarios, the scene size of the simulation experiment is 1000 × 1000 m 2 , the number of UAV nodes is 100, the simulation duration is 210 s, the number of data links is 30, the node movement speed is 0–30 m/s, the dwell time is 30 s, the packet sending interval is 500 ms, the malicious nodes are incremented by 0, 5, 10, 15, 20, 25, 30, the MAC layer protocol is 802.11b, and the wireless transmission range is 400 m. The wireless transmission range was 400 m. Each test protocol was run three times with different random numbers, and the average of the three runs was used as the basis for flat evaluation. Different random numbers indicate different trajectories of nodes in the network. The error nodes in the experiment mainly consist of compromised legitimate nodes, whose forwarding behavior is dangerous in the sense of deliberately dropping packets or forwarding inconsistent data; selfish nodes, which only actively send data and do not forward it; and failure points.
Packet Delivery Rate: The packet delivery rate is the ratio of packets successfully received by the destination node to those sent by the source node. Figure 4 represents the change in the guaranteed delivery rate of the four routing protocols as the number of error nodes increases.
Figure 4. Packet delivery rate for a progressively increasing number of fault nodes.
It is clear that AODV has the highest delivery rate when there are no error nodes, and the other protocols have similar delivery rates, but as error nodes continue to be created, the blockchain-assisted trusted area routing protocols remain largely unchanged, but the delivery rates of OLSR, AODV and ZRP drop sharply and eventually collapse. The reason for this is that BC-TZRP can isolate the largest number of untrustworthy nodes from the network and dynamically reconfigure the upper logical network used for consensus, thus providing high fault tolerance. Moreover, as the number of erroneous nodes increases, the network’s erroneous routing information leads to non-stop maintenance and reconfiguration of road routes under the other three protocols, resulting in a high rate of delivery degradation.
Routing Overhead: The routing overhead is the number of routing control packets sent out by all nodes in the same condition. Figure 5 shows the status of routing overhead for each routing protocol under different error nodes. In the absence of errant nodes, both ZRP and AODV have low routing overhead and OLSR has the highest routing overhead, but as errant nodes appear the overhead of OLSR, AODV and ZRP increases rapidly and OLSR is the first to crash as the routing overhead exhausts the radio bandwidth, but BC_TZRP stays at a low level and shows a continuous downward trend due to the isolation of untrustworthy nodes. For the same reason, erroneous nodes generate a lot of invalid routing information, leading to an increase in the routing overhead of classical routing protocols, whereas the nodes involved in route construction and maintenance in BC_TZRP are trusted, avoiding the interference of invalid routing information, and the routing overhead remains largely unchanged.
Figure 5. Routing overhead for the case of progressively increasing fault nodes.
The average end-to-end delay refers to the time elapsed from the time the packet leaves the source node until the packet arrives at the destination node. As can be seen in Figure 6, in the absence of error nodes ZRP has the lowest latency, OLSR is at the low end and AODV has a higher latency, again due to interference from error nodes, the average end-to-end latency of all three rises rapidly and when error nodes exceed 25, the network system is in a state of collapse and the latency tends to infinity. BC_TRZP maintains the actual trustworthiness of the network performing the task, and by completing inter-zone routing through the upper layers of the network consisting of the regional centers, the average end-to-end delay was kept at a small level.
Figure 6. Avarage End-End delay for the case of progressively increasing fault node.
The purpose of the BC_TZRP scheme implementation is to reconfigure the new network based on the state of the nodes, through the records of the blockchain. The main component of reconfiguring the network is to isolate malicious nodes from the network. These malicious nodes are not in the new network, there are not involved in routing and data forwarding, so the changes in Figure 5 and Figure 6 are minor. On the other hand, the consensus mechanism is set when the node finds that the neighboring nodes are not trustworthy, it immediately requests the system to initiate consensus to isolate these wrong nodes in time. The behavior of the malicious node set in the experiment is to tamper with the forwarding information, and the discount of its trustworthiness is relatively large, and it is quickly determined as an untrustworthy node and expelled from the task network. So the actual of malicious nodes to do evil is very short and does not cause much harm to the network before being isolated.
The routing protocols of classical mobile Ad Hoc networks do not take into account the security of the routes. Although blockchain network systems provide authentication capabilities for UAV networks that can prevent unauthorized access by external malicious nodes, the complex mission environment has not only selfish and faulty nodes, but also the risk of Byzantine node generation. Experiments in this scenario were set up with varying proportions of erroneous nodes where compromised internal nodes (drones with legitimate identities) would initiate malicious tampering and packet drops. The blockchain-assisted trusted hierarchical routing protocol effectively maintains the trustworthiness of the UAV network during the mission process.
The decentralized and de-trusted blockchain system is the best choice in terms of global trustworthy management and rational use of network resources for distributed drone networks running in complex environments. However, unlike the traditional blockchain, drones as blockchain nodes have limited resources, and the consensus algorithm of the blockchain needs to be redesigned to meet the objective environment of asynchronous, lightweight, and dynamic generation of error nodes. The following content designs experiments for the lightweight storage and energy consumption problems of blockchain.
Blockchain Storage: The blockchain itself is a non-stop growing shared chain database to provide validation of transactions with the tamper-proof nature of historical data, thus requiring high storage capacity of blockchain nodes. An experimental scenario is designed with a network size of 100 nodes, with each node submitting transactions randomly within 5 s, no malicious nodes, and a 20-s cycle consensus. Using the Delegated Proof of Stake (DPOS) consensus algorithm, 21 nodes are designated to take turns to keep score and compare the storage consumption of blockchains with transaction packet sizes of 50 bytes and 100 bytes, respectively. The results of the simulation experiment are shown in Figure 7.
Figure 7. Blockchain Storage Growth Comparison.
Obviously, the BC_TZRP scheme has a small growth rate and is independent of the size of the transaction because it uses a two-stage consensus and the blockchain only keeps the consensus result of the decision, while the traditional blockchain of DPOS has a consensus for each block of the order taking consensus and all the transaction history data is saved to the blockchain, which has a large data growth rate and requires larger storage of blockchain time as the volume of transactions increases.
Energy Consumption: The energy consumption of the drone network is a key issue. The energy of a blockchain system is mainly consumed during the consensus computation in communication and computation overhead. An experimental scenario with 100 drone nodes is designed with ZRP routing concordance compared to a traditional blockchain. the POW consensus algorithm adjusts the number of zeros and transactions in the header of the requested hash to the specific test environment, which can result in a POW calculation time of roughly 20 s. The POS and PBFT consensus algorithms ensure that the consensus time is determined by setting the number of transactions. We provide the two-stage asynchronous consensus algorithm used in the bill. If the preferred asynchronous consensus algorithm fails to reach an agreement within the specified time, the proof-of-authority consensus algorithm is activated to ensure consensus within 20 s. The experiments track the communication and computation overhead of the consensus algorithm under different error nodes and translate the communication and computation overhead into energy consumption. The local state transactions obtained from real-time monitoring of the forwarding behavior of ZRP are subjected to consensus, and the overall network energy consumption is viewed under different experimental scenarios against POW and PBFT consensus algorithms, respectively. The results of the simulation experiment are shown in Figure 8.
Figure 8. Comparison of energy consumption in a consensus process with different numbers of malicious nodes.
Due to the presence of malicious nodes, the traditional blockchain scheme generates invalid routing information during the routing process, increasing the communication and computation overhead. For the POW consensus algorithm, although the communication overhead is small, all nodes consume arithmetic power by participating in the competition for bookkeeping rights, so the consumption is the largest. The POS consensus algorithm does not need to consume arithmetic power, but with the increase in malicious nodes, its invalid routing process also increases the overall network consumption. The PBFT also increases energy consumption due to the increase in malicious nodes and the increase in view switching frequency in the consensus process. The BC_TZRP scheme reconfigures the network periodically to exclude untrustworthy nodes from the network, minimizing the generation of interfering routes, and replacing the agent nodes used for consensus delegation every cycle is a more reasonable resource allocation for the whole network, so the consensus overhead is basically the same in the presence of different numbers of malicious nodes.

7. Conclusions

This solution combines the operational process of the blockchain system with the dynamic update of the UAV network routing, where the evaluation of the data forwarding behavior of nodes to their respective neighboring nodes during intra-zone routing is combined with the list of neighboring nodes to construct node local state transactions. The periodically elected central node phase of the zone is used by the upper layer network to reach consensus on the local state of the network’s prime nodes. The consensus results are used to perform a global trust assessment of the nodes, obtain new zone centers through clustering, generate new blocks, update the blockchain and then reconstruct the upper layer network. The tasking process of the UAV network is also a recording process of the blockchain system for node state migration and the continuous reconfiguration of the UAV network, with the aim of identifying and isolating untrustworthy nodes in a timely manner and maintaining the overall performance of the UAV network during the tasking process, which has also been proven to be effective in simulation experiments.

Author Contributions

Conceptualization, L.K.; Data curation, L.K.; Investigation, F.H.; Project administration, B.C.; Writing—original draft, L.K.; Writing—review & editing, F.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Key Research and Development Program of China, under Grant 2019YFB2102002; in part by the National Natural Science Foundation of China, under Grant 62176122, 62001217; in part by A3 Foresight Program of NSFC, under Grant No. 62061146002.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Army Day 2021: Offensive Swarm Drone System Demonstrates Capabilities for the First Time. 2021. Available online: https://timesofindia.indiatimes.com/videos/news/army-day-2021-offensive-swarm-drone-system-demonstrates-capabilities-for-the-first-time/videoshow/80282977.cms (accessed on 15 January 2021).
  2. Ferreira, R.; Gaspar, J.; Sebastião, P.; Souto, N. A Software Defined Radio Based Anti-UAV Mobile System with Jamming and Spoofing Capabilities. Sensors 2022, 22, 1487. [Google Scholar] [CrossRef] [PubMed]
  3. Cheng, F.; Liang, Z.; Peng, G.; Liu, S.; Li, S.; Ji, M. An Anti-UAV Long-Term Tracking Method with Hybrid Attention Mechanism and Hierarchical Discriminator. Sensors 2022, 22, 3701. [Google Scholar] [CrossRef] [PubMed]
  4. Zhao, J.; Wang, G.; Li, J.; Jin, L.; Fan, N.; Wang, M.; Wang, X.; Yong, T.; Deng, Y.; Guo, Y.; et al. The 2nd Anti-UAV Workshop & Challenge: Methods and Results. arXiv 2021, arXiv:2108.09909. [Google Scholar]
  5. Jiang, N.; Wang, K.; Peng, X.; Yu, X.; Wang, Q.; Xing, J.; Li, G.; Zhao, J.; Guo, G.; Han, Z. Anti-UAV: A Large Multi-Modal Benchmark for UAV Tracking. arXiv 2021, arXiv:2101.08466. [Google Scholar]
  6. Brust, M.R.; Danoy, G.; Stolfi, D.H.; Bouvry, P. Swarm-based counter UAV defense system. Discov. Internet Things 2021, 1, 1–19. [Google Scholar]
  7. Clausen, T.H.; Jacquet, P. Optimized Link State Routing Protocol (OLSR). RFC 2003, 3626, 1–75. [Google Scholar] [CrossRef]
  8. Pei, G.; Gerla, M.; Chen, T. Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks. In Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, ICC 2000, New Orleans, LA, USA, 18–22 June 2000; pp. 70–74. [Google Scholar] [CrossRef]
  9. Hassan, M.A.; Ullah, S.I.; Khan, I.U.; Shah, S.B.H.; Salam, A.; Khan, A.W.U. Unmanned Aerial Vehicles Routing Formation Using Fisheye State Routing for Flying Ad-hoc Networks. In Proceedings of the ICFNDS’20: The 4th International Conference on Future Networks and Distributed Systems, St. Petersburg, Russia, 26–27 November 2020; ACM: New York, NY, USA, 2020; pp. 9:1–9:7. [Google Scholar] [CrossRef]
  10. Perkins, C.E.; Belding-Royer, E.M.; Das, S.R. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 2003, 3561, 1–37. [Google Scholar] [CrossRef]
  11. Pandey, P.; Singh, R. Efficient Route Selection Scheme in MANET Using Enhanced AODV Protocol. Wirel. Pers. Commun. 2022, 123, 959–974. [Google Scholar] [CrossRef]
  12. Qin, L.; Kunz, T. Pro-active route maintenance in DSR. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2002, 6, 79–89. [Google Scholar] [CrossRef]
  13. Ko, Y.; Vaidya, N.H. Location-Aided Routing (LAR) in mobile ad hoc networks. Wirel. Netw. 2000, 6, 307–321. [Google Scholar] [CrossRef]
  14. Gasmi, R.; Aliouat, M.; Seba, H. A Stable Link Based Zone Routing Protocol (SL-ZRP) for Internet of Vehicles Environment. Wirel. Pers. Commun. 2020, 112, 1045–1060. [Google Scholar] [CrossRef]
  15. Sinha, P.; Krishnamurthy, S.V.; Dao, S.K. Scalable unidirectional routing with zone routing protocol (ZRP) extensions for mobile ad-hoc networks. In Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, WCNC 2000, Chicago, IL, USA, 23–28 September 2000; pp. 1329–1339. [Google Scholar] [CrossRef]
  16. Lv, X.; Le, X.; Ding, K. An Improved Cluster Routing Algorithm Based on ZRP Protocol. In Proceedings of the Wireless Internet—10th International Conference, WiCON 2017, Tianjin, China, 16–17 December 2017; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Li, C., Mao, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; Volume 230, pp. 261–271. [Google Scholar] [CrossRef]
  17. Zhou, B.; Lee, Y.; Gerla, M.; Rango, F.D. Geo-LANMAR: A scalable routing protocol for ad hoc networks with group motion. Wirel. Commun. Mob. Comput. 2006, 6, 989–1002. [Google Scholar] [CrossRef]
  18. Lee, Y.; Chen, J.; Hong, X.; Xu, K.; Breyer, T.M.; Gerla, M. Experimental evaluation of LANMAR, a scalable ad-hoc routing protocol. In Proceedings of the IEEE Wireless Communications and Networking Conference, WCNC 2005, New Orleans, LO, USA, 13–17 March 2005; pp. 2032–2037. [Google Scholar] [CrossRef]
  19. Ourouss, K.; Naja, N.; Jamali, A. Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol. Wirel. Pers. Commun. 2021, 116, 207–226. [Google Scholar] [CrossRef]
  20. Anand, A.; Rani, R.; Aggarwal, H. A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks. KSII Trans. Internet Inf. Syst. 2015, 9, 4701–4719. [Google Scholar] [CrossRef]
  21. Choudhury, P.; Kumar, M.P.; Agarawal, R.K.; De, T. Reputation Based Resistance for Route Request Flooding Attack in MANETs. In Proceedings of the 2010 International Conference on Wireless Networks, ICWN, Las Vegas, NV, USA, 12–15 July 2010; Arabnia, H.R., Clincy, V.A., Deligiannidis, L., Solo, A.M.G., Eds.; CSREA Press: Las Vegas, NV, USA, 2010; Volume 2, pp. 240–245. [Google Scholar]
  22. Oliviero, F.; Romano, S.P. A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks. In Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November–4 December 2008; pp. 1935–1939. [Google Scholar] [CrossRef]
  23. Guillaume, L.; Van de Sype, J.; Schumacher, L.; Di Stasi, G.; Canonico, R. Adding reputation extensions to AODV-UU. In Proceedings of the 2010 17th IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT2010), Enschede, The Netherlands, 24–25 November 2010; pp. 1–6. [Google Scholar]
  24. Azza, M.; Hacene, S.B. An Enhanced Reputation-based for Detecting Misbehaving Nodes in MANET. Int. J. Wirel. Microw. Technol. (IJWMT) 2017, 7, 28–37. [Google Scholar] [CrossRef]
  25. Jarjis, A.; Kadir, G. Blockchain Authentication for AODV Routing Protocol. In Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, BCCA 2020, Antalya, Turkey, 2–5 November 2020; Alsmirat, M.A., Jararweh, Y., Aloqaily, M., Özkasap, Ö., Eds.; pp. 78–85. [Google Scholar] [CrossRef]
  26. Careem, M.A.A.; Dutta, A. Reputation based Routing in MANET using Blockchain. In Proceedings of the 2020 International Conference on COMmunication Systems &NETworkS, COMSNETS 2020, Bengaluru, India, 7–11 January 2020; pp. 1–6. [Google Scholar] [CrossRef]
  27. Goka, S.; Shigeno, H. Distributed management system for trust and reward in mobile ad hoc networks. In Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, CCNC 2018, Las Vegas, NV, USA, 12–15 January 2018; pp. 1–6. [Google Scholar] [CrossRef]
  28. Li, G.; He, B.; Wang, Z.; Cheng, X.; Chen, J. Blockchain-enhanced spatiotemporal data aggregation for UAV-assisted wireless sensor networks. IEEE Trans. Ind. Inf. 2021, 18, 4520–4530. [Google Scholar] [CrossRef]
  29. Islam, A.; Al Amin, A.; Shin, S.Y. FBI: A federated learning-based blockchain-embedded data accumulation scheme using drones for Internet of Things. IEEE Wirel. Commun. Lett. 2022, 11, 972–976. [Google Scholar] [CrossRef]
  30. Arnold, R.; Longley, D. Continuity: A deterministic Byzantine fault tolerant asynchronous consensus algorithm. Comput. Netw. 2021, 199, 108431. [Google Scholar] [CrossRef]
  31. Li, K.; Hua, C.; You, X. Distributed Asynchronous Consensus Control for Nonlinear Multiagent Systems Under Switching Topologies. IEEE Trans. Autom. Control 2021, 66, 4327–4333. [Google Scholar] [CrossRef]
  32. Knudsen, H.; Li, J.; Notland, J.S.; Haro, P.H.; Ræder, T.B. High-Performance Asynchronous Byzantine Fault Tolerance Consensus Protocol. In Proceedings of the 2021 IEEE International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, 6–8 December 2021; Xiang, Y., Wang, Z., Wang, H., Niemi, V., Eds.; IEEE: Manhattan, NY, USA, 2021; pp. 476–483. [Google Scholar] [CrossRef]
  33. Kuo, R.; Zheng, Y.R.; Quyen, N.T.P. Metaheuristic-based possibilistic fuzzy k-modes algorithms for categorical data clustering. Inf. Sci. 2021, 557, 1–15. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.