Beyond Flight: Enhancing the Internet of Drones with Blockchain Technologies
Abstract
:1. Introduction
2. Motivation and Contribution
3. Research Methodology
4. The Internet of Drones (IοD)
4.1. Background of the Internet of Drones (IoD)
4.2. Fundamental IoD Architecture
4.3. Security in the IoD
4.3.1. Localization Error-Based Attacks
4.3.2. Attacks Based on Security and Privacy Requirements
4.3.3. Localization Error-Based Attacks
5. Blockchain Fundamentals
5.1. Overview of Blockchain
- Distribution: Thanks to distribution, independent computers or nodes keep sharing, recording, and synchronizing transactions in their respective electronic ledgers through protocols and supporting infrastructure. In this manner, the process remains transparent, dependable, and reliable.
- Immutability: Since each block is specified with a string of characters obtained by a cryptographic hash function, representing recorded transactions, stored data remain immutable and unable to be manipulated.
- Decentralization: This indicates the transfer of control, authority, and decision-making from an individual, organization, or group to a distributed network or its participants, averting the abuse of power. Consequently, assets can be stored in the network without the oversight or control of a single person or entity.
- Transparency: Each participant in the blockchain system holds a copy of the blockchain for the verification of initiating a transaction by a legitimate user.
- Tamper-proofing: After the verification of each block by (all) participants, it is added to the blockchain through the confirmation of a consensus algorithm. Hence, the blockchain system maintains a tamper-proof ledger shared by the participants, without relying on a trusted third party.
- Security: Blockchain systems use asymmetric cryptographic building blocks to encrypt data, whose security generally relies on the underpinning consensus algorithm, and this is empowered by most of the participants.
5.2. Contribution of Blockchain to the IoD
- It overcomes single-point failures due to decentralization features.
- It provides enhanced security to drone communication.
- Drone data are transparently recorded, maintaining their integrity.
- It ensures accountability and traceability.
- It controls multi-signature access and decentralized administration.
- It secures shared data due to the encryption and hashing capabilities.
- It is based on the distributed consensus mechanism, enabling smart agreements, trust, and protection across the utilized decentralized network, with a transaction being validated as authentic [156].
- It ensures data privacy protection through cryptography [153].
- It offloads the provision of dynamical cache data [159].
- It provides a secure and transparent platform for managing valuable information and data obtained by drones [160].
- It ensures the confidentiality of all transactions following decentralized, distributed, and peer-to-peer (P2P) communication networks, with data being stored on each node [161].
- It ensures secure data sharing over a tamper-proof and decentralized ledger [162].
6. Underpinning Technologies for IoD–Blockchain Integration
6.1. Artificial Intelligence (AI)
- Local training of models and sharing by a central server: This allows drones to operate autonomously and contribute to the collective knowledge of the entire network. Specifically, it enables data recording and management, sharing of model updates within the blockchain, coordination between participants, and ensuring transparency, immutability, and trust in the IoD ecosystem.
- Additional transaction security: During the flight of drones, AI-based mechanisms support the safety of drone operations by detecting potential risks, such as collisions or unauthorized intrusions. When data are inserted into the blockchain, an additional layer of security is added to it, identifying and preventing or minimizing the risk of fraud and detected anomalies in transactions. In this manner, the transparency of the transactions is increased, reducing the need for intermediaries.
- Automating processes of the IoD and blockchain: The key to automatic enhancement is the integration of AI, decentralized decision-making through blockchain, and automation to enable systems to adapt and improve autonomously. Drones operate autonomously without direct human intervention and can dynamically adjust their routes based on real-time data, traffic, weather conditions, and mission priorities. In addition, drones analyze sensor data in real time for object detection, path planning, and decision-making during missions, with the system automatically scheduling maintenance and even ordering replacement parts or services, while blockchain facilitates decentralized coordination among drones, allowing them to share information and collaborate effectively. Smart contracts on the blockchain can govern interactions and decision-making, as they can be designed to adapt and optimize themselves based on changing conditions and performance data [170,171].
- Scalability improvements: Drones collect a vast amount of data that are distributed in a decentralized system towards multiple nodes while optimizing blockchain consensus algorithms, making blockchain networks more efficient and scalable. AI algorithms can allocate resources such as processing power and bandwidth dynamically, based on the specific requirements of each drone’s mission, ensuring efficient resource utilization and scalability. In addition, AI facilitates multi-drone coordination, allowing them to collaborate efficiently in various tasks, such as surveillance, search and rescue, or delivery. Moreover, AI analyzes real-time data to optimize the routing of drones, enabling them to avoid congestion [31].
- Congestion of transactions: Congestion in the drones’ communication network can result in communication delays, disrupting the execution of drone tasks that rely on real-time data sharing and control commands, as well as malfunctions and errors during drone fleet missions, causing disturbances in their coordination. Taking into consideration the aspect of blockchain, transaction delays are also present. AI can help improve congestion by prioritizing transactions based on their size and urgency, analyzing historical data and network conditions to predict potential congestion, distributing transaction data processing across the network nodes evenly, preventing specific nodes from becoming bottlenecks during congestion, and allocating resources dynamically to drones based on their current tasks and priority levels [172]. This ensures that drones with critical missions are supplied with the required resources during such situations, manage the communication traffic efficiently, reduce congestion by scheduling data transmission, and control the flow of information between drones and central servers [45,173].
- Communication: The wireless communication among the drones and data management within blockchain is secure, thanks to AI providing efficient decentralized intelligence. AI can assist drones in selecting optimal communication paths, optimize the utilization of the available frequencies, and enable drones to dynamically switch to different frequencies or channels to avoid interference, facilitating multi-drone communication coordination. Furthermore, UAVs’ robustness, resilience, and efficiency are improved by applying Machine Learning, Deep Learning, and ANN-optimized UAV communication networks [64]. Meanwhile, in the case of blockchain, AI provides efficient and secure data transfer, optimizing the communication and load distribution between wireless nodes [174,175].
- Consumption of energy: During data transmission between drones and Ground Stations, or among drones, a significant amount of energy is consumed. In addition, data processes within blockchain, or features such as the execution of complex smart contracts, contribute to additional energy consumption. AI can optimize drone routes and flight patterns, making them more energy-efficient, reducing operational costs [176], and establishing intelligent decision-making in relation to data blocks and the overall ledger [177].
6.2. Cloud Computing (CC)
- Scalability: There are platforms with on-demand resources, allowing IoD applications to scale up or down as needed. Thus, CC provides the capability of handling a variable number of drones or accommodating traffic spikes during specific missions, as well as supplementing blockchain storage depending on the resources required by the utilized nodes [179,180].
- Data storage: The IoD generates large volumes of data, such as high-definition images and videos, which can be efficiently stored in the cloud, since blockchain networks often require extensive data storage for the ledger. Cloud storage can provide a reliable and cost-effective solution for storing blockchain data. In addition, CC prevents data losses, offering data copies that are stored in different nodes [181].
- Cloud-based AI: In this case, cloud-based AI and analytics tools can be used to process and analyze the vast amounts of data generated by drones. This is valuable for extracting insights, detecting anomalies, and optimizing operations.
- Security: Cloud providers often offer robust security features, including encryption and access control, to protect the data and communication within IoD and blockchain networks.
6.3. Edge Computing (EC)
- Data transfer: It enables drones to perform data processing and decision-making procedures at the edge, reducing the need to transmit large volumes of data to central servers. This reduces network congestion and enhances scalability while minimizing the requirement of transferring massive data volumes over blockchain.
- Low latency: It reduces latency by processing data and making decisions closer to the source, which is crucial for real-time communication, obstacle detection, and collision avoidance in IoD applications, while it accelerates the verification and propagation of blockchain transactions. Consequently, there are significant improvements in the speed of confirmations and transactions [184].
- Offloading tasks: Combined with AI, it facilitates the computational flow of the server to offload tasks and data, providing lower latency, higher reliability, improved security and privacy, and reduced costs and energy consumption [31,185]. Thus, data streams are shortened to remote centralized servers because of the computational services at the edge of the network [182], while blockchain technology is used to further enhance the capabilities of EC, allowing secure communications and data processing by enabling decentralized approaches [186].
- Data storage: Since the data collected can be stored within the blockchain, edge devices can store a copy of the blockchain ledger, reducing the reliance on central servers for data access and ensuring data integrity, while smart contracts can be executed at the edge, allowing for quicker and more responsive automation of contractual agreements without the need for centralized cloud services.
- Security and Privacy: Sensitive data obtained by drones can remain on the edge device or gateway, reducing the exposure to potential security threats and privacy breaches that may occur during data transmissions to a central server. Also, during data transfers within the blockchain, an extra layer of security is included, allowing for localized encryption and data validation at the source.
6.4. Internet of Things (IoT)
- Real-time data acquisition: IoT sensors and devices on drones result in the collection of real-time data—specifically, smart monitoring of environmental factors like temperature, humidity, air quality, and radiation levels, with the data being able to be registered on a blockchain for storage, analysis, and further decision-making tasks. Similarly, depending on the status of the collected data, IoT devices can trigger warning notifications and reports to the related stakeholders, with the history of the reported data being stored in an immutable decentralized ledger. Also, IoT devices can be used for identity verification and access control in blockchain-based systems, enhancing security and privacy.
- Collision Avoidance: IoT sensors can detect nearby objects, including other drones, aircraft, and obstacles, preventing potential collisions, and ensuring their physical integrity and safety during flights. Such an approach is handled with the registration of IoT data within a decentralized system dedicated to the drones’ coordination. Drones can share their positions and intentions on a blockchain, and smart contracts can govern their interactions, providing a framework for collision avoidance strategies through immutable flight data, including routes, altitudes, and times, which can be reviewed in case of incidents or accidents. Analyzing these data can help identify the causes of collisions and develop preventive measures.
6.5. Communication Technologies
- Properties of 5G networking:
- Low Latency: 5G offers significantly lower latency (below 1 ms) compared to previous generations of mobile networks, supporting high data transmission rates in the range of Gbps. Since drones collect real-world data, 5G’s low latency and high bandwidth can facilitate this procedure of utilizing external data sources when the related data are inserted into a blockchain, with smart contracts enhancing the capabilities of blockchain-based oracles. This is crucial for real-time communication and decision-making in drone operations, while during the data processing in blockchain, low latency in the 5G network provides faster transaction confirmation, propagation, and validation, leading to faster confirmation times [194,195].
- High Bandwidth: The high bandwidth of 5G networks allows drones to transmit large volumes of data, including high-definition video feeds, sensor data, and imagery. When the corresponding data are inserted into the blockchain, a unification is achieved between the security of the decentralized mechanism and the increased bandwidth of 5G, resulting in advanced scalability, encryption, and authentication [196].
- Reliable Connectivity: 5G provides a more reliable and stable connection for drones, reducing the risk of signal loss or interference, which is vital for maintaining control and communication in critical missions, while blockchain provides faster and more reliable 5G networks, improving the cross-chain communication and enabling the transfer of assets and data obtained by drones between different blockchain networks more seamlessly [197].
- Network Slicing: 5G supports network slicing, allowing operators to dedicate specific network slices to IoD ecosystems, ensuring that drones have dedicated resources and guaranteed service quality, and enhancing the overall performance. Meanwhile, the transactions are processed more efficiently, improving the performance of blockchain networks, especially in scenarios with high transaction volumes [192].
- Properties of 6G networking:
- Ultra-Low Latency: 6G is expected to provide even lower latency than 5G, potentially enabling near-instantaneous communication between drones and control centers. It is expected that the 6G network will have a transmission rate up to Tbps, i.e., 1000 times faster than 5G, and the ability to provide latency in ms, which is crucial for real-time decision-making and autonomous drone operations. In addition, with 6G’s improved connectivity and low latency, drones can operate in swarms with greater autonomy, facilitating collaborative tasks and coordinated missions, while in blockchain 6G can enable faster consensus mechanisms, reducing the time required for transaction validation. Thus, high transaction volumes are handled easily, with the capability of being processed simultaneously, making blockchain networks more efficient and responsive [197,198].
- Terahertz Frequencies: 6G may operate at terahertz frequencies, allowing for higher data rates and more efficient data transmissions. Drones can stream ultra-high-definition videos and sensor data, offering more precise positioning and navigation capabilities, and ensuring accurate location information for drones. In blockchain, 6G frequencies provide faster and more efficient data transmissions and consensus mechanisms, as well as seamless exchange of data and assets between various blockchains [197].
- Secure Communication: 6G is expected to introduce advanced security features, such as quantum-resistant encryption, which can ensure the confidentiality and integrity of data exchanged between drones and other network components. Moreover, blockchain is expected to introduce advanced security mechanisms, including post-quantum cryptography, which can further enhance the security of decentralized networks [199,200,201].
7. IoD and Blockchain-Enabled Features and Applied Use Cases
7.1. Supply Chain
7.2. Healthcare
7.3. Natural Disasters
7.4. Charging/Refueling Stations
7.5. Agriculture
7.6. Transportation
7.7. Media
8. Discussion and Open Issues
8.1. Security and Privacy
- I.
- Access control and authentication of UAVs can fail with affected and centralized authentication methods. Thus, secure decentralized communications among drones, and between drones and GSS, should be ensured [16].
- II.
- Due to the lack of robust communication between devices, blockchain should be combined with solutions such as 5G-enabled IoD, utilization of multiple signatures, and smart contracts [231].
- III.
- Regarding security and privacy issues of blockchain in 5G-based IoD environments, a more robust blockchain, in terms of security, would improve data management between communicating entities in the IoD [70].
- IV.
- Although cryptographic functions and a consensus mechanism are available in blockchain, insurance of the integrity of the drone-collected data and the processing rate of transactions are limited. Thus, it would be useful to expand the throughput and develop mechanisms that will support the participation derived by multiple entities [232].
- V.
- Blockchain preserves the privacy of users and drone owners through the implementation of pseudo-random identities. However, transaction data are visible to all participants. A potential solution would be the development of novel encryption methods that prevent correlations with previous data blocks [232].
- VI.
- The development of powerful security protocols enhanced with blockchain cryptographic features will tackle repeated attacks, such as man-in-the-middle infiltrations taking place in the computing environment of the IoD, providing low computational and communication costs [233].
- VII.
- Lack of security and privacy during the design stage requires the construction of suitable strategies, including the forensic mechanism to eliminate attacks, as well as tracing and reconstructing attack events [234].
8.2. Data Communication
- I.
- Lack of security mechanisms for cyber–physical systems to guarantee the secure transmission of information between drones, requiring the development of mechanisms focused on the verification of registrations and transactions within the integrated blockchain. Deep Learning approaches are an ideal solution for the protection of flight paths during the exchange of data between drones and GCSs [118].
- II.
- Lack of security of unmanned traffic management in the IoD, requiring mechanisms providing secure and unalterable traffic data between drones and GCSs. A potential solution is logging the respective data into immutable decentralized ledgers [153].
- III.
- The lack of the node’s memory in terms of data storage is conflicting due to the constant growth of data blocks being correlated with each other, along with the storage required for the drone to collect the predefined data, resulting in the requirement of additional memory space. Hence, consideration of the node’s data storage requirements is essential [235].
- IV.
- In the context of the IoD, many drones collect a vast amount of data. Thus, data collection and storage among a sufficient number of blockchain nodes for load sharing would be a potential solution. The development of aggregation schemes is required to ensure data security, energy efficiency, and reduced communication costs with integrated encryption techniques that can be used to provide confidentiality and access control of data [12].
8.3. Autonomy
- I.
- The lack of reliable infrastructure for an autonomous IoD is tackled by the utilization of decentralized tools for designing and developing IoD solutions. Hence, drone-based autonomous systems will ensure security and safety in the operating phase, avoiding risks and preventing mishaps [236].
- II.
- Avoidance of functionality errors caused by faulty devices is achieved through the development of a decentralized mechanism capable of monitoring malfunctions distributed in the interconnected IoD nodes, along with the comparison of different traditional architectures, to reduce the overall operational time and increase maintenance quality [237].
- III.
- There is a significant lack of drone operational control, causing demotivation of the relevant stakeholders. Thus, the creation of platforms with dedicated anti-spoofing tools, as well as related smart contracts with specific conditions, would improve the overall protection of the IoD system [238].
- IV.
- Energy efficiency is a big challenge due to the requirements for data processing, storage, transmission, and operation of blockchain functionalities. An efficient solution would be the development and adoption of smart systems capable of supplementing the existing IoD solutions for minimal energy consumption [38].
8.4. Wireless Communications/Networking
- I.
- Security and privacy challenges regarding the broadcasting of wireless communications result in important vulnerability of UAVs. The contribution of enabling technologies, such as AI and blockchain for the design of intelligent decentralized drones, would assist in the overall data security and privacy in different communication layers while controlling and monitoring the operational flow of the IoD system [36].
- II.
- Challenges related to the lack of network maintenance services are tackled with the development of protocols and the distribution of resource allocations. Additional indicative solutions include the availability of models that efficiently monitor and calculate the performance of multi-core CPUs, effective utilization of the related communication channels, distribution of information to the main data storage, and secure blockchain ledgers [239].
- III.
- There is a high possibility of data loss or reception of false data by other nodes, as well as routing issues in the interconnection of drones and IoD networks. To tackle these challenges, a standardized policy and suitable communication protocols should be developed for the utilization of authorized components and effective interconnection and data sharing of the installed sensors, so as to successfully submit the collected data to the integrated blockchain solution [240].
- IV.
- Network communication issues such as high throughput, latency, and delay, due to low-quality hardware components, require solutions that implement IoT infrastructures with smart routing features and integrated 5G networks [240].
- V.
- Due to the lack of upgraded platforms supporting 5G communication networks and AI, the development of novel architectures with decentralized features would ensure the increase in network capacity, communication safety, privacy, and cost reduction for transaction storage [241].
8.5. Regulation and Fairness
- I.
- Security: Different regulatory frameworks lead to uncertainty in terms of researching and leveraging the potentiality of drones and blockchain, as well as lack of access control leading to unfairness in blockchain adaptation. Governments and industry stakeholders should be proactive in developing clear and consistent regulations to accommodate the rapid development and deployment of drones and blockchain technologies [237].
- II.
- Unfair mining issues may lead to further conflicts among stakeholders, with the risk of the blockchain of one party being considered as valid, while others, although legitimate, are identified as invalid. Thus, specific mining metric evaluation models would support the prevention of unfair treatment [242].
8.6. Architecture and Deployment
- I.
- Lack of intelligent techniques to detect possible attacks is a significant challenge. The potential scheme’s design will offer cutting-edge solutions for detecting attacks, as well as prevention measures. A suitable mechanism will isolate an attack in real time to reduce localization error, return the drone to its core GS in the case of disconnection, and prevent the collapse of the entire network [37].
- II.
- Due to ongoing technological evolution, more complex attacks appear. However, since the IoD and blockchain incorporate additional technologies, the implementation of AI-based mechanisms mitigates this challenge by using neural networks, Deep Learning, and Machine Learning algorithms to optimize the security and privacy of the IoD network [243].
- III.
- High computational and communication costs remain challenging. However, the IoD architecture may contain devices from the Mobile Edge Computing (MEC) domain, facilitating quicker and more effective communication by offloading messages to the closest verified MEC device for processing. This suggests a decrease in computing costs as well [37].
- IV.
- The lack of reliable real-time detection of obstacles can lead to physical damage to the drone or civil properties due to collisions. Therefore, the development of avoidance mechanisms for the early identification of obstacles would be sufficient [244].
- V.
- Deployment of drones related to the covering area and the completion of the scheduled task requires the programming and training of several UAVs, as well as distributing a suitable number of blockchain nodes to support the decentralized IoD system. Thus, the development of a suitable mechanism focusing on the mobility/trajectory motion to mitigate interference and collision issues would be a sufficient solution [34].
- VI.
- Due to frequent point-to-point network updates and traffic congestion, a noticeable depletion is generated, leading to the prolonged latency of the network. To avoid such implications, enhanced architectures would allow drones to have access to their own assigned data blocks [245].
- VII.
- Authentication schemes suffer from real-time latencies and are vulnerable to potential attacks. Thus, the establishment of a system that performs automated authentication in specific flight zones, with the respective coordinates being registered in a dedicated ledger, would enhance security countermeasures against potential infiltrations [246].
9. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Kang, J.H.; Park, K.J.; Kim, H. Analysis of localization for drone-fleet. In Proceedings of the Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 28–30 October 2015; pp. 533–538. [Google Scholar] [CrossRef]
- Gharibi, M.; Boutaba, R.; Waslander, S.L. Internet of Drones. IEEE Access 2016, 4, 1148–1162. [Google Scholar] [CrossRef]
- D’Andrea, R. Guest Editorial Can Drones Deliver? IEEE Trans. Autom. Sci. Eng. 2014, 11, 647–648. [Google Scholar] [CrossRef]
- Harbi, Y.; Medani, K.; Gherbi, C.; Senouci, O.; Aliouat, Z.; Harous, S. A Systematic Literature Review of Blockchain Technology for Internet of Drones Security. Arab. J. Sci. Eng. 2023, 48, 1053–1074. [Google Scholar] [CrossRef] [PubMed]
- Singh, M.P.; Aujla, G.S.; Bali, R.S. Blockchain for the Internet of Drones: Applications, Challenges, and Future Directions. IEEE Internet Things Mag. 2021, 4, 47–53. [Google Scholar] [CrossRef]
- Alzahrani, B.; Oubbati, O.S.; Barnawi, A.; Atiquzzaman, M.; Alghazzawi, D. UAV assistance paradigm: State-of-the-art in applications and challenges. J. Netw. Comput. Appl. 2020, 166, 102706. [Google Scholar] [CrossRef]
- Hall, R.J. An Internet of Drones. IEEE Internet Comput. 2016, 20, 68–73. [Google Scholar] [CrossRef]
- Stankovic, J.A. Research Directions for the Internet of Things. IEEE Internet Things J. 2014, 1, 3–9. [Google Scholar] [CrossRef]
- Choudhary, G.; Sharma, V.; Gupta, T.; Kim, J.; You, I. Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives. Res. Briefs Inf. Commun. Technol. Evol. 2018, 4, 64–77. [Google Scholar] [CrossRef]
- Nguyen, H.P.D.; Nguyen, D.D. Drone Application in Smart Cities: The General Overview of Security Vulnerabilities and Countermeasures for Data Communication. In Development and Future of Internet of Drones (IoD): Insights, Trends, and Road Ahead; Krishnamurthi, R., Nayyar, A., Hassanien, A.E., Eds.; Studies in Systems, Decision and Control; Springer International Publishing: Cham, Switzerland, 2021; Volume 332, pp. 185–210. [Google Scholar] [CrossRef]
- Boccadoro, P.; Striccoli, D.; Grieco, L.A. An extensive survey on the Internet of Drones. Ad Hoc Networks 2021, 122, 102600. [Google Scholar] [CrossRef]
- Abdelmaboud, A. The Internet of Drones: Requirements, Taxonomy, Recent Advances, and Challenges of Research Trends. Sensors 2021, 21, 5718. [Google Scholar] [CrossRef]
- Lin, C.; He, D.; Kumar, N.; Choo, K.-K.R.; Vinel, A.; Huang, X. Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 2018, 56, 64–69. [Google Scholar] [CrossRef]
- Abualigah, L.; Diabat, A.; Sumari, P.; Gandomi, A.H. Applications, Deployments, and Integration of Internet of Drones (IoD): A Review. IEEE Sensors J. 2021, 21, 25532–25546. [Google Scholar] [CrossRef]
- Bera, B.; Chattaraj, D.; Das, A.K. Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment. Comput. Commun. 2020, 153, 229–249. [Google Scholar] [CrossRef]
- Sharma, B.; Srivastava, G.; Lin, J.C.-W. A bidirectional congestion control transport protocol for the internet of drones. Comput. Commun. 2020, 153, 102–116. [Google Scholar] [CrossRef]
- Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain Technology Overview. arXiv 2019, arXiv:1906.11078. [Google Scholar]
- Golosova, J.; Romanovs, A. The Advantages and Disadvantages of the Blockchain Technology. In Proceedings of the 2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), Vilnius, Lithuania, 8–10 November 2018; pp. 1–6. [Google Scholar]
- Alkadi, R.; Alnuaimi, N.; Shoufan, A.; Yeun, C. Blockchain Interoperability in UAV Networks: State-of-the-art and Open Issues. arXiv 2021, arXiv:2111.09529. [Google Scholar]
- Harbi, Y.; Aliouat, Z.; Refoufi, A.; Harous, S. Recent Security Trends in Internet of Things: A Comprehensive Survey. IEEE Access 2021, 9, 113292–113314. [Google Scholar] [CrossRef]
- Yampolskiy, M.; Horvath, P.; Koutsoukos, X.D.; Xue, Y.; Sztipanovits, J. Taxonomy for description of cross-domain attacks on CPS. In Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, Philadelphia, PA, USA, 9–11 April 2013; pp. 135–142. [Google Scholar]
- Akram, R.N.; Markantonakis, K.; Mayes, K.; Habachi, O.; Sauveron, D.; Steyven, A.; Chaumette, S. Security, privacy and safety evaluation of dynamic and static fleets of drones. In Proceedings of the 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), St. Petersburg, FL, USA, 17–21 September 2017; pp. 1–12. [Google Scholar]
- Javaid, A.Y.; Sun, W.; Devabhaktuni, V.K.; Alam, M. Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In Proceedings of the 2012 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 13–15 November 2012; pp. 585–590. [Google Scholar]
- Mansfield, K.; Eveleigh, T.; Holzer, T.H.; Sarkani, S. Unmanned aerial vehicle smart device ground control station cyber security threat model. In Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 12–14 November 2013; pp. 722–728. [Google Scholar]
- Jain, A.; Singhal, P. Fog computing: Driving force behind the emergence of edge computing. In Proceedings of the 2016 International Conference System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 25–27 November 2016; pp. 294–297. [Google Scholar]
- Chen, Y.-J.; Wang, L.-C. Privacy Protection for Internet of Drones: A Network Coding Approach. IEEE Internet Things J. 2019, 6, 1719–1730. [Google Scholar] [CrossRef]
- Biswas, A.R.; Giaffreda, R. IoT and cloud convergence: Opportunities and challenges. In Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Republic of Korea, 6–8 March 2014; pp. 375–376. [Google Scholar]
- Al-Turjman, F.; Zahmatkesh, H. A Comprehensive Review on the Use of AI in UAV Communications: Enabling Technologies, Applications, and Challenges. In Unmanned Aerial Vehicles in Smart Cities; Al-Turjman, F., Ed.; Unmanned System Technologies; Springer International Publishing: Cham, Switzerland, 2020; pp. 1–26. [Google Scholar] [CrossRef]
- Sobb, T.; Turnbull, B.; Moustafa, N. Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions. Electronics 2020, 9, 1864. [Google Scholar] [CrossRef]
- Taherdoost, H. A Critical Review of Blockchain Acceptance Models—Blockchain Technology Adoption Frameworks and Applications. Computers 2022, 11, 24. [Google Scholar] [CrossRef]
- McEnroe, P.; Wang, S.; Liyanage, M. A Survey on the Convergence of Edge Computing and AI for UAVs: Opportunities and Challenges. IEEE Internet Things J. 2022, 9, 15435–15459. [Google Scholar] [CrossRef]
- Ahram, T.; Sargolzaei, A.; Sargolzaei, S.; Daniels, J.; Amaba, B. Blockchain technology innovations. In Proceedings of the 2017 IEEE Technology & Engineering Management Conference (TEMSCON), Santa Clara, CA, USA, 8–10 June 2017; pp. 137–141. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Lee, J.-H. Authentication protocols for the internet of drones: Taxonomy, analysis and future directions. J. Ambient. Intell. Humaniz. Comput. 2018, 1–10. [Google Scholar] [CrossRef]
- Yang, W.; Wang, S.; Yin, X.; Wang, X.; Hu, J. A Review on Security Issues and Solutions of the Internet of Drones. IEEE Open J. Comput. Soc. 2022, 3, 96–110. [Google Scholar] [CrossRef]
- Hema, N.; Sharma, M. Smart Agriculture Using IoD: Insights, Trends and Road Ahead. In Development and Future of In-ternet of Drones (IoD): Insights, Trends and Road Ahead; Krishnamurthi, R., Nayyar, A., Hassanien, A.E., Eds.; Studies in Systems, Decision and Control; Springer International Publishing: Cham, Switzerland, 2021; Volume 332, pp. 79–107. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V.; Sahu, N.; Guizani, M. Applications of blockchain in unmanned aerial vehicles: A review. Veh. Commun. 2020, 23, 100249. [Google Scholar] [CrossRef]
- Yahuza, M.; Idris, M.Y.I.; Bin Ahmedy, I.; Wahab, A.W.B.A.; Nandy, T.; Noor, N.M.; Bala, A. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges. IEEE Access 2021, 9, 57243–57270. [Google Scholar] [CrossRef]
- Ilgi, G.S.; Ever, Y.K. Critical analysis of security and privacy challenges for the Internet of drones: A survey. In Drones in Smart-Cities; Elsevier: Amsterdam, The Netherlands, 2020; pp. 207–214. [Google Scholar] [CrossRef]
- Chen, J.; Wang, W.; Zhou, Y.; Ahmed, S.H.; Wei, W. Exploiting 5G and Blockchain for Medical Applications of Drones. IEEE Netw. 2021, 35, 30–36. [Google Scholar] [CrossRef]
- Arai, K.; Bhatia, R.; Kapoor, S. (Eds.) Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2019; Volume 881, pp. 1037–1058. [Google Scholar] [CrossRef]
- Ahanger, T.A.; Aldaej, A.; Atiquzzaman, M.; Ullah, I.; Yousufudin, M. Distributed Blockchain-Based Platform for Unmanned Aerial Vehicles. Comput. Intell. Neurosci. 2022, 2022, 4723124. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Agrawal, A.; Goyal, A.; Luong, N.C.; Niyato, D.; Yu, F.R.; Guizani, M. Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 2021, 23, 2802–2832. [Google Scholar] [CrossRef]
- Heidari, A.; Navimipour, N.J.; Unal, M.; Zhang, G. Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues. ACM Comput. Surv. 2023, 55, 1–45. [Google Scholar] [CrossRef]
- Kang, J.; Xiong, Z.; Niyato, D.; Xie, S.; Kim, D.I. Securing data sharing from the sky: Integrating blockchains into drones in 5G and beyond. IEEE Netw. 2021, 35, 78–85. [Google Scholar] [CrossRef]
- Taherdoost, H. Blockchain Technology and Artificial Intelligence Together: A Critical Review on Applications. Appl. Sci. 2022, 12, 12948. [Google Scholar] [CrossRef]
- Zhu, C.; Zhu, X.; Ren, J.; Qin, T. Blockchain-Enabled Federated Learning for UAV Edge Computing Network: Issues and Solutions. IEEE Access 2022, 10, 56591–56610. [Google Scholar] [CrossRef]
- Renu; Sharma, S.; Saxena, S. Blockchain and UAV: Security, Challenges and Research Issues. In Proceedings of the UASG 2019, Melbourne, Australia, 12–24 April 2019; Jain, K., Khoshelham, K., Zhu, X., Tiwari, A., Eds.; Lecture Notes in Civil Engineering. Springer International Publishing: Cham, Switzerland, 2020; Volume 51, pp. 99–107. [Google Scholar] [CrossRef]
- Kitchenham, B. Procedures for Performing Systematic Reviews; Keele University: Keele, UK, 2004. [Google Scholar]
- Solanki, A.; Tarar, S.; Singh, S.P.; Tayal, A. (Eds.) The Internet of Drones: AI Applications for Smart Solutions; CRC Press: Boca Raton, FL, USA, 2022. [Google Scholar]
- Zhang, P.; Wang, C.; Qin, Z.; Cao, H. A multidomain virtual network embedding algorithm based on multiobjective optimization for Internet of Drones architecture in Industry 4.0. Softw. Pract. Exp. 2022, 52, 710–728. [Google Scholar] [CrossRef]
- Choudhary, G.; Sharma, V.; You, I. Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Comput. Electr. Eng. 2019, 74, 59–73. [Google Scholar] [CrossRef]
- Koubâa, A.; Qureshi, B.; Sriti, M.-F.; Allouch, A.; Javed, Y.; Alajlan, M.; Cheikhrouhou, O.; Khalgui, M.; Tovar, E. Dronemap Planner: A service-oriented cloud-based management system for the Internet-of-Drones. Ad Hoc Netw. 2019, 86, 46–62. [Google Scholar] [CrossRef]
- Sanchez-Garcia, J.; Garcia-Campo, J.M.; Arzamendia, M.; Reina, D.G.; Toral, S.L.; Gregor, D. A survey on unmanned aerial and aquatic vehicle multi-hop networks: Wireless communications, evaluation tools and applications. Comput. Commun. 2018, 119, 43–65. [Google Scholar] [CrossRef]
- Bousbaa, F.Z.; Kerrache, C.A.; Mahi, Z.; Tahari, A.E.K.; Lagraa, N.; Yagoubi, M.B. GeoUAVs: A new geocast routing protocol for fleet of UAVs. Comput. Commun. 2020, 149, 259–269. [Google Scholar] [CrossRef]
- Ren, M.; Fu, X.; Pace, P.; Aloi, G.; Fortino, G. Collaborative Data Acquisition for UAV-Aided IoT Based on Time-Balancing Scheduling. IEEE Internet Things J. 2024, 11, 13660–13676. [Google Scholar] [CrossRef]
- Huang, X.; Fu, X. Fresh Data Collection for UAV-Assisted IoT Based on Aerial Collaborative Relay. IEEE Sensors J. 2023, 23, 8810–8825. [Google Scholar] [CrossRef]
- Lagkas, T.; Argyriou, V.; Bibi, S.; Sarigiannidis, P. UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”. Sensors 2018, 18, 4015. [Google Scholar] [CrossRef]
- Vallejo, D.; Castro-Schez, J.; Glez-Morcillo, C.; Albusac, J. Multi-agent architecture for information retrieval and intelligent monitoring by UAVs in known environments affected by catastrophes. Eng. Appl. Artif. Intell. 2020, 87, 103243. [Google Scholar] [CrossRef]
- López, J.; Royo, P.; Pastor, E.; Barrado, C.; Santamaria, E. A middleware architecture for unmanned aircraft avionics. In Proceedings of the ACM/IFIP/USENIX International Conference on Middleware Companion, Newport Beach, CA, USA, 26–30 November 2007; pp. 1–6. [Google Scholar]
- Ribeiro, J.P.; Fontes, H.; Lopes, M.; Silva, H.; Campos, R.; Almeida, J.M.; Silva, E. UAV cooperative perception based on DDS communications network. In Proceedings of the OCEANS 2017-Anchorage, Anchorage, AK, USA, 18–27 September 2017; pp. 1–8. [Google Scholar]
- Aggarwal, S.; Shojafar, M.; Kumar, N.; Conti, M. A New Secure Data Dissemination Model in Internet of Drones. In Proceedings of the IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019. [Google Scholar]
- Xu, S.; Doğançay, K.; Hmam, H. Distributed pseudolinear estimation and UAV path optimization for 3D AOA target tracking. Signal Process. 2017, 133, 64–78. [Google Scholar] [CrossRef]
- Mohamed, N.; Al-Jaroodi, J.; Jawhar, I.; Idries, A.; Mohammed, F. Unmanned aerial vehicles applications in future smart cities. Technol. Forecast. Soc. Chang. 2020, 153, 119293. [Google Scholar] [CrossRef]
- Sharma, A.; Vanjani, P.; Paliwal, N.; Basnayaka, C.M.; Jayakody, D.N.K.; Wang, H.-C.; Muthuchidambaranathan, P. Communication and networking technologies for UAVs: A survey. J. Netw. Comput. Appl. 2020, 168, 102739. [Google Scholar] [CrossRef]
- Wang, J.; Liu, Y.; Niu, S.; Song, H.; Jing, W.; Yuan, J. Blockchain enabled verification for cellular-connected unmanned aircraft system networking. Futur. Gener. Comput. Syst. 2021, 123, 233–244. [Google Scholar] [CrossRef]
- Yang, G.; Lin, X.; Li, Y.; Cui, H.; Xu, M.; Wu, D.; Rydén, H.; Redhwan, S.B. A Telecom Perspective on the Internet of Drones: From LTE-Advanced to 5G. arXiv 2018, arXiv:1803.11048. [Google Scholar] [CrossRef]
- Rahman, M.F.B.A. Smart CCTVS for Secure Cities: Potentials and Challenges; Rajaratnam School of International Studies: Singapore, 2017. [Google Scholar]
- Nikooghadam, M.; Amintoosi, H.; Islam, S.H.; Moghadam, M.F. A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance. J. Syst. Arch. 2021, 115, 101955. [Google Scholar] [CrossRef]
- Ko, Y.; Kim, J.; Duguma, D.G.; Astillo, P.V.; You, I.; Pau, G. Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors 2021, 21, 2057. [Google Scholar] [CrossRef] [PubMed]
- Bera, B.; Saha, S.; Das, A.K.; Kumar, N.; Lorenz, P.; Alazab, M. Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment. IEEE Trans. Veh. Technol. 2020, 69, 9097–9111. [Google Scholar] [CrossRef]
- Ayamga, M.; Akaba, S.; Nyaaba, A.A. Multifaceted applicability of drones: A review. Technol. Forecast. Soc. Chang. 2021, 167, 120677. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet Things J. 2019, 6, 3572–3584. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N.; Rodrigues, J.J.P.C. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment. IEEE Trans. Veh. Technol. 2019, 68, 6903–6916. [Google Scholar] [CrossRef]
- Alsamhi, S.H.; Ma, O.; Ansari, M.S.; Almalki, F.A. Survey on Collaborative Smart Drones and Internet of Things for Improving Smartness of Smart Cities. IEEE Access 2019, 7, 128125–128152. [Google Scholar] [CrossRef]
- Zhi, Y.; Fu, Z.; Sun, X.; Yu, J. Security and Privacy Issues of UAV: A Survey. Mob. Netw. Appl. 2020, 25, 95–101. [Google Scholar] [CrossRef]
- Das, A.K.; Bera, B.; Wazid, M.; Jamal, S.S.; Park, Y. iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment. IEEE Access 2021, 9, 87024–87048. [Google Scholar] [CrossRef]
- Yaacoub, J.-P.; Noura, H.; Salman, O.; Chehab, A. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 2020, 11, 100218. [Google Scholar] [CrossRef] [PubMed]
- Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Commun. Surv. Tutorials 2019, 21, 2702–2733. [Google Scholar] [CrossRef]
- Mitka, E.; Mouroutsos, S.G. Classification of Drones. Am. J. Eng. Res. 2017, 6, 36–41. [Google Scholar]
- Dahlman, E.; Lagrelius, K. A Game of Drones: Cyber Security in UAVs. 2019. Available online: https://www.semanticscholar.org/paper/A-Game-of-Drones-%3A-Cyber-Security-in-UAVs-Dahlman-Lagrelius/3119bc3f5f4282210ab46a25ce86b3c6124b26d5 (accessed on 10 April 2024).
- Nandy, T.; Bin Idris, M.Y.I.; Noor, R.M.; Ahmedy, I.; Bhattacharyya, S. An Enhanced Two-factor Authentication Protocol for V2V Communication in VANETs. In Proceedings of the 3rd International Conference on Information Science and System, Cambridge, UK, 19–22 March 2020. [Google Scholar]
- Abdelhafez, A.A.M.A. Localization of Cyber-Physical Systems: Privacy, Security and Efficiency. Doctoral Dissertation, Technische Universität München, Munich, Germany, 2020. [Google Scholar]
- Giray, S.M. Anatomy of unmanned aerial vehicle hijacking with signal spoofing. In Proceedings of the 2013 6th International Conference on Recent Advances in Space Technologies (RAST), Istanbul, Turkey, 12–14 June 2013; pp. 795–800. [Google Scholar]
- Bhattacharya, S.; Başar, T. Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In Proceedings of the 2010 American Control Conference (ACC 2010), Baltimore, MD, USA, 30 June–2 July 2010; pp. 818–823. [Google Scholar]
- Rudinskas, D.; Goraj, Z.; Stankūnas, J. Security analysis of UAV radio communication system. Aviation 2009, 13, 116–121. [Google Scholar] [CrossRef]
- Chen, W.; Dong, Y.; Duan, Z. Manipulating Drone Position Control. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; pp. 1–9. [Google Scholar]
- Alajmi, N.M.; Elleithy, K.M. Comparative analysis of selective forwarding attacks over Wireless Sensor Networks. Int. J. Comput. Appl. 2015, 111, 27–38. [Google Scholar] [CrossRef]
- Samanth, S.; Prema, K.V.; Balachandra, M. Security in Internet of Drones: A Comprehensive Review. Cogent Eng. 2022, 9, 2029080. [Google Scholar] [CrossRef]
- He, D.; Chan, S.; Guizani, M. Drone-Assisted Public Safety Networks: The Security Aspect. IEEE Commun. Mag. 2017, 55, 218–223. [Google Scholar] [CrossRef]
- Vattapparamban, E.; Güvenç, I.; Yurekli, A.I.; Akkaya, K.; Uluagac, S. Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, 5–9 September 2016; pp. 216–221. [Google Scholar]
- Arteaga, S.P.; Hernandez, L.A.M.; Perez, G.S.; Orozco, A.L.S.; Villalba, L.J.G. Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo. IEEE Access 2019, 7, 51782–51789. [Google Scholar] [CrossRef]
- Sciancalepore, S.; Ibrahim, O.A.; Oligeri, G.; Di Pietro, R. PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis. Comput. Networks 2020, 168, 107044. [Google Scholar] [CrossRef]
- Perazzo, P.; Ariyapala, K.; Conti, M.; Dini, G. The verifier bee: A path planner for drone-based secure location verification. In Proceedings of the 2015 IEEE 16th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Boston, MA, USA, 14–17 June 2015; pp. 1–9. [Google Scholar]
- Chen, W.; Dong, Y.; Duan, Z. Compromising Flight Paths of Autopiloted Drones. In Proceedings of the 2019 International Conference on Unmanned Aircraft Systems (ICUAS), Atlanta, GA, USA, 11–14 June 2019; pp. 1316–1325. [Google Scholar]
- Son, Y.; Shin, H.; Kim, D.; Park, Y.; Noh, J.; Choi, K.; Choi, J.; Kim, Y. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), Washington, DC, USA, 12–14 August 2015; pp. 881–896. [Google Scholar]
- Maurya, S.; Rauthan, M.M.S.; Verma, R. Security Aspects of the Internet of Drones (IoD). In Proceedings of the 2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, 21–22 April 2022; pp. 1–6. [Google Scholar]
- Jan, S.U.; Abbasi, I.A.; Algarni, F. A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD). Comput. Mater. Contin. 2022, 72, 5845–5869. [Google Scholar] [CrossRef]
- Pauner, C.; Kamara, I.; Viguri, J. Drones. In Current challenges and standardization solutions in the field of privacy and data protection. In Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015), Barcelona, Spain, 9–11 December 2015; pp. 1–7. [Google Scholar]
- Hartmann, K.; Steup, C. The vulnerability of UAVs to cyber-attacks-An approach to the risk assessment. In Proceedings of the 2013 5th International Conference on Cyber Conflict (CYCON 2013), Tallinn, Estonia, 4–7 June 2013; pp. 1–23. [Google Scholar]
- Kamthan, S.; Singh, H.; Meitzler, T. UAVs: On development of fuzzy model for categorization of countermeasures during threat assessment. In Proceedings of the SPIE Defense + Security, Anaheim, CA, USA, 5 May 2017; Karlsen, R.E., Gage, D.W., Shoemaker, C.M., Nguyen, H.G., Eds.; SPIE: Bellingham, WA, USA, 2017; p. 1019518. [Google Scholar]
- Osanaiye, O.A.; Alfa, A.S.; Hancke, G.P. Denial of Service Defence for Resource Availability in Wireless Sensor Networks. IEEE Access 2018, 6, 6975–7004. [Google Scholar] [CrossRef]
- Rodday, N.M.; Schmidt, R.d.O.; Pras, A. Exploring security vulnerabilities of unmanned aerial vehicles. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, 25–29 April 2016; pp. 993–994. [Google Scholar]
- Oleson, K.E.; Hancock, P.; Billings, D.R.; Schesser, C.D. Trust in unmanned aerial systems: A synthetic, distributed trust model. In Proceedings of the 6th International Symposium on Aviation Psychology, Columbus, OH, USA, 2–5 May 2011; pp. 469–474. [Google Scholar]
- Mekdad, Y.; Aris, A.; Babun, L.; El Fergougui, A.; Conti, M.; Lazzeretti, R.; Uluagac, S. A Survey on Security and Privacy Issues of UAVs. Comput. Netw. 2023, 224, 109626. [Google Scholar] [CrossRef]
- Dissanayake, N.; Jayatilaka, A.; Zahedi, M.; Babar, M.A. Software Security Patch Management—A Systematic Literature Review of Challenges, Approaches, Tools and Practices. Inf. Softw. Technol. 2021, 144, 106771. [Google Scholar] [CrossRef]
- Eldosouky, A.R.; Ferdowsi, A.; Saad, W. Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing. IEEE Internet Things J. 2020, 7, 2840–2854. [Google Scholar] [CrossRef]
- Martínez-Rodríguez, B.; Bilbao-Arechabala, S.; Jorge-Hernandez, F. Security Architecture for Swarms of Autonomous Vehicles in Smart Farming. Appl. Sci. 2021, 11, 4341. [Google Scholar] [CrossRef]
- Omolara, A.E.; Alawida, M.; Abiodun, O.I. Drone Cybersecurity Issues, Solutions, Trend Insights and Future Perspectives: A Survey. Neural Comput. Appl. 2023, 35, 23063–23101. [Google Scholar] [CrossRef]
- Siddappaji, B.; Akhilesh, K.B. Role of Cyber Security in Drone Technology. In Smart Technologies; Akhilesh, K.B., Möller, D.P.F., Eds.; Springer: Singapore, 2020; pp. 169–178. [Google Scholar] [CrossRef]
- Lei, Z.; Ding, P.; Zheng, W.; Fei, X.; Fan, H. UAV Countermeasure Technology Based on Partial-band Noise Jamming. In Proceedings of the 2021 33rd Chinese Control and Decision Conference (CCDC), Kunming, China, 22–24 May 2021; pp. 1456–1461. [Google Scholar]
- Altawy, R.; Youssef, A.M. Security, Privacy, and Safety Aspects of Civilian Drones: A Survey. ACM Trans. Cyber-Physical Syst. 2017, 1, 1–25. [Google Scholar] [CrossRef]
- Kumar, C.R.S.; Mohanty, S. Current trends in cyber security for drones. In Proceedings of the 2021 International Carnahan Conference on Security Technology (ICCST) IEEE, Hatfield, UK, 1–15 October 2021; pp. 1–5. [Google Scholar]
- Singh, M.; Aujla, G.S.; Bali, R.S. Derived Blockchain Architecture for Security-Conscious Data Dissemination in Edge-Envisioned Internet of Drones Ecosystem. Clust. Comput. 2022, 25, 2281–2302. [Google Scholar] [CrossRef]
- Sachdeva, H.; Gupta, S.; Misra, A.; Chauhan, K.; Dave, M. Privacy and Security Improvement in UAV Network Using Blockchain. Int. J. Commun. Networks Distrib. Syst. 2023, 29, 383–406. [Google Scholar] [CrossRef]
- Alajlan, R.; Alhumam, N.; Frikha, M. Cybersecurity for Blockchain-Based IoT Systems: A Review. Appl. Sci. 2023, 13, 7432. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 2019, 6, 2188–2204. [Google Scholar] [CrossRef]
- Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on blockchain for Internet of Things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
- Singh, M.; Aujla, G.S.; Bali, R.S. A Deep Learning-Based Blockchain Mechanism for Secure Internet of Drones Environment. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4404–4413. [Google Scholar] [CrossRef]
- Das, A.K.; Bera, B.; Saha, S.; Kumar, N.; You, I.; Chao, H.-C. AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber–Physical Systems. IEEE Internet Things J. 2021, 9, 6374–6388. [Google Scholar] [CrossRef]
- Vangala, A.; Sutrala, A.K.; Das, A.K.; Jo, M. Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming. IEEE Internet Things J. 2021, 8, 10792–10806. [Google Scholar] [CrossRef]
- Kayalvizhi, M.; Ramamoorthy, S. Blockchain-based Secure Data Transmission for UAV Swarm using Modified Particle Swarm Optimization Path Planning Algorithm. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 554–563. [Google Scholar] [CrossRef]
- Li, X.; Wang, Y.; Vijayakumar, P.; He, D.; Kumar, N.; Ma, J. Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network. IEEE Trans. Veh. Technol. 2019, 68, 11309–11322. [Google Scholar] [CrossRef]
- Demestichas, K.; Peppes, N.; Alexakis, T.; Adamopoulou, E. Blockchain in Agriculture Traceability Systems: A Review. Appl. Sci. 2020, 10, 4113. [Google Scholar] [CrossRef]
- Herbadji, A.; Gou-midi, H.; Harbi, Y.; Medani, K.; Aliouat, Z. Blockchain for internet of vehicles security. In Blockchain for Cybersecurity and Privacy; CRC Press: Boca Raton, FL, USA, 2020; pp. 159–197. [Google Scholar]
- Merkle, R. A Digital Signature Based on a Conventional Encryption Function. In Proceedings of the Advances in Cryptology—CRYPTO1987, Santa Barbara, CA, USA, 16–20 August 1987; Springer: Berlin/Heidelberg, Germany, 1988; pp. 369–378. [Google Scholar]
- Cheng, L.; Liu, J.; Xu, G.; Zhang, Z.; Wang, H.; Dai, H.-N.; Wu, Y.; Wang, W. SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs. IEEE Trans. Comput. Soc. Syst. 2019, 6, 1373–1385. [Google Scholar] [CrossRef]
- Wang, C.; Jiang, H.; Zeng, J.; Min, Y.U.; Huang, Q.; Zuo, Z. A review of blockchain layered architecture and technology application research. Wuhan Univ. J. Nat. Sci. 2021, 26, 14. [Google Scholar]
- Duan, Z.; Mao, H.; Chen, Z.; Bai, X.; Hu, K.; Talpin, J.-P. Formal Modeling and Verification of Blockchain System. In Proceedings of the 10th International Conference on Computer Modeling and Simulation, Sydney, Australia, 8–10 January 2018; pp. 231–235. [Google Scholar]
- Bary, T.A.A.A.A.; Elomda, B.M.; Hassan, H.A. Multiple Layer Public Blockchain Approach for Internet of Things (IoT) Systems. IEEE Access 2024, 12, 56431–56438. [Google Scholar] [CrossRef]
- Zhai, S.; Yang, Y.; Li, J.; Qiu, C.; Zhao, J. Research on the Application of Cryptography on the Blockchain. J. Phys. Conf. Ser. 2019, 1168, 032077. [Google Scholar] [CrossRef]
- Latif, S.; Idrees, Z.; Huma, Z.E.; Ahmad, J. Blockchain Technology for the Industrial Internet of Things: A Comprehensive Survey on Security Challenges, Architectures, Applications, and Future Research Directions. Trans. Emerg. Telecommun. Technol. 2021, 32, e4337. [Google Scholar] [CrossRef]
- Pajooh, H.H.; Rashid, M.; Alam, F.; Demidenko, S. Multi-Layer Blockchain-Based Security Architecture for Internet of Things. Sensors 2021, 21, 772. [Google Scholar] [CrossRef]
- Zhu, Y. Security architecture and key technologies of blockchain. J. Inf. Secur. Res. 2016, 2, 1090. [Google Scholar]
- Hu, Q.; Yan, B.; Han, Y.; Yu, J. An Improved Delegated Proof of Stake Consensus Algorithm. Procedia Comput. Sci. 2021, 187, 341–346. [Google Scholar] [CrossRef]
- Wang, S.; Ouyang, L.; Yuan, Y.; Ni, X.; Han, X.; Wang, F.-Y. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends. IEEE Trans. Syst. Man, Cybern. Syst. 2019, 49, 2266–2277. [Google Scholar] [CrossRef]
- Ferreira, M.; Rodrigues, S.; Reis, C.I.; Maximiano, M. Blockchain: A Tale of Two Applications. Appl. Sci. 2018, 8, 1506. [Google Scholar] [CrossRef]
- Singh, H. DApps: Decentralized Applications for Blockchains. In Distributed Computing to Blockchain; Elsevier: Amsterdam, The Netherlands, 2023; pp. 87–104. [Google Scholar] [CrossRef]
- Dutta, J.; Barman, S.; Sen, S.; Routh, A.; Chattopadhyay, M.; Chattopadhyay, S. Easypay: A user-friendly blockchain-powered payment gateway. Clust. Comput. 2024, 1–20. [Google Scholar] [CrossRef]
- Buldas, A.; Draheim, D.; Gault, M.; Laanoja, R.; Nagumo, T.; Saarepera, M.; Shah, S.A.; Simm, J.; Steiner, J.; Tammet, T.; et al. An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation. IEEE Access 2022, 10, 77284–77322. [Google Scholar] [CrossRef]
- Schaer, F. Decentralized Finance: On Blockchain- and Smart Contract-Based Financial Markets. FRB St. Louis Rev. 2020, 103, 153–174. [Google Scholar] [CrossRef]
- Chaudhry, N.; Yousaf, M.M. Consensus Algorithms in Blockchain: Comparative Analysis, Challenges and Opportunities. In Proceedings of the 12th International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan, 19–21 December 2018; pp. 54–63. [Google Scholar]
- Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 3, 1–32. [Google Scholar]
- Zou, W.; Lo, D.; Kochhar, P.S.; Le, X.-B.D.; Xia, X.; Feng, Y.; Chen, Z.; Xu, B. Smart Contract Development: Challenges and Opportunities. IEEE Trans. Softw. Eng. 2021, 47, 2084–2106. [Google Scholar] [CrossRef]
- Scherer, M. Performance and Scalability of Blockchain Networks and Smart Contracts. 2017. Available online: https://www.semanticscholar.org/paper/Performance-and-Scalability-of-Blockchain-Networks-Scherer/be45a7e01d17cc2e09e7ddecfabb2d28ac2763d9 (accessed on 10 April 2024).
- Holotescu, C. Understanding Blockchain Opportunities and Challenges; Carol I National Defence University Publishing House: Bucharest, Romania, 2018; pp. 275–283. [Google Scholar] [CrossRef]
- Dinh, T.T.A.; Wang, J.; Chen, G.; Liu, R.; Ooi, B.C.; Tan, K.-L. BLOCKBENCH: A Framework for Analyzing Private Blockchains. In Proceedings of the International Conference on Management of Data, Chicago, IL, USA, 14–19 May 2017; pp. 1085–1100. [Google Scholar] [CrossRef]
- Yang, R.; Wakefield, R.; Lyu, S.; Jayasuriya, S.; Han, F.; Yi, X.; Yang, X.; Amarasinghe, G.; Chen, S. Public and Private Blockchain in Construction Business Process and Information Integration. Autom. Constr. 2020, 118, 103276. [Google Scholar] [CrossRef]
- Mohan, C. State of Public and Private Blockchains: Myths and Reality. In Proceedings of the International Conference on Management of Data, Amsterdam, The Netherlands, 30 June–5 July 2019; pp. 404–411. [Google Scholar]
- Dib, O.; Brousmiche, K.-L.; Durand, A.; Thea, E.; Hamida, E.B. Consortium blockchains: Overview, applications and challenges. Int. J. Adv. Telecommun. 2018, 11, 51–64. [Google Scholar]
- Meng, T.; Zhao, Y.; Wolter, K.; Xu, C.-Z. On Consortium Blockchain Consistency: A Queueing Network Model Approach. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 1369–1382. [Google Scholar] [CrossRef]
- Yao, W.; Deek, F.P.; Murimi, R.; Wang, G. SoK: A Taxonomy for Critical Analysis of Consensus Mechanisms in Consortium Blockchain. IEEE Access 2023, 11, 79572–79587. [Google Scholar] [CrossRef]
- Allouch, A.; Cheikhrouhou, O.; Koubâa, A.; Toumi, K.; Khalgui, M.; Gia, T.N. UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones. Sensors 2021, 21, 3049. [Google Scholar] [CrossRef] [PubMed]
- Bera, B.; Das, A.K.; Sutrala, A.K. Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment. Comput. Commun. 2021, 166, 91–109. [Google Scholar] [CrossRef]
- Niranjanamurthy, M.; Nithya, B.N.; Jagannatha, S. Analysis of Blockchain technology: Pros, cons and SWOT. Clust. Comput. 2019, 22, 14743–14757. [Google Scholar] [CrossRef]
- Bera, B.; Wazid, M.; Das, A.K.; Rodrigues, J.J.P.C. Securing Internet of Drones Networks Using AI-Envisioned Smart-Contract-Based Blockchain. IEEE Internet Things Mag. 2021, 4, 68–73. [Google Scholar] [CrossRef]
- Huang, R.; Yang, X.; Ajay, P. Consensus mechanism for software-defined blockchain in internet of things. Internet Things Cyber-Physical Syst. 2023, 3, 52–60. [Google Scholar] [CrossRef]
- Gumaei, A.; Al-Rakhami, M.; Hassan, M.M.; Pace, P.; Alai, G.; Lin, K.; Fortino, G. Deep Learning and Blockchain with Edge Computing for 5G-Enabled Drone Identification and Flight Mode Detection. IEEE Netw. 2021, 35, 94–100. [Google Scholar] [CrossRef]
- Wu, Y.; Dai, H.-N.; Wang, H.; Choo, K.-K.R. Blockchain-Based Privacy Preservation for 5G-Enabled Drone Communications. IEEE Netw. 2021, 35, 50–56. [Google Scholar] [CrossRef]
- Luo, S.; Li, H.; Wen, Z.; Qian, B.; Morgan, G.; Longo, A.; Rana, O.; Ranjan, R. Blockchain-Based Task Offloading in Drone-Aided Mobile Edge Computing. IEEE Netw. 2021, 35, 124–129. [Google Scholar] [CrossRef]
- Nguyen, T.; Katila, R.; Gia, T.N. An advanced Internet-of-Drones System with Blockchain for improving quality of service of Search and Rescue: A feasibility study. Futur. Gener. Comput. Syst. 2023, 140, 36–52. [Google Scholar] [CrossRef]
- Mistry, I.; Tanwar, S.; Tyagi, S.; Kumar, N. Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges. Mech. Syst. Signal Process. 2019, 135, 106382. [Google Scholar] [CrossRef]
- Kang, J.; Xiong, Z.; Niyato, D.; Ye, D.; Kim, D.I.; Zhao, J. Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory. IEEE Trans. Veh. Technol. 2019, 68, 2906–2920. [Google Scholar] [CrossRef]
- Wu, Q.; Mei, W.; Zhang, R. Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective. IEEE Wirel. Commun. 2019, 26, 12–18. [Google Scholar] [CrossRef]
- Cao, B.; Li, Y.; Zhang, L.; Zhang, L.; Mumtaz, S.; Zhou, Z.; Peng, M. When Internet of Things Meets Blockchain: Challenges in Distributed Consensus. IEEE Netw. 2019, 33, 133–139. [Google Scholar] [CrossRef]
- Yanmaz, E.; Yahyanejad, S.; Rinner, B.; Hellwagner, H.; Bettstetter, C. Drone networks: Communications, coordination, and sensing. Ad Hoc Netw. 2018, 68, 1–15. [Google Scholar] [CrossRef]
- Dai, H.-N.; Zheng, Z.; Zhang, Y. Blockchain for Internet of Things: A Survey. IEEE Internet Things J. 2019, 6, 8076–8094. [Google Scholar] [CrossRef]
- Ossamah, A. Blockchain as a solution to Drone Cybersecurity. In Proceedings of the IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020; pp. 1–9. [Google Scholar]
- Kantur, H.; Bamuleseyo, C. How Smart Contracts Can Change the Insurance Industry: Benefits and Challenges of Using Blockchain Technology. 2018. Available online: http://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1214254&dswid=8446 (accessed on 10 April 2024).
- Tyagi, A.K.; Chandrasekaran, S.; Sreenath, N. Blockchain Technology:– A New Technology for Creating Distributed and Trusted Computing Environment. In Proceedings of the International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 9–11 May 2022; pp. 1348–1354. [Google Scholar]
- Rajagopal, B.R.; Anjanadevi, B.; Tahreem, M.; Kumar, S.; Debnath, M.; Tongkachok, K. Comparative Analysis of Blockchain Technology and Artificial Intelligence and its impact on Open Issues of Automation in Workplace. In Proceedings of the 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 28–29 April 2022; pp. 288–292. [Google Scholar]
- Gupta, R.; Reebadiya, D.; Tanwar, S.; Kumar, N.; Guizani, M. When Blockchain Meets Edge Intelligence: Trusted and Security Solutions for Consumers. IEEE Netw. 2021, 35, 272–278. [Google Scholar] [CrossRef]
- Yang, R.; Yu, F.R.; Si, P.; Yang, Z.; Zhang, Y. Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges. IEEE Commun. Surv. Tutorials 2018, 21, 1508–1532. [Google Scholar] [CrossRef]
- Wang, Z.; Li, M.; Lu, J.; Cheng, X. Business Innovation based on artificial intelligence and Blockchain technology. Inf. Process. Manag. 2022, 59, 102759. [Google Scholar] [CrossRef]
- Mendis, G.J.; Wu, Y.; Wei, J.; Sabounchi, M.; Roche, R. A Blockchain-Powered Decentralized and Secure Computing Paradigm. IEEE Trans. Emerg. Top. Comput. 2020, 9, 2201–2222. [Google Scholar] [CrossRef]
- Nassar, M.; Salah, K.; Rehman, M.H.U.; Svetinovic, D. Blockchain for explainable and trustworthy artificial intelligence. WIREs Data Min. Knowl. Discov. 2019, 10, e1340. [Google Scholar] [CrossRef]
- Wang, K.; Dong, J.; Wang, Y.; Yin, H. Securing Data with Blockchain and AI. IEEE Access 2019, 7, 77981–77989. [Google Scholar] [CrossRef]
- Zuo, Y.; Guo, J.; Gao, N.; Zhu, Y.; Jin, S.; Li, X. A Survey of Blockchain and Artificial Intelligence for 6G Wireless Communications. IEEE Commun. Surv. Tutorials 2023, 25, 2494–2528. [Google Scholar] [CrossRef]
- Saini, S.; Jangra, A.; Singh, G. Real-Time Agent-Based Load-Balancing Algorithm for Internet of Drone (IoD) in Cloud Computing. In Internet of Things, 1st ed.; CRC Press: Boca Raton, FL, USA, 2022; pp. 81–94. [Google Scholar] [CrossRef]
- Atlam, H.F.; Alenezi, A.; Alassafi, M.O.; Wills, G.B. Blockchain with Internet of Things: Benefits, Challenges, and Future Directions. Int. J. Intell. Syst. Appl. 2018, 10, 40–48. [Google Scholar] [CrossRef]
- Reyna, A.; Martin, C.; Chen, J.; Soler, E.; Diaz, M. On blockchain and its integration with loT. Challenges and opportunities. Futur. Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
- Habib, G.; Sharma, S.; Ibrahim, S.; Ahmad, I.; Qureshi, S.; Ishfaq, M. Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. Futur. Internet 2022, 14, 341. [Google Scholar] [CrossRef]
- Khan, W.Z.; Ahmed, E.; Hakak, S.; Yaqoob, I.; Ahmed, A. Edge computing: A survey. Futur. Gener. Comput. Syst. 2019, 97, 219–235. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, Y.; Lu, S.; Liu, L.; Xu, L.; Shi, W. OpenEI: An Open Framework for Edge Intelligence. In Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 1840–1851. [Google Scholar]
- Zhou, S.; Jadoon, W.; Khan, I.A. Computing Offloading Strategy in Mobile Edge Computing Environment: A Comparison between Adopted Frameworks, Challenges, and Future Directions. Electronics 2023, 12, 2452. [Google Scholar] [CrossRef]
- Yuan, X.; Xie, Z.; Tan, X. Computation Offloading in UAV-Enabled Edge Computing: A Stackelberg Game Approach. Sensors 2022, 22, 3854. [Google Scholar] [CrossRef]
- Xue, H.; Chen, D.; Zhang, N.; Dai, H.-N.; Yu, K. Integration of blockchain and edge computing in internet of things: A survey. Futur. Gener. Comput. Syst. 2023, 144, 307–326. [Google Scholar] [CrossRef]
- Nayyar, A.; Kumar, A. (Eds.) A Roadmap to Industry 4.0: Smart Production, Sharp Business and Sustainable Development; Springer International Publishing: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
- Keshk, M.; Sitnikova, E.; Moustafa, N.; Hu, J.; Khalil, I. An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems. IEEE Trans. Sustain. Comput. 2019, 6, 66–79. [Google Scholar] [CrossRef]
- Kang, S.; Fu, X. Blockchain-Enabled Infection Sample Collection System Using Two-Echelon Drone-Assisted Mechanism. Drones 2024, 8, 14. [Google Scholar] [CrossRef]
- Ulusar, U.D.; Al-Turjman, F.; Celik, G. An overview of Internet of things and wireless communications. In Proceedings of the International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, 5–8 October 2017; pp. 506–509. [Google Scholar]
- Khanh, Q.V.; Hoai, N.V.; Manh, L.D.; Le, A.N.; Jeon, G. Wireless Communication Technologies for IoT in 5G: Vision, Applications, and Challenges. Wirel. Commun. Mob. Comput. 2022, 2022, 3229294. [Google Scholar] [CrossRef]
- Gemeliarana, I.G.A.K.; Sari, R.F. Evaluation of Proof of Work (POW) Blockchains Security Network on Selfish Mining. In Proceedings of the 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, 21–22 November 2018; pp. 126–130. [Google Scholar]
- Saad, S.M.S.; Radzi, R.Z.R.M.; Othman, S.H. Comparative Analysis of the Blockchain Consensus Algorithm Between Proof of Stake and Delegated Proof of Stake. In Proceedings of the International Conference on Data Science and Its Applications (ICoDSA), Bandung, Indonesia, 21–22 November 2018; pp. 175–180. [Google Scholar]
- Aloqaily, M.; Bouachir, O.; Boukerche, A.; Al Ridhawi, I. Design Guidelines for Blockchain-Assisted 5G-UAV Networks. IEEE Netw. 2021, 35, 64–71. [Google Scholar] [CrossRef]
- Tychola, K.A.; Voulgaridis, K.; Lagkas, T. Tactile IoT and 5G & beyond schemes as key enabling technologies for the future metaverse. Telecommun. Syst. 2023, 84, 1–23. [Google Scholar] [CrossRef]
- Khan, F. LTE for 4G Mobile Broadband: Air Interface Technologies and Performance; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
- Gupta, R.; Nair, A.; Tanwar, S.; Kumar, N. Blockchain-assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges. IET Commun. 2021, 15, 1352–1367. [Google Scholar] [CrossRef]
- Andrews, J.G.; Buzzi, S.; Choi, W.; Hanly, S.V.; Lozano, A.; Soong, A.C.K.; Zhang, J.C. What Will 5G Be? IEEE J. Sel. Areas Commun. 2014, 32, 1065–1082. [Google Scholar] [CrossRef]
- Raja, G.; Senthivel, S.G.; Balaganesh, S.; Rajakumar, B.R.; Ravichandran, V.; Guizani, M.; Ganesh, S. MLB-IoD: Multi Layered Blockchain Assisted 6G Internet of Drones Ecosystem. IEEE Trans. Veh. Technol. 2022, 72, 2511–2520. [Google Scholar] [CrossRef]
- Zhang, S.; Zhang, H.; Song, L. Beyond D2D: Full Dimension UAV-to-Everything Communications in 6G. IEEE Trans. Veh. Technol. 2020, 69, 6592–6602. [Google Scholar] [CrossRef]
- Piran, J.; Suh, D.Y. Learning-Driven Wireless Communications, towards 6G. In Proceedings of the International Conference on Computing, Electronics & Communications Engineering (iCCECE), London, UK, 22–23 August 2019; pp. 219–224. [Google Scholar]
- Porkodi, S.; Kesavaraja, D. Integration of Blockchain and Internet of Things. In Handbook of Research on Blockchain Technology; Elsevier: Amsterdam, The Netherlands, 2020; pp. 61–94. [Google Scholar] [CrossRef]
- Zafar, S.; Bhatti, K.M.; Shabbir, M.; Hashmat, F.; Akbar, A.H. Integration of Blockchain and Internet of Things: Challenges and Solutions. Ann. Telecommun. 2022, 77, 13–32. [Google Scholar] [CrossRef]
- Alsharari, N. Integrating Blockchain Technology with Internet of Things to Efficiency. Int. J. Technol. Innov. Manag. (IJTIM) 2021, 1, 1–13. [Google Scholar] [CrossRef]
- Sharma, D.K.; Kaushik, A.K.; Goel, A.; Bhargava, S. Internet of Things and Blockchain: Integration, Need, Challenges, Applications, and Future Scope. In Handbook of Research on Blockchain Technology; Elsevier: Amsterdam, The Netherlands, 2020; pp. 271–294. [Google Scholar] [CrossRef]
- Stadtler, H. Supply Chain Management: An Overview. In Supply Chain Management and Advanced Planning; Stadtler, H., Kilger, C., Meyr, H., Eds.; Springer Texts in Business and Economics; Springer: Berlin/Heidelberg, Germany, 2015; pp. 3–28. [Google Scholar] [CrossRef]
- Beamon, B.M. Supply chain design and analysis: Models and methods. Int. J. Prod. Econ. 1998, 55, 281–294. [Google Scholar] [CrossRef]
- Druehl, C.; Carrillo, J.; Hsuan, J. Technological Innovations: Impacts on Supply Chains. In Innovation and Supply Chain Management; Moreira, A.C., Ferreira, L.M.D.F., Zimmermann, R.A., Eds.; Contributions to Management Science; Springer International Publishing: Cham, Switzerland, 2018; pp. 259–281. [Google Scholar] [CrossRef]
- Rejeb, A.; Rejeb, K.; Simske, S.J.; Treiblmaier, H. Drones for supply chain management and logistics: A review and research agenda. Int. J. Logist. Res. Appl. 2023, 26, 708–731. [Google Scholar] [CrossRef]
- Amiri, M.J.; Agrawal, D.; El Abbadi, A. CAPER: A cross-application permissioned blockchain. Proc. VLDB Endow. 2019, 12, 1385–1398. [Google Scholar] [CrossRef]
- Gupta, R.; Bhattacharya, P.; Tanwar, S.; Kumar, N.; Zeadally, S. GaRuDa: A Blockchain-Based Delivery Scheme Using Drones for Healthcare 5.0 Applications. In IEEE Internet of Things Magazine; IEEE: Piscataway, NJ, USA, 2021; Volume 4, pp. 60–66. [Google Scholar] [CrossRef]
- Haleem, A.; Javaid, M.; Singh, R.P.; Suman, R.; Rab, S. Blockchain technology applications in healthcare: An overview. Int. J. Intell. Networks 2021, 2, 130–139. [Google Scholar] [CrossRef]
- Ellingsen, G.; Hertzum, M. User requirements meet large-scale EHR suites: Norwegian preparations for Epic. Stud. Health Technol. Inform. 2020, 270, 703–707. [Google Scholar] [CrossRef]
- Claesson, A.; Svensson, L.; Nordberg, P.; Ringh, M.; Rosenqvist, M.; Djarv, T.; Samuelsson, J.; Hernborg, O.; Dahlbom, P.; Jansson, A.; et al. Drones may be used to save lives in out of hospital cardiac arrest due to drowning. Resuscitation 2017, 114, 152–156. [Google Scholar] [CrossRef]
- Rosser, J.C.; Vignesh, V.; Terwilliger, B.A.; Parker, B.C. Surgical and Medical Applications of Drones: A Comprehensive Review. J. Soc. Laparosc. Robot. Surg. 2018, 22, e2018.00018. [Google Scholar] [CrossRef]
- Braun, J.; Gertz, S.D.; Furer, A.; Bader, T.; Frenkel, H.; Chen, J.; Glassberg, E.; Nachman, D. The promising future of drones in prehospital medical care and its application to battlefield medicine. J. Trauma Inj. Infect. Crit. Care 2019, 87, S28–S34. [Google Scholar] [CrossRef]
- Aujla, G.S.; Jindal, A. A Decoupled Blockchain Approach for Edge-Envisioned IoT-Based Healthcare Monitoring. IEEE J. Sel. Areas Commun. 2021, 39, 491–499. [Google Scholar] [CrossRef]
- Singh, M.P.; Aujla, G.S.; Bali, R.S. An Unorthodox Security Framework using Adapted Blockchain Architecture for Internet of Drones. In Proceedings of the IEEE Globecom Workshops (GC Wkshps), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
- Khan, A.; Gupta, S.; Gupta, S.K. Emerging UAV technology for disaster detection, mitigation, response, and preparedness. J. Field Robot. 2022, 39, 905–955. [Google Scholar] [CrossRef]
- Panda, K.G.; Das, S.; Sen, D.; Arif, W. Design and Deployment of UAV-Aided Post-Disaster Emergency Network. IEEE Access 2019, 7, 102985–102999. [Google Scholar] [CrossRef]
- Pinto, R.; Lagorio, A. Point-to-point drone-based delivery network design with intermediate charging stations. Transp. Res. Part C Emerg. Technol. 2022, 135, 103506. [Google Scholar] [CrossRef]
- Torky, M.; El-Dosuky, M.; Goda, E.; Snášel, V.; Hassanien, A.E. Scheduling and Securing Drone Charging System Using Particle Swarm Optimization and Blockchain Technology. Drones 2022, 6, 237. [Google Scholar] [CrossRef]
- Boukoberine, M.N.; Zhou, Z.; Benbouzid, M. Power Supply Architectures for Drones–A Review. In Proceedings of the 45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, 14–17 October 2019; pp. 5826–5831. [Google Scholar]
- Krithika, L.B. Survey on the Applications of Blockchain in Agriculture. Agriculture 2022, 12, 1333. [Google Scholar] [CrossRef]
- A Mukherjee, A.; Singh, R.K.; Mishra, R.; Bag, S. Application of blockchain technology for sustainability development in agricultural supply chain: Justification framework. Oper. Manag. Res. 2021, 15, 46–61. [Google Scholar] [CrossRef]
- Zhang, Z.; Song, X.; Liu, L.; Yin, J.; Wang, Y.; Lan, D. Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work. Secur. Commun. Netw. 2021, 2021, 1–15. [Google Scholar] [CrossRef]
- Bilow, S.C. Introduction: Blockchain in Media and Entertainment. SMPTE Motion Imaging J. 2020, 129, 20–21. [Google Scholar] [CrossRef]
- Cho, S.; Jeong, C. A blockchain for media: Survey. In Proceedings of the International Conference on Electronics, Information, and Communication (ICEIC), Auckland, New Zealand, 22–25 January 2019. [Google Scholar]
- Peng, C.; Liu, Z.; Wen, F.; Lee, J.-Y.; Cui, F. Research on Blockchain Technology and Media Industry Applications in the Context of Big Data. Wirel. Commun. Mob. Comput. 2022, 2022, 3038436. [Google Scholar] [CrossRef]
- Zaidi, S.; Atiquzzaman, M.; Calafate, C.T. Internet of Flying Things (IoFT): A Survey. Comput. Commun. 2021, 165, 53–74. [Google Scholar] [CrossRef]
- Feng, C.; Liu, B.; Guo, Z.; Yu, K.; Qin, Z.; Choo, K.-K.R. Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones. IEEE Internet Things J. 2022, 9, 6224–6238. [Google Scholar] [CrossRef]
- Uddin, A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. A survey on the adoption of blockchain in IoT: Challenges and solutions. Blockchain Res. Appl. 2021, 2, 100006. [Google Scholar] [CrossRef]
- Wazid, M.; Bera, B.; Das, A.K.; Garg, S.; Niyato, D.; Hossain, M.S. Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment. IEEE Internet Things Mag. 2021, 4, 120–126. [Google Scholar] [CrossRef]
- Ab Rahman, N.H.; Glisson, W.B.; Yang, Y.; Choo, K.-K.R. Forensic-by-Design Framework for Cyber-Physical Cloud Systems. IEEE Cloud Comput. 2016, 3, 50–59. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Muram, F.U.; Javed, M.A. Drone-based Risk Management of Autonomous Systems Using Contracts and Blockchain. In Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Honolulu, HI, USA, 9–12 March 2021; pp. 679–688. [Google Scholar]
- Dawaliby, S.; Aberkane, A.; Bradai, A. Blockchain-based IoT platform for autonomous drone operations management. In Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, London, UK, 25 September 2020; pp. 31–36. [Google Scholar] [CrossRef]
- Kumar, M.S.; Vimal, S.; Jhanjhi, N.; Dhanabalan, S.S.; Alhumyani, H.A. Blockchain based peer to peer communication in autonomous drone operation. Energy Rep. 2021, 7, 7925–7939. [Google Scholar] [CrossRef]
- Idries, A.; Mohamed, N.; Jawhar, I.; Mohamed, F.; Al-Jaroodi, J. Challenges of developing UAV applications: A project management view. In Proceedings of the International Conference on Industrial Engineering and Operations Management (IEOM), Dubai, United Arab Emirates, 3–5 March 2015; pp. 1–10. [Google Scholar]
- Kriz, V.; Gabrlik, P. UranusLink–Communication Protocol for UAV with Small Overhead and Encryption Ability. IFAC-PapersOnLine 2015, 48, 474–479. [Google Scholar] [CrossRef]
- Gupta, R.; Kumari, A.; Tanwar, S. Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications. Trans. Emerg. Telecommun. Technol. 2021, 32, e4176. [Google Scholar] [CrossRef]
- Kędziora, M.; Kozłowski, P.; Szczepanik, M.; Jóźwiak, P. Analysis of Blockchain Selfish Mining Attacks. In Information Systems Architecture and Technology, Proceedings of the 40th Anniversary International Conference on Information Systems Architecture and Technology–ISAT 2019, Wrocław, Polska, 15–17 September 2019; Borzemski, L., Świątek, J., Wilimowska, Z., Eds.; Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2020; Volume 1050, pp. 231–240. [Google Scholar] [CrossRef]
- Mazhar, T.; Talpur, D.B.; Al Shloul, T.; Ghadi, Y.Y.; Haq, I.; Ullah, I.; Ouahada, K.; Hamam, H. Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sci. 2023, 13, 683. [Google Scholar] [CrossRef]
- Sawalmeh, A.H.; Othman, N.S. An Overview of Collision Avoidance Approaches and Network Architecture of Unmanned Aerial Vehicles (UAVs). arXiv 2021. [Google Scholar] [CrossRef]
- Singh, M.; Aujla, G.S.; Bali, R.S. ODOB: One Drone One Block-based Lightweight Blockchain Architecture for Internet of Drones. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 249–254. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Karimipour, H.; Srivastava, G.; Aledhari, M. Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security. IEEE Internet Things J. 2020, 8, 6406–6415. [Google Scholar] [CrossRef]
Characteristics | Blockchain Integration within the Internet of Drones (IoD) | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
[33] | [34] | [35] | [36] | [37] | [14] | [38] | [4] | [39] | [40] | [17] | [41] | [42] | [43] | [44] | [45] | [46] | [47] | Ours | |
IoD | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ 1 | × 2 | × | ✓ | ✓ | ✓ | ✓ | × | ✓ | ✓ | ✓ |
Blockchain | × | × | × | ✓ | ✓ | ✓ | × | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
IoD–blockchain integration | × | × | × | ✓ | × | × | × | ✓ | ✓ | × | × | ✓ | ✓ | ✓ | × | × | × | × | ✓ |
Contribution of blockchain | × | × | × | × | ✓ | ✓ | × | × | × | × | × | × | × | ✓ | ✓ | × | × | ✓ | ✓ |
Security issues | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | × | × | ✓ | ✓ | ✓ | × | × | ✓ | ✓ | |
Underpinnings technologies | × | × | × | × | ✓ | × | × | × | × | ✓ | × | × | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Uses cases of IoD and blockchain | × | × | × | × | × | × | × | × | × | × | × | × | × | × | × | × | × | × | ✓ |
Challenges | ✓ | ✓ | × | ✓ | ✓ | ✓ | ✓ | × | × | × | × | ✓ | ✓ | ✓ | × | ✓ | ✓ | × | ✓ |
Investigated Works | Scientific Topic |
---|---|
[2,5,26,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,72,76] | Basic elements and requirements of the IoD |
[13,22,35,39,67,71,77,78,79,80] | Privacy and security issues of the IoD |
[9,22,34,78,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103] | IoD attacks |
[9,33,77,88,104,105,106,107,108,109,110,111,112,113,114,115] | Protected countermeasures |
[116,117,118,119,120,121,122] | Blockchain measures for IoD security |
Parameters | Public BC | Private BC | Consortium BC |
---|---|---|---|
Accessibility | Anyone can participate in the core activities of the BC network | Selected and verified participants can join the network (restricted access) | Participants need permission to join the network (restricted access) |
Visibility | All transactions are visible in the network | Closed or open to a certain number of nodes | Open to a certain number of nodes (preselected nodes) |
Control | Decentralized | Centralized | Centralized |
Transparency | Transparent, as all transactions are visible to anyone on the network | Private, as only authorized users can view the data and transactions on the network | Private, as only authorized users can view the data and transactions on the network |
Scalability | Lower | Higher | Better compared to the public BC |
Privacy | Less privacy, as it accessible to everyone | High-level privacy | High level privacy compared to the public BC |
Consensus mechanism | PoW | PoW, PoS, etc. | PoW, PoS, etc. |
Power consumption | High energy consumption | Low energy consumption | Low energy consumption |
Anonymity | Users remain anonymous | Identities of users involved in the transaction | Identities of users involved in the transaction |
Security | Highly secure and resistant to attacks, due to the decentralized nature of the network and use of cryptography | Security using cryptography | Enhanced security through access restrictions |
Use cases | Mining and exchanging cryptocurrencies, decentralized financial systems, supply chain management, digital arts | Enterprise applications, supply chain management, and internal data sharing | Financial institutions, the healthcare industry, supply chain management, and confidential data sharing among trusted entities |
Investigated References | Scientific Topic |
---|---|
[118,123,124,125,126,141,142,143,144] | Structure of blockchain |
[127,128,129,130,131,132,133,134,135,136,137,138,139,140] | Architecture of blockchain |
[144,145,146,147,148,149,150,151] | Types of blockchain |
[15,61,143,152,153,154,155,156,157,158,159,160,161,162,163,164,165,166,167,168] | Contribution and benefits of blockchain to the IoD |
Investigated Works | Underpinning Technologies |
---|---|
[169,170,171,172,173,174,175,176,177] | Artificial Intelligence (AI) within blockchain and the IoD |
[178,179,180,181] | Cloud Computing (CC) within blockchain and the IoD |
[182,183,184,185,186] | Edge Computing (EC) within blockchain and the IoD |
[29,187,188,189] | The Internet of Things (IoT) within blockchain and the IoD |
[190,191,192,193] | Communication technologies |
[192,194,195,196,197,198] | 5G networks |
[197,199,200,201] | 6G networks |
Investigated References | IoD–Blockchain Use Cases |
---|---|
[45,200,201,202,203,204,205] | Integration of blockchain within IoD devices |
[206,207,208,209,210,211] | Supply chain within blockchain and the IoD |
[211,212,213,214,215,216,217,218] | Health chain within blockchain and the IoD |
[214,219,220] | Natural disasters within blockchain and the IoD |
[221,222,223,224] | Charging/refueling stations within blockchain and the IoD |
[5,34,45,224,227] | Agriculture within blockchain and the IoD |
[5,14,228] | Transportation within blockchain and the IoD |
[227,228,229] | Media within blockchain and the IoD |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tychola, K.A.; Voulgaridis, K.; Lagkas, T. Beyond Flight: Enhancing the Internet of Drones with Blockchain Technologies. Drones 2024, 8, 219. https://doi.org/10.3390/drones8060219
Tychola KA, Voulgaridis K, Lagkas T. Beyond Flight: Enhancing the Internet of Drones with Blockchain Technologies. Drones. 2024; 8(6):219. https://doi.org/10.3390/drones8060219
Chicago/Turabian StyleTychola, Kyriaki A., Konstantinos Voulgaridis, and Thomas Lagkas. 2024. "Beyond Flight: Enhancing the Internet of Drones with Blockchain Technologies" Drones 8, no. 6: 219. https://doi.org/10.3390/drones8060219
APA StyleTychola, K. A., Voulgaridis, K., & Lagkas, T. (2024). Beyond Flight: Enhancing the Internet of Drones with Blockchain Technologies. Drones, 8(6), 219. https://doi.org/10.3390/drones8060219