Application of Blockchain in UAV - 2
Application of Blockchain in UAV - 2
Vehicular Communications
www.elsevier.com/locate/vehcom
a r t i c l e i n f o a b s t r a c t
Article history: The recent advancement in Unmanned Aerial Vehicles (UAVs) in terms of manufacturing processes,
Received 4 December 2019 and communication and networking technology has led to a rise in their usage in civilian and
Received in revised form 22 January 2020 commercial applications. The regulations of the Federal Aviation Administration (FAA) in the US had
Accepted 13 February 2020
earlier limited the usage of UAVs to military applications. However more recently, the FAA has outlined
Available online 19 February 2020
new enforcement that will also expand the usage of UAVs in civilian and commercial applications.
Keywords: Due to being deployed in open atmosphere, UAVs are vulnerable to being lost, destroyed or physically
Unmanned Aerial Vehicle (UAV) network hijacked. With the UAV technology becoming ubiquitous, various issues in UAV networks such as intra-
Security and privacy UAV communication, UAV security, air data security, data storage and management, etc. need to be
Blockchain technology addressed. Blockchain being a distributed ledger protects the shared data using cryptography techniques
Internet of Things (IoT) such as hash functions and public key encryption. It can also be used for assuring the truthfulness of
the information stored and for improving the security and transparency of the UAVs. In this paper,
we review various applications of blockchain in UAV networks such as network security, decentralized
storage, inventory management, surveillance, etc., and discuss some broader perspectives in this regard.
We also discuss various challenges to be addressed in the integration of blockchain and UAVs and suggest
some future research directions.
© 2020 Elsevier Inc. All rights reserved.
1. Introduction munication services where UAVs are being used. Thus they have a
huge scope for applications in a wide variety of fields in both civil
Unmanned Aerial Vehicles (UAVs) are a class of robotic vehi- and military domains. A Non-Governmental Organisation (NGO) in
cles that can carry payloads and execute flying missions guided Japan employed UAVs to inspect unlicensed Japanese whaling that
either by remote control stations or in an autonomous way. UAVs was going on in the southern hemisphere [11]. Also, after the dev-
are very mobile, which enables them to function even in remote astating Japanese earthquake and tsunami which occurred in 2011,
areas where there is no physical or technological infrastructure. three different types of UAVs were deployed during the emergency
Originally UAVs were used only for military applications. However, operations to closely monitor the Fukushima nuclear power plant.
with their increasing popularity, technological advancements and The inputs received from these UAVs were crucial for carrying out
awareness among the people in industry and research, their ap- the emergency operations [12]. Such applications have encouraged
plications are no longer limited to military applications [1]. As the research and scientific communities to actively explore the do-
highlighted in Fig. 1, some of the different applications where main of UAVs and how to enhance their operational capabilities.
UAVs are used today are [2]- rescue operations [3], saving lives UAVs are associated with solving new problems and are in-
[4], agriculture and farming [5], building structures [6], pipeline volved in a variety of new activities in the technological domain
inspections [7], delivering goods and medical supplies [8], video leading to the growth of the UAV market. They are also being
capturing and filming [9] and surveying [10]. Apart from these, actively explored for acting as base stations in communication net-
there are many more applications such as inventory management, works [13–17]. A lot of agencies are involved in developing UAVs
surveillance monitoring activities and providing relayed telecom- to bring down the cost associated with the connected services.
There are also many studies which are coming up with improved
authentication protocols for UAV and vehicle to vehicle communi-
*
Corresponding author.
cations such as [18–21]. This will increase the efficiency of UAV
E-mail addresses: [email protected] (T. Alladi),
[email protected] (V. Chamola), [email protected] communications in the future. UAVs also offer a lot of flexibility,
(N. Sahu), [email protected] (M. Guizani). are easy to deploy, can be customized to take high-resolution im-
https://doi.org/10.1016/j.vehcom.2020.100249
2214-2096/© 2020 Elsevier Inc. All rights reserved.
2 T. Alladi et al. / Vehicular Communications 23 (2020) 100249
Table 1
Applications of blockchain in other emerging areas.
Technology References
Smart cities [35–38]
Smart grids and energy management [39–46]
Smart communities [41,47–51]
Edge computing [52–58]
Cloud computing [54,56,59–76]
Internet of Things (IoT) [58,59,77–109]
Machine learning [110–113]
Deep learning [114–120]
Fig. 3. Typical structure of a block in a blockchain [35,125].
Brain Computer Interface (BCI) [121,122]
Smart Healthcare [123]
Industry 4.0 [124]
of the blockchain [130]. The major consensus mechanisms [35]
are Delegated Proof of Stake (DPoS) [131], Practical Byzantine
Fault Tolerance (PBFT) [132], Proof of Work (PoW) [33] and
Proof of Stake (PoS) [133]. Apart from these, there are other tract, it is cryptographically signed and is broadcast to all other
consensus algorithms also such as Tendermint [134], Ripple nodes participating in the blockchain for verification [141].
[135], Stellar [136], Proof of Bandwidth (PoB) [137], Proof of 6) Application layer: This is the highest layer of the blockchain
Reliability (PoR) [138] and many more. For more details re- which comprises of its applications in various practical fields
garding different consensus protocols, readers are encouraged such as IoT, finance, AI, etc. We discuss the applications of
to go through [35,139,140]. blockchain in UAVs in this paper, which is also a part of the
4) Incentive layer: The incentive layer can be called one of the application layer. There have been various studies related to
foundation pillars of blockchain architecture as it the driving applications of blockchain in different fields such as smart
force behind blockchain’s usage and the which it has today. cities [35–38], smart grids and energy management [39–46],
It combines the blockchain technology with economic factors smart communities [41,47–50], edge computing [52–58], cloud
and creates a mutually beneficial scheme for the miners. The computing [54,56,59–76], Internet of Things (IoT) [58,59,77–
miners invest a lot of processing power to mine the blocks and 109], machine learning [110–113], deep learning [114–120],
in return get reward points in the form of incentives such as Brain-Computer Interface (BCI) [121,122], healthcare applica-
digital currency corresponding to the magnitude of their work. tions [123], Industry 4.0 [124] and many more. Apart from
5) Contract layer: The contract layer makes the blockchain pro- this there are other innovative applications also such as track-
grammable and enables the inclusion of different scripts, ing and registration of police FIR [142], mobile data offloading
smart contracts, and algorithms with the help of which com- [143] and many more. A more recent blockchain-based appli-
plex transactions can be carried out on the blockchain. A smart cation was implemented by authors in [144], where they de-
contract is a set of rules which when met triggers a transac- veloped a smart irrigation system using blockchain technology.
tion between the two parties involved in the contract. When Table 1 gives an overview of the applications of blockchain in
these parties agree with the terms specified within the con- other emerging areas.
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 5
2.4. Blockchain types a reliable communication channel in UAV networks is very cru-
cial because of their high mobility and sparse deployment [154].
Currently, blockchain systems have been broadly categorized As blockchain technology evolves, so does the UAV industry. Ap-
into three types based on the ownership and the audience allowed plication areas of blockchain are broad, from security robots to
to participate in the process of block verification and addition delivery UAVs logging their activities, thereby improving customer
[145,146]. contentment. Law enforcement can be improved by security robots
logging information on a blockchain by providing concise informa-
1) Public blockchain: In a public blockchain, all the records are tion. UAVs are here to stay and will change almost every aspect
visible to the public and everyone is allowed to take part in of our lives. The future of UAVs will contain everything ranging
the consensus process, i.e., a permissionless consensus process. from asteroid mining to very small inner-body autonomous ve-
Public blockchains have the highest immutability as compared hicles. Some of the applications of blockchain in UAV networks
to the other two types since the number of participants is very mentioned in this paper are shown in Fig. 4.
high [145]. However, public blockchains have lower efficiency There have been many studies in the past which explore appli-
as compared to private and consortium blockchains. cation of UAVs in fields such as telecommunications, medical sup-
2) Private blockchain: In a private blockchain, only those nodes ply delivery, military applications, surveillance and monitoring etc
which come from one specific organization are allowed to join [155–169]. To the best of our knowledge, a comprehensive survey
the network and the consensus process, i.e., it has a permis-
of the combined application prospects of UAVs and blockchain has
sioned consensus process. It is also regarded as a centralized
not been discussed to date. In this paper, we try to present a com-
network since it is fully under the control of one organization.
prehensive survey of applications of UAVs using blockchain. The
Such networks have high efficiency but can be tampered with
breakup of each section is such that we highlight the motivation
relatively easily as compared to public blockchains because of
behind using blockchain and its role in enhancing the applicabil-
the lesser number of participants.
ity of UAVs for each application area. Also, where ever possible,
3) Consortium blockchain: A consortium blockchain also has a per-
we discuss the detailed working of the system in each area. In the
missioned consensus process, but unlike a private blockchain,
end, we discuss the challenges involved in each application.
only a few selected organizations can participate in it. There-
fore, it is a partially decentralized system. It also has high
efficiency but can be tampered with relatively easily as com- 3. Blockchain-based uav systems for automation of supply chain
pared to public blockchains [145].
Fig. 4. Applications of blockchain in various fields of UAV networks which are discussed in this study.
3.2. Role of blockchain the flow of stocks can be stored and monitored easily. The UAVs
can be programmed to charge themselves and conduct scans at
Blockchain provides a high level of transparency, security, trust, regular intervals, thereby fully automating the storage and verifi-
and efficiency in the supply chain and enables the use of smart cation process.
contracts. Depending on the rules set in the smart contract, the
parties involved in the contract will interact with each other. The 3.2.2. Automating transactions
agreement is automatically enforced as soon as predefined rules Smart contracts can help automate certain transactions and
are met. These smart contracts help in verifying, facilitating and processes which take place regularly, such as the ordering of sup-
enforcing the negotiation of a transaction. It provides a way of de- plies when the stock of a particular product has dropped below a
centralized automation. In [173] the authors present a UAV-based certain limit. As soon as some predetermined conditions are met,
system to automate the inventory and keep track of industrial the smart contracts are executed without any human intervention.
objects which are attached with RFID tags. This system uses a This process is explained in Fig. 5.
blockchain that receives and validates the inventory data collected
by the UAVs, ensures their trustworthiness and also makes them 3.2.3. Automating decision making
accessible to the interested parties. Some of the specific utilities of Via use of smart contracts, UAVs participating in multi-agent
blockchain are as follows. systems can be programmed to make decisions on their own. For
example, in the application of Ethereum blockchain-based UAVs
3.2.1. Automating data storage and verification discussed in [175], smart contracts are used for transferring com-
The data collected by UAVs performing tasks such as inventory mands between the UAV and other robotic agents which operate in
management can be directly transmitted to a cyber-physical sys- business processes among people. In such applications, only when
tem connected to a blockchain. Each block of the blockchain will one agent completes its task the other agent can start its task.
contain details of the inventory stock scanned by the UAVs and the After completion of the task, the UAV agent deposits a specific
timestamp at which the block was added, thus information about amount of token as specified in the smart contract to the next
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 7
send it to the blockchain to be received by the UAVs through a number of UAVs that are capable of serving the users without any
transaction. The sequence of events starts with a request for deliv- overheads. However, multiple vendors may aim at providing the
ery based on which a smart contract is issued containing informa- same solution, therefore, there are good chances of channel block-
tion about the order, its purpose and the client data. This contract ing, interference, and overlapping coordinates. The network can fail
is accepted by any UAV agent which is available. The client and the because of the above-mentioned issues. There should be a platform
UAV agent conclude a smart contract for air tokens which contains that is capable of connecting UAVs from different vendors but it in-
the client’s location data. The UAV then commits the transaction volves issues related to authority, control, and trust. A small glitch
to request for air route to an agent dispatcher. As soon as the dis- in the security is enough to disclose the security protocol used
patcher agrees to this contract, a new contract takes place between by any specific vendor. Also, unreliable and untrustworthy aerial
them which has information about the registered route. After this, vehicles may get associated with the network leading to infor-
the UAV makes the scheduled flight and informs the dispatcher mation leakage and redirection of network traffic, causing losses
that the air route has been used. to the vendors. There is a need to handle such issues effectively
without completely relying on a central system which may induce
3.4. Challenges operational overheads and bottlenecks in rendering services. This
issue can be resolved using blockchain with very little overheads
Inventories usually have a huge stock of products, hence hav- and complexity. An aerial blockchain can be formed by UAVs from
ing RFID tags for all of them may be quite costly. Furthermore, the different vendors, creating a social circle of UAVs as described in
blockchain being used for these applications would require high [177].
processing power for mining the data and creation of blocks which
will also increase the installation cost of the system. It will con- 4.2. Role of blockchain
stantly consume electricity reducing the efficiency of the system
by increasing the operational cost. In many countries of the world, Blockchain technology can provide reliable peer-to-peer com-
the legal status of blockchain-based cryptocurrencies such as bit- munication channels to UAV networks (UAVNETs) and ways to
coin usage is not very well defined. Thus, automating economic overcome possible threats and attacks. We discuss below some of
processes with blockchain-based UAVs without a legal framework the utilities of blockchain specific to coordination in UAV networks.
in place can raise concerns in the future, leading to confusion and
a lack of trust among the participants. 4.2.1. Creating new business models
A combination of UAVNETs and blockchain can be used to de-
4. Coordinated uav services using blockchain velop new business models that incorporate the facility of ex-
changing data between a UAV and an end-user. Sensing-as-a-
4.1. Motivation Service (S2 aas) is a business model in the Internet of Things (IoT)
field which is gaining a lot of popularity [178–180]. It helps in
With the increasing popularity of UAVs, their application areas creating a market pattern in which multiple users can buy sensor
are becoming more diverse and in many cases, a group of UAVs data from multiple sensors. Having a blockchain incorporated in
performs the tasks rather than a single UAV. Some examples of this this network will make the process decentralized and autonomous.
are disaster relief, surveillance, network relaying, energy-efficient A possible model of such an implementation is discussed in [23].
device discovery [176] etc. Coordination between the UAVs is core
to these applications but most of the existing systems lack a global 4.2.2. Collision free movement of UAVs
knowledge-sharing platform between the member UAVs in the One of the most important requirements in UAV networks is
UAV network and instead just rely on local communication be- that the UAVs do not physically crash into each other and also that
tween adjacent member UAVs [23]. This is where blockchain can they do not interfere with each other’s signal. Blockchain can help
prove to be beneficial and it opens a new stream of research in achieve this feature by storing the coordinates of all the UAVs in
UAV networks emphasizing a global channel for communication. its database. By using algorithms such as discussed in [181] and
Furthermore, with its help, we can incorporate capabilities such as referring to these stored coordinates, UAVs can decide their opti-
distributed decision making and enhanced security into UAV net- mal route to move to a destination without any collision and with
works. Some basic requirements of coordination between UAVs are minimum interference.
to prevent mid-air collisions, to make decisions based on data col-
lected from more than one UAV and to securely communicate with 4.2.3. Uniform load sharing
each other. Blockchain can help to provide secure one to one as In inter-service operations, it is necessary to ensure uniform
well as broadcast communication facilities in such UAV networks distribution of services between different vendors who lack trust
with the help of public key and private key mechanism. It can also among each other. Blockchain can solve this problem owing to
empower the UAV network to make decisions based on the opin- its being a transparent electronic ledger. Based on the load in-
ion of other UAVs such as in a voting system discussed in [23]. [23] formation of different regions, UAVs can be assigned their regions
also discusses the application of blockchain to create new business of operation ensuring uniform distribution as far as possible. An-
models where UAVs can conduct money transactions with human other way to do this is to assign a set of randomly generated
users in exchange for the services they provide. non-overlapping coordinates which can be used in cases where the
Another important area where blockchain can be used is to load is dynamic. This technique can also be used for load balancing
coordinate activities between UAVs belonging to different service in UAV assisted communication for IoT [182].
providers in case of high demand which cannot be met by any
single party at a time. Such an application of the operability of 4.2.4. Data and entity authentication
UAVs is discussed in [177]. This is called inter-service operabil- Because of the facility of the public and private key, UAVs can
ity of UAVs i.e. sharing a UAV among multiple vendors to serve communicate with each other through a common channel and
users present in a very densely populated area. The coordinates avoid hacking of data by third parties who can get access to the
of the UAV should not overlap to maintain minimum interference. channel. Additionally, they can also uniquely sign the data col-
Taking into account the number of users present and the services lected using their private key and can broadcast it to the whole
demanded by each one of them, every vendor deploys a sufficient network. This way, blockchain also helps in enabling the feature
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 9
to the users. As the vendors might be competitors in the mar- 4.4. Challenges
ket, with the help of blockchain they can maintain the level of
trust among themselves. Another application is discussed in [177] Although the integration of UAV networks with blockchain
where the authors use the concept of a weighted blockchain for opens a lot of possibilities, there also exist many practical chal-
load balancing in UAVNETs. Load balancing can be implemented lenges [23]. In Bitcoin, a block takes almost 10 minutes to be
using consensus between different UAVs from different vendors processed. Although such a delay can be minimized in private
and the users are charged depending on how much services they blockchains, there will still be a significant time lag between the
utilize. Fig. 9 shows a representational blockchain where the data time when the transaction is carried out and when it is confirmed.
usage and the service time are stored in the blockchain in the form This can prove to be dangerous in carrying out cooperative tasks
of transactions that the UAVs make to the vendor’s account. Iden- between the UAVs such as swarm movement and can cause col-
tification of vendors is carried out and zones are allocated to each lisions. Also, if the number of UAVs in the swarm is very large
of the identified vendors for cooperative operation over a region. and can operate for a long period of time, the blockchain itself can
The UAVs use a public key for identifying each other without the grow very large for the UAVs to accommodate. This problem is also
need of any centralized authentication mechanism. When all of the faced by the Bitcoin community and is called bloat [184].
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 11
5.1. Motivation
5.2. Role of blockchain i. The first step of the system is the collection of data by ASs
present at different altitudes.
The role of blockchain here is to securely store and send data ii. An UAVs with AS requests for storage space from the GSMs by
from the UAV nodes (on which ASs are deployed) to the GSMs. issuing a broadcast command.
Blockchain also helps in distributing rewards (such as crypto- iii. The GSM having the closest physical proximity to the UAV of-
currencies) from UAVs to GSMs depending on the services they fers its storage space.
provide such as storage and processing power, and thus enables iv. Data is sent from the UAV to the GS.
the creation of a mutually beneficial model. Blockchain provides v. GS receives the data and verifies the completion of data recep-
the following utilities for this application: tion with an acknowledgment signal.
vi. The UAV issues reward points to the GS via the blockchain.
5.2.1. Increase air data security
The GSMs which are part of the network allocate caching space The transactions between the UAVs and the GSMs are carried
to the UAVs to collect and secure their data. The UAVs in return out using smart contracts and the consensus protocol used is the
pay the GSMs with reward points with the help of transactions in Proof of Space (PoS) as discussed in [189]. The blockchain struc-
the blockchain. The UAVs can instantly transfer the cached data to ture used is based on the IoT security blockchain-based framework
the GSMs. This reduces the vulnerability of the data collected by discussed in [77] which has a block header, block data and a policy
the UAVs since the adversaries will have a lesser window to carry header.
out physical or cyber attacks.
5.4. Challenges
5.2.2. Enable mutually beneficial transactions between heterogeneous
The proposed system of organizing air to ground industrial IoT
IoT agents
networks with the help of blockchain is a very innovative solution
The UAVs can pay the GSMs for their services of securing the
but its implementation still faces some challenges. As air sensors
data collected by ASs onboard. The GSMs provide additional stor-
are installed in the air, regulatory concerns come up with govern-
age space and processing power to the UAVs with ASs and in
ment and airspace rules of the region. The reward that is given out
return the UAV pays them with reward points, thus creating a mu-
in the form of cryptocurrency is again a concern with countries
tually beneficial network. The authors of [187] also point out that
such as India banning private cryptocurrencies completely. Also,
such a mutually beneficial network will create a healthy ecosystem
organizing a diverse set of ground sensors modules can be a big
in a heterogeneous IoT environment as shown in Fig. 11. Hetero-
challenge as various types of individual and commercial enterprise
geneous IoT systems is a growing area of research [188] and have
permissions will be required to install ground sensors modules on
the potential to transform the lifestyle of individuals.
their property.
5.2.3. Tackle problem of limited storage and processing power onboard
6. Securing uav networks with blockchain
UAVs
UAVs harbouring ASs have limited storage space and processing 6.1. Motivation
power. By sending the data collected by ASs to GSMs they can free
up their onboard memory to capture the next set of data and also The use of UAVs has been increasing at a huge rate across in-
save the data processing power. Saving on power can increase their dustries for both defense and civilian applications. With further
flying time. advancements in the technologies used for making them, such as
12 T. Alladi et al. / Vehicular Communications 23 (2020) 100249
battery capacity, AI-based software solutions, physical design im- be fatal if the flying control and navigation systems are de-
provements, construction material, camera technologies, etc., their pendent on the commands from the GCS. It can be a single
demand is going to increase manifold [190]. This increases the point of failure for the whole system. Having a decentralized
risk of cyber-physical attacks on the UAVs in the coming years blockchain network removes this dependency and reduces the
especially once their usage is regularised by governments across vulnerability of UAV networks to signal jamming. Each UAV
the globe. Blockchain technology has the potential to secure data has a copy of the blockchain which contains the flying route
that is being dynamically updated, through its security capabili- details of other UAVs and can decide its path accordingly.
ties such as hashing, smart contracts, consensus protocols, public 2) Detecting UAV hijacks, poisoned data and ensuring data integrity:
and private keys, etc. Hence it is ideally suited for UAV applica- UAV networks are very vulnerable and dynamic in nature. An
tions which are very dynamic in nature. As the UAV traffic density adversary UAV may enter the network and start injecting false
in the air increases, there is an increasing need to integrate them information or alter the original information. Such altered in-
with the Air-Traffic-Control (ATC) network to regulate their move- formation called poisoned data can also be injected by UAVs
ment and usage. This can be achieved with the help of blockchain which were initially part of the network but were later hi-
as discussed in [190]. UAVs can decide their flight routes indepen- jacked by adversaries. To tackle such attacks, the consensus
dently with the help of their onboard blockchain copy containing mechanism of blockchain can be implemented. If any UAV de-
information about flight routes of the other UAVs and the input tects suspicious activity, it can report it in the blockchain and
data from ATC. In this section we discuss the security models pre- if the number of such entries against a UAV exceeds a certain
sented by [190–192] to analyze the applicability of blockchain in predetermined threshold, it can be concluded that it is a ma-
addressing the security challenges of UAV networks. Fig. 12 gives a licious UAV. Also, in commercial scenarios, blockchain can be
pictorial overview of different scenarios where blockchain can en- used to receive the feedback of end-users to enable the UAVs
hance the security of UAV networks. to reach a consensus on the source of internal attacks, if any.
3) Avoiding mid-air collisions of UAVs: UAV networks may comprise
6.2. Role of blockchain a large number of UAVs with a high probability of their routes
clashing with each other due to a slight delay in the com-
1) Mitigating jamming of UAV signals: Jamming of wireless signals mand signal received or a channel blockage in the path of
between the UAVs and the Ground Control Station (GCS) can the signals coming from GCSs. If each UAV has an onboard
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 13
blockchain copy containing the flying routes of its peer UAVs, UAVs already have a lot of onboard processing requirements
it can maintain a safe distance from others while moving to- for controlling their flight and other attached payloads such as
wards its destination. This removes the dependence of UAVs cameras, sensors, etc., simultaneously carrying out computa-
on manual signaling which is highly prone to delays and er- tions for blockchain will be a big challenge.
rors. 2) 51 percent attacks: Blockchain networks are also vulnerable to
4) Securing UAV communications: The communication infrastruc- attacks from mischievous groups who can gain control over
ture in UAV networks is prone to threats such as spoofing, the majority of the mining power of the blockchain (i.e. con-
Denial-of-Service (DoS), man-in-the-middle, eavesdropping, trol over 51% of the participant nodes). This gives them free-
and data tampering attacks as discussed in [192]. Blockchain dom to create a fork in the chain and ability to revert trans-
empowers the UAV networks to encrypt the data and store actions which took place when they were in control of the
them in the blockchain thus making it inaccessible to anyone blockchain. They can also prevent certain transactions from
without the legitimate decryption key. In [192], the authors getting registered in the blockchain. In UAV networks, adver-
have proposed a mechanism where one of the UAVs is re- saries can prevent the UAV’s coordinates form getting regis-
sponsible for block creation (called the ‘forger node’) and all tered on the blockchain or even delete them with the help of
the other UAVs are used for block validation and verification a 51% attack. This can be fatal for vehicles in air such as com-
using the Proof of Stake (PoS) consensus protocol. The selec- mercial airplanes and also harm people and property on the
tion of a forger node is done using a utility function based on ground.
game theory. The presented study shows that the blockchain 3) Rigorous mathematical testing: Implementing blockchain models
security model gives better performance compared to other in UAV networks is a very complex task. Rigorous simulations
state-of-the-art security systems in place for the UAV networks
have to be carried out keeping in mind various test cases that
in terms of communication latency and cost.
may be possible. The whole system design needs to be veri-
5) Securing UAV data types: In any UAV network there are four
fied from all angles before the technology moves into real-life
main data types namely, UAV identifier, flight route control,
implementation, since any error may lead to fatal accidents.
sensor data, and the flying schedule [190]. Blockchain pro-
Although simulations have been carried out by [191] with pos-
vides secure storage and protects the integrity of these data
itive results, more robust testing from the system engineering
parameters by writing and updating them inside a block of
point is required which is very challenging to carry out in such
the blockchain. The authors of [190] show us how the flying
complex UAV networks.
schedule and the flight route control of the UAV can be im-
plemented in the form of a smart contract. The fulfillment of
7. Blockchain-based uav surveillance applications
the conditions in the smart contract indicates the completion
of the UAV’s flight mission.
6) Securing data dissemination: Data dissemination refers to the 7.1. Motivation
distribution of data to the end-users. The forger node (as dis-
cussed in the previous section) sends the data to the end-users
UAVs are being actively explored for their usage in surveillance
to securely store it in the blockchain. The following sequence
applications because of their high mobility and dynamic nature
of steps is followed for the same [192].
which empowers them to operate in regions without any network
i. Forger node encrypts the packet data to be sent and for-
infrastructure such as borders, remote environmentally sensitive
wards it to a public distributed blockchain.
locations and regions affected by natural disasters [193,194]. How-
ii. The public distributed blockchain network accepts the re-
ever, because of their dynamic topology, UAV networks have many
quest and updates its ledger.
security challenges that make them vulnerable to a variety of at-
iii. Forger node computes the digital signature of the packet
tacks. Some of the main challenges faced by UAV networks are as
data with its private key.
follows [25].
iv. This digital signature is then broadcast to the public
blockchain network.
i. Trust and data authentication.
v. The distributed nodes verify and validate the broadcasting
node. ii. Upholding the security and reliability of channels.
vi. Post validation the packet is forwarded to the end-user. iii. Finding the optimal path.
vii. The end-user decrypts the packet with the public key of
the forger node and sends an acknowledgment (Ack) to the In areas without any Vehicle to Infrastructure network (V2I),
forger UAV, indicating the completion of the transaction. UAVs rely on their Vehicle to Vehicle (V2V) networks. This commu-
In this way, blockchain can be employed to secure the com- nication needs to be secure as they are used in real-time mission
munication between UAVs and end-users. This is important for mode applications such as combat [195], border monitoring, and
future commercial applications of UAV networks in areas such rescue and relief operations. Thus, it is important to know what
as Sensing as a Service (SaaS) [178–180] and new business kind of attacks can penetrate their communication network to ap-
models such as UAV delivery. preciate the role of blockchain in solving them. The most frequent
and popular attacks made on such networks are listed below [25].
6.3. Challenges
i. Unauthorised access to the UAV ID and physical location of
1) Limited resources onboard UAVs: Like any other existing block- UAVs.
chain applications, the models discussed here also come with ii. DoS attack.
certain limitations of data storage, computation time and com- iii. Sybil Attack which creates confusion in the network by imitat-
putation cost. As the number of UAVs in the network increases, ing several UAVs with the same ID.
the computation cost also goes up. And as more data is gener- iv. Increasing the latency of system transmissions by spamming.
ated, the blockchain becomes bigger occupying a lot of disk v. MITM attack.
space. Also hashing for larger data requires more time and vi. Blackhole attack.
processing power which is limited onboard UAVs. Given that vii. Fake information of locations.
14 T. Alladi et al. / Vehicular Communications 23 (2020) 100249
Fig. 13. A blockchain-based surveillance system [25]. (Left) Raising of alarm in case of a real intruder and (Right) a malicious UAV generating a False alarm. The trust level of
true alarm increases with time whereas the trust level of false alarm remains stagnant.
Blockchain can very easily secure access to the IDs and physi- 7.2.1. Maintaining high trust of intruder detection alarm
cal coordinates of UAVs as is discussed in one of its applications One of the main purposes of deploying UAV systems for surveil-
of securing UAV data types in the previous section. It can easily lance is to create an alarm in case of intrusion of surveillance
avoid MITM attacks by encryption and decryption mechanism us- areas. Blockchain can facilitate the verification of such intrusion
ing public-key cryptography. Given the consensus mechanism of events and maintain high trust of the alarm. Every time an event
UAVs participating in the blockchain, it is also not difficult to de- occurs, UAVs detect them and pass on these messages to neighbor-
tect fake information. Thus, blockchain has the potential to solve ing UAVs by adding a block to blockchain containing details of the
most of these problems and can be used to securely and effi- intrusion and this continues recursively as shown in Fig. 13. Each
ciently implement these mechanisms. Surveillance is not limited UAV sends different encrypted messages conveying whether they
to only military applications but can be conducted in the civilian
detected the intruder directly or is it done by another one and If
environment also (e.g., traffic management in metropolitan areas,
several UAVs observes the same intruder event, it can be validated
imaging of a particular area, etc). Such applications do have a
and if the event is detected by only one UAV it is taken as true,
ground infrastructure but operate in a highly dense environment
but considered suspicious. Like in Fig. 13, in case of a real intru-
which means there is a lot of physical obstacles in the movement
sion the first UAV to observe it is UAV A and then subsequently
of UAVs and a lot of scope for high jacking of the data transmit-
ted between them. Thus, blockchain can be used to enhance the UAV B and UAV C will also observe it and hence the trust level
security of such UAV ad-hoc networks and avoiding paths where of the alarm increases. But in case of a false alarm, only one alert
the line of sight is blocked. Blockchain can also help in detecting is obtained and its trust level remains low. Also, if it is detected
wrong information when a UAV is hijacked physically using asym- that a UAV has sent false information, it is penalized and loses its
metric encryption and discriminate such compromised UAVs using trust. The neighbor UAVs can find out if an UAV is sending ma-
distributed trust management. We discuss the system models pre- licious data continuously as each UAV keeps updated track of IDs
sented in [25] and [24] to discuss this application of blockchain in of all the direct observers. A similar implementation based on the
UAV surveillance applications. principles of blockchain was simulated by [25]. The results of the
study show that in case of an actual intruder crossing surveillance
7.2. Role of blockchain area, the number of direct observer UAVs remains below 10 per-
cent throughout the time period of simulation and the number
of indirectly alerted UAVs reach 100 percent in about 50 minutes
Blockchain ensures the security of information sets by sharing
them and verifying the data by the distinctive suggested parties. and within an hour the trust level of the alarm reaches 90 per-
It can help in creating a robust data transmission network be- cent in the network. In the case of an intruder, UAV generating a
tween UAVs where data can be verified at various checkpoints to false Alarm of tress-passing the indirectly alerted UAVs reach 100
ensure the integrity of the data. Also, using the features of unique percent in an hour but the trust level of the alarm remains 0 as
fingerprint of every block (in the form of hashing) and the address- only one UAV reports it. So overall the performance of the system
ing mechanism (in the form of public keys and private keys), the if satisfactory and the distributed trust policy proves to be benefi-
robustness of the system can be increased against attacks by ad- cial in detecting false alarms. This is a very essential feature of a
versaries. Thus, on similar lines we discuss some of the utilities of surveillance network because if the alarm loses its trust then cases
blockchain in surveillance applications below. of real intrusion may go unnoticed.
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 15
Fig. 14. Double-block checking mechanism in a UAV network based on the model proposed in [24]. It makes it more immune to physical obstacles in line of sight and cyber
physical attacks.
7.2.2. Securing the surveillance data from adversaries height. Blockchain helps in the collection of the data from differ-
Securing the surveillance data captured by the UAVs using ent UAVs and their collective processing at ground data centers. In
Blockchain makes it immune to impersonator UAVs or hackers [24], the authors present such an application wherein a large UAV
who may try to modify or access the data. Hashing mechanism network, each UAV shares its local view in the form of the block
of blockchain protects the data from being manipulated. Hash is a on the blockchain as shown in Fig. 14. Finally, these blockchain
unique identity of each block which is generated by inputting the reach the ground station and data centers where the global view
data of the block to a complex mathematical function. So even if is made. Also as discussed in the previous section such a network
there is a slight change in the data of the block it will give an en- is robust against obstacles blocking line of sight and cyber-physical
tirely different hash. So if an intruder UAV wants to modify the attacks which makes it more reliable. This view can be shared with
data stored in the blockchain, then he will have to recalculate the Air Traffic Control (ATC) authorities, UAV operators, etc., to imple-
hash of the majority of the blocks in the blockchain which requires ment Collision Avoidance Algorithms and plan their flight routes
huge processing power which is not possible on-board an UAV. accordingly.
Another possibility is that the malicious UAV may try to create a
false alarm, this is already discussed in the previous point where 7.2.5. Create an efficient and secure data transmission mechanism
it is mitigated with a distributed trust policy. Also to address the All the UAVs which are to participate in the surveillance can be
challenge of authentication of UAVs joining the surveillance fleet, registered in the network before the fleet starts the surveillance
the authors in [25] proposed to use the hyper-ledger permission activity. Hence the Public keys of all the UAVs will be available
blockchain where every UAV which wants to connect to the net- with everyone in the fleet and can be used for signing the message
work needs to obtain an enrollment certificate from an enrollment securely to everyone. This avoids the MiM attack as the message
Certificate Authority (CA) that is part of the membership services. encrypted by a public key can be decrypted by a corresponding
The CA gives the UAV permission to connect to the network and private key which are private to the individual UAVs.
a transaction certificate which allows it to submit transactions to
the blockchain. Thus it helps in increasing the authenticity of the 7.3. Challenges
surveillance data. This is important because adversaries may try
to tamper the surveillance data to delete their mischievous acts
7.3.1. Latency
which may have been captured by the surveillance network.
The distribution of information in such UAV networks is slow as
each UAV share the data with UAVs that are close enough to com-
7.2.3. Reduce system vulnerability to cyber-physical attacks and
municate when possible and the next UAV does the same thing
physical obstacles
and in this way the information is propagated in the whole net-
With the help of Blockchain, we can implement a double-
work. So although such medium of communication is reliable it
blocks checking mechanism which is discussed in [24]. The mech-
leads to a lot of latency which may be fatal as the intruder may
anism is shown in Fig. 14. Here different colors represent different
have caused considerable damage in that time.
blockchains and each node represents a UAV which adds its block
of collected data to the blockchain which is sent to it. We can see
7.3.2. Limited memory and power
that both UAV 2 and UAV 3 receive block from UAV 1 in the purple
Surveillance applications require a large amount of data collec-
and green blockchain respectively. Now both of these blockchains
reach UAV 5 at different time instants and contain the block added tion especially if the area to be monitored is large. So in these
by UAV 1. So UAV 5 can check whether the block added by UAV cases the size of the blockchain may be very large which can be
1 is same in the both the blockchains and hence in that way it difficult for UAVs with limited onboard resources to store and pro-
can check the validity and security of the routes 1-2-5 and 1-3-4- cess.
5 through which the blockchains have come to it. This reduces the
vulnerability of the blockchain to obstacles in line of sight which 8. Blockchain-based UAV networks for edge computing
may corrupt the data and makes it more immune to cyber-physical
attacks. 8.1. Motivation
7.2.4. Dynamic imaging of large areas Edge computing is a very happening technological domain in
With the help of blockchain, the UAVs system can be empow- the market today because of the latency and cost issues with big
ered to image large areas just like a satellite but from a lower cloud servers [196]. There have been also some studies to decrease
16 T. Alladi et al. / Vehicular Communications 23 (2020) 100249
Table 2
Role of blockchain in enhancing the utility of UAV systems.
the latency and optimize edge cloud-lets [197,198]. Physical prox- 8.3. Challenges
imity to the connected devices ensures low jitter, high bandwidth
and also empowers the owner of the device to enforce privacy Implementing blockchain for reducing the maintenance, cost,
policies via the edge server before the data is released to the and administration of MEC services and for the identification of
cloud. One of its interesting features is mobile edge computing appropriate servers requires several issues to be resolved. Some
(MEC) which offers services to users via near-site mobile devices of them identified by [200] are related to lower and upper bounds
like UAVs. UAV networks can play an important role in the imple- on memory for blockchain-enabled communication, survivability of
mentation of MEC especially during emergencies such as disasters UAVs with excessive computations, failure analysis, server dom-
when the stationary ground infrastructure is not available. Also, inance, and sharing and content identification. These challenges
MEC is seen as one of the key technologies towards 5G [199] and need to be addressed before such an application can be rolled out
hence considerable developments are required to make it ultra- in the market. Some solutions in this direction can be found in lit-
reliable in terms of survivability, availability ad connectivity. This erature. [201] discusses the importance of partitioning and offload-
is where blockchain can be used. Blockchain can enable the par- ing in smart mobile devices. Also, [202] discusses the method of
ticipant UAVs to maintain a high trust among themselves and help adaptive partitioning for distributed optimization of mobile appli-
achieve a flat architecture. Here, we discuss a model of a neural cations. So, such measures need to be adopted to make blockchain-
based UAV networks suitable for MEC applications.
blockchain for achieving an ultra-reliable caching scheme in Edge-
UAV networks [200].
9. Some broader perspectives
8.2. Role of blockchain As the number of UAVs grow over time, several challenges re-
garding their management and security will need to be addressed.
Blockchain as a tool can be useful in tackling these as discussed
Blockchain can be used for increasing the reliability of MEC
in the previous sections. But certain applications may require ad-
communications using UAV caching, in terms of connectivity, avail-
ditional tools that will enhance the application of blockchain in
ability, and survivability. In the model proposed by [200], the au-
UAV networks. Also, blockchain can enhance the role of other tech-
thors suggest using a neural network on a combination of three
nologies in UAV applications and has the potential to enhance the
blockchains to generate an optimal master blockchain-based on
applicability of UAV systems in a wide variety of practical scenar-
which the optimal path for the UAVs is decided. They also present
ios such as military and commercial establishments, environment
a detailed mathematical approach for calculating the reliability of
monitoring, traffic management, etc. Based on the detailed study
the system as a parameter. If the calculated reliability parameter done in the previous sections of this paper, we present a summary
is not in the theoretical optimal range, the iterations in the neu- of the role of blockchain in different application scenarios of UAV
ral network can be increased to arrive at the optimal blockchain. systems in Table 2. However, there are more possibilities to ex-
Also, blockchain facilitates content sharing and data delivery be- plore this exciting synergy of UAVs and blockchain. Thus, a broader
tween the user equipment connected to the edge servers and the perspective is required as to how blockchain-based UAV networks
caching servers with the help of its smart contracts and transac- can influence different application scenarios and how other tech-
tion models. One of its main utilities is to support caching based nologies can contribute to or benefit from it. We present here a
on page ranks, which is derived with the help of survivability of discussion on the same.
page requests coming from different user equipment. In the exper-
iments carried by [200] it was demonstrated that using blockchain 9.1. Artificial intelligence-driven blockchain solution for UAVs
the probability of connectivity reaches 0.99, survivability becomes
greater than 0.90, energy consumption is decreased by 60.34 per- An application of Artificial intelligence (AI) in blockchain-based
cent and the reliability reaches 1.0 even for a large number of UAV networks was already discussed in section 8 where a neu-
users. Thus blockchain as a technology can be used to make MEC ral network was applied on three different blockchains to create
communications ultra-reliable. an optimized blockchain which gives the optimal fly routes for
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 17
the UAVs [200]. Another state of the art application of AI is be- alarms in such cases which poses a big challenge for the fire fight-
ing done by the Deep Aero project [203] where it is used to build ing team as there are limited resources to be deployed and all the
a smart, autonomous self-governing system for UAVs with many alarms cannot be addressed. In such cases, XAI implemented using
blockchain-based practical applications. It is a blockchain-based blockchain can be a more reliable option which the common users
framework for air traffic management of UAVs. Whenever we talk can trust as compared to just using AI to predict the truthfulness
about UAVs, we usually talk about an aerial vehicle operating with- of a system. Blockchain can maintain a history of alarms transpar-
out any human. The absence of humans might decrease the oper- ently raised by UAVs. Based on this data the truthfulness of each
ational cost, but it also comes with several disadvantages such as UAV can be calculated using XAI algorithms, thus making the sys-
the risk of collision with other UAVs, destruction of public prop- tem explainable. The alarm raised by the most trustworthy UAV is
erty and much more. A framework is necessary which could guide considered a priority. The importance of maintaining a high trust
on-field UAVs by providing them a set of regulations and maps level of alarms is also discussed in [204].
so that mishaps can be avoided. The specific utilities which the
project highlights are as under. 9.3. IoT inspired blockchain-based UAV delivery systems
9.1.1. Air traffic management UAV systems possess the advantage of enjoying the shortest
Air traffic management for manned vehicles is a completely hu- route to destinations by following an almost straight path route
man, manual and comparatively easy process, but air traffic man- via low altitude air corridors as compared to road transportation
agement for unmanned vehicles is a highly complex system. UAVs which is constrained by traffic and the way roadways are con-
fly in low-altitude zone, so they need a complex set of data and structed. Hence, many delivery companies are looking towards de-
programs to help them monitor the environment around them as veloping UAV delivery systems for direct delivery to consumers in
well as to make communication with other manned/unmanned ve- a fast and secure manner. UAVs are also safer than conventional
hicles in immediate proximity to escape any potential collision. delivery systems as they will not act maliciously and tamper the
Deep Aero’s UTM (UAV traffic management) platform comes into ef- packages which may happen in case of manual delivery systems.
fect here. UTM is the infrastructure that allows a UAV to exchange
information such as its location coordinates with other aerial vehi-
9.3.1. Chronicled
cles (manned/unmanned), air space management services, airport
A new application area in this domain is the door-to-door pack-
personnel, and air traffic control. Ongoing research is exploring
age delivery system where the UAV can drop or handover the
various prototype technologies such as airspace design, dynamic
package via the consumer’s door or window. Chronicled, a company
geofencing, congestion management to make the UTM platform
working on blockchains is trying a similar implementation of UAV
highly effective and fool-proof.
delivery system using IoT [206]. The consumers’ houses may have
IoT enabled doors and windows and the UAVs can interact with
9.1.2. Deep chain UAV identity system
them via the Internet. A blockchain stores data regarding the iden-
UAVs do not carry a specific identity in the real environment,
tity of UAVs to ensure that only authentic UAVs are allowed entry
thus, it becomes very difficult to provide a specific set of instruc-
through the doors and windows. Whenever an order is placed, a
tions to a UAV. This necessitates an identity management system
UAV arrives near the house with the package and sends request
that is addressed by the Deep Aero Project. Deep chain UAV reg-
to the door or a window through which it is supposed to enter
istration is a blockchain-based registration system that provides a
the house, the chip on the IoT enabled door/window checks if the
unique identity to UAVs, and even pilots so that a specific set of
UAV is authentic by referring to the blockchain and if its identity
instructions can be sent to specific UAVs/pilots.
is verified, it opens to let the UAV enter the house.
9.2. Blockchain driven explainable AI (XAI) based UAV systems
9.3.2. Walmart
9.2.1. Brief introduction to XAI Walmart is aiming to utilize blockchains to develop a smarter
Explainable Artificial intelligence (XAI) aims at making AI sys- package delivery and tracking system [207]. The U.S. Patent and
tems more explainable. Present-day machine learning technology Trademark Office issued a new patent on Walmart’s name recently.
which is core to AI applications is very opaque, nonintuitive and is It explains a smart package delivered via UAVs which includes a
not comprehensible by common users [204]. Analysts find it diffi- device to store the information regarding a blockchain-related to
cult to find out the reasons behind failures, successes and prevent the environmental locations, the content of the package, manufac-
previously occurred errors and suggest corrective measures. XAI turer, location, model number, etc. The blockchain component is
addresses this problem by making more explainable models and planned to be encrypted into the device and will contain “key ad-
at the same time maintain a high learning performance. dresses along the chain of the packages custody, including hashing
with a seller private key address, a courier private key address,
9.2.2. Blockchain-based XAI UAV systems and a buyer private key address” [208]. Thus this is another major
Blockchain ensures a high level of trust by maintaining the data step in the application of blockchain in package delivery systems.
intact in a transparent ledger and can be used to make the decision There have been other efforts also by some other big players such
making process explainable for systems operating in a multi-agent as Amazon which is developing Amazon Sir prime since 2013 and
environment where trust on the decisions can enhance the speed Dorado, a blockchain company that launched an ICO in May 2018
of operations. In [205], the authors discuss a few scenarios where to develop a UAV delivery system [206].
this can be applied such as cloud computing, smart cities, and user
satisfaction management. The combination of these three state- 9.4. Blockchain inspired UAV systems for the security industry
of-the-art technologies, namely blockchain, XAI, and UAVs can be
used in applications where there are limited resources (e.g., UAV UAVs have a huge scope of application in the security industry.
systems can be deployed to detect fire in a particular locality). We had discussed its surveillance potential in section 7 which is
As soon as an alarm is raised by a particular UAV, a nearby fire relevant for monitoring purposes and can be used in securing sen-
station is informed and the rescue team reaches the location fol- sitive locations. Alternatively, UAVs also have the potential to act
lowing the coordinates of the UAV. There is a possibility of false as the next generation of robotic guards and can shield the target
18 T. Alladi et al. / Vehicular Communications 23 (2020) 100249
Table 3
Summary of blockchain applications in UAV systems.
from both air and ground attacks. Using blockchain, such an appli- 9.5. Blockchain and UAV based solution for environment conservation
cation can be coordinated and managed transparently from remote
locations. Also, monitoring air space security is a major concern This is one of the most exciting areas where blockchain empow-
today. Last year an incident at Gatwick airport, London highlighted ered UAV systems can be deployed to track poaching activities and
animal movements. UAV systems can easily operate in dense forest
the need for this [206]. In December 2018, many flights were
environments and thus have the potential to make a difference in
grounded during busy hours due to the spotting of unidentified
this field. Across Africa, many national parks are employing UAVs
UAVs near the commercial runways. Due to this, over 1,000 flights to combat poaching activities [206]. Also, mapping of river surfaces
were grounded which affected the holiday plans of over 140,000 and oceans over a large area can help monitor algae count and
people leading to a huge monetary loss. One of the carriers, Easy check the health of water bodies. Soar, a company operating out of
jet lost around 19 million dollars [206]. This highlights the need Australia aims to work on aerial photography via UAV systems to
to register UAVs in a common platform such as blockchain to improve urban planning, smart agriculture, natural resource man-
trace and prevent the source of such attacks. Although this inci- agement, and disaster relief [206]. People interested in such data
dent did not result in any casualties, the authorities initially did have to conventionally depend on search engines such as Google
fear the possibility of terrorist attacks. Such uncertainties can be to provide them with mapping technology. But with the rise of
new companies such as Soar, static mapping is no longer the only
used by adversaries to exploit the system in the future. A pos-
option. The public can get hold of dynamic mapping capabilities
sible solution for this can come from IBM. The company filed a
by exchanging data over the blockchain. The contributors will be
patent in 2017 highlighting how a permissioned blockchain can be credited and compensated for the contributions leading to a com-
integrated with UAVs to provide airspace controllers with the in- petitive incentive based decentralized data exchange platform.
formation regarding UAVs and their operators and thus ensuring Based on the above discussion, we summarize the different
air-space security. application areas on integrating UAVs and blockchain in Table 3
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 19
Table 4
Implementation, effectiveness, and comparison of the solutions discussed in this study.
Application scenario Implementation details Effectiveness of the solution / comparison with other solutions
Supply chain automation A blockchain-based inventory management system was tested The implemented system was found to be faster compared
in [173] with a practical UAV implementation for scanning to conventional human-based inventory management
RFID tagged products in an inventory setup. systems, as discussed in [173].
Providing decentralized Authors in [187] carried out simulations using their proposed Simulation results in [187] show that the trading consensus
storage in UAV networks mathematical model for the decentralized storage system. process can be usefully adopted in the air-to-ground
industrial IoT system; the optimized active density could
maximize the QoS for AS (Air sensors) and increase the
transmission rate for the information exchange system.
Security of UAV networks Simulations were conducted in [191] for evaluating a Simulation results in [191] showed that the proposed
permissioned blockchain system with an efficient and scalable system has lower system overhead and achieves better
consensus algorithm for securing ICN based UAV adhoc latency performance than Internet Key binding (IKB).
networks.
In [192], authors conducted security evaluation of their work Results in [192] show that the proposed scheme is better
in terms of communication cost and time and compared it compared to other state-of-the-art schemes in terms of
with state-of-the-art works. cost and time.
UAV swarm based In [25], the proposed model for security of UAVs used for The experimental results showed that around 90% of UAVs
surveillance network surveillance was tested in a novel agent based simulator, were able to corroborate information about a person
ABS-SecurityUAV. walking in a controlled area, while none of the UAVs
corroborated fake information coming from a hijacked UAV.
In [24], the authors carried out Monte Carlo simulations to The results in [24] showed that the UAV-TIEN system
characterize the performance of the system proposed by them proposed by them can increase the traffic data broadcasting
in a highly dynamic traffic environment. range and reduce the fraction of missing UAVs in a city.
UAV networks for edge In [200], the authors carried out simulations for evaluating the The findings of the study demonstrated the utility of the
computing performance of their network model in terms of flyby time, proposed system for a large set of users in different
probability of connectivity, energy consumption, failure rate, altitudes and different number of drones.
survivability, reliability, and area spectral efficiency.
giving the application scenario, the problem addressed and the power. Incorporating this onboard the UAVs can be a chal-
proposed solution for each area. In Table 4, we summarize the im- lenging task. This is a common problem which all blockchain-
plementation details discussed in each application area based on based UAV systems may face in the future. UAVs already have
the available works in the literature and briefly compare them with complex payloads to carry in addition to their battery and fly-
standard available solutions which do not make use of blockchain. ing mechanism system. In addition to that, if they have to
play the role of nodes in a blockchain, considerable processing
10. Challenges and future research directions power and storage capabilities will also need to be incorpo-
rated into their hardware.
4) Quantum attacks: With the advent of quantum computing,
10.1. Challenges
blockchains need to be secured against quantum attacks since
quantum computers have very powerful processing capabili-
UAVs and blockchain as individual technologies have some chal- ties that may provide the adversaries sufficient resources to
lenges which limit their capabilities and also impact their com- execute 51 percent attacks in the future. There have been
bined applications. Based on our study we try to present some of some studies related to this issue such as [210–214]. This is-
the major issues which may be roadblocks to their practical appli- sue can prove to be a major challenge in the area of securing
cations. blockchain-based applications in the future.
5) Machine learning (ML) and algorithmic game-theory based at-
1) Privacy issues: UAVs can be used to monitor the personal prop- tacks: Blockchain-based applications are also vulnerable to
erty of the public against their wish and knowledge. Such majority attacks executed using ML and algorithmic game-
applications of UAVs are possible and there has to be strict theory approach. This is one of the current challenges that the
regulation to tackle these. Blockchain as a technology can fur- blockchain community needs to address to make it more se-
ther the efficiency of UAV applications, but if the total number cure [215,216].
of UAVs hovering in the sky goes up, people’s privacy may be
at a risk. A detailed discussion of the societal impact of UAVs 10.2. Future research directions
is also presented in [209].
Integration of both the technologies, UAVs and blockchain is an
2) Air traffic violation: With the increasing number of UAVs in
exciting field of research today. There has been some effort in this
the airspace, there is a need to have a proper civil air traf-
direction and much more can be done. We discuss a few possible
fic management system in place for coordination between the
research directions here which can have a great impact based on
UAVs. As discussed in section 9 an incident at Gatwick air-
our study.
port resulted in a lot of chaos and monetary loss because of
unknown UAVs being spotted near the airport airspace [206]. 1) Simulation software for blockchain-based UAV systems: Implemen-
Such incidents can become more frequent if the civil aviation tation of blockchain in UAV systems is a complex system inte-
authorities do not integrate robust air space management sys- gration problem and it requires rigorous testing before it can
tems for UAVs. Until such precautions are taken, expanding the be rolled out in the market. The same problem is also dis-
use of UAVs by incorporating technologies such as blockchain cussed in [190]. There have been few studies that have used
will be a questionable task. agent-based simulation software for similar applications such
3) Limited onboard resources for UAVs: To execute consensus algo- as in [25]. A more dedicated platform incorporating features of
rithms of blockchain, miners require considerable processing both blockchain technology and UAVs is required.
20 T. Alladi et al. / Vehicular Communications 23 (2020) 100249
2) Protecting private/permissioned blockchain systems against intelli- to save lives in out of hospital cardiac arrest due to drowning, Resuscitation
gent attacks: Most blockchain-based UAV applications and ap- 114 (2017) 152–156.
[5] M. Bacco, A. Berton, E. Ferro, C. Gennaro, A. Gotta, S. Matteoli, F. Paonessa, M.
plications in fields other than financial markets require a pri-
Ruggeri, G. Virone, A. Zanella, Smart farming: opportunities, challenges and
vate/permissioned blockchain. Such blockchain networks are technology enablers, in: 2018 IoT Vertical and Topical Summit on Agriculture-
more vulnerable to attacks as compared to public blockchains Tuscany, IOT Tuscany, IEEE, 2018, pp. 1–6.
where the number of participants is very high and it is [6] S. Daftry, C. Hoppe, H. Bischof, Building with drones: accurate 3d facade re-
very difficult to execute a majority attack on them. Also construction using mavs, in: 2015 IEEE International Conference on Robotics
and Automation, ICRA, IEEE, 2015, pp. 3487–3494.
with an increase in more advanced types of attacks such
[7] A. Shukla, H. Xiaoqian, H. Karki, Autonomous tracking and navigation con-
as quantum attacks, ML and game-theory based attacks on troller for an unmanned aerial vehicle based on visual data for inspection of
blockchain networks, there is an increasing need for securing oil and gas pipelines, in: 2016 16th International Conference on Control, Au-
the blockchain. Research in this direction is required to make tomation and Systems, ICCAS, IEEE, 2016, pp. 194–200.
[8] C.A. Thiels, J.M. Aho, S.P. Zietlow, D.H. Jenkins, Use of unmanned aerial vehi-
private blockchain networks more immutable and safer.
cles for medical product transport, Air Med. J. 34 (2) (2015) 104–108.
3) Optimizing UAV power consumption and increasing their fly-time: [9] E. Natalizio, R. Surace, V. Loscri, F. Guerriero, T. Melodia, Filming sport events
Due to the limited battery capacity of UAVs, their fly-time is with mobile camera drones: Mathematical modeling and algorithms, 2012.
usually very less. Thus, for increasing their fly-time there is [10] L. Tang, G. Shao, Drone remote sensing for forestry research and practices,
a need to optimize UAV operations. Blockchain-based applica- J. For. Res. 26 (4) (2015) 791–797.
[11] R. Schiffman, Drones flying high as new tool for field biologists, 2014.
tions require more processing power, thus power consumption
[12] M. Corcoran, Drone Journalism: Newsgathering Applications of Unmanned
can be a crucial bottleneck. There have been some studies in Aerial Vehicles (Uavs) in Covering Conflict, Civil Unrest and Disaster,
this direction such as [147,217,218], but more research is re- vol. 201, Flinders University, Adelaide, 2014, p. 202014, Retrieved from
quired before we arrive at a practical solution. http://www.flinders.edu.au/ehl/fms/law_files/Drone%20Journalism%20During%
20Conflict,%20Civil%20Unrest%20and%20Disasters%20March.
[13] A. Fotouhi, M. Ding, M. Hassan, Flying drone base stations for macro hotspots,
11. Conclusions IEEE Access 6 (2018) 19530–19539.
[14] X. Sun, N. Ansari, Latency aware drone base station placement in hetero-
In this study, we reviewed various applications of blockchain geneous networks, in: GLOBECOM 2017-2017 IEEE Global Communications
in UAV systems. UAV systems are very dynamic and sophisticated Conference, IEEE, 2017, pp. 1–6.
[15] S. Zhang, X. Sun, N. Ansari, Placing multiple drone base stations in hotspots,
in nature. Using blockchain features such as smart contracts and
in: 2018 IEEE 39th Sarnoff Symposium, IEEE, 2018, pp. 1–6.
consensus mechanism, they can be automated and secured. The [16] L. Zhang, N. Ansari, A framework for 5g networks with in-band full-duplex
increasing deployment of UAVs in the airspace has led to a need enabled drone-mounted base-stations, IEEE Wirel. Commun. 26 (5) (2019)
for secure and reliable UAV communications, as we have seen in 121–127.
applications such as inventory management, air traffic system and [17] L. Zhang, N. Ansari, Approximate algorithms for 3d placement of ibfd en-
abled drone-mounted base stations, IEEE Trans. Veh. Technol. 68 (8) (2019)
semi-autonomous delivery systems. This paper also provided an
7715–7722.
outlook of secure UAV systems for coordinated operation capabil- [18] G. Bansal, Naren, V. Chamola, Rama: real-time automobile mutual authen-
ity in scenarios where different players in the market collaborate tication protocol using puf, in: IEEE ICOIN, 34th International Conference,
to provide solutions to users in an efficient way by making use Barcelona, Spain, 2019.
[19] V. Hassija, V. Chamola, G. Han, J. Rodrigues, M. Guizani, Dagiov: a framework
of the blockchain principles and its features. By using blockchain
for vehicle to vehicle communication using directed acyclic graph and game
technology, commercial houses can share the same set of UAVs theory, IEEE Trans. Veh. Technol. (Jan. 2020), https://doi.org/10.1109/TVT.2020.
as it ensures trust and transparency. Various security and privacy 2968494.
threats on UAVs were identified and potential blockchain-based [20] T. Alladi, V. Chamola, Naren, N. Kumar, Parth: a two-stage lightweight mu-
solutions to mitigate these threats were also suggested. We also tual authentication protocol for uav surveillance networks, Comput. Commun.
(Feb. 2020).
discussed the challenges involved in each application that need to
[21] T. Alladi, G. Bansal, Naren, V. Chamola, S. Garg, M. Obaidat, Drona: lightweight
be addressed. Overall, blockchain as a technology helps in over- mutual authentication protocol for drones using puf, IEEE Syst. J. (Feb. 2020).
coming many problems such as coordination, security, collision [22] T. Alladi, V. Chamola, B. Sikdar, K.-K.R. Choo, Consumer iot: security vulnera-
avoidance, privacy, decision making, signal jamming, etc. faced by bility case studies and solutions, IEEE Consum. Electron. 9 (2019) 6–14.
UAV systems. We also suggested some future research directions [23] E.C. Ferrer, The blockchain: a new framework for robotic swarm sys-
tems, in: Proceedings of the Future Technologies Conference, Springer, 2018,
for blockchain-based UAV systems. The application scenarios dis- pp. 1037–1058.
cussed in this paper hold immense potential for real-life imple- [24] H. Chao, A. Maheshwari, V. Sudarsanan, S. Tamaskar, D.A. DeLaurentis, Uav
mentation in both military and commercial domains. traffic information exchange network, in: 2018 Aviation Technology, Integra-
tion, and Operations Conference, 2018, p. 3347.
[25] I. García-Magariño, R. Lacuesta, M. Rajarajan, J. Lloret, Security in networks
Declaration of competing interest
of unmanned aerial vehicles for surveillance with an agent-based approach
inspired by the principles of blockchain, Ad Hoc Netw. 86 (2019) 72–82.
The authors declare that they have no known competing finan- [26] O.V. Solomentsev, V.H. Melkumyan, M.Y. Zaliskyi, M.M. Asanov, Uav operation
cial interests or personal relationships that could have appeared to system designing, in: 2015 IEEE International Conference Actual Problems of
influence the work reported in this paper. Unmanned Aerial Vehicles Developments, APUAVD, Oct 2015, pp. 95–98.
[27] A. Fotouhi, H. Qiang, M. Ding, M. Hassan, L.G. Giordano, A. Garcia-Rodriguez, J.
Yuan, Survey on uav cellular communications: practical aspects, standardiza-
References tion advancements, regulation, and security challenges, IEEE Commun. Surv.
Tutor. 21 (4) (2019) 3417–3442.
[1] M. Alwateer, S.W. Loke, A. Zuchowicz, Drone services: issues in drones for [28] Parrot Mambo FPV, https://www.parrot.com/global/drones/parrot-mambo-fpv.
location-based services from human-drone interaction to information pro- (Accessed 21 September 2019) [Online].
cessing, J. Locat. Based Serv. 13 (2) (2019) 94–127. [29] Types of Drones, https://www.casa.gov.au/drones/rules/drone-typesv, 2019.
[2] M. Alwateer, S.W. Loke, N. Fernando, Enabling drone services: drone crowd- (Accessed 21 September 2019) [Online].
sourcing and drone scripting, IEEE Access 7 (2019) 110035–110049. [30] M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, M. Debbah, A tutorial on uavs for
[3] S.W. Loke, M. Alwateer, V.S. Abeysinghe Achchige Don, Virtual space boxes wireless networks: applications, challenges, and open problems, IEEE Com-
and drone-as-reference-station localisation for drone services: an approach mun. Surv. Tutor. 21 (3) (2019) 2334–2360.
based on signal strengths, in: Proceedings of the 2nd Workshop on Micro [31] F.A. d’Oliveira, F.C.L.d. Melo, T.C. Devezas, High-altitude platforms—present
Aerial Vehicle Networks, Systems, and Applications for Civilian Use, ACM, situation and technology trends, J. Aerosp. Technol. Manag. 8 (3) (2016)
2016, pp. 45–48. 249–262.
[4] A. Claesson, L. Svensson, P. Nordberg, M. Ringh, M. Rosenqvist, T. Djarv, J. [32] C. Stöcker, R. Bennett, F. Nex, M. Gerke, J. Zevenbergen, Review of the current
Samuelsson, O. Hernborg, P. Dahlbom, A. Jansson, et al., Drones may be used state of uav regulations, Remote Sens. 9 (5) (2017) 459.
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 21
[33] S. Nakamoto, et al., Bitcoin: a peer-to-peer electronic cash system, 2008. enhanced privacy and availability, in: Proceedings of the 17th IEEE/ACM Inter-
[34] G. Bansal, V. Hassija, V. Chamola, N. Kumar, M. Guizani, Smart stock exchange national Symposium on Cluster, Cloud and Grid Computing, IEEE Press, 2017,
market: a secure predictive decentralised model, 2019, pp. 9–13. pp. 468–477.
[35] J. Xie, H. Tang, T. Huang, F.R. Yu, R. Xie, J. Liu, Y. Liu, A survey of blockchain [63] C. Esposito, A. De Santis, G. Tortora, H. Chang, K.-K.R. Choo, Blockchain: a
technology applied to smart cities: research issues and challenges, IEEE Com- panacea for healthcare cloud-based data security and privacy? IEEE Cloud
mun. Surv. Tutor. 21 (3) (2019) 2794–2830. Comput. 5 (1) (2018) 31–37.
[36] P.K. Sharma, S.Y. Moon, J.H. Park, Block-vn: a distributed blockchain based [64] C. Xu, K. Wang, M. Guo, Intelligent resource management in blockchain-based
vehicular network architecture in smart city, JIPS 13 (1) (September 2017) cloud datacenters, IEEE Cloud Comput. 4 (6) (2017) 50–59.
184–195. [65] Y. Zhang, R.H. Deng, X. Liu, D. Zheng, Blockchain based efficient and robust
[37] M. Ruta, F. Scioscia, S. Ieva, G. Capurso, G. Loseto, F. Gramegna, A. Pinto, E. Di fair payment for outsourcing services in cloud computing, Inf. Sci. 462 (2018)
Sciascio, Semantic-enhanced blockchain technology for smart cities and com- 262–277.
munities, in: 3rd Italian Conference on ICT, 2017. [66] H.-W. Kim, Y.-S. Jeong, Secure authentication-management human-centric
[38] J. Sun, J. Yan, K.Z. Zhang, Blockchain-based sharing services: what blockchain scheme for trusting personal resource information on mobile cloud comput-
technology can contribute to smart cities, Financ. Innov. 2 (1) (2016) 26. ing with blockchain, Hum.-Cent. Comput. Inf. Sci. 8 (1) (2018) 11.
[39] E. Mengelkamp, B. Notheisen, C. Beer, D. Dauer, C. Weinhardt, A blockchain- [67] L. Zhu, Y. Wu, K. Gai, K.-K.R. Choo, Controllable and trustworthy blockchain-
based smart grid: towards sustainable local energy markets, Comput. Sci. Res. based cloud data management, Future Gener. Comput. Syst. 91 (2019)
Dev. 33 (1–2) (2018) 207–214. 527–535.
[40] M. Mylrea, S.N.G. Gourisetti, Blockchain for smart grid resilience: exchang- [68] Y. Zhang, R. Deng, X. Liu, D. Zheng, Outsourcing service fair payment based on
ing distributed energy at speed, scale and security, in: 2017 Resilience Week, blockchain and its applications in cloud computing, IEEE Trans. Serv. Comput.
RWS, IEEE, 2017, pp. 18–23. (2018), https://doi.org/10.1109/TSC.2018.2864191, https://ieeexplore.ieee.org/
[41] Z. Guan, G. Si, X. Zhang, L. Wu, N. Guizani, X. Du, Y. Ma, Privacy-preserving document/8428431.
and efficient aggregation based on blockchain for power grid communications [69] C. Yang, X. Chen, Y. Xiang, Blockchain-based publicly verifiable data deletion
in smart communities, IEEE Commun. Mag. 56 (7) (2018) 82–88. scheme for cloud storage, J. Netw. Comput. Appl. 103 (2018) 185–193.
[42] A. Cohn, T. West, C. Parker, Smart after all: blockchain, smart contracts, para- [70] Z. Xiong, S. Feng, W. Wang, D. Niyato, P. Wang, Z. Han, Cloud/fog computing
metric insurance, and smart energy grids, Georgetown Law Technol. Rev. 1 (2) resource management and pricing for blockchain networks, IEEE Int. Things J.
(2017) 273–304. 6 (3) (2018) 4585–4600.
[43] C. Pop, T. Cioara, M. Antal, I. Anghel, I. Salomie, M. Bertoncini, Blockchain [71] H. Kaur, M.A. Alam, R. Jameel, A.K. Mourya, V. Chang, A proposed solution and
based decentralized management of demand response programs in smart en- future direction for blockchain-based heterogeneous medicare data in cloud
ergy grids, Sensors 18 (1) (2018) 162. environment, J. Med. Syst. 42 (8) (2018) 156.
[44] T. Alladi, V. Chamola, J.J. Rodrigues, S.A. Kozlov, Blockchain in smart grids: [72] H. Wang, Y. Song, Secure cloud-based ehr system using attribute-based cryp-
a review on different use cases, Sensors 19 (22) (2019) 4862. tosystem and blockchain, J. Med. Syst. 42 (8) (2018) 152.
[45] A. Miglani, N. Kumar, V. Chamola, S. Zeadally, Blockchain for Internet of en- [73] S. Hu, C. Cai, Q. Wang, C. Wang, X. Luo, K. Ren, Searching an encrypted
ergy management: a review, solutions and challenges, Comput. Commun. 151 cloud meets blockchain: a decentralized, reliable and fair realization, in: IEEE
(2020) 395–418. INFOCOM 2018-IEEE Conference on Computer Communications, IEEE, 2018,
[46] V. Hassija, V. Chamola, S. Garg, N. Dara, G. Kaddoum, N. Jayakody, A pp. 792–800.
blockchain-based framework for lightweight data sharing and energy trad- [74] D. Tosh, S. Shetty, P. Foytik, C. Kamhoua, L. Njilla, Cloudpos: a proof-of-stake
ing in v2g network, IEEE Trans. Veh. Technol. (Nov. 2019), https://doi.org/10. consensus design for blockchain integrated cloud, in: 2018 IEEE 11th Interna-
1109/TVT.2020.2967052, https://ieeexplore.ieee.org/document/8961137. tional Conference on Cloud Computing, CLOUD, IEEE, 2018, pp. 302–309.
[47] V. Hassija, G. Bansal, V. Chamola, V. Saxena, B. Sikdar, Blockcom: a blockchain [75] K. Gai, K.-K.R. Choo, L. Zhu, Blockchain-enabled reengineering of cloud data-
based commerce model for smart communities using auction mechanism, centers, IEEE Cloud Comput. 5 (6) (2018) 21–25.
in: 2019 IEEE International Conference on Communications Workshops, ICC [76] J. Li, J. Wu, L. Chen, Block-secure: blockchain based scheme for secure p2p
Workshops, IEEE, 2019, pp. 1–6. cloud storage, Inf. Sci. 465 (2018) 219–231.
[48] Z. Su, Y. Wang, Q. Xu, M. Fei, Y.-C. Tian, N. Zhang, A secure charging scheme [77] A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for iot security
for electric vehicles with smart communities in energy blockchain, IEEE Int. and privacy: the case study of a smart home, in: 2017 IEEE International
Things J. 6 (3) (2018) 4601–4613. Conference on Pervasive Computing and Communications Workshops, PerCom
[49] P. Kianmajd, J. Rowe, K. Levitt, Privacy-preserving coordination for smart Workshops, IEEE, 2017, pp. 618–623.
communities, in: 2016 IEEE Conference on Computer Communications Work- [78] A. Dorri, S.S. Kanhere, R. Jurdak, Towards an optimized blockchain for iot, in:
shops, INFOCOM WKSHPS, IEEE, 2016, pp. 1045–1046. Proceedings of the Second International Conference on Internet-of-Things De-
[50] R. Alcarria, B. Bordel, T. Robles, D. Martín, M.-Á. Manso-Callejo, A blockchain- sign and Implementation, ACM, 2017, pp. 173–178.
based authorization system for trustworthy resource monitoring and trading [79] O. Novo, Blockchain meets iot: an architecture for scalable access manage-
in smart communities, Sensors 18 (10) (2018) 3561. ment in iot, IEEE Int. Things J. 5 (2) (2018) 1184–1195.
[51] S. Aggarwal, R. Chaudhary, G.S. Aujla, N. Kumar, K.-K.R. Choo, A.Y. Zomaya, [80] A. Panarello, N. Tapas, G. Merlino, F. Longo, A. Puliafito, Blockchain and iot
Blockchain for smart communities: applications, challenges and opportunities, integration: a systematic survey, Sensors 18 (8) (2018) 2575.
J. Netw. Comput. Appl. 144 (2019) 13–48. [81] S. Huh, S. Cho, S. Kim, Managing iot devices using blockchain platform, in:
[52] R. Yang, F.R. Yu, P. Si, Z. Yang, Y. Zhang, Integrated blockchain and edge com- 2017 19th International Conference on Advanced Communication Technology,
puting systems: a survey, some research issues and challenges, IEEE Commun. ICACT, IEEE, 2017, pp. 464–467.
Surv. Tutor. 21 (2) (2019) 1508–1532. [82] M.A. Khan, K. Salah, Iot security: review, blockchain solutions, and open chal-
[53] Z. Xiong, Y. Zhang, D. Niyato, P. Wang, Z. Han, When mobile blockchain meets lenges, Future Gener. Comput. Syst. 82 (2018) 395–411.
edge computing, IEEE Commun. Mag. 56 (8) (2018) 33–39. [83] A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Lsb: a lightweight scal-
[54] Z. Li, A.V. Barenji, G.Q. Huang, Toward a blockchain cloud manufacturing sys- able blockchain for iot security and privacy, arXiv preprint, arXiv:1712.02969,
tem as a peer to peer distributed network platform, Robot. Comput.-Integr. 2017.
Manuf. 54 (2018) 133–144. [84] M. Samaniego, R. Deters, Blockchain as a service for iot, in: 2016 IEEE Interna-
[55] A. Stanciu, Blockchain based distributed control system for edge computing, tional Conference on Internet of Things (iThings) and IEEE Green Computing
in: 2017 21st International Conference on Control Systems and Computer Sci- and Communications (GreenCom) and IEEE Cyber, Physical and Social Com-
ence, CSCS, IEEE, 2017, pp. 667–671. puting (CPSCom) and IEEE Smart Data (SmartData), IEEE, 2016, pp. 433–436.
[56] H. Liu, Y. Zhang, T. Yang, Blockchain-enabled security in electric vehicles cloud [85] N. Kshetri, Can blockchain strengthen the Internet of things? IT Prof. 19 (4)
and edge computing, IEEE Netw. 32 (3) (2018) 78–83. (2017) 68–72.
[57] J. Kang, R. Yu, X. Huang, M. Wu, S. Maharjan, S. Xie, Y. Zhang, Blockchain for [86] A. Reyna, C. Martín, J. Chen, E. Soler, M. Díaz, On blockchain and its integra-
secure and efficient data sharing in vehicular edge computing and networks, tion with iot. challenges and opportunities, Future Gener. Comput. Syst. 88
IEEE Int. Things J. 6 (3) (2019) 4660–4670. (2018) 173–190.
[58] N. El Ioini, C. Pahl, S. Helmer, A decision framework for blockchain platforms [87] Y. Zhang, J. Wen, The iot electric business model: using blockchain technology
for iot and edge computing, SCITEPRESS, 2018. for the Internet of things, Peer-to-Peer Netw. Appl. 10 (4) (2017) 983–994.
[59] P.K. Sharma, M.-Y. Chen, J.H. Park, A software defined fog node based dis- [88] D. Miller, Blockchain and the Internet of things in the industrial sector, IT Prof.
tributed blockchain cloud architecture for iot, IEEE Access 6 (2017) 115–124. 20 (3) (2018) 15–18.
[60] E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, V. Sassone, [89] J. Lin, Z. Shen, C. Miao, Using blockchain technology to build trust in sharing
Blockchain-based database to ensure data integrity in cloud computing en- lorawan iot, in: Proceedings of the 2nd International Conference on Crowd
vironments, 2017. Science and Engineering, ACM, 2017, pp. 38–43.
[61] J. Park, J. Park, Blockchain security in cloud computing: use cases, challenges, [90] Y. Rahulamathavan, R.C.-W. Phan, M. Rajarajan, S. Misra, A. Kondoz, Privacy-
and solutions, Symmetry 9 (8) (2017) 164. preserving blockchain based iot ecosystem using attribute-based encryption,
[62] X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, L. Njilla, Provchain: a in: 2017 IEEE International Conference on Advanced Networks and Telecom-
blockchain-based data provenance architecture in cloud environment with munications Systems, ANTS, IEEE, 2017, pp. 1–6.
22 T. Alladi et al. / Vehicular Communications 23 (2020) 100249
[91] S. Huckle, R. Bhattacharya, M. White, N. Beloff, Internet of things, blockchain [118] C. Qiu, F.R. Yu, H. Yao, C. Jiang, F. Xu, C. Zhao, Blockchain-based software-
and shared economy applications, Proc. Comput. Sci. 98 (2016) 461–466. defined industrial Internet of things: a dueling deep q-learning approach, IEEE
[92] N.M. Kumar, P.K. Mallick, Blockchain technology for security issues and chal- Int. Things J. 6 (3) (2019) 4627–4639.
lenges in iot, Proc. Comput. Sci. 132 (2018) 1815–1823. [119] R.-Y. Chen, A traceability chain algorithm for artificial neural networks using
[93] A. Ouaddah, A.A. Elkalam, A.A. Ouahman, Towards a novel privacy-preserving t–s fuzzy cognitive maps in blockchain, Future Gener. Comput. Syst. 80 (2018)
access control model based on blockchain technology in iot, in: Europe and 198–210.
MENA Cooperation Advances in Information and Communication Technolo- [120] M. Swan, R. dos Santos, Smart network field theory: The technophysics of
gies, Springer, 2017, pp. 523–533. blockchain and deep learning, available at SSRN 3262945, 2018.
[94] Z. Huang, X. Su, Y. Zhang, C. Shi, H. Zhang, L. Xie, A decentralized solution [121] M.A. Rahman, M.S. Hossain, M.M. Rashid, S.J. Barnes, M.F. Alhamid, M.
for iot data trusted exchange based-on blockchain, in: 2017 3rd IEEE In- Guizani, A blockchain-based non-invasive cyber-physical occupational therapy
ternational Conference on Computer and Communications, ICCC, IEEE, 2017, framework: Bci perspective, IEEE Access 7 (2019) 34874–34884.
pp. 1180–1184. [122] S. Bak, Y. Pyo, J. Jeong, Protection of eeg data using blockchain platform, in:
[95] A. Bahga, V.K. Madisetti, Blockchain platform for industrial Internet of things, 2019 7th International Winter Conference on Brain-Computer Interface, BCI,
J. Softw. Eng. Appl. 9 (10) (2016) 533. IEEE, 2019, pp. 1–3.
[96] M.A. Walker, A. Dubey, A. Laszka, D.C. Schmidt, Platibart: a platform for trans- [123] T. McGhin, K.-K.R. Choo, C.Z. Liu, D. He, Blockchain in healthcare applications:
active iot blockchain applications with repeatable testing, in: Proceedings of research challenges and opportunities, J. Netw. Comput. Appl. 135 (2019)
the 4th Workshop on Middleware and Applications for the Internet of Things, 62–75.
ACM, 2017, pp. 17–22. [124] T. Alladi, V. Chamola, R.M. Parizi, K.-K.R. Choo, Blockchain applications for in-
[97] P. Danzi, A.E. Kalor, C. Stefanovic, P. Popovski, Analysis of the communication dustry 4.0 and industrial iot: a review, IEEE Access 7 (2019) 176935–176951.
traffic for blockchain synchronization of iot devices, in: 2018 IEEE Interna- [125] G. Cui, K. Shi, Y. Qin, L. Liu, B. Qi, B. Li, Application of block chain in multi-
tional Conference on Communications, ICC, IEEE, 2018, pp. 1–7. level demand response reliable mechanism, in: 2017 3rd International Con-
[98] K.R. Özyılmaz, A. Yurdakul, Work-in-progress: integrating low-power iot de- ference on Information Management, ICIM, IEEE, 2017, pp. 337–341.
vices to a blockchain-based infrastructure, in: 2017 International Conference [126] Y. Yuan, F.-Y. Wang, Towards blockchain-based intelligent transportation sys-
on Embedded Software, EMSOFT, IEEE, 2017, pp. 1–2. tems, in: 2016 IEEE 19th International Conference on Intelligent Transporta-
[99] H. Shafagh, L. Burkhalter, A. Hithnawi, S. Duquennoy, Towards blockchain- tion Systems, ITSC, IEEE, 2016, pp. 2663–2668.
based auditable storage and sharing of iot data, in: Proceedings of the 2017 [127] R. Xu, L. Zhang, H. Zhao, Y. Peng, Design of network media’s digital rights
on Cloud Computing Security Workshop, ACM, 2017, pp. 45–50. management scheme based on blockchain technology, in: 2017 IEEE 13th In-
[100] B. Liu, X.L. Yu, S. Chen, X. Xu, L. Zhu, Blockchain based data integrity ser- ternational Symposium on Autonomous Decentralized System, ISADS, IEEE,
vice framework for iot data, in: 2017 IEEE International Conference on Web 2017, pp. 128–133.
Services, ICWS, IEEE, 2017, pp. 468–475. [128] F.R. Yu, J. Liu, Y. He, P. Si, Y. Zhang, Virtualization for distributed ledger tech-
[101] C.-F. Liao, S.-W. Bao, C.-J. Cheng, K. Chen, On design issues and architectural nology (vdlt), IEEE Access 6 (2018) 25019–25028.
styles for blockchain-driven iot services, in: 2017 IEEE International Confer-
[129] F.R. Yu, Y. He, A service-oriented blockchain system with virtualization, Trans.
ence on Consumer Electronics-Taiwan, ICCE-TW, IEEE, 2017, pp. 351–352.
Blockchain Technol. Appl. 1 (1) (2019) 1–10.
[102] A. Dorri, S.S. Kanhere, R. Jurdak, Blockchain in Internet of things: challenges
[130] T. Lakshman, A.K. Agrawala, Efficient decentralized consensus protocols, IEEE
and solutions, arXiv preprint, arXiv:1608.05187, 2016.
Trans. Softw. Eng. 5 (1986) 600–607.
[103] A. Banafa, Iot and blockchain convergence: benefits and challenges,
[131] D. Larimer, Delegated proof-of-stake (dpos), Bitshare whitepaper, 2014.
IEEE Int. Things (2017), https://iot.ieee.org/newsletter/january-2017/iot-and-
[132] M. Castro, B. Liskov, et al., Practical byzantine fault tolerance, in: OSDI
blockchain-convergence-benefits-and-challenges.html.
99 (1999) (1999) 173–186.
[104] L. Zhou, L. Wang, Y. Sun, P. Lv, Beekeeper: a blockchain-based iot system
[133] S. King, S. Nadal, Ppcoin: Peer-to-peer crypto-currency with proof-of-stake,
with secure storage and homomorphic computation, IEEE Access 6 (2018)
self-published paper, vol. 19, August 2012.
43472–43488.
[134] J. Kwon, Tendermint: Consensus without mining, Draft v. 0.6, fall, vol. 1, 2014,
[105] M. Samaniego, R. Deters, Hosting virtual iot resources on edge-hosts with
p. 11.
blockchain, in: 2016 IEEE International Conference on Computer and Infor-
[135] D. Schwartz, N. Youngs, A. Britto, et al., The ripple protocol consensus algo-
mation Technology, CIT, IEEE, 2016, pp. 116–119.
rithm, Ripple Labs Inc White Paper 5 (2014) 8.
[106] A. Boudguiga, N. Bouzerna, L. Granboulan, A. Olivereau, F. Quesnel, A. Roger, R.
[136] D. Mazieres, The stellar consensus protocol: a federated model for Internet-
Sirdey, Towards better availability and accountability for iot updates by means
level consensus, Stellar Development Foundation, 2015, p. 32.
of a blockchain, in: 2017 IEEE European Symposium on Security and Privacy
[137] M. Ghosh, M. Richardson, B. Ford, R. Jansen, A torpath to torcoin: Proof-of-
Workshops, EuroS&PW, IEEE, 2017, pp. 50–58.
[107] F. Angeletti, I. Chatzigiannakis, A. Vitaletti, The role of blockchain and iot in bandwidth altcoins for compensating relays, NAVAL RESEARCH LAB WASH-
INGTON DC, Tech. Rep., 2014.
recruiting participants for digital clinical trials, in: 2017 25th International
Conference on Software, Telecommunications and Computer Networks, Soft- [138] A. Miller, A. Juels, E. Shi, B. Parno, J. Katz, Permacoin: repurposing bitcoin
COM, IEEE, 2017, pp. 1–5. work for data preservation, in: 2014 IEEE Symposium on Security and Privacy,
[108] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, A survey on iot IEEE, 2014, pp. 475–490.
security: application areas, security threats, and solution architectures, IEEE [139] T.T.A. Dinh, R. Liu, M. Zhang, G. Chen, B.C. Ooi, J. Wang, Untangling blockchain:
Access 7 (2019) 82721–82743. a data processing view of blockchain systems, IEEE Trans. Knowl. Data Eng.
[109] I. Makhdoom, M. Abolhasan, H. Abbas, W. Ni, Blockchain’s adoption in iot: the 30 (7) (2018) 1366–1385.
challenges, and a way forward, J. Netw. Comput. Appl. 125 (2019) 251–279. [140] C. Cachin, M. Vukolić, Blockchain consensus protocols in the wild, arXiv
[110] A.B. Kurtulmus, K. Daniel, Trustless machine learning contracts; evaluating preprint, arXiv:1707.01873, 2017.
and exchanging machine learning models on the ethereum blockchain, arXiv [141] A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, Hawk: the blockchain
preprint, arXiv:1802.10185, 2018. model of cryptography and privacy-preserving smart contracts, in: 2016 IEEE
[111] T.-T. Kuo, L. Ohno-Machado, Modelchain: decentralized privacy-preserving Symposium on Security and Privacy, SP, IEEE, 2016, pp. 839–858.
healthcare predictive modeling framework on private blockchain networks, [142] V. Hassija, A. Patel, V. Chamola, Police fir registration and tracking using con-
arXiv preprint, arXiv:1802.01746, 2018. sortium blockchain, in: MOSICOM, Dubai, Jan. 2019.
[112] M. Swan, Blockchain thinking: the brain as a decentralized autonomous cor- [143] V. Hassija, V. Saxena, V. Chamola, A mobile data offloading framework
poration [commentary], IEEE Technol. Soc. Mag. 34 (4) (2015) 41–52. based on a combination of blockchain and virtual voting, Softw. Pract.
[113] T.N. Dinh, M.T. Thai, Ai and blockchain: a disruptive integration, Computer Exp. (December 2019), https://doi.org/10.1002/spe.2786, https://onlinelibrary.
51 (9) (2018) 48–53. wiley.com/doi/full/10.1002/spe.2786, https://onlinelibrary.wiley.com/doi/epdf/
[114] J.-S. Weng, J. Weng, M. Li, Y. Zhang, W. Luo, Deepchain: auditable and privacy- 10.1002/spe.2786.
preserving deep learning with blockchain-based incentive, IACR Cryptology [144] B. Bordel, D. Martín, R. Alcarria, T. Robles, A blockchain-based water con-
ePrint Archive 2018 (2018) 679. trol system for the automatic management of irrigation communities, in:
[115] Y. Dai, D. Xu, S. Maharjan, Z. Chen, Q. He, Y. Zhang, Blockchain and deep 2019 IEEE International Conference on Consumer Electronics, ICCE, IEEE, 2019,
reinforcement learning empowered intelligent 5g beyond, IEEE Netw. 33 (3) pp. 1–2.
(2019) 10–17. [145] Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An overview of blockchain tech-
[116] N.C. Luong, Z. Xiong, P. Wang, D. Niyato, Optimal auction for edge computing nology: architecture, consensus, and future trends, in: 2017 IEEE International
resource management in mobile blockchain networks: a deep learning ap- Congress on Big Data, BigData Congress, IEEE, 2017, pp. 557–564.
proach, in: 2018 IEEE International Conference on Communications, ICC, IEEE, [146] V. Buterin, On public and private blockchains, https://blog.ethereum.org/
2018, pp. 1–6. 2015/08/07/on-public-and-private-blockchains/, 2015. (Accessed 25 Septem-
[117] A. Juneja, M. Marefat, Leveraging blockchain for retraining deep learning ar- ber 2019) [Online].
chitecture in patient-specific arrhythmia classification, in: 2018 IEEE EMBS [147] V. Hassija, V. Saxena, V. Chamola, Scheduling drone charging for multi-drone
International Conference on Biomedical & Health Informatics, BHI, IEEE, 2018, network based on consensus time-stamp and game theory, Comput. Commun.
pp. 393–397. 149 (2020) 51–61.
T. Alladi et al. / Vehicular Communications 23 (2020) 100249 23
[148] I.I. Institute, Facts + statistics: aviation and drones, https://www.iii.org/ uavs, in: 2017 Workshop on Research, Education and Development of Un-
fact-statistic/facts-statistics-aviation-and-drones#Drones, 2019. (Accessed 23 manned Aerial Systems, RED-UAS, IEEE, 2017, pp. 84–89.
November 2019) [Online]. [176] V. Sharma, F. Song, I. You, M. Atiquzzaman, Energy efficient device discovery
[149] W. Zafar, B.M. Khan, Flying ad-hoc networks: technological and social impli- for reliable communication in 5g-based iot and bsns using unmanned aerial
cations, IEEE Technol. Soc. Mag. 35 (2) (2016) 67–74. vehicles, J. Netw. Comput. Appl. 97 (2017) 79–95.
[150] A. Paranjothi, M.S. Khan, M. Atiquzzaman, Hybrid-vehcloud: an obstacle shad- [177] V. Sharma, I. You, G. Kul, Socializing drones for inter-service operability in
owing approach for vanets in urban environment, in: 2018 IEEE 88th Vehicu- ultra-dense wireless networks using blockchain, in: Proceedings of the 2017
lar Technology Conference, VTC-Fall, IEEE, 2018, pp. 1–5. International Workshop on Managing Insider Security Threats, ACM, 2017,
[151] V. Hassija, V. Saxena, V. Chamola, A blockchain-based framework for drone- pp. 81–84.
mounted base stations in tactile Internet environment, in: IEEE Infocom [178] R. Mizouni, M. El Barachi, Mobile phone sensing as a service: business model
Workshops, Beijing, China, April 2020. and use cases, in: 2013 Seventh International Conference on Next Generation
[152] V. Sharma, I. You, F.-Y. Leu, M. Atiquzzaman, Secure and efficient protocol for Mobile Apps, Services and Technologies, IEEE, 2013, pp. 116–121.
fast handover in 5g mobile xhaul networks, J. Netw. Comput. Appl. 102 (2018) [179] K. Noyen, D. Volland, D. Wörner, E. Fleisch, When money learns to fly: to-
38–57. wards sensing as a service applications using bitcoin, arXiv preprint, arXiv:
[153] V. Sharma, K. Srinivasan, H.-C. Chao, K.-L. Hua, W.-H. Cheng, Intelligent de- 1409.5841, 2014.
ployment of uavs in 5g heterogeneous communication environment for im- [180] C. Perera, A. Zaslavsky, P. Christen, D. Georgakopoulos, Sensing as a service
proved coverage, J. Netw. Comput. Appl. 85 (2017) 94–105. model for smart cities supported by Internet of things, Trans. Emerg. Telecom-
[154] O.S. Oubbati, M. Atiquzzaman, P. Lorenz, M.H. Tareque, M.S. Hossain, Routing mun. Technol. 25 (1) (2014) 81–93.
in flying ad hoc networks: survey, constraints, and future challenge perspec- [181] V. Sharma, R. Sabatini, S. Ramasamy, Uavs assisted delay optimization in het-
tives, IEEE Access 7 (2019) 81057–81105. erogeneous wireless networks, IEEE Commun. Lett. 20 (12) (2016) 2526–2529.
[155] K.P. Valavanis, G.J. Vachtsevanos, Handbook of Unmanned Aerial Vehicles, [182] Q. Fan, N. Ansari, Towards traffic load balancing in drone-assisted communi-
Springer, 2015. cations for iot, IEEE Int. Things J. 6 (2) (2018) 3633–3640.
[156] R. Austin, Unmanned Aircraft Systems: UAVS Design, Development and De- [183] S. Thiel, D. Häbe, M. Block, Co-operative robot teams in a hospital environ-
ployment, vol. 54, John Wiley & Sons, 2011. ment, in: 2009 IEEE International Conference on Intelligent Computing and
[157] R.W. Beard, T.W. McLain, Small Unmanned Aircraft: Theory and Practice, Intelligent Systems, vol. 2, IEEE, 2009, pp. 843–847.
Princeton University Press, 2012. [184] A. Wagner, Ensuring network scalibility: how to fight blockchain bloat, Bitcoin
[158] A. Puri, A Survey of Unmanned Aerial Vehicles (UAV) for Traffic Surveillance, Mag. 6 (2014).
Department of Computer Science and Engineering, University of South Florida, [185] G. Chalapathi, V. Chamola, A. Vaish, R. Buyya, Industrial Internet of things
2005, pp. 1–29. (iiot) applications of edge and fog computing: a review and future directions,
arXiv preprint, arXiv:1912.00595, 2019.
[159] M. Mozaffari, W. Saad, M. Bennis, M. Debbah, Mobile unmanned aerial vehi-
[186] G.K. Verma, B. Singh, N. Kumar, V. Chamola, Cb-cas: certificate-based effi-
cles (uavs) for energy-efficient Internet of things communications, IEEE Trans.
cient signature scheme with compact aggregation for industrial Internet of
Wirel. Commun. 16 (11) (2017) 7574–7589.
things environment, IEEE Int. Things J. (2019), https://doi.org/10.1109/JIOT.
[160] R.I. Bor-Yaliniz, A. El-Keyi, H. Yanikomeroglu, Efficient 3-d placement of an
2019.2944632, https://ieeexplore.ieee.org/document/8854296.
aerial base station in next generation cellular networks, in: 2016 IEEE Inter-
[187] Y. Zhu, G. Zheng, K.-k. Wong, Blockchain empowered decentralized storage
national Conference on Communications, ICC, IEEE, 2016, pp. 1–5.
in air-to-ground industrial networks, IEEE Trans. Ind. Inform. 15 (6) (2019)
[161] I. Bucaille, S. Héthuin, A. Munari, R. Hermenier, T. Rasheed, S. Allsopp, Rapidly
3593–3601.
deployable network for tactical applications: aerial base station with oppor-
[188] I.U. Din, M. Guizani, S. Hassan, B.-S. Kim, M.K. Khan, M. Atiquzzaman, S.H.
tunistic links for unattended and temporary events absolute example, in:
Ahmed, The Internet of things: a review of enabled technologies and future
MILCOM 2013-2013 IEEE Military Communications Conference, IEEE, 2013,
challenges, IEEE Access 7 (2018) 7606–7640.
pp. 1116–1120.
[189] S. Park, K. Pietrzak, J. Alwen, G. Fuchsbauer, P. Gazi, Spacecoin: a cryptocur-
[162] M. Mozaffari, W. Saad, M. Bennis, M. Debbah, Unmanned aerial vehicle with
rency based on proofs of space, in: IACR Cryptology ePrint Archive, 2015.
underlaid device-to-device communications: performance and tradeoffs, IEEE
[190] A. Kuzmin, E. Znak, Blockchain-base structures for a secure and operate net-
Trans. Wirel. Commun. 15 (6) (2016) 3949–3963.
work of semi-autonomous unmanned aerial vehicles, in: 2018 IEEE Interna-
[163] A. Al-Hourani, S. Kandeepan, S. Lardner, Optimal lap altitude for maximum
tional Conference on Service Operations and Logistics, and Informatics, SOLI,
coverage, IEEE Wirel. Commun. Lett. 3 (6) (2014) 569–572.
IEEE, 2018, pp. 32–37.
[164] M. Mozaffari, W. Saad, M. Bennis, M. Debbah, Drone small cells in the clouds:
[191] K. Lei, Q. Zhang, J. Lou, B. Bai, K. Xu, Securing icn-based uav ad hoc networks
design, deployment and performance analysis, in: 2015 IEEE Global Commu-
with blockchain, IEEE Commun. Mag. 57 (6) (2019) 26–32.
nications Conference, GLOBECOM, IEEE, 2015, pp. 1–6.
[192] S. Aggarwal, M. Shojafar, N. Kumar, M. Conti, A new secure data dissemination
[165] M. Mozaffari, W. Saad, M. Bennis, M. Debbah, Efficient deployment of multiple
model in Internet of drones, in: ICC 2019-2019 IEEE International Conference
unmanned aerial vehicles for optimal wireless coverage, IEEE Commun. Lett.
on Communications, ICC, IEEE, 2019, pp. 1–6.
20 (8) (2016) 1647–1650. [193] M. Erdelj, O. Saif, E. Natalizio, I. Fantoni, Uavs that fly forever: uninterrupted
[166] Y. Zeng, R. Zhang, T.J. Lim, Wireless communications with unmanned aerial structural inspection through automatic uav replacement, Ad Hoc Netw. 94
vehicles: opportunities and challenges, IEEE Commun. Mag. 54 (5) (2016) (2019) 101612.
36–42. [194] P. Li, H. Duan, A potential game approach to multiple uav cooperative search
[167] I. Bor-Yaliniz, H. Yanikomeroglu, The new frontier in ran heterogeneity: multi- and surveillance, Aerosp. Sci. Technol. 68 (2017) 403–415.
tier drone-cells, IEEE Commun. Mag. 54 (11) (2016) 48–55. [195] L. Wan, G. Han, L. Shu, N. Feng, C. Zhu, J. Lloret, Distributed parameter es-
[168] S. Rohde, C. Wietfeld, Interference aware positioning of aerial relays for cell timation for mobile wireless sensor network based on cloud computing in
overload and outage compensation, in: 2012 IEEE Vehicular Technology Con- battlefield surveillance system, IEEE Access 3 (2015) 1729–1739.
ference, VTC Fall, IEEE, 2012, pp. 1–5. [196] M. Satyanarayanan, The emergence of edge computing, Computer 50 (1)
[169] E. Yanmaz, S. Yahyanejad, B. Rinner, H. Hellwagner, C. Bettstetter, Drone net- (2017) 30–39.
works: communications, coordination, and sensing, Ad Hoc Netw. 68 (2018) [197] S.S. Chalapathi G., V. Chamola, C.-K. Tham, GurunarayananS., N. Ansari, An
1–15. optimal delay aware task assignment scheme for wireless sdn networked edge
[170] T.M. Fernández-Caramés, P. Fraga-Lamas, A review on human-centered cloudlets, Future Gener. Comput. Syst. 102 (2020) 862–875.
iot-connected smart labels for the industry 4.0, IEEE Access 6 (2018) [198] V. Chamola, C.-K. Tham, G.S. Chalapathi, Latency aware mobile task assign-
25939–25957. ment and load balancing for edge cloudlets, in: 2017 IEEE International Con-
[171] P. Fraga-Lamas, T. Fernández-Caramés, L. Castedo, Towards the Internet of ference on Pervasive Computing and Communications Workshops, PerCom
smart trains: a review on industrial iot-connected railways, Sensors 17 (6) Workshops, IEEE, 2017, pp. 587–592.
(2017) 1457. [199] Y.C. Hu, M. Patel, D. Sabella, N. Sprecher, V. Young, Mobile edge computing—a
[172] T. Fernández-Caramés, P. Fraga-Lamas, M. Suárez-Albela, M. Vilar-Montesinos, key technology towards 5g, ETSI White Paper 11 (11) (2015) 1–16.
A fog computing and cloudlet based augmented reality system for the indus- [200] V. Sharma, I. You, D.N.K. Jayakody, D. Reina, K.-K.R. Choo, Neural-blockchain
try 4.0 shipyard, Sensors 18 (6) (2018) 1798. based ultra-reliable caching for edge-enabled uav networks, IEEE Trans. Ind.
[173] T.M. Fernández-Caramés, O. Blanco-Novoa, M. Suárez-Albela, P. Fraga-Lamas, A Inform. 15 (10) (2019) 5723–5736.
uav and blockchain-based system for industry 4.0 inventory and traceability [201] F. Gu, J. Niu, Z. Qi, M. Atiquzzaman, Partitioning and offloading in smart mo-
applications, Multidisciplinary Digital Publishing Institute Proc. 4 (1) (2018) bile devices for mobile cloud computing: state of the art and future directions,
26. J. Netw. Comput. Appl. 119 (2018) 83–96.
[174] M. Beul, D. Droeschel, M. Nieuwenhuisen, J. Quenzel, S. Houben, S. Behnke, [202] J. Niu, W. Song, M. Atiquzzaman, Bandwidth-adaptive partitioning for dis-
Fast autonomous flight in warehouses for inventory applications, IEEE Robot. tributed execution optimization of mobile applications, J. Netw. Comput. Appl.
Autom. Lett. 3 (4) (2018) 3121–3128. 37 (2014) 334–347.
[175] A. Kapitonov, S. Lonshakov, A. Krupenkin, I. Berman, Blockchain-based pro- [203] S. Chaudhary, Deep aero: a blockchain based ai-driven revolution in uav’s
tocol of autonomous business activity for multi-agent systems consisting of and drone industry !! https://medium.com/@chaudhry_salmn/deep-aero-a-
24 T. Alladi et al. / Vehicular Communications 23 (2020) 100249
blockchain-based-ai-driven-revolution-in-uavs-drone-industry-de80facefb2b, [211] D. Aggarwal, G.K. Brennen, T. Lee, M. Santha, M. Tomamichel, Quantum at-
2018. (Accessed 11 September 2019) [Online]. tacks on bitcoin, and how to protect against them, arXiv preprint, arXiv:
[204] D. Gunning, Explainable artificial intelligence (xai), Defense Advanced Re- 1710.10377, 2017.
search Projects Agency (DARPA), nd Web, vol. 2, 2017. [212] A.K. Fedorov, E.O. Kiktenko, A.I. Lvovsky, Quantum computers put blockchain
[205] D. Calvaresi, Y. Mualla, A. Najjar, S. Galland, M. Schumacher, Explainable security at risk, 2018.
multi-agent systems through blockchain technology, in: Proceedings of the [213] K. Ikeda, Security and Privacy of Blockchain and Quantum Computation, Ad-
1st International Workshop on eXplanable TRansparent Autonomous Agents vances in Computers, vol. 111, Elsevier, 2018, pp. 199–228.
and Multi-Agent Systems, EXTRAAMAS 2019, 2019. [214] B. Rodenburg, S.P. Pappas, Blockchain and quantum computing, https://
[206] R. Smith, Blockchain drones | entering high flying automation, https:// www.researchgate.net/publication/322132176_Blockchain_and_Quantum_
coincentral.com/blockchain-drones/, 2019. (Accessed 17 September 2019) Computing, 2017, https://doi.org/10.13140/RG.2.2.29449.13923, https://www.
[Online]. mitre.org/publications/technical-papers/blockchain-and-quantum-computing.
[207] J. Simon, D.R. High, B. Wilkinson, T. Mattingly, R. Cantrell, J.O.V. John, B. [215] D. Somdip, A proof of work: Securing majority-attack in blockchain using
McHale, J. Jurich, et al., Managing participation in a monitored system using machine learning and algorithmic game theory, Ph.D. dissertation, Modern
blockchain technology, uS Patent App. 15/881,715, Aug. 2 2018. Education and Computer Science Press, 2018.
[208] A. Milano, Walmart wants blockchain to make shipping ‘smarter’, https:// [216] S. Dey, Securing majority-attack in blockchain using machine learning and al-
www.coindesk.com/walmart-using-blockchain-tech-make-shipping-smarter, gorithmic game theory: a proof of work, in: 2018 10th Computer Science and
2018. (Accessed 17 September 2019) [Online]. Electronic Engineering, CEEC, IEEE, 2018, pp. 7–10.
[209] B. Rao, A.G. Gopi, R. Maione, The societal impact of commercial drones, Tech- [217] J. Yao, N. Ansari, Qos-aware power control in Internet of drones for data col-
nol. Soc. 45 (2016) 83–90. lection service, IEEE Trans. Veh. Technol. 68 (7) (2019) 6649–6656.
[210] Y.-L. Gao, X.-B. Chen, Y.-L. Chen, Y. Sun, X.-X. Niu, Y.-X. Yang, A secure cryp- [218] V. Hassija, V. Chamola, N. Dara, M. Guizani, A distributed framework for
tocurrency scheme based on post-quantum blockchain, IEEE Access 6 (2018) charge trading between uavs and charging stations, IEEE Trans. Veh. Technol.
27205–27213. (Feb. 2020).