Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 528-532.doi: 10.11896/jsjkx.201100199

• Information Security • Previous Articles     Next Articles

Security Cooperation of UAV Swarm Based on Blockchain

WANG Yu-chen, QI Wen-hui, XU Li-zhen   

  1. School of Computer Science and Engineering,Southeast University,Nanjing 211189,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:WANG Yu-chen,born in 1997,postgraduate.Her main research interests include blockchain and recommendation system.
    XU Li-zhen,born in 1963,professor.His main research interests include database technology,software engineering and enterprise information.

Abstract: Unmanned aircraft vehicle swarm not only broadens the application fields of unmanned aircraft vehicles (UAVs),but also brings more complex security issues.Both the intelligence collected by UAVs and UAV itself are vulnerable to hacker attacks.Once hackers intercept communication information or hijack UAVs,it will have an adverse effect on the combat environment,and even cause serious consequences such as leaking state secrets and disrupting social order.This article introduces the security issues faced by UAV swarm and the principle of the consortium blockchain-Hyperledger Fabric.Then it designs a peer-to-peer network model named “UAV-Swarm Net” based on Hyperledger Fabric,using distributed ledgers and smart contracts to implement the safe cooperative combat of UAV swarm.The UAV-Swarm Net model has the characteristics of distribution,multiple copies,encrypted channel transmission and responsibility traceability,which can effectively guarantee the confidentiality,integrity and availability of data,enhance the robustness and scalability of UAV system.It provides a new solution to the information security problems faced by UAV swarm in the future UAV systemized combat environment.

Key words: Blockchain, Cooperative combat, Hyperledger Fabric, Network security, UAV swarm

CLC Number: 

  • TP319
[1]LIU H F,SU J M,FU Y J.Summary of Research on Unmanned System Cluster and Its Countermeasure Technology[J].Flying Missile,2018(11):35-40,91.
[2]GHAMRY K A,KAMEL M A,ZHANG Y.Multiple UAVs in forest fire fighting mission using particle swarm optimization[C]//2017 International Conference on Unmanned Aircraft Systems (ICUAS).IEEE,2017:1404-1409.
[3]CHEN S J,ZHANG K,HE Y.High dynamic self-organizingdrone network architecture design and model research[J].Computer Science,2015,42(2):50-54.
[4]JAVAID A Y,SUN W,DEVABHAKTUNI V K,et al.Cyber security threat analysis and modeling of an unmanned aerial vehicle system[C]//2012 IEEE Conference on Technologies for Homeland Security (HST).IEEE,2012:585-590.
[5]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference.2018:1-15.
[6]DUAN H B,SHEN Y K,WANG Y,et al.Hot reviews in the field of drones in 2018[J].Science & Technology Review,2019,37(3):82-90.
[7]DUAN H B,QIU H X,CHEN L,et al.Research Prospects of UAV Autonomous Cluster Technology[J].Science & Techno-logy Review,2018,36(21):90-98.
[8]JENSEN I J,SELVARAJ D F,RANGANATHAN P.Block-chain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)[C]//2019 IEEE 20th International Symposium on A World of Wireless,Mobile and Multimedia Networks(WoWMoM).IEEE,2019:1-7.
[9]RODDAY N M,SCHMIDT R O,PRAS A.Exploring security vulnerabilities of unmanned aerial vehicles[C]//NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium.IEEE,2016:993-994.
[10]SEDJELMACI H,SENOUCI S M,ANSARI N.Intrusiondetection Andean framework againstlethaltacksin UAV-aided Networks:A Bayesiangame-theoretic metrology[J].IEEE Transformaton International Transportation Transportation Systems,2016(99):1-11.
[11]YOON K,PARK D,YIM Y,et al.Security authentication system using encrypted channel on uav network[C]//2017 First IEEE International Conference on Robotic Computing (IRC).IEEE,2017:393-398.
[12]GORENFLO C,LEE S,GOLAB L,et al.Fastfabric:Scaling hyperledger fabric to 20 000 transactions per second[C]//2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).IEEE,2019:455-463.
[13]H CHAO,MAHESHWARI A,SUDARSANAN V,et al.UAV traffic information exchange network[OL].http://dx.doi.org/10.252018:14/6.2018-3347.
[14]DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops.PerComWorkshops,2017:618-623.
[15]LIANG X,ZHAO J,SHETTY S,et al.Towards data assurance and resilience in IoT using blockchain[C]//MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM).IEEE,2017:261-266.
[16]BOZIC N,PUJOLLE G,SECCI S,A tutorial on blockchain and applications to secure network control-planes[C]//2016 3rd Smart Cloud Networks Systems.SCNS,2016:1-8.
[17]VADLAMANI S,EKSIOGLU B,NANDI H M,et al.Jamming attacks on wireless networks:A taxonomic survey[J].Int.J.Prod.Econ.,2016(172):76-94.
[18]ZHOU Y.Summary of UAV Ground Station Development[J].Aviation Electronics Technology,2010,41(1):1-6.
[19]CAMPION M,RANGANATHAN P,FARUQUE S.UAVswarm communication and control architectures:a review[J].Journal of Unmanned Vehicle Systems,2018,7(2):93-106.
[20]MCGOVERN S.Blockchain for Unmanned Aircraft Systems[R].John A.Volpe National Transportation Systems Center (US),2020.
[21]JENSEN I J,SELVARAJ D F,RANGANATHAN P.Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)[C]//2019 IEEE 20th International Sympo-sium on A World of Wireless,Mobile and Multimedia Networks(WoWMoM).IEEE,2019:1-7.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[3] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[4] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[5] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[6] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[7] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[8] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[9] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[10] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[11] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[12] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[13] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[14] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[15] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!