Professional Documents
Culture Documents
Design Guidelines For Blockchain-Assisted 5G-UAV Networks: IEEE Network March 2021
Design Guidelines For Blockchain-Assisted 5G-UAV Networks: IEEE Network March 2021
Design Guidelines For Blockchain-Assisted 5G-UAV Networks: IEEE Network March 2021
net/publication/349697151
CITATIONS READS
10 70
4 authors, including:
Ismaeel Al Ridhawi
University of Ottawa
51 PUBLICATIONS 936 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Classification of brain tumors (Based) On Noise-reduced MRI by Non Local PCA View project
All content following this page was uploaded by Moayad Aloqaily on 04 March 2021.
Digital Object Identifier: Moayad Aloqaily is with Al Ain University; Ouns Bouachir is with Zayed University; Azzedine Boukerche is with the University of Ottawa;
10.1109/MNET.011.2000170 Ismeel Al Ridhawi is with Kuwait College of Science and Technology.
5G
5G
5G
5G
services and access to resources. In addition, we processing (e.g., ML and AI), drones as a service
identify challenges associated with the block- (DaaS) is able to provide a wide range of smart
chain-assisted 5G-UAV network such as energy services (Fig. 1). Indeed, drones are able to per-
consumption and reliability. We demonstrate form any task on demand using the different com-
through simulation results that the proposed solu- munication infrastructures deployed around the
tion can be beneficial in terms of data delivery city. The various types of collected data, the users’
success and minimal data exchange. requests, or the transactions among the service
providers can be processed and stored by edge
drones As A serVIce or cloud computing, allowing the extraction of
valuable information that can be very useful in
operAtIons enhancing quality of experience (QoE), safety,
With the remarkable fast advances in artificial and life in the smart city.
intelligence (AI) and machine learning (ML), Services: Thanks to their 3D movement flex-
extraordinary capabilities are designed, empow- ibility, UAVs do not have complex traversing
ering the concept of smart autonomous systems restrictions as seen in roads. They can move in
such as robots and autonomous vehicles. UAVs, various directions and fly over inaccessible and
or simply drones, are another example of sys- dangerous locations. Various applications can
tems that may benefit from these advances. Used benefit from this feature. Those applications can
for the first time in the World War II by the U.S. be grouped into three different classes based on
Army in an attempt to use a manned aircraft in the task allocated to the aircraft.
an unmanned manner, the name “drones” has Flying IoT Device: Equipped with diverse types
always been coupled with the military. Nowadays, of sensors (e.g., gas and temperature sensors),
UAVs are available in diverse sizes and capabili- a drone can reach inaccessible and dull loca-
ties and used in civil domains for various applica- tions and get better visibility than any other IoT
tions. They perform at different automation levels, device to collect accurate data about a situation.
ranging from fully controlled (no automation) to For instance, drones can fly around big build-
fully autonomous, which can be reflected by a ings, mountains, bridges, hazardous areas (e.g.,
swarm of drones cooperating together to fulfill a after natural disasters), and so on. An example of
common mission. sensed information is weather forecast informa-
As shown in Fig. 1, UAVs can be active actors tion, which can be forwarded in real time to the
in all types of smart city services and applications. closest edge device or to the cloud, or stored in
They can be used with police and fire stations for the drone’s memory and collected by the ground
emergency situations, as well as in smart transport station at the end of the exploratory trip. UAVs
management, healthcare, agriculture, industry, are considered cost-effective flying IoT devices
smart grid, environment control, and much more. used to collect truthful information for various
Coupled with the most advanced paradigms applications. Surveillance, monitoring, and envi-
of communication (i.e., 5G), data storage (using ronment measurements are popular examples of
edge, fog, cloud, blockchain technologies), and IoT application-based drones.
Limited range that depends on the used technology Extended range based on
Communication range Extended range based on 5G infrastructure
(i.e., Zigbee or Wifi) 5G infrastructure
Fair data delivery speed with limited throughput, Very fast data delivery
Very fast data delivery with high throughput and
QoS especially with Zigbee, which cannot support video with high throughput and
reliability level
messages reliability level
Resource management Basic, depends on the technology used 5G resource management Advanced, managing 5G resources using BC
Intelligence
The simplest form of blockchain is a linked list sioned. The benefit of identity management is
of “blocks” that contains various types of informa- that private blockchains are usually an order of
tion; for example, transactions that record Bitcoin magnitude faster and transaction costs are lower
money transfers. Each participant stores a local due to the reduced number of processing nodes.
blockchain, and uses some form of a “consensus” The drawback of blockchain is that identity/
mechanism to establish its exact order and content. permission management is not as scalable and
Popular mechanisms include proof of work (PoW), decentralized.
proof of stake (PoS), and practical Byzantine fault There are also hybrid solutions that combine
tolerance (PBFT), each of which has different trade- private and public blockchains, referred to as
offs and suitable usage scenarios [11, 12]. Block- “consortium blockchains.”
chain technology has been envisioned because of
its robustness in providing trust and anonymity in Blockchain for Drones and 5G
any commodity trading such as energy [13]. Drones and 5G: With the deployment of 5G,
Each block is “chained” to the previous one many services can benefit from the advantages of
using a cryptographical data structure called a hash this technology in terms of data rate and energy
pointer, and participants jointly verify all transac- consumption. 5G and UAVs have a mutual rela-
tions by examining the content and the accom- tionship. Each technology can provide a range of
panying hash pointers. Thus, false transactions advantages to the other that may have a significant
are rejected if enough participants are correct. impact on the quality of various smart city services.
Such mechanisms ensure that the system is tam- 5G in Service of UAVs: As mentioned previ-
per-proof, since an adversary cannot persuade cor- ously, the biggest challenges for UAV networks
rect participants to switch to an incorrect branch of are fast data delivery, QoS, and energy consump-
the blockchain. This is also how blockchain intui- tion. 5G is designed to provide these features:
tively establishes decentralized trust [14, 15]. highest data rate and better QoS, and it was
The original intention of blockchain was to proved that it is an energy-aware technology. This
create a public network similar to the models makes 5G a promising solution to make UAVs
of Bitcoin, Ethereum, and Litecoin. However, communicate together and with the different
due to performance limitations, private block- smart city components.
chains have also been developed. The difference UAVs in Service of 5G: Cellular networks suf-
between public and private blockchains depends fer from signal quality degradation due to several
on the permissions of the participants. Anyone causes such as interference, a vast number of con-
is free to join a public blockchain, whereas pri- nected devices, and big buildings and their thick
vate versions require an authority to approve metallic infrastructure [6]. Also, some areas may
membership. Therefore, public types are known be outside of the cellular coverage like rural areas
as permission-less and private types as permis- or after hazardous situations. The fast growing IoT
Number of Messages
N2N-UAV without BC
2,500
allowing them to have node-to-drone communi- N2N-UAV with BC