Design Guidelines For Blockchain-Assisted 5G-UAV Networks: IEEE Network March 2021

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/349697151

Design Guidelines for Blockchain-Assisted 5G-UAV Networks

Article  in  IEEE Network · March 2021


DOI: 10.1109/MNET.011.2000170

CITATIONS READS

10 70

4 authors, including:

Moayad Aloqaily Ouns Bouachir


Al Ain University Zayed University
116 PUBLICATIONS   1,905 CITATIONS    22 PUBLICATIONS   313 CITATIONS   

SEE PROFILE SEE PROFILE

Ismaeel Al Ridhawi
University of Ottawa
51 PUBLICATIONS   936 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Classification of brain tumors (Based) On Noise-reduced MRI by Non Local PCA View project

All content following this page was uploaded by Moayad Aloqaily on 04 March 2021.

The user has requested enhancement of the downloaded file.


BLOCKCHAIN-ENVISIONED DRONES: REALIZING 5G-ENABLED
FLYING AUTOMATION

Design Guidelines for Blockchain-Assisted 5G-UAV Networks


Moayad Aloqaily, Ouns Bouachir, Azzedine Boukerche, and Ismaeel Al Ridhawi

Abstract the resource-rich edge without full reliance on the


cloud. Such an approach introduced the concept
Fifth generation (5G) wireless networks are of fog-to-cloud (F2C) and fog-to-fog (F2F) com-
designed to meet various end-user quality of ser- puting [2].
vice (QoS) requirements through high data rates However, in today’s smart city environments,
(typically of gigabits per second) and low laten- and with the ever growing numbers in IoT devic-
cies. Coupled with fog and mobile edge com- es, especially in UDN environments, 5G networks
puting, 5G can achieve high data rates, enabling will face limitations due to unpredictable and
complex autonomous smart city services such as non-uniform loading [3]. As such, if the supplied
the large deployment of self-driving vehicles and network capacity does not match the through-
large-scale artificial-intelligence-enabled industrial put demand, end-user QoS requirements will not
manufacturing. However, to meet the exponen- be met. To solve this issue in regard to the dis-
tially growing number of connected IoT devices proportion between irregular demand and the
and irregular data and service requests in both limitations in access availability, a UDN could be
low- and high-density locations, the process of assisted through mobile serving stations, name-
enacting traditional cells supported through fixed ly, unmanned aerial vehicles (UAVs), or simply
and costly base stations requires rethought to drones. UAV mobile base stations (BSs) will
enable on-demand mobile access points in the improve the QoS of the wireless network by
form of unmanned aerial vehicles (UAV) for diver- increasing network capacity and improving the
sified smart city scenarios. This article envisions coverage area [4, 5]. Such mobile BSs can be
a 5G network environment that is supported moved to highly dense locations close to the end
by blockchain-enabled UAVs to meet dynamic users. Drones also have the potential of replacing
user demands with network access supply. The or at least complementing cellular networks in
solution enables decentralized service delivery high interference conditions or locations where
(drones as a service) and routing to and from end it is not economically feasible to install a perma-
users in a reliable and secure manner. Both pub- nent infrastructure. For instance, in cases where
lic and private blockchains are deployed within there are few active end users, deploying UAVs
the UAVs, supported by fog and cloud comput- may sufficiently serve the users’ needs without
ing devices and data centers to provide a wide reliance on high-end cellular BSs. Moreover, run-
range of complex authenticated service and data ning a few drones in those locations might reduce
availability. Particular attention is paid to com- the overall power consumption (i.e., by switching
paring data delivery success rates and message the drones on and off according to the number
exchange in the proposed solution against tra- of active requests compared to an all-time active
ditional UAV-supported cellular networks. Chal- fixed cellular BS).
lenges and future research are also discussed with Although mitigating the disproportion between
highlights on emerging technologies such as fed- irregular end-user requests and the available 5G
erated learning. access through an increase in the number of fixed
and mobile stations, such overprovisioning leads
Introduction to more complex service provider management
The rapid growth in communication traffic issues. To this end, we investigate the feasibili-
between Internet of Things (IoT) devices has rev- ty and significance of a novel blockchain-assist-
olutionized the current communication frame- ed 5G-UAV network over other state-of-the-art
work, leading to smaller cell architectures and UAV-supported 5G networks. The solution relies
ultra-dense networks (UDNs). The fifth generation on a decentralized service delivery and rout-
(5G) network was designed to meet stringent user ing technique to and from end users through a
quality of service (QoS) requirements in terms of 5G-supportive UAV network. Both public and pri-
higher data rate and low latency. Many smart city vate blockchains are deployed in a smart city to
applications have been deployed as a result of ensure secure communication between partici-
this ever evolving communication technology. For pants. Mobile UAVs are deployed in ultra-dense
instance, smart intelligent autonomous self-driving areas suffering from network congestion and
and service provisioning vehicles are now capable decreased QoS to provide efficient and reliable
of achieving their intended tasks with the aid of data routing. UAVs communicate with both fog/
fog and cloud computing [1]. Most time-sensitive edge devices and cloud data centers to ensure
critical decisions can now be made at the fog or extensive coverage of a multitude of smart city

Digital Object Identifier: Moayad Aloqaily is with Al Ain University; Ouns Bouachir is with Zayed University; Azzedine Boukerche is with the University of Ottawa;
10.1109/MNET.011.2000170 Ismeel Al Ridhawi is with Kuwait College of Science and Technology.

64 0890-8044/21/$25.00 © 2021 IEEE IEEE Network • January/February 2021


Authorized licensed use limited to: Al Ain University. Downloaded on February 17,2021 at 09:23:19 UTC from IEEE Xplore. Restrictions apply.

ALOQAILY1_LAYOUT.indd 64 1/29/21 4:22 PM


Cloud
Data processing, analysis and storage

5G

5G

5G

5G

FIGURE 1. An overview of the blockchain-assisted 5G-drone network scenario.

services and access to resources. In addition, we processing (e.g., ML and AI), drones as a service
identify challenges associated with the block- (DaaS) is able to provide a wide range of smart
chain-assisted 5G-UAV network such as energy services (Fig. 1). Indeed, drones are able to per-
consumption and reliability. We demonstrate form any task on demand using the different com-
through simulation results that the proposed solu- munication infrastructures deployed around the
tion can be beneficial in terms of data delivery city. The various types of collected data, the users’
success and minimal data exchange. requests, or the transactions among the service
providers can be processed and stored by edge
drones As A serVIce or cloud computing, allowing the extraction of
valuable information that can be very useful in
operAtIons enhancing quality of experience (QoE), safety,
With the remarkable fast advances in artificial and life in the smart city.
intelligence (AI) and machine learning (ML), Services: Thanks to their 3D movement flex-
extraordinary capabilities are designed, empow- ibility, UAVs do not have complex traversing
ering the concept of smart autonomous systems restrictions as seen in roads. They can move in
such as robots and autonomous vehicles. UAVs, various directions and fly over inaccessible and
or simply drones, are another example of sys- dangerous locations. Various applications can
tems that may benefit from these advances. Used benefit from this feature. Those applications can
for the first time in the World War II by the U.S. be grouped into three different classes based on
Army in an attempt to use a manned aircraft in the task allocated to the aircraft.
an unmanned manner, the name “drones” has Flying IoT Device: Equipped with diverse types
always been coupled with the military. Nowadays, of sensors (e.g., gas and temperature sensors),
UAVs are available in diverse sizes and capabili- a drone can reach inaccessible and dull loca-
ties and used in civil domains for various applica- tions and get better visibility than any other IoT
tions. They perform at different automation levels, device to collect accurate data about a situation.
ranging from fully controlled (no automation) to For instance, drones can fly around big build-
fully autonomous, which can be reflected by a ings, mountains, bridges, hazardous areas (e.g.,
swarm of drones cooperating together to fulfill a after natural disasters), and so on. An example of
common mission. sensed information is weather forecast informa-
As shown in Fig. 1, UAVs can be active actors tion, which can be forwarded in real time to the
in all types of smart city services and applications. closest edge device or to the cloud, or stored in
They can be used with police and fire stations for the drone’s memory and collected by the ground
emergency situations, as well as in smart transport station at the end of the exploratory trip. UAVs
management, healthcare, agriculture, industry, are considered cost-effective flying IoT devices
smart grid, environment control, and much more. used to collect truthful information for various
Coupled with the most advanced paradigms applications. Surveillance, monitoring, and envi-
of communication (i.e., 5G), data storage (using ronment measurements are popular examples of
edge, fog, cloud, blockchain technologies), and IoT application-based drones.

IEEE Network • January/February 2021 65


Authorized licensed use limited to: Al Ain University. Downloaded on February 17,2021 at 09:23:19 UTC from IEEE Xplore. Restrictions apply.

ALOQAILY1_LAYOUT.indd 65 1/29/21 4:22 PM


sudden movement, and data exchanging with the
Blockchain Cloud ground station. To make fast and wise decisions,
Data Storage
drones should rely on their sensors and the data
Public BC received from the surroundings (other drones,
Data Machine Behavior and Decision
vehicles, infrastructure, etc.).
Analysis Learning Data Extraction Making
Drones have a certain automation level, and
Reward
may perform as a swarm of cooperative agents
Smart Fog/edge
[8, 9]. By continuously exchanging data between
Consensus the drones, they can create an idea about the sit-
Contract Data Mining
Process uation and update their tasks based on that. For
Data instance, each drone may change its path plan
Private BC Data Filtering
Encryption based on other aircraft trajectories or task results.

Any Service Data UAV Network Challenges


As explained above, all UAV operations are based
5G Drones as a Service on a continuous exchange of data between the
drone and various surrounding devices including
other drones, base stations, vehicles, infrastruc-
ture, and so on.
Smart City Components
A drone exchanges diverse types of messag-
es: information related to its task (e.g., geograph-
FIGURE 2. System architecture. ic location or pilot instructions), gathered IoT
data, and much more [10]. These messages can
Mobile Flying Base Station: Due to the expan- be generated by the drone, sent to the drones,
sion in the number of connected devices, espe- or simply relayed to other devices through the
cially in crowded areas, communication networks drone. The communication system used by the
are facing many challenges to meet all these drones faces several challenges.
simultaneous requests. Many researchers have Fast Delivery: To guarantee the best task per-
focused on this issue and have proposed to add formance, drones should exchange information
mobile small cells (MSCs) that can support the about surrounding events (or pilot instructions) on
connection provided by the mega-cell. [6] Fly- time, with the shortest delay, to make instant reac-
ing a few meters above the users, UAVs offer an tions. Also, some of the forwarded IoT data may
important coverage area that can be provided by be critical and require low transmission delay.
a flying MSC. Also, UAVs can be used as base sta- Trust and Privacy: Drones may perform as a
tions or relays to connect devices in areas where swarm or individually, and they may relay infor-
no communication infrastructure is used (point-to- mation exchanged between other devices. The
point networks, rural areas, and after hazardous privacy of the exchanged messages, and the par-
events). ticipating aircraft identity verification and authenti-
Flying Robots: Advances in technology are cation are critical issues that should be taken into
creating intelligent systems based on unprece- consideration.
dented paradigms. AI and ML are creating a rev- Security: Drones, operating in the sky, commu-
olution in all technological sectors by providing nicate thorough wireless communication technol-
cutting-edge devices such as robots that are able ogies, and may be vulnerable to several privacy
to collect information about their surrounding and security risks. Drones can easily be controlled
environment, analyze the current situation, make by hackers to manipulate their tasks, to send
decisions, and perform various tasks in real time. wrong data, and to target data accountability,
UAVs are considered flying robots that, based data integrity, data authorization, and reliability.
on innovative algorithms, can replace humans in QoS: Drones exchange various types of data
many dull missions [7]. Examples are the Amazon such as video surveillance (real-time traffic) and
delivery and flying ambulance projects. emergency events that require immediate reac-
UAV Automation Levels: Drones can perform tions [8]. These messages have different require-
various operations and tasks under different levels ments in terms of QoS such as throughput,
of automation that can go from fully controlled reliability, and delay that may change with time.
to fully autonomous drones. The level of automa- Energy Consumption: Most drones are
tion is defined by how the drone can monitor the equipped with limited batteries that have short
progress of its mission. lifetimes. The communication exchanges, the
Zero Automation Level: A pilot can control computing processes running on the UAV, and
khả năng xử lý theo yêu cầu the drone’s operations from the ground by send- the carried payload increase the energy consump-
và tự xử lý độc lập ing instructions for each movement and action. tion and reduce the lifetime of the UAV.
In this situation, the aircraft should obey all the
received directions passively.
Hybrid Automation Level: The UAV’s auto-
Blockchain for Drones
mation level can increase progressively, reducing Blockchain Overview
the human interposition during the mission. Some Generally speaking, blockchain (BC) is a distribut-
decisions may be made locally by the drones ed and tamper-resistant ledger that does not rely
based on surrounding events, while some others on a centralized authority to establish trust, with
are received from the ground controller. a core layer mechanism for decentralized trust
Full Automation Level: Based on advances in management. Since the introduction of Bitcoin,
AI and ML algorithms, drones have full control blockchain has been used in applications such as
of their operations including trajectory planning, cryptocurrency, secure storage, and asset transfer.

66 IEEE Network • January/February 2021


Authorized licensed use limited to: Al Ain University. Downloaded on February 17,2021 at 09:23:19 UTC from IEEE Xplore. Restrictions apply.

ALOQAILY1_LAYOUT.indd 66 1/29/21 4:22 PM


Characteristics Basic UAV networks 5G UAV networks BC-assisted 5G UAV networks

Limited range that depends on the used technology Extended range based on
Communication range Extended range based on 5G infrastructure
(i.e., Zigbee or Wifi) 5G infrastructure

Fair data delivery speed with limited throughput, Very fast data delivery
Very fast data delivery with high throughput and
QoS especially with Zigbee, which cannot support video with high throughput and
reliability level
messages reliability level

UAV identity is checked so not just any drone can


Identity verification No UAV identity verification No UAV identity verification
participate in the mission

Data security ↓ ↓ Data is stored in BC, which provides security

Privacy ↓ ↓ Data is stored in BC, which provides privacy

Trust is provided since all participants’ identities are


Trust ↓ ↓ verified, their privacy is guaranteed, and data storage
is secure

Decentralization Centralized system Centralized system Decentralized system

Resource management Basic, depends on the technology used 5G resource management Advanced, managing 5G resources using BC

Thanks to the resource management features, this


Power efficiency ↓ ↓
system provides UAVs power efficiency

Scalability ↓↓ ↓ Better scalability

Intelligence

UAV movement flexibility Restricted within the communication range ↑ ↑

Autonomy Limited Limited Very advanced

Swarm operations Limited Limited Advanced


TABLE 1. Comparison between different drone communication platforms. ↑ means comparatively high, ↓ means comparatively low.

The simplest form of blockchain is a linked list sioned. The benefit of identity management is
of “blocks” that contains various types of informa- that private blockchains are usually an order of
tion; for example, transactions that record Bitcoin magnitude faster and transaction costs are lower
money transfers. Each participant stores a local due to the reduced number of processing nodes.
blockchain, and uses some form of a “consensus” The drawback of blockchain is that identity/
mechanism to establish its exact order and content. permission management is not as scalable and
Popular mechanisms include proof of work (PoW), decentralized.
proof of stake (PoS), and practical Byzantine fault There are also hybrid solutions that combine
tolerance (PBFT), each of which has different trade- private and public blockchains, referred to as
offs and suitable usage scenarios [11, 12]. Block- “consortium blockchains.”
chain technology has been envisioned because of
its robustness in providing trust and anonymity in Blockchain for Drones and 5G
any commodity trading such as energy [13]. Drones and 5G: With the deployment of 5G,
Each block is “chained” to the previous one many services can benefit from the advantages of
using a cryptographical data structure called a hash this technology in terms of data rate and energy
pointer, and participants jointly verify all transac- consumption. 5G and UAVs have a mutual rela-
tions by examining the content and the accom- tionship. Each technology can provide a range of
panying hash pointers. Thus, false transactions advantages to the other that may have a significant
are rejected if enough participants are correct. impact on the quality of various smart city services.
Such mechanisms ensure that the system is tam- 5G in Service of UAVs: As mentioned previ-
per-proof, since an adversary cannot persuade cor- ously, the biggest challenges for UAV networks
rect participants to switch to an incorrect branch of are fast data delivery, QoS, and energy consump-
the blockchain. This is also how blockchain intui- tion. 5G is designed to provide these features:
tively establishes decentralized trust [14, 15]. highest data rate and better QoS, and it was
The original intention of blockchain was to proved that it is an energy-aware technology. This
create a public network similar to the models makes 5G a promising solution to make UAVs
of Bitcoin, Ethereum, and Litecoin. However, communicate together and with the different
due to performance limitations, private block- smart city components.
chains have also been developed. The difference UAVs in Service of 5G: Cellular networks suf-
between public and private blockchains depends fer from signal quality degradation due to several
on the permissions of the participants. Anyone causes such as interference, a vast number of con-
is free to join a public blockchain, whereas pri- nected devices, and big buildings and their thick
vate versions require an authority to approve metallic infrastructure [6]. Also, some areas may
membership. Therefore, public types are known be outside of the cellular coverage like rural areas
as permission-less and private types as permis- or after hazardous situations. The fast growing IoT

IEEE Network • January/February 2021 67


Authorized licensed use limited to: Al Ain University. Downloaded on February 17,2021 at 09:23:19 UTC from IEEE Xplore. Restrictions apply.

ALOQAILY1_LAYOUT.indd 67 1/29/21 4:22 PM


Simulation parameters Numerical values a drone physically falls into the wrong hands.
Moreover, it validates and ensures the identities
Communication protocol
IEEE 802.11n (for N2D and D2D) LTE gNB with 1 Gb/s bandwidth-(for of participating UAVs performing a task. Thus,
N2B and D2B) this architecture provides trust among drones and
service beneficiaries.
Area 1500 m  1500 m
Two types of blockchains can be seen from the
Number of fixed BSs 1 architecture and are used according to different
scenarios (private or public) where service provid-
Number of UAVs 20 ers use public or private keys. Public keys are used
Number of end users 10–20 mobile nodes when the service is visible to all parties, while private
keys belong to service providers for specific services.
UAVs placement Random-uniform distribution (initially) Blockchain authenticates communications among
UAVs by tracking all their transactions, makes it
Mobility model Random waypoint (for mobile nodes)
available to all network nodes, and achieves data
Drone flying heights 50 m integrity (i.e., cryptography) to provide tamper resis-
tance. The blockchain is decentralized with no cen-
Simulation duration 60 s tralized authority to access or modify transactions.
CBR packet length 512 B All network participants must reach a consensus to
validate transactions in a secure way.
CBR packet interval 10 ms The proposed architecture is secure by the
principles of blockchain, where no centralized
Transmission power 0.1 W (for UAVs), 0.01 W (for mobile nodes)
authentication mechanism such as the public key
TABLE 2.Simulator settings. is used by the UAVs for identifying each other. For
example, when providers mutually agree to pro-
traffic is very challenging for static base stations vide services for a specific area, they also share the
in 5G networks. Thanks to their flexible mobility pool of secret keys that are the private keys for the
and low cost, UAVs can serve as MSCs, which drones used to exchange load information while
enhances the cellular network coverage and pro- executing a drone’s service task. As such, drones
vides support for 5G infrastructure, empowering and service providers need to execute drone smart
new 5G applications. contracts. Blockchain can be used to enhance the
performance of the UAV-5G communication net-
Concept work by proposing a spectrum trading platform
Nowadays, communication is no longer tradition- between the aerial and terrestrial systems, allowing
al. Not only do we have mobile phones communi- secure spectrum sharing between the network
cating, but they are also connected to the cloud, operators and UAV service providers. This feature
edge, and fog, as shown in Fig. 1. Such a hetero- provides privacy based on a distributed sharing
geneous environment is sensitive to many issues; information platform and limits the risk of unautho-
trust is the most important of all. On-demand trust rized spectrum utilization by malicious nodes.
in ultra-dense wireless networks is not an easy
task. It requires high-speed communication, iden- Advantages
tification, and authentication. Drones are capable The proposed blockchain-assisted 5G-UAV net-
of communicating with each other through trust work provides several advantages and improves
to relay information regardless of the owner (e.g., the QoE of drone services. These benefits are
service provider). ML and AI are two techniques summarized as follows:
that can be used to identify intrusive traffic. More- • Better network QoS in terms of delay,
over, blockchain can be used to certify the true throughput and reliability that are essential
identity of drones. requirements in UAV services to provide the
This section presents an architecture that best QoE.
secures the utilization of drones as on-demand • Data privacy and security based on BC dis-
flying nodes for inter-service operability between tributed ledger.
multiple service providers by employing the fea- • Identity of participating drones is verified for
tures of ML and blockchain. each new transaction, providing trust and
Figure 2 presents various components and anonymity that protects against malicious
strategies for utilizing the use of 5G and block- attackers trying to join the UAV network.
chain-based drones. Further, Table 1 provides an • Distributed platform-based immutability,
overview of the characteristics and implications transparency, and traceability increase trust-
of blockchain-based drones, and compares the worthiness between agents and enables the
deployment issues with the centralized and tradi- deployment of high automation systems.
tional drone-assisted wireless networks. • Better resource and spectrum management
Drones are facilitating smart city sub-compo- allows controlling the interference in UAV-
nent services through the 5G infrastructure. Data 5g-based networks, which provide better
processing and storage are usually handled at the scalability, accessibility, and power efficiency.
edge or the cloud. Blockchain can be used to inte- This advantage allows creation of a trusted
grate drones with fog and cloud by ensuring data scheme for interference monitoring in flying
integrity and secure communication. This in return small cells.
makes the system more reliable and trustworthy.
The use of blockchain-assisted drones in this Performance Evaluation: A Scenario
architecture improves data security across several To test the effectiveness of the proposed model,
layers. Blockchain provides a level of security that analysis has been performed through Network
limits external hacking and data retrieval when Simulator 3 (NS-3). To maintain uniformity, all

68 IEEE Network • January/February 2021


Authorized licensed use limited to: Al Ain University. Downloaded on February 17,2021 at 09:23:19 UTC from IEEE Xplore. Restrictions apply.

ALOQAILY1_LAYOUT.indd 68 1/29/21 4:22 PM


experiments have been conducted on i7-6500U 100
CPU @ 2.5 GHz with 8 GB RAM. Simulator set- 95

Packet delivery success rate (%)


tings are summarized in Table 2. In the simula- 90
tion scenario, a test is conducted where up to 85
100 mobile devices are scattered along a network 80
area of 1500 m x 1500 m, 20 mobile drones fly 75
over them to form a relay and data delivery plat- 70
form, and one next generation node B (gNB) base 65
station is placed to cover the entire simulation 60 N2N-BS
environment. Communication between UAVs is 55
N2N-UA V without BC

conducted using a flying ad hoc network (FANET) 50


N2N-UA V with BC

topology. The UAVs are randomly redistributed to 10 20 30 40 50 60 70 80 90 100


mobile node dense locations throughout the sim- Number of Mobile Nodes
ulation environment at predefined time intervals.
This technique would represent the movement of FIGURE 3. Comparing the overall packet delivery suc-
UAVs to locations of high-density mobile nodes cess rate among the three different techniques.
to aid in the process of all-time connectivity and
faster data delivery. Mobile nodes and UAVs are 3,000
N2N-BS
equipped with two communication interfaces,

Number of Messages
N2N-UAV without BC
2,500
allowing them to have node-to-drone communi- N2N-UAV with BC

cation (N2D), node-to-BS communication (N2B), 2,000


and drone-to-drone communication (D2D). Three
solutions have been compared, namely, tradi- 1,500
tional node-to-node communication using the BS
(N2N-BS), node-to-node communication using 1,000
both UAVs and BS without blockchain (N2N-UAV 500
without BC), and node-to-node communication
using both UAVs and BS with blockchain (N2N-
10 20 30 40 50 60 70 80 90 100
UAV with BC). The tests conducted focused
Number of Mobile Nodes
mainly on data delivery success rate and message
exchange overhead. FIGURE 4. Total number of packets exchanged in the
network for data delivery between source and
Authenticated Data Delivery Success Rate destination nodes using the three different data
Authenticated data delivery success rate is the delivery techniques.
percentage of positive responses received for all
packets sent from the source mobile node to the
destination mobile node. Results depicted in Fig. introduced. Moreover, by using blockchain the
3 show that the proposed solution, namely, N2N- number of packets increase more to ensure that
UAV with BC, outperforms traditional communica- communication between UAVs is authenticat-
tion techniques and non-authenticated N2N-UAV ed. Thus, there is always a trade-off between an
state-of-the-art solutions. It is important to note that increase in the communication overhead and sys-
without proper data authentication (with the aid of tem efficiency in terms of reduced delay, power
blockchain), sensitive data may be intercepted by usage reduction, and much more. For example,
hostile UAVs. From the figure, we see that as the an increase in the network traffic as a result of
node density increases within the environment, taking a different data delivery route might speed
the gap in success rate between the proposed and up the data delivery process if the BS or anoth-
traditional methods increases. For instance, when er primary UAV is busy with handling other
comparing N2N-UAV with BC to N2N-BS with data delivery requests. We see from Fig. 4 that
100 mobile nodes in the network, we see that when comparing a UAV communication method
the success rate for N2N-UAV with BC is almost (N2N-UAV) to a traditional cellular communica-
77 percent compared to 55 percent for N2N-BS. tion method (N2N-BS), the N2N-BS technique
Moreover, the success rate for N2N communica- outperforms N2N-UAV in terms of reduced net-
tion without reliance on blockchain is 60 percent. work traffic overhead, where the overall number
Such results indicate that in high-mobility cases like of sent messages is 1200 with 100 mobile nodes
UDNs, UAVs are capable of adjusting their loca- network density. When relying on a UAV solu-
tion to meet service demands in accordance with tion, the overall number of exchanged messages
mobile node density. For instance, whenever node is 2150 for N2N-UAV without BC and 2650 for
density increases in a certain location within the N2N-UAV with BC. Although results show that a
network, one or more extra UAVs move to that traditional N2N-UAV technique outperforms our
location to ensure continuous and reliable data proposed solution that relies on blockchain, the
delivery. The proposed technique not only delivers difference in message exchange is modest com-
data in a timely manner, but also ensures that data pared to the gains achieved in terms of authenti-
communication is authenticated to ensure high cation and privacy.
delivery success rates.
Challenges and Future Research
Message Overhead The BC-assisted 5G UAV network empowers
It is well known that with any short-range com- drone services by providing security, privacy,
munication technique, the number of packets trust, and better resource management. However,
sent from the source to the destination increas- the deployment of this system may face a few
es in accordance to the number of relay nodes challenges.

IEEE Network • January/February 2021 69


Authorized licensed use limited to: Al Ain University. Downloaded on February 17,2021 at 09:23:19 UTC from IEEE Xplore. Restrictions apply.

ALOQAILY1_LAYOUT.indd 69 1/29/21 4:22 PM


modification or deletion. Off-chain blockchain
UAVs exchange various types of data. Some of the data may be too large to be stored in the blockchain storage should be provided to solve this issue and
efficiently or requires frequent modification or deletion. Off-chain blockchain storage should be provid- enhance the system performance.
Dense Number of Nodes: There are various
ed to solve this issue and enhance system performance. challenges such as location identification, chan-
nel selection, interference management, and the
availability of a line of sight.
Scalability and QoS: Blockchain faces perfor- Location and Divisibility: One of the primary
mance challenges in terms of scalability, through- challenges for the proposed model is the mutual
put, and delay due to the rapidly growing volume agreement on the location and divisibility of ser-
of data exchanged by such systems. Indeed, data vices between the service providers.
mining requires several verifications performed
by each blockchain participant. When the data Conclusion
generation rate is faster than the mining process, This article presents research guidelines for a
the performance of the overall system is affected 5G-UAV network that provides fast, reliable, and
in terms of throughput and delay. Scalability is secure service delivery to end users of smart cities,
one of the critical challenges causing QoS deg- namely, drones as a service (DaaS). With the aid of
radation. blockchain, UAVs can act as mobile access points,
Federated Learning UAVs: 5G provides a routing entities, or resource providers in a decen-
unique communication infrastructure to run tralized manner. With the exponential growth in
sophisticated smart applications of autonomous the number of connected IoT devices, data and
systems. Flying close to end users, drones can service acquisition may be irregular depending
be utilized as relay devices to forward messages on the location and time. Thus, it may be more
and to support edge servers. Moreover, through beneficial both economically and in terms of ser-
federated learning mechanisms, UAVs can also vice quality to run such a blockchain-assisted UAV
help in processing the collected data and shar- network instead of a permanent fixed and over-
ing the learned model with the fog/cloud servers provisioned cellular network. The solution sup-
where all the received models are aggregated and ports service delivery either with the aid of a 5G
compared for decision making. Adopting such an network or in a totally decentralized manner using
approach adds extra constraints on computation, only UAVs. Both public and private blockchains
which requires optimization of the UAV resourc- are deployed with the UAVs. Moreover, with the
es (CPU, battery, node election, and formation) support of fog and cloud computing resources,
based on efficient task allocation and schedul- data and services are efficiently delivered. A case
ing (sensing, communication, and computing), in study was performed using a network simulator to
addition to many other mechanisms that help in compare the data delivery success rate and num-
reducing energy consumption and increasing the ber of messages exchanged using the proposed
operation lifetime. solution and other state-of-the-art UAV-supported
Data Type Diversity: Drones exchange vari- data delivery techniques.
ous types of messages that should be treated dif-
ferently. Some of the exchanged data is used to
References
[1] I. A. Ridhawi et al., “A Continuous Diversified Vehicular
guide the drones to fulfill their tasks, including Cloud Service Availability Framework for Smart Cities,”
message exchange between UAVs or instructions Computer Networks, vol. 145, 2018, pp. 207–18.
received from the pilot, IoT messages generated [2] O. Bouachir et al., “Blockchain and Fog Computing for
Cyber-Physical Systems: Case of Smart Industry,” IEEE Com-
by the UAV, and other messages generated from puter, vol. 53, no. 9, Sept. 2020, pp. 36–45.
other devices and relayed by the flying drone. [3] S. Andreev et al., “Future of Ultra-Dense Networks Beyond
System Infrastructure: Deployment of the 5G 5G: Harnessing Heterogeneous Moving Cells,” IEEE Com-
infrastructure is under process in many countries, mun. Mag., vol. 57, no. 6, June 2019, pp. 86–92.
[4] F. Tang et al., “Acpoca: Anticoordination Game Based Par-
and it may take years before having full 5G cov- tially Overlapping Channels Assignment in Combined UAV
erage. and D2D-Based Networks,” IEEE Trans. Vehic. Tech., vol. 67,
Regulations and Standards: Regulation is a no. 2, Feb. 2018, pp. 1672–83.
big challenge for both blockchain and UAVs. [5] S. Garg et al., “Tree-Based Attack-Defense Model for Risk
Assessment in Multi-UAV Networks,” IEEE Consumer Elec-
New rules should be defined to regulate the tronics Mag., vol. 8, no. 6, 2019, pp. 35–41; https://doi.
involvement of drones in cities for safety and pri- org/10.1109/MCE.2019.2941345.
vacy reasons, and to decide which entities and [6] S. Zafar et al., “Resource Allocation in Moving Small Cell
service providers may have access to the data in Network Using Deep Learning Based Interference Determi-
nation,” Proc. 2019 IEEE 30th Annual Int’l. Symp. Personal,
the blockchain. Some of these rules should regu- Indoor and Mobile Radio Commun., Sept. 2019, pp. 1–6.
late the relationship between the various service [7] N. Bousias et al., “Collaborative Visual Area Coverage Using
providers. Aerial Agents Equipped With Ptz-Cameras Under Localiza-
Novel UAV Services: The proposed system tion Uncertainty,” Proc. 2019 18th Euro. Control Conf., IEEE,
2019, pp. 1079–84.
allows achieving the high automation and intelli- [8] O. Bouachir et al., “Testbed of QoS Ad-Hoc Network
gence level that is the key to designing novel and Designed for Cooperative Multidrone Tasks,” Proc. 17th
advanced UAV services. ACM Int’l. Symp. Mobility Management and Wireless Access,
Innovative Consensus Algorithms: Advanced 2019, pp. 89–95.
[9] D. He et al., “How to Govern the Noncooperative Ama-
consensus algorithms should be designed, con- teur Drones?” IEEE Network, vol. 33, no. 3, May 2019, pp.
sidering the various types of services provided by 184–89.
the aircraft. [10] X. Liang et al., “Towards Data Assurance and Resilience
Off-Chain Blockchain Storage: As mentioned in IoT Using Blockchain,” Proc. IEEE MILCOM, 2017, pp.
261–66.
above, UAVs exchange various types of data. [11] L. Tseng et al., “Blockchain for Managing Heterogeneous
Some of the data may be too large to be stored Internet of Things: A Perspective Architecture,” IEEE Net-
in the blockchain efficiently or requires frequent work, vol. 34, no. 1, Jan./Feb. 2020, pp. 16–23.

70 IEEE Network • January/February 2021


Authorized licensed use limited to: Al Ain University. Downloaded on February 17,2021 at 09:23:19 UTC from IEEE Xplore. Restrictions apply.

ALOQAILY1_LAYOUT.indd 70 1/29/21 4:22 PM


[12] M. Aloqaily et al., “An Energy Trade Framework Using University, United Arab Emirates. She has a Ph.D. degree in
Smart Contracts: Overview and Challenges,” IEEE Network, computer engineering from the University Paul Sabatier (Tou-
vol. 34, no. 4, July/Aug. 2020, pp. 119–25. louse 3), France. She also holds an engineering degree in tele-
[13] F. Ali et al., “Cyberphysical Blockchain-Enabled Peer-to-Peer communications from the Higher School of Communications
Energy Trading,” IEEE Computer, vol. 53, no. 9, Sept. 2020, (Sup’Com), Tunis, Tunisia. Prior to joining Zayed University, she
pp. 56–65. worked as an assistant professor and postdoctoral researcher at
[14] B. Bera, D. Chattaraj, and A. K. Das, “Designing Secure Canadian University Dubai. Her current research activities are
Blockchain-Based Access Control Scheme in IoT-Enabled directed toward connected and autonomous vehicles, block-
Internet of Drones Deployment,” Computer Commun., vol. chain solutions, the Internet of Things (IoT), energy optimization,
153, 2020, pp. 229–49. AI, and ML. She is part of the Technical Program Committees
[15] O. Alfandi, S. Otoum, and Y. Jararweh, “Blockchain Solu- for numerous journals, conferences, and workshops like BCCA
tion for IoT-Based Critical Infrastructures: Byzantine Fault 2020, ITCVT-NOMS 2020, PEDISWESA-ISCC 2020, and AICS-
Tolerance,” IEEE/IFIP Network Operations and Management SA 2019.
Symp. 2020, Budapest, Hungary, 2020.
Azzedine Boukerche [F’15] is a Distinguished University Pro-
Biographies fessor and holds a Canada Research Chair Tier-1 position at the
Moayad Aloqaily [S’12, M’17] received his M.Sc. degree in University of Ottawa. He has received the C. Gotlieb Computer
electrical and computer engineering from Concordia Universi- Medal Award, the Ontario Distinguished Researcher Award,
ty, Montreal, Quebec, Canada, in 2012, and his Ph.D. degree the Premier of Ontario Research Excellence Award, the G. S.
in electrical and computer engineering from the University of Glinski Award for Excellence in Research, the IEEE Computer
Ottawa, Ontario, Canada, in 2016. He was an instructor in the Society Golden Core Award, the IEEE CS-Meritorious Award,
Systems and Computer Engineering Department at Carleton the IEEE TCPP Technical Achievement and Leadership Award,
University, Ottawa, Canada, in 2017. He has been working with the IEEE ComSoc ASHN Leadership and Contribution Award,
Gnowit Inc. as a senior researcher and data scientist since 2016. and the University of Ottawa Award for Excellence in Research.
He is also the managing director of xAnalytics Inc., Ottawa, His research interests include sensor networks, autonomous and
since 2019. Currently, he is with the Faculty of Engineering, connected vehicles, distributed and mobile computing, wireless
Al Ain University, United Arab Emirates. His current research multimedia, IoT, blockchains and network security, and perfor-
interests include the applications of AI and ML, connected and mance modeling and analysis of evaluation of large-scale distrib-
autonomous vehicles, blockchain solutions, and sustainable uted and mobile systems. He has published extensively in these
energy and data management. He has been the recipient of areas. He is a Fellow of the Engineering Institute of Canada, a
many honors and awards. He received the 2020 best paper Fellow of the Canadian Academy of Engineering, and a Fellow
award from the Ad Hoc Networks Journal. He has chaired and of the American Association for the Advancement of Science.
co-chaired many IEEE conferences and workshops including
BCCA 2020, AdHocNets 2020, PEDISWESA-ISCC 2020, ITCVT- Ismaeel Al Ridhawi [M’09, SM’19] received his B.A.Sc., M.A.Sc.,
NOMS 2020, E2NIoT-IWCMC 2020, ICCN-INFOCOM 2019, and Ph.D. degrees in electrical and computer engineering from
AICSSA 2019, and BAT-FMEC 2019 and 2020. He has served the University of Ottawa in 2007, 2009, and 2014, respectively.
as a Guest Editor for many journals including IEEE Wireless Com- He is an assistant professor of computer engineering at Kuwait
munications, IEEE Network, the International Journal of Machine College of Science and Technology and a researcher in the field
Learning and Cybernetics, the Elsevier IPM Journal, Springer of wireless communications. He also worked at the American
JONS, Springer Cluster Computer, Internet Technology Letters, University of the Middle East in Kuwait as an assistant professor
Transaction on Telecommunications Technologies, Security and from 2014 to 2019. He is a registered professional engineer
Privacy, and IEEE Access. He is an Associate Editor with Cluster in Ontario (P.Eng). He has many peer-reviewed publications in
Computing, Security and Privacy, IEEE Access, and IET Quantum highly ranked magazines, journals, and conference proceedings.
Computing. He was appointed the Co-Editor-in-Chief of the He is an Associate and Guest Editor in many journals and has
IEEE CommSoft TC eLetter in 2020. He started his own Special organized a number of IEEE conferences over the years. He has
Interest Group (SIG) on Blockchain and Application as well as also served as Session Chair for a number of symposiums and
one on Internet of Unmanned Aerial Networks. He is an ACM a member of the Technical Program Committees of numerous
member and a Professional Engineer Ontario (P.Eng.). journals and conferences. His current research interests include
service delivery and provisioning in fog and cloud computing,
Ouns Bouachir [M’18] is an assistant professor of computer quality of service monitoring for wireless networks, MEC net-
engineering in the College of Technological Innovation at Zayed work management, and service-specific overlay networks.

IEEE Network • January/February 2021 71


Authorized licensed use limited to: Al Ain University. Downloaded on February 17,2021 at 09:23:19 UTC from IEEE Xplore. Restrictions apply.

ALOQAILY1_LAYOUT.indd 71 1/29/21 4:22 PM


View publication stats

You might also like