Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/353469796

A novel improved artificial bee colony and blockchain-based secure clustering


routing scheme for FANET

Article  in  China Communications · July 2021


DOI: 10.23919/JCC.2021.07.009

CITATIONS READS

8 74

6 authors, including:

Liang Zhao Muhammad Bin Saif


Shenyang Aerospace University University of Verona
171 PUBLICATIONS   1,968 CITATIONS    2 PUBLICATIONS   8 CITATIONS   

SEE PROFILE SEE PROFILE

Ammar Hawbani Geyong Min


University of Science and Technology of China University of Exeter
151 PUBLICATIONS   1,350 CITATIONS    628 PUBLICATIONS   11,168 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

NSFC (Research on reliability and Diffserv oriented adaptive routing algorithm in VANETs) View project

Telemedicine System Application View project

All content following this page was uploaded by Muhammad Bin Saif on 26 August 2022.

The user has requested enhancement of the downloaded file.


1

A Novel Improved Artificial Bee Colony and


Blockchain-Based Secure Clustering Routing
Scheme for FANET
Liang Zhao, Muhammad Bin Saif, Ammar Hawbani, Geyong Min, Su Peng, Na Lin

Abstract—Flying Ad hoc Network (FANET) has drawn signif- FANET can be perceived as a subset of Mobile Ad hoc Net-
icant consideration due to its rapid advancements and extensive work (MANET) and Vehicular Ad hoc Networks (VANET).
use in civil applications. However, FANET characteristics of However, despite having similar characteristics, FANET has
high mobility, limited resources and distributed nature have
posed a new challenge to develop a secure and efficient routing some unique features as compared to ad hoc on land. Such as
scheme for FANET. To overcome these challenges, this paper distributed nature, 3D mobility, high speed, frequent topology
proposed a novel cluster based secure routing scheme, which changes, node density, and resource constraint nature [12]. The
aims to solve the routing and data security problem of FANET. speed of UAVs is greater than that of MANET and VANET.
In this scheme, the optimal cluster head selection is based on Moreover, UAVs have total freedom of movement in three
residual energy, online time, reputation, blockchain transactions,
mobility, and connectivity by using Improved Artificial Bee dimensions (3D) which leads to frequent topology changes.
Colony Optimization (IABC). The proposed IABC utilizes two UAVs are fitted with small batteries, providing a flight time of
different search equations for employee bee and onlooker bee to about 30-40 minutes [13]. These features have a direct impact
enhance convergence rate and exploitation abilities. Further, a on the development of routing protocol for FANET [14].
lightweight blockchain consensus algorithm, AI-Proof of Witness The advanced applications are being designed for FANETs,
Consensus Algorithm (AI-PoWCA) is proposed, which utilizes
the optimal cluster head for mining. In AI-PoWCA, the concept but pose new challenges, including data security, traffic load
of the witness for block verification is also involved to make balancing, mobility, congestion, and high error rates, which
the proposed scheme resource efficient and highly resilient typically lead to the degradation of network performance. The
against 51% attack. Simulation results demonstrate that the wireless communication scheme is essential to build a flying
proposed scheme outperforms its counterparts and achieves up ad hoc network for collaboration and communication between
to 90% packet delivery ratio, lowest end-to-end delay, highest
throughput, resilience against security attacks, and superior in UAVs. Due to FANET’s highly dynamic nature, 3D mobility
block processing time. and high speed results in low throughput, high delay and
consumes more battery power of UAV [15]. One solution
Index Terms—Improved Artificial Bee Colony Optimization;
Optimal Cluster Head Selection; Secure Routing; Blockchain; for this problem is the cluster-based routing. Clustering is
Lightweight Consensus Protocol a strategy for grouping nodes in different clusters of the
same geographical area [16]. Each cluster has a cluster head
(CH) and other neighboring nodes called cluster members
I. I NTRODUCTION
(CM) are connected with CH to form a cluster [17]. The,
comparatively new research field of ad hoc networks for
A flying vehicles, Flying Ad hoc Network (FANET) has
emerged as a promising networking paradigm [1]. FANET
CH’s selection is among the most significant of all clustering
tasks, where every node in the network can be a candidate
for CH. The criterion of selecting a cluster head is probably
consists of Unmanned Aerial Vehicles (UAVs) as they can random, or well-defined criterion based on various factors i.e.
fly autonomously and remotely without any human assistance connectivity, residual energy, mobility and reputation. Hence,
[2][3][4]. In recent years, FANET has attracted more attention a well-defined criterion depends on objectives for maximizing
in civilian, and commercial applications, such as search and the connectivity, maximizing residual energy, minimizing mo-
rescues operation [5][6], border monitoring [7], traffic control bility, maximizing reputation should be designed, where this
and management [8][9], and remote sensing [10], because of problem is a multiple objective optimization problem. To this
the adoptable, versatile and flexible nature of FANET. This end, it is a challenging task to select an optimal cluster head
made FANET an interesting field of research [11]. and objectives that are related to the problem.
In recent years, different CH selection approaches were
Liang Zhao, Muhammad Bin Saif, Su Peng, and Na Lin are with School
of Computer Science, Shenyang Aerospace University, Shenyang, Liaon- presented. For example, Particle Swarm Optimization (PSO)
ing, China. (e-mail: lzhao@sau.edu.cn;195252410804@email.sau.edu.cn; su- [18], Ant Colony Optimization (ACO) [19], Grey Wolf Opti-
peng@stumail.neu.edu.cn; linna@sau.edu.cn) mization (GWO) [20], and Artificial Bee Colony Optimization
Ammar Hawbani is with School of Computer Science and Technology,
University of Science and Technology of China, Hefei, China. (e-mail: (ABC) [21] for clustering in ad hoc networks have also been
anmande@ustc.edu.cn) proposed. The Artificial Bee Colony (ABC) algorithm is a new
Geyong Min is with University of Exeter, Exeter, UK. (e-mail: type of swarm intelligence algorithm proposed by Basturk and
g.min@ex.ac.uk)
Ammar Hawbani and Geyong Min are the corresponding authors of this Karaboga [21]; this algorithm has been modified by many
work. studies to solve complicated problems in various fields of
2

science and engineering. Similar to other population-based gorithm using IABC. In the objective function, we
meta-heuristic algorithms, ABC meta-heuristics also faces considered different factors. The selected cluster head
some challenges, such as a poor exploitation process rather is optimal in terms of resources and security, which is
than exploration, and comparatively slow rate of convergence, also employed for mining.
especially in dealing with multi-modal optimization problems. 3) A novel lightweight consensus algorithm is proposed, in
Furthermore, FANET security has become a critical issue which we consider the optimal cluster head as a super
and drawn increasing concern because UAVs can be employed miner. The new block is verified by a randomly selected
as weapons. The key features of the most related works are super mining node, and the concept of a witness for the
compared in Table I. At present, numerous researches have new block is also proposed. This allows the algorithm
been conducted on the security of FANET. These studies to be more resilient against a 51% attack.
have focused on communication privacy, integrity, and au-
thentication through the development of trust management II. T HE P ROPOSED ROUTING S CHEME
[22] and cryptographic protocols [23]. However, ensuring the
Two significant challenges that FANET encounters are how
data immutability, data availability, and transparency of the
to connect nodes together and how to adapt the dynamically
network is still an open research problem in FANET. In
changes in the network topology. The overview of the novel
cluster based routing the data immutability, data availability,
and transparency is a crucial issue as members in the cluster
solely rely on the CH for operational instructions, route
discovery, and routing data storage. The peer-to-peer network
and distributed characteristics of FANET makes them suitable
for blockchain. The combination of FANET and blockchain
can provide the capabilities to make FANET routing data more
secure, immutable, and transparent. The blockchain [24] is a
decentralized and distributed data structure run by a consensus
algorithm and distributed nodes. The application that runs
previously through any trusted authority; in blockchain, it is
possible to run that application without any trusted authority in
a distributed environment [25][26]. Without central authority,
blockchain can assist to develop a distributed network of
nodes, in which blockchain excludes the need to trust each
node in the network. The consensus algorithm used by the
blockchain ensures that the ledger is consistent and temper
proof across all nodes in the network.
The above work gives us motivation to develop an improved
artificial bee colony and blockchain-based secure clustering
routing scheme for FANET. In this paper, we proposed an
Improved Artificial Bee Colony (IABC) algorithm for bal-
ancing the exploration and exploitation process. Moreover,
convergence rate is fast in the comparison with the origi-
nal Artificial Bee Colony (ABC) algorithm. Furthermore, an Fig. 1: Overview of secure FANET routing scheme.
optimal cluster head selection algorithm is proposed using
IABC. In the proposed scheme, the CH is responsible for inter- FANET routing scheme is depicted in Fig. 1. In this scheme,
cluster, intra-cluster routing, and base station communication. the UAVs are employed as relay nodes for ground stations. For
Furthermore, CMs rely on CH for route discovery, packet example, if two ground stations are not in the communication
forwarding, and routing table storage. Therefore, routing data range of each other the FANET helps to establish a link
security and immutability is critical for CH to overcome between ground stations. After optimal cluster head selection
this challenge we employed blockchain. However, for highly and network formation, as described below the CHs locates the
resource-constrained FANETs, traditional blockchain consen- nearest ground station by sending a Hello Message if ground
sus algorithms are not suitable. Therefore, we proposed a stations are in direct communication range or through edge
lightweight consensus algorithm AI-Proof of Witness Consen- UAVs. The second step is if a new block is generated, the
sus Algorithm which do not only comprises miners to verify CH invites a random witness UAV by sending its Public Key
blocks, but also requires a witness to verify block to append (PK) and the witness UAV verifies the new block by adding
in the blockchain. The major contributions of the paper are its digital signature. After successful block verification, the
listed as follows. CH (super mining node) broadcasts a new block using Block
1) We proposed an improved artificial bee colony algorithm Announcement Message. The third step is the ground station
(IABC). The proposed algorithm is significantly better sends a data packet to CH and CH forwards the packet to
in exploration, exploitation and convergence. the next hop by looking into its routing table until the packet
2) We introduced the optimal cluster head selection al- reaches the destination ground station.
3

TABLE I: Comparison of Most Related Works

Ref. Detail Advantage Disadvantage

[27] Proposed a trust model based on blockchain Identify malicious fake reports Computational, time complexity and energy
for Unmanned Aerial System (BUAS) consumption because of PoW
[28] Proposed a secure utilization of drones in an Improves latency, network overheads, and Lack of user independency, and verification
ultra-dense network deployment costs of users in IoD
[29] Proposed a blockchain based UAV assisted MEC server stores the collected data into Vulnerable to injection attacks
data acquisition for IoTs blockchain
[30] Proposed the position-aware, secure, and Ensures the security and scalability High overhead and delay
efficient mesh routing approach (PASER)
[31] Proposed Fuzz-logic based trust model for Identifies selfish nodes Poor performance for network with low le-
FANETs (FCTM) gitimate nodes
[32] Proposed a blockchain technology for auto- Protect the privacy of users and increase the High latency, overhead and delay
motive security security of the vehicular ecosystem

Fig. 2 illustrates the system structure of proposed secure A. Improved Artificial Bee Colony Optimization
FANET routing scheme. At first, we select a UAV with high Artificial Bee Colony Algorithm is a meta-heuristic algo-
residual energy to perform cluster head selection by employing rithm comprised intelligent and foraging behavior of honey
the proposed IABC algorithm. After reaching a maximum bee swarms. The algorithm comprised three essential phases:
number of cycles, IABC returns a list of optimal cluster heads employee bee phase, onlooker bee phase, and scout bee phase.
or also called super mining nodes, and broadcasts in the Every employee bee is associated with a specific food source;
network with cluster head ID. The second step is network onlooker bees watch the wangle dance of employee bees in a
formation, all UAVs except CHs send cluster join request hive to check the quality of food and scout bees search for food
to neighbouring CH, and the CH keeps updating the routing randomly [21]. Various modifications have been presented
table. In the proposed scheme, we consider each update in the to improve the efficiency of the original version of ABC.
routing table as a blockchain transaction and transmits it to the Following other meta-heuristic algorithms, standard ABC also
blockchain module. The third step is to secure the routing data suffers a few challenges, such as slow convergence speed
when the number of transactions reaches a specified threshold during search and an unbalanced exploitation and exploration
a block is created and it invokes the consensus algorithm to process. A new candidate solution is produced by updating its
verify and append block in the blockchain. The consensus parent solution’s random dimension vector during the search
algorithm invites a witness node to be a witness of the block process. Therefore, most likely, new candidate solution is
by adding a digital signature of the witness. After, a successful similar to its parent solution, which leads to slow convergence.
verification block is appended in the local chain and broadcast In addition, when addressing complex multimodal problems,
in the network to other CHs. ABC may easily fall into local minima [33]. Therefore, a
better optimization algorithm during the search process should
balance exploration and exploitation.
In this context, we proposed two different search equations
for coping with slow convergence rate and unbalanced ex-
ploration and exploitation process. The standard ABC can
produce a new solution by utilizing Eq. (1). In Eq. (2), we
proposed a improved search equation for the employee bee
phase in which it utilizes the information of the global best
solution, which helps to improve the exploitation process in
the employee bee phase. The second part (𝑥 𝑔, 𝑗 − 𝑥𝑖, 𝑗 ) of Eq.
(2) use the information of the global best solution. In Eq.
(2), 𝑥 𝑔, 𝑗 is the 𝑗 𝑡 ℎ element of global best solution and first
part of equation is similar to standard ABC algorithm, which
works better in exploration. Hence, Eq. (2) is more balanced
in exploration and exploitation.
𝑣 𝑖, 𝑗 = 𝑥 𝑖, 𝑗 + 𝜙𝑖, 𝑗 (𝑥 𝑖, 𝑗 − 𝑥 𝑘, 𝑗 ) (1)
𝑣 𝑖, 𝑗 = 𝑥 𝑖, 𝑗 + 𝜙𝑖, 𝑗 (𝑥 𝑖, 𝑗 − 𝑥 𝑘, 𝑗 ) + (𝑥 𝑔, 𝑗 − 𝑥𝑖, 𝑗 ) (2)
The onlooker bee also utilizes Eq. (1) for producing new
candidate solution in standard ABC, which is more likely
to tend to slow convergence. The modified search approach
Fig. 2: System structure of secure FANET routing scheme. MABC (ABC/best/1) is proposed in [34], in which the infor-
mation of global best solution has been used to assist new
candidate solutions. We employ the search strategy of Eq. (3)
4

for onlooker bees, which is helpful to achieve fast convergence Initialization Phase: The initialization of population is an
compared with search equation Eq. (1) of standard ABC, important phase in any population based meta-heuristic opti-
which only search in the neighborhood randomly. mization algorithm. In our proposed algorithm, each UAV is
initialized with above mentioned parameters and considered
𝑣 𝑖, 𝑗 = 𝑥 𝑔, 𝑗 + 𝜙𝑖, 𝑗 (𝑥 𝑔, 𝑗 − 𝑥 𝑘, 𝑗 ) (3)
as a food source.
where 𝑥 𝑔, 𝑗 is the 𝑗 𝑡 ℎ element of global best solution, 𝜙𝑖, 𝑗 Fitness Function: The assessment of each food source in
is random number between [-1,1], and 𝑥 𝑘, 𝑗 is the randomly population and selecting optimal CH needs to have a fitness
selected solution in population (𝑘 ≠ 𝑖), 𝑗 ∈ (1, 2, ....𝐷) in a function. For the selection of optimal cluster head in our pro-
random index. posed algorithm, we constructed a fitness function inspired by
[36]. The major objectives of fitness function are that if UAV
is selected as a CH, it should have maximum residual energy
B. IABC-Cluster Head Selection
𝑚𝑎𝑥(𝐸𝑟 ), maximum reputation ranking 𝑚𝑎𝑥(𝑅𝑟 ), maximum
We proposed a cluster-based routing scheme, in which an online time 𝑚𝑎𝑥(𝑂 𝑡 ), maximum transactions 𝑚𝑎𝑥(𝑇), mini-
optimal selection of cluster head (CH) is implemented based mum UAV mobility 𝑚𝑖𝑛(1 𝑀 ) , and maximum UAV connectivity
on our proposed IABC. CH selection is considered as one of 𝑚𝑎𝑥(𝐶).
the most pivotal tasks for clustering in FANETs because CH The proposed fitness function can be described as
routes the data from Cluster Members (CM) and transmitting
𝑚𝑎𝑥(𝐸𝑟 ) + 𝑚𝑎𝑥(𝑅𝑟 ) + 𝑚𝑎𝑥(𝑂 𝑡 ) + 𝑚𝑎𝑥(𝑇) + 𝑚𝑎𝑥(𝐶)
data to other CHs. We consider group of objectives to calculate 𝑓 ∝
the proposed fitness function described as follows: 𝑚𝑖𝑛(𝑀)
(5)
• Residual Energy: The total remaining energy of UAV is
residual energy described in Eq. (4) 𝑚𝑎𝑥(𝐸𝑟 ) + 𝑚𝑎𝑥(𝑅𝑟 ) + 𝑚𝑎𝑥(𝑂 𝑡 ) + 𝑚𝑎𝑥(𝑇) + 𝑚𝑎𝑥(𝐶)
𝑓 =𝐾
𝐸𝑟 = 𝐸 𝑡 − 𝐸 𝑐 + 𝐸 𝑝𝑟 + 𝐸 𝑝𝑠 (4) 𝑚𝑖𝑛(𝑀)
(6)
where 𝐸𝑟 is current residual energy 𝐸 𝑡 is the total initial
where K is a constant of proportionality, we assumed K=1.
energy 𝐸 𝑐 is the energy for processing one block in
blockchain, 𝐸 𝑝𝑟 is the packet receiving energy, and 𝐸 𝑝𝑠
is the packet sending energy. In the proposed scheme, 𝑚𝑎𝑥(𝐸𝑟 ) + 𝑚𝑎𝑥(𝑅𝑟 ) + 𝑚𝑎𝑥(𝑂 𝑡 ) + 𝑚𝑎𝑥(𝑇) + 𝑚𝑎𝑥(𝐶)
𝑓 =
the CH is responsible for inter-cluster and intra-cluster 𝑚𝑖𝑛(𝑀)
communication. Hence, the residual energy of CH is very (7)
crucial because low residual energy leads to frequent dead Therefore, we determine the fitness of solution using Eq. (7).
nodes and decreases the overall network lifetime. Employee Bee Phase: Employed bees search for new food
• Reputation Ranking: The reputation ranking is based on sources, it associates each employee bee with a food source.
the number of packets received, the number of packets The number of employee bees are equal to the food source
dropped, and the number of packets forwarded. Therefore, and each employee bee determines a new solution using Eq.
a high reputation ranking helps to avoid malicious and (2). After producing new solution, it calculates the fitness
compromised UAV to be selected as a CH. of proposed solution by using Eq. (7) and applies greedy
• Total Online Time: Online time is the total time that each selection for selecting improved food source. At the end of
UAV takes part in the blockchain and network. The higher this phase employee bee share information with onlooker bee.
online time of CH indicates that CH has less probability Onlooker Bee Phase: The onlooker bee selects a food source
to turn into a dead node which enhances trust and overall according to probability given in Eq. (8) and determines a
network lifetime. new solution by using Eq. (3). The onlooker bee calculates
• Numbers of Transactions: The numbers of transactions the nectar amount in other words fitness of newly generated
are the total number of new blocks append in the solution by using Eq. (7) and applies greedy selection for
blockchain by individual UAV. The malicious and com- selecting improved food source.
promised UAV can hold or drop blockchain transactions. 𝑓𝑖
Hence, the number of transactions is useful to select a 𝑝 𝑖 = Í𝑆 𝑁 (8)
𝑓𝑖
trusted CH. Trusted CH can reduce energy consumption 𝑖=1
and the number of transactions to be verified [35]. where 𝑓𝑖 is the fitness of 𝑖 𝑡 ℎ solution in the population and
• Mobility: The mobility is course change and speed stabil- 𝑖 = 1, 2, 3, ..., 𝑆𝑁 SN is the population size. Hence, fitness is
ity of a UAV compared with other UAVs in the network. proportional to 𝑝 𝑖 .
The stable course change and low-speed help to form Scout Bee Phase: The scout bee randomly determines new
more stable clusters, reduces frequent link breakage, and food source using Eq. (9), if a food source does not improve
control messages. the fitness after repeated trails and food source it is considered
• Connectivity: The connectivity is the number of UAVs as abandoned.
connected with any individual UAV in the network. The
𝑥 𝑖, 𝑗 = 𝑥 𝑚𝑖𝑛
𝑗 + 𝑟𝑎𝑛𝑑 (0, 1) (𝑥 𝑚𝑎𝑥
𝑗 − 𝑥 𝑚𝑖𝑛
𝑗 ) (9)
UAV with higher connectivity have a higher likelihood of
being CH because high connectivity reduces the number where 𝑥 𝑖, 𝑗 is new food source. 𝑥 𝑚𝑎𝑥
𝑗 and 𝑥 𝑚𝑖𝑛
𝑗 denote the upper
of uncluster UAVs and increases the packet delivery ratio. and lower bounds of abandoned food source, respectively.
5

𝑟𝑎𝑛𝑑 (0, 1) is a uniform random number range between 0 and [37]. In PoW algorithm, all mining nodes take part in the
1. The scout bee will replace new solution with abandoned consensus process, and the node with more resources, i.e.,
food source. After reaching maximum number of cycles computing power or hashing power can commit new blocks
𝑀𝐶𝑁, the proposed IABC will return optimal cluster head. in the blockchain. In PoS, the node with more stakes in
Network Formation: After the selection of optimal cluster the network has more chances to commit the new block in
head, the next phase is formation of network. In our proposed blockchain. The drawbacks of these algorithms are energy
solution, cluster head is responsible for handling packets from consumption and time delay for processing new blocks, which
cluster members and forward packets to other cluster heads. makes these algorithms unsuitable for UAVs because of having
Each UAV in the network is initialized with a UAV ID, which low battery power and less computing power. Blockchain com-
is used as a identification for UAV. Initially all UAVs except prise main three components transactions or blocks, consensus
cluster heads in the network broadcasts Join Cluster Message. algorithm and chain.
When a cluster head receives Join Cluster Message, it updates 1) Transactions and Blocks: The structure of the transac-
its cluster member’s table. Each CH maintains three tables as tion is shown in Fig. 3(a). The first entry is the transaction
follows. ID (TID). In contrast, the second entry is a pointer to the
• Cluster Member Table: The CH manages a cluster mem- previous transaction of transaction generator UAV. The third
ber table in which the information of direct neighbors is the public key (PK) of the transaction generator UAV. The
of CH is stored, and intra-cluster communication is per- fourth is a time-stamp when a transaction is generated. The
formed by utilizing the cluster member table. The entries fifth is the signature of the transaction receiver CH, sixth entry
in a table contain the Id of a neighboring UAV, con- is the reputation of transaction. The reputation comprises three
nected or disconnected status, and updated information entries, 1) total number of transactions of the generator, 2)
of parameters, i.e. the residual energy, reputation ranking, the receiver CH rejects a total number of transactions, and 3)
total online time, number of transactions, mobility, and the hash of PK that the transaction generator will use for the
connectivity of neighbors and CH update all information next transaction. The reputation field is used in the distributed
periodically. trust algorithm presented by [35]. The structure of the block is
• Two-hop Member Table: The cluster members broadcast shown in Fig. 3(b). The block consists of a block header and
their neighbors information periodically to the CH. There- a block body. The header section contains, the hash of the
fore, by utilizing the information of neighbors, the CH can previous block, witness signature and time-stamp and block
collect information about UAVs located two-hop away body contains all transactions.
and maintains a two-hop member table by adding two-
hop un-clustered neighbors.
• Edge Member Table: The edge member table maintains
the information of neighboring clusters. The edge UAV
is connected with more than one CHs, which is used
as a link between two clusters. The edge member table
contain Ids of connected CHs, Id of edge UAV, which
is connected with both cluster heads and link status. The
inter-cluster communication is performed by utilizing an
edge member table.

C. A Lightweight Consensus Algorithm


Blockchain is a distributed database, in which every node Fig. 3: Structure of Block, Transaction and Reputation.
or majority of nodes should participate and agree in the
decision of adding a new block of information in blockchain 2) AI-Proof of Witness Consensus Algorithm: The AI-
and should have a copy of that database. Blockchain is a PoWCA selects an optimal UAV called super mining nodes
distributed ledger with tamper-proof, decentralization and data to add a new block in blockchain rather than allowing each
traceability characteristics. Blockchain can be used to improve node in the network to take part in the mining process (Proof
the trustworthiness and robustness of the routing information. of Work), or select a designated validator based on stakes in
We employ the blockchain to record the routing tables data the network (Proof of Stake). Thus, there is no or limited
described in Section II (B) Network Formation. The process of competition in adding a new block. Super mining nodes are
participating and agreeing on a common or majority decision optimal miners in terms of lifetime, reputation, connectivity,
is called consensus. In this paper, we proposed an AI-based and the number of transactions. The AI-PoWCA makes the
lightweight consensus algorithm suitable for UAVs. Currently, requirement on computational power and memory capacity of
the mostly consensus algorithms used are not suitable for the mining devices basic. The verification of a new block
UAVs because these algorithms consume energy and pro- is not only verified by a super mining node, at least one
cessing power for reaching on consensus conclusion adding random witness node, which is not a super mining node, is
a new block in blockchain. The commonly used consensus invited to be a witness of a new block using a digital signature
algorithms are Proof of Work (PoW) and Proof of Stake (PoS) generated by public and private key pair. The optimal cluster
6

TABLE II: AI-PoWCA Comparison With Existing Algorithms

Algorithm 51% Attack Long Range Attack DDoS Sybil Attack Energy Consumption Availability for FANET

PoW Resilient Vulnerable Resilient Resilient Very High No


PoS Resilient Resilient Resilient Resilient High No
PoA Resilient Resilient Resilient Vulnerable Low Yes
AI-PoWCA Highly Resilient Resilient Resilient Resilient Very Low Yes

heads selected by IABC act as super mining nodes, and cluster A. Performance Evaluation of IABC
member nodes act as witness nodes in our proposed system. We conduct the experiments on MATLAB R2020 to com-
A 51% attack needs simultaneously attack both super mining pare the performance of our proposed IABC with three well-
nodes and witness nodes to gain hostile takeover. When a new known population-based meta-heuristic algorithms, particle
block is committed, the super mining node broadcasts a new swarm optimization algorithm [18], grey wolf optimization
block in network, and all super mining nodes keep updated algorithm [20], and standard artificial bee colony algorithm
their blockchain ledger. Hence, the proposed algorithm greatly [21]. The effectiveness of the algorithms is evaluated by utiliz-
improves the security of blockchain. ing eight well-known benchmark functions specified in Table
III. The first three functions f1, f2 and f3 with 30 dimensions
and range between [-100,100] are unimodal functions. The
D. Security Analysis
high dimension of unimodal functions can help to examine
In this part, we conduct a security analysis to analyze our the exploitation ability of proposed algorithms. The latter five
proposal. The comparison of AI-PoWCA with PoW, PoS, multimodal functions from f4 to f8 with local optima can
and PoA on attacks, energy consumption, and availability for help to investigate the exploration capability of the algorithm.
FANET is presented in Table II. All experiments were run with 30 population size, and 50
1) 51% Attack: 51% attack refers to an attack in which independent runs. The performance of solution accuracy and
a group of miners controlling over 50% of network mining convergence of these three algorithms on each benchmark
hash rate or computing power to prevent new transactions function is shown in Fig. 4.
from gaining confirmation. The proposed AI-PoWCA is highly In case of unimodal functions from f1 to f3, as illustrated
resilient against 51% attack. The attacker needs to control all in Fig. 4a, 4b and 4c, curve continues downward shift and
super mining nodes and witness nodes because a new block proposed IABC showed better performance in solution ac-
is verified by the witness node as well. curacy and convergence, especially in f1 and f2. In case of
2) Long Range Attack: Long range attack is a scenario multimodal function from f4 to f8, IABC gets global optima
where the attacker creates a new branch on the genesis block rapidly as shown in Fig. 4d, 4e, 4f, 4g and 4h, which shows
and overtakes the main chain. The proposed algorithm is re- that IABC have better exploration ability in the comparison
silient against long range attack because AI-PoWCA maintains with other algorithm, especially the original ABC. These
only the main branch. experiments have verified that IABC is superior in terms of
3) DDoS Attack: DDoS attack takes place when a malicious solution accuracy, convergence and balance in exploration and
node floods a network with extreme traffic. DDoS attack made exploitation to its adversaries.
possible through the centralized feature of the network. The
proposed scheme is decentralized, and numerous UAVs are B. Simulation Environment and Network Analysis
connected with each other in a distributed fashion. The attacker
All the simulation experiments are carried out on NS-
needs to control multiple UAVs at the same time.
3. As listed in Table IV, We adopt the random waypoint
4) Sybil Attack: In this attack, a node attempts to overpower mobility model for 3D mobility of UAVs. We have evaluated
the network through the use of different IDs. The AI-PoWCA the proposed routing scheme in different scenarios in terms
is resilient because all UAVs in the network are required to of UAV node density within an area of 1500m×1500m and
have a genesis block and authorized ID which prevents the a communication range of 300m. The SHA-256 is used as
attacker from introducing unauthorized UAV to the network. the hash algorithm in the blockchain. The performance of
the routing scheme is compared with meta-heuristic based
III. E XPERIMENTS routing schemes AntHocNet [38] and BeeAdHoc [39] in terms
of packet delivery ratio (PDR), end-to-end delay (EED), and
In this section, we present the configuration and results of throughput.
our proposed scheme. We conduct the experiments on PC 1) Packet Deliver Ratio: The packet delivery ratio (PDR)
intel core i5, 1.9 GHz CPU, and 8 GB RAM. We first eval- is a ratio of number of packets delivered in total to the
uate the proposed IABC, then compare the proposed routing total number of packets sent from source node. The PDR
scheme. The experimental code has been made open source is calculated as 𝑃𝑟 /𝑃𝑠 , where 𝑃𝑟 is the total number of
(https://github.com/MuhammadBinSaif/FANET-Routing). packets received and 𝑃𝑠 is the total number of packets sent
7

TABLE III: The Benchmark Functions

Fun Formula Dim Range

𝑥𝑖2
Í𝑛
Sphere 𝑓1= 𝑖=1 30 [-100,100]
Axis Parallel Hyper Ellipsoid 𝑓2=
Í𝑛 2 30 [-100,100]
𝑖=1 𝑖 𝑥𝑖
Í𝑛 Î𝑛
Schwefel 2.22 𝑓3= 𝑖=1 |𝑥𝑖 | + 𝑖=1 |𝑥𝑖 | 30 [-100,100]
 
1 Í𝑛 2 Î𝑛 𝑥
Griewank 𝑓4= 1 + 4000 𝑖=1 𝑥𝑖 − 𝑖=1 cos
√𝑖 30 [-600,600]
𝑖
− 𝑥𝑖2 ) 2 + (1 − 𝑥𝑖 ) 2 ]
Í𝑛−1
Rosenbrock 𝑓5= 𝑖=1 [100( 𝑥𝑖+1 30 [-15,15]
q Í
𝑓 6 = 20 + 𝑒 − 20𝑒𝑥 𝑝 (−0.2 𝑛1 𝑖=1 𝑥𝑖2 ) − 𝑒𝑥 𝑝 ( 𝑛1 𝑖=1
𝑛 Í𝑛
Ackley 𝑐𝑜𝑠 (2 𝜋 𝑥𝑖 )) 30 [-32,32]
Í𝑛 p
Schwefel 2.26 𝑓 7 = 418.9829 × 𝑛 − 𝑖=1 𝑥𝑖 𝑠𝑖𝑛( |𝑥𝑖 |) 30 [-500,500]
( 𝑥𝑖2 − 10𝑐𝑜𝑠 (2 𝜋 𝑥𝑖 ))
Í𝑛
Rastrigin 𝑓 8 = 10𝑛 + 𝑖=1 30 [-15,15]

(a) Sphere (b) Axis Parallel Hyper Ellipsoid (c) Schwefel-2.22 (d) Griewank

(e) Rosenbrock (f) Ackley (g) Schwefel-2.26 (h) Rastrigin


Fig. 4: Convergence curves of IABC, PSO, ABC, and GWO on benchmark functions.

TABLE IV: The Simulation Parameters UAVs, the packet delivery ratio of all schemes climbs up. The
proposed routing scheme outperforms others in PDR, as we
Parameters Values can justify this because of the optimal cluster head selection
and formation of more stable clusters.
Simulator NS-3
Simulation Area 1500m×1500m
Simulation Time 100sec
Mobility Model Random Waypoint 1.00

Number of UAVs 10-80


0.95

Standard IEEE 802.11b


0.90
Packet Delivery Ratio

Packet Size 512bytes


UAV Height 100m 0.85

UAV Speed 20-50m/s 0.80

UAV Transmission Range 300m


0.75
Hash Algorithm SHA-256
0.70

AntHocNet
0.65
BeeAdHoc

Proposed
by source node. As shown in Fig. 5, we compare the PDR 0.60

of our proposed FANET routing strategy with meta-heuristic 10 20 30 40 50 60 70 80

Number of UAVs
based routing schemes,AntHocNet and BeeAdHoc. The graph
illustrated that the proposed routing scheme achieves the
highest PDR up to 90% for all network densities. From Fig Fig. 5: The packet delivery ratio.
5, we can observe that with the increase of the number of
8

260

2.5
240

220
End to End Delay (ms)

2.0

Throughput (kbps)
200
1.5

180

1.0
160

140
0.5 AntHocNet AntHocNet

BeeAdHoc
120
BeeAdHoc

Proposed Proposed
0.0 100
10 20 30 40 50 60 70 80 10 20 30 40 50 60 70 80
Number of UAVs Number of UAVs

Fig. 6: The average end-to-end delay. Fig. 7: The average throughput.

2) Average End-to-End Delay: The end-to-end delay (EED) tionally expensive task. The average processing time of AI-
of each packet is the sum of the delays encountered by the PoWCA is illustrated in Fig. 8, which concludes that as the
transitional node on the way to the destination. The average number of blocks increases the processing time is gradually
EED depends on the sum of the total time taken to the increased.
number of packets received successfully at the destination
node. The efficiency of the network can be measured by the
average EED, which is supposed to be as low as possible.
As shown in Fig. 6, we can observe that the average EED of 100
proposed FANET routing scheme is significantly lower than
compared with other routing schemes this is because the UAVs
80
are distributed in clusters and each cluster head maintains its
cluster which leads to lower overhead messages and EED. It
Time (ms)

can be observed from Fig. 6 that the more number of UAVs 60

interact in network, the higher the bandwidth will be used,


and thus more congestion will occur, meaning that the average 40
EED will increase substantially.
3) Throughput: The throughout is described as an amount 20
of data transferred from source to destination during a time
period. We can observe the real transmission efficiency of 10 20 30 40 50
the network from this metric. Fig. 7 depicts the throughput Number of Blocks

of proposed FANET routing strategy in different scenarios.


We have simulated the proposed routing scheme on differ- Fig. 8: Block processing time.
ent network density and compare with meta-heuristic based
routing schemes AntHocNet and BeeAdHoc to find out the
influence of UAVs density on throughout. From Fig. 7, we
concluded that the network utilize more throughput as network IV. C ONCLUSION
density grows, in which the our scheme achieves the highest In this paper, we proposed a novel cluster-based secure
throughput (249 kbps) in the scenario with 80 UAVs and the routing scheme for FANETs, which intends to simultaneously
lowest (129 kbps) in the scenario with 10 UAVs. deal with the problem of optimal cluster head selection and
4) Block Generation Time: The processing time is the total routing data security. Initially, IABC is presented to balance
time consumed by a super mining node to verify a new block. exploration and exploitation capabilities as well as the con-
Due to resource constrained nature of UAVs, we adopted a vergence rate of standard ABC, and we evaluate performance
distributed trust algorithm proposed in [35], in which number on scalable unimodal and multimodal benchmark functions.
of transactions to be verified in a block is decreases as UAVs The comparison with PSO, GWO, and ABC shows that IABC
build-up a trust table based on number of transactions verified outperforms these existing meta-heuristic algorithms. Further,
and number of transactions rejected of source node by super IABC had been utilized to minimize the fitness function for
mining node. On the other hand, in the classic blockchain we CH selection based on residual energy, reputation, online time,
must verify all transactions inside a block which is computa- connectivity, transactions, and mobility. In addition, we present
9

a lightweight consensus scheme for blockchain which utilizes [19] M. Dorigo, M. Birattari, and T. Stutzle, “Ant colony optimization,” IEEE
the optimal CH for mining, as known as the super mining computational intelligence magazine, vol. 1, no. 4, pp. 28–39, 2006.
[20] S. Mirjalili, S. M. Mirjalili, and A. Lewis, “Grey wolf optimizer,”
node. We also introduce the concept of witness for block ver- Advances in engineering software, vol. 69, pp. 46–61, 2014.
ification to make this scheme highly resilient. Last, extensive [21] D. Karaboga and B. Basturk, “A powerful and efficient algorithm for
experiments are conducted to compare our proposed scheme numerical function optimization: artificial bee colony (abc) algorithm,”
Journal of glo bal optimization, vol. 39, no. 3, pp. 459–471, 2007.
with meta-heuristic based AntHocNet and BeeAdHoc in terms [22] K. Singh and A. K. Verma, “A fuzzy-based trust model for flying ad hoc
of end-to-end delay, packet delivery ratio, throughput, and networks (fanets),” International Journal of Communication Systems,
block processing time, where the results show the proposed vol. 31, no. 6, p. e3517, 2018.
[23] K. Yoon, D. Park, Y. Yim, K. Kim, S. K. Yang, and M. Robinson, “Secu-
scheme is superior in all scenarios and AI-PoWCA takes a rity authentication system using encrypted channel on uav network,” in
fraction of time for block processing. 2017 First IEEE International Conference on Robotic Computing (IRC).
IEEE, 2017, pp. 393–398.
[24] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,”
R EFERENCES Manubot, Tech. Rep., 2019.
[25] N. Kshetri, “Can blockchain strengthen the internet of things?” IT
[1] N. Lin, L. Fu, L. Zhao, G. Min, A. Al-Dubai, and H. Gacanin, “A novel professional, vol. 19, no. 4, pp. 68–72, 2017.
multimodal collaborative drone-assisted vanet networking model,” IEEE [26] C. Peng, C. Wu, L. Gao, J. Zhang, K.-L. Alvin Yau, and Y. Ji,
Transactions on Wireless Communications, vol. 19, no. 7, pp. 4919– “Blockchain for vehicular internet of things: Recent advances and open
4933, 2020. issues,” Sensors, vol. 20, no. 18, 2020.
[2] S. K. Maakar, Y. Singh, and R. Singh, “Flying ad hoc network: A newest [27] E. Barka, C. A. Kerrache, H. Benkraouda, K. Shuaib, F. Ahmad,
research area for ad hoc networks,” in 2019 2nd International Con- and F. Kurugollu, “Towards a trusted unmanned aerial system using
ference on Intelligent Communication and Computational Techniques blockchain for the protection of critical infrastructure,” Transactions on
(ICCT). IEEE, 2019, pp. 298–302. Emerging Telecommunications Technologies, p. e3706, 2019.
[3] J. Shi, L. Zhao, X. Wang, W. Zhao, A. Hawbani, and M. Huang, “A novel [28] V. Sharma, I. You, and G. Kul, “Socializing drones for inter-service
deep q-learning-based air-assisted vehicular caching scheme for safe operability in ultra-dense wireless networks using blockchain,” in Pro-
autonomous driving,” IEEE Transactions on Intelligent Transportation ceedings of the 2017 international workshop on managing insider
Systems, pp. 1–11, 2020. security threats, 2017, pp. 81–84.
[4] L. Zhao, K. Yang, Z. Tan, X. Li, S. Sharma, and Z. Liu, “A novel cost [29] A. Islam and S. Y. Shin, “Buav: A blockchain based secure uav-
optimization strategy for sdn-enabled uav-assisted vehicular computation assisted data acquisition scheme in internet of things,” Journal of
offloading,” IEEE Transactions on Intelligent Transportation Systems, Communications and Networks, vol. 21, no. 5, pp. 491–502, 2019.
pp. 1–11, 2020. [30] M. Sbeiti, N. Goddemeier, D. Behnke, and C. Wietfeld, “Paser: Secure
[5] M. Półka, S. Ptak, and Ł. Kuziora, “The use of uav’s for search and and efficient routing approach for airborne mesh networks,” IEEE
rescue operations,” Procedia engineering, vol. 192, pp. 748–752, 2017. Transactions on Wireless Communications, vol. 15, no. 3, pp. 1950–
[6] T. Yang, Z. Jiang, R. Sun, N. Cheng, and H. Feng, “Maritime search 1964, 2015.
and rescue based on group mobile computing for unmanned aerial vehi- [31] K. Singh and A. K. Verma, “Fctm: A novel fuzzy classification trust
cles and unmanned surface vehicles,” IEEE Transactions on Industrial model for enhancing reliability in flying ad hoc networks (fanets).” Ad
Informatics, vol. 16, no. 12, pp. 7700–7708, 2020. Hoc Sens. Wirel. Networks, vol. 40, no. 1-2, pp. 23–47, 2018.
[7] Z. Sun, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al-Dhelaan, [32] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak, “Blockchain: A
and I. F. Akyildiz, “Bordersense: Border patrol through advanced distributed solution to automotive security and privacy,” IEEE Commu-
wireless sensor networks,” Ad Hoc Networks, vol. 9, no. 3, pp. 468– nications Magazine, vol. 55, no. 12, pp. 119–125, 2017.
477, 2011. [33] W.-f. Gao and S.-y. Liu, “A modified artificial bee colony algorithm,”
[8] M. A. Khan, W. Ectors, T. Bellemans, D. Janssens, and G. Wets, “Uav- Computers & Operations Research, vol. 39, no. 3, pp. 687–697, 2012.
based traffic analysis: A universal guiding framework based on literature [34] H. Wang, Z. Wu, S. Rahnamayan, H. Sun, Y. Liu, and J.-s. Pan, “Multi-
survey,” Transportation research procedia, vol. 22, pp. 541–550, 2017. strategy ensemble artificial bee colony algorithm,” Information Sciences,
[9] X. Chen, C. Wu, T. c. Chen, Z. Liu, H. Zhang, M. Bennis, H. Liu, and vol. 279, pp. 587–603, 2014.
J. Yusheng, “Information freshness-aware task offloading in air-ground [35] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Lsb: A
integrated edge computing,” arXiv, 2020. lightweight scalable blockchain for iot security and anonymity,” Journal
[10] A. Bhardwaj, L. Sam, F. J. Martín-Torres, R. Kumar et al., “Uavs as of Parallel and Distributed Computing, vol. 134, pp. 180–197, 2019.
remote sensing platform in glaciology: Present applications and future [36] P. S. Mann and S. Singh, “Improved artificial bee colony metaheuristic
prospects,” Remote sensing of environment, vol. 175, pp. 196–204, 2016. for energy-efficient clustering in wireless sensor networks,” Artificial
[11] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying ad-hoc networks Intelligence Review, vol. 51, no. 3, pp. 329–354, 2019.
(fanets): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, [37] W. Wang, D. T. Hoang, P. Hu, Z. Xiong, D. Niyato, P. Wang, Y. Wen,
2013. and D. I. Kim, “A survey on consensus mechanisms and mining strategy
[12] D. Saha, P. Wararkar, and S. Patil, “Comprehensive study and overview management in blockchain networks,” IEEE Access, vol. 7, pp. 22 328–
of vehicular ad-hoc networks (vanets) in current scenario with respect to 22 370, 2019.
realistic vehicular environment,” Int J Comput Appl, vol. 975, p. 8887, [38] V. A. Maistrenko, L. V. Alexey, and V. A. Danil, “Experimental estimate
2019. of using the ant colony optimization algorithm to solve the routing
[13] S. Hayat, E. Yanmaz, and R. Muzaffar, “Survey on unmanned aerial problem in fanet,” in 2016 International Siberian Conference on Control
vehicle networks for civil applications: A communications viewpoint,” and Communications (SIBCON). IEEE, 2016, pp. 1–10.
IEEE Communications Surveys Tutorials, vol. 18, no. 4, pp. 2624–2661, [39] A. V. Leonov, “Application of bee colony algorithm for fanet rout-
2016. ing,” in 2016 17th International Conference of Young Specialists on
[14] L. Gupta, R. Jain, and G. Vaszkun, “Survey of important issues in Micro/Nanotechnologies and Electron Devices (EDM). IEEE, 2016,
uav communication networks,” IEEE Communications Surveys Tutorials, pp. 124–132.
vol. 18, no. 2, pp. 1123–1152, 2016.
[15] L. Gupta, R. Jain, and G. Vaszkun, “Survey of important issues in uav
communication networks,” IEEE Communications Surveys & Tutorials,
vol. 18, no. 2, pp. 1123–1152, 2015.
[16] M. Y. Arafat and S. Moh, “A survey on cluster-based routing protocols
for unmanned aerial vehicle networks,” IEEE Access, vol. 7, pp. 498–
516, 2018.
[17] F. Aadil, A. Raza, M. F. Khan, M. Maqsood, I. Mehmood, and S. Rho,
“Energy aware cluster-based routing in flying ad-hoc networks,” Sensors,
vol. 18, no. 5, p. 1413, 2018.
[18] R. Poli, J. Kennedy, and T. Blackwell, “Particle swarm optimization,”
Swarm intelligence, vol. 1, no. 1, pp. 33–57, 2007.

View publication stats

You might also like