You are on page 1of 13

Version of Record: https://www.sciencedirect.

com/science/article/pii/S0140366420319885
Manuscript_bc44becc9690ecd3f64d1b6bf3dc3d71

Lightweight Blockchain Assisted Secure Routing of Swarm UAS


Networking
Jian Wanga , Yongxin Liua , Shuteng Niua and Houbing Songa,∗
a Embry-Riddle Aeronautical University, Daytona Beach, FL, USA

ARTICLE INFO ABSTRACT


Keywords: The prominent capacities of 5G New Radio (5G NR) cellular networking drive the rapid development
5G Cellular Networking of many fields. The ubiquitous implementations of 5G NR cellular networking also provide swarm
Swarm UAS Unmanned Aircraft System (UAS) networking the feasibility of scalable deployment and smart con-
Lightweight Blockchain trol. However, the conveniences derived from 5G NR also bring other vulnerabilities to swarm UAS
Secure Routing networking. The advanced capacities of 5G NR enable attackers to commit disruptive attacks to
Passive Synchronization swarm UAS networking more severely and quickly. The requirement for the security of swarm UAS
networking is imminent.
In this paper, we propose a lightweight Blockchain-based secure routing algorithm for swarm UAS
networking. We leverage the lightweight Blockchain to enhance the security of routing of swarm UAS
networking which is based on 5G NR cellular networking. Different from the conventional routing
algorithms, the proposed algorithm with lightweight Blockchain can avoid the malicious connections
from attackers, recognize the malicious UASs and mitigate the attacks from malicious UASs. Concur-
rently, the proposed algorithm are swarm UAS oriented which aims to extend the deployment of swarm
UAS networking on a large scale. Compared with Proof-of-Work (PoW) and Proof-of-Stake(PoS), we
adopt pheromone to estimate the traffic status of each UAS in swarm UAS networking, construct con-
sensus for swarm UAS networking with Proof-of-Traffic (PoT) and synchronize the updated blocks for
lightweight Blockchain passively under the constraints of energy consumption. The evaluation shows
PoT can reduce the routing consumption in the processes of consensus construction and blocks syn-
chronization. Compatible with the constrained resource of swarm UASs, the lightweight Blockchain-
assisted approach, proposed in this paper, can maintain the efficiency of swarm UAS networking.

1. Introduction extends the range of execution and the complexity of mis-


sion complement. Equipped with different devices in UAS,
The instantaneous evolution of 5G New Radio (5G NR)
swarm UAS is capable to satisfy the mission requirement on
cellular networking fuels many fields (like industrial manu- different scales. Concurrently, the ultra capacities of 5G NR
factures [10], remote health care [31], and cloud education also construct the excellent backbone of swarm UAS net-
[35]) to achieve immense advancement. Compared with the working which enables swarm UASs to deliver feedback in
conventional mobile communication, 5G NR can provide real time and execute intrusions in quick response. With en-
more improvements on ultra low latency [51], efficient spec-
hanced 5G NR, swarm UASs can achieve the robust con-
trum [48], capable traffic [39], dense connections [49], expe-
nections in the inter and intra swarms which enable swarm
rienced throughput [38] and efficient networking [13]. With UASs complete complex missions collaboratively.
the assistance of 5G NR, implementations can improve ef- However, the enhancements derived from 5G NR also
ficient interactions between different platforms and different bring conveniences for attackers to penetrate swarm UAS
devices which can enhance the performance of the imple-
networking which can cause a catastrophic loss for the pub-
mentation in practice. The massive networking capacity can
lic properties and safety. Without secure routings, the at-
enable implementations to deploy on a large scale with man- tackers can leverage a malicious UASs to join swarm UASs.
aged controllability and reliable quality of communication. The access to swarm UAS networking can allow attackers
Simultaneously, the robust networking can be achieved with to play attacks, like eavesdropping, hijacking, and man-in-
the efficient networking and dense connections of 5G NR. the-middle [40]. Once the swarm UAS networking is ma-
The outstanding characteristics of 5G NR stimulate mobile
nipulated by the attackers, the attackers can leverage ultra
communication-based implementations to evolve more scal-
capacities to navigate the compromised swarm UASs rush
able, efficient, collaborative [14]. into restricted areas. With the mobility and the volatile bat-
Swarm Unmanned Aircraft System (UAS) can execute teries, each UAS, under the manipulation of the attacker, in
multiple and complex missions in parallel which can achieve the swarm can be transferred into a flying threat to public
the efficiency and safety for workers, officials, and civil- properties and safety [9]. Thus, a secure routing algorithm
ians. Compared with single UAS and UAS fleet, swarm UAS
is needed to avoid malicious connections from attackers.
∗ Corresponding author The conventional secure routings for swarm UAS net-
WANGJ14@my.erau.edu (J. Wang); LIUY11@my.erau.edu (Y. Liu); working focus on the encryption of packets [15]. The
SHUTENGN@my.erau.edu (S. Niu); Houbing.Song@erau.edu (H. Song) symmetric session key to encrypt the packets which could
http://www.songlab.us/ (H. Song)
achieve the security between the point-to-point communi-
ORCID (s): 0000-0001-6043-6971 (J. Wang); 0000-0003-4527-8623 (Y.
Liu); 0000-0003-2631-9223 (H. Song) cation with the sacrifice of the latency and overhead of the

Jian Wang et al.: Preprint submitted to Elsevier Page 1 of 13


© 2020 published by Elsevier. This manuscript is made available under the Elsevier user license
https://www.elsevier.com/open-access/userlicense/1.0/
Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

system [45]. At the same time, conventional methods can source constraint Internet of Things (IoT) devices and UAS
not avoid re-display attacks in communication. The deploy- networking. Thus, we also present the literature review of
ment of swarm UAS networking on a large scale requires lightweight Blockchain in this section briefly.
the distributed security to defense the attacks from malicious
UASs. The distributed security requires the conventional ap- 2.1. Blockchain assisted UAS
proaches afford much computational resource allocation and The advantage of convenient controllability stimulates
communication resource consumption which poses an im- civilian and industrial implementations to deploy UASs on
mense challenging for the current secure approaches. Most a large scale. However, the vulnerabilities to attacks slug-
importantly, the conventional methods can not satisfy the re- gish the processing of UAS deployment. With immutabil-
quirement of energy efficiency and scalable deployment. ity and data integrity, many researchers attempted to explore
In this paper, we leverage a lightweight Blockchain to the feasibility and potentials of Blockchain on the enhance-
assist swarm UASs to improve the security of routing. With ment of security of UASs. The majority of research con-
lightweight Blockchain, swarm UASs can prevent the ma- siders Blockchain as static storage which contains sensitive
licious UAS connection to swarm UAS networking, rec- information. The Blockchain is implemented to support au-
ognize the malicious UASs in swarm and mitigate the at- thentication. The main advantages of static Blockchain can
tacks from malicious UASs. Different from the conventional maintain the integrity of the data and improve the efficiency
consensus constructions, our contribution is that we lever- of the authentication processing. Integrity and distribution
age pheromone to estimate the traffic status of each UAS provide the security of data transmission and storage.
in swarm UAS networking. Based on the traffic status, the With the motivation of avoidance of modification of link
swarm UAS networking constructs consensus with Proof-of- data for marine surveillance, The authors deployed verifi-
Traffic (PoT). Different from Proof-of-Work (PoW), Proof- cation information distributively on the ground control cen-
of-Stake (PoS), we synchronize the updated blocks with pas- ter. UASs with a connection can access the identification
sive broadcast which can reduce the additional routings un- storage on the server to verify each boat in the surveillance
der the energy constraint swarm UAS networking. The eval- sea area [17]. However, the vulnerability of this approach
uation shows PoT can reduce the routing consumption in is that it will lead to catastrophic loss once UAS is compro-
the processes of consensus construction and blocks synchro- mised to attackers. The security of data sharing is important
nization. In this paper, we leverage passive broadcast to re- that can prevent malicious access to swarm UAS networking.
duce the burden of energy consumption and computational Based on this requirement, the authors, in [24], proposed
resource allocation for the swarm UAS networking. With a Blockchain based architecture which can be implemented
PoT updating, UAS in swarm UAS networking can reduce into the distributed business system to improve the security
the consumption on the priority competition for the blocks of data sharing. The threat from data is not limited to the
generation. Compatible with the constrained resource of sharing but also includes data acquisition. The swarm UAS,
swarm UASs, the lightweight Blockchain-assisted approach as the powerful tools for gathering data from IIoT devices,
proposed in this paper can maintain the efficiency of swarm can save many labors and energy consumption. In [20], the
UAS networking. authors presented a Blockchain based exploration of secu-
The paper is organized as follows: Section I presents our rity and data integrity on data acquisition of IoT devices
motivation and contributions. Section II illustrates the re- via swarm UASs. The UASs in swarm leverage 𝜋 − ℎ𝑎𝑟𝑠ℎ
lated work of Blockchain on UASs. Section III describes the bloom filter to verify the identity of IoT devices and upload
methodology of our proposed approach. Section IV presents the collected data derived from authenticated IIoT devices to
the evaluation of the proposed methodology. Section V con- servers. The server adds the collected data into Blockchain.
cludes the paper. Different from [20], the authors, in [19], leverage UASs to
collect data generated from IIoT devices and stored the col-
lected data in Blockchain at Mobile Edge Computing (MEC)
2. Related Work server. The main flaw of this approach that it is vulnerable
With the advantages of immutability and data integrity, to injection attacks when the UAS decrypts the data with-
Blockchain as a promising technology has been imple- out the identification of IIoT devices. To mitigate the cy-
mented in many fields to improve security and efficiency. ber threats and data integrity, the authors leverage UAS to
Apart from the outstanding implementation of cryptocur- collect the data derived from wearable devices on the users
rency, Blockchain also plays an important role in improving and upload it with MEC to the cloud. Thereafter, the cloud
the security and efficiency of UASs, networking, Indus- stores the collected data into Blockchain [18]. Another at-
trial Internet of Things (IIoT) which is considered as the tempt, in [5], aims to provide an efficient Blockchain-as-a-
promising core technology to construct the Cyber Physical Service (BaaS) support for IIoT applications. The authors
System (CPS). In this section, we mainly exhibit the re- leverage the Blockchain to store the data generated from IIoT
lated work of Blockchain which obtains Blockchain assisted devices. The data collected from IIoT devices is recorded as
UAS, Blockchain enhanced Networking. Based on the over- a mining task, and the Blockchain peer decides how to pro-
head consumption and memory constraints, lightweight cess tasks, verify tasks, and transaction records according to
Blockchain is implemented to be compatible with the re- energy consumption [3]. The Blockchain server is the core

Jian Wang et al.: Preprint submitted to Elsevier Page 2 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

of the architecture of the IIoT system with the Baas-MEC 2.2. Blockchain enhanced Networking
support process and verifies the compute-intensive mining Networking is critical to the performance of swarm UAS.
tasks of the peers. The authors, in [41], leverage consortium The quality of performance of swarm UAS is dependent
Blockchain to establish the distributed shared database to on the efficient packets delivery and intrusion execution
minimize computational consumption. In the computation- in time which is based on networking capacities deeply.
intensive stages, MEC assists in Blockchain creation and Efficiency, reliability, and resilience are pivotal factors to
verification. evaluate networking. With the unique characteristics of
The above shows Blockchain can protect the data in- Blockchain, many researchers explored the potential of en-
tegrity with the advantage of immutability effectively and hancement on networking. The natural architecture of net-
securely. There is another branch aiming to extend the au- working for Blockchain is Peer-to-Peer (P2P) which poses
thentication of swarm UASs by storing identification into the an immense challenge for the implementations on differ-
blocks of Blockchain. ent architectures of networking. However, there are still
To prevent malicious joint of swarm UASs access, the many researchers exploring the feasibility of Blockchain on
authors, in [27], tried to enhance the trust of named data other architectures. In this section, the following parts aim
networking-based Fly Ad hoc Networking (FANET) and at 1) routing of Blockchain; 2) Blockchain assisted Vehi-
mitigate content poisoning. They stored the interest content cle Ad hoc Networking (VANET) and Mobile Ad hoc Net-
and identification of UAS into Blockchain. Once the simi- working (MANET). The networking research of Blockchain
lar interest content is detected, the content will be delivered mainly focuses on the routing enhancement and assistance
to the ground station to verify the source and the interest- of VANET. The implementations of Blockchain on routing
ing content. If the content is from the attackers, the source enhancement and assistance of VANET are an important ref-
will be recorded and alarm to the system to bind the pack- erence for the exploration of Blockchain based FANET en-
ets from the source. In [21], the authors utilized the hyper hancement. FANET enhancement of Blockchain is exhib-
ledgers to store validation of UAS into Blockchain which ited on the above, the following will mainly present the ex-
can authenticate the UAS with mobile ground stations. The ploration of VANET and MANET.
UAS without verification in the Blockchain can not access
swarm networking. Inspired by randomness improvement, 2.2.1. Routing of Blockchain
in [42], the authors added the intrusions and GPS informa- The routing of Blockchain mainly focuses on the net-
tion into Blockchain to surveillance the operation and sta- working routing of Blockchain and Blockchain to enhance
tus perpetually. Authenticated by Blockchain on the cloud, networking routing. The previous one focuses on the im-
the information can be delivered between ground stations provement of routing algorithms on the security and effi-
and UAS. Association with perpetual connections and re- ciency of Blockchain deployment. The latter focuses on the
liable topologies decreases the security and efficiency of hi- implementation of Blockchain on the enhancement of differ-
erarchical networking. In [44], the authors bundled differ- ent architectures of networking.
ent systems into multiple Blockchains to improve the secu- The main problems for Blockchain deployment are scal-
rity of drone caching through users via MEC and optimized ability and synchronization. In terms of the two problems,
the multiple Blockchains with neural networking. The sim- the efficient and light routing algorithms are implemented to
ulation shows that the approach can improve the probability the P2P networking to extend the capacities of Blockchain.
of connectivity to 0.9900 and decrease energy consumption With the motivation of improvement in synchronization and
to 0.6034. Different from implementations of storage, the minimum of the processing and transmission delay through
authors consider the UAS and ground devices as nodes in reduced duplicated transmissions, the authors, in [30], ap-
Blockchain and chain the devices to maintain the integrity plied the minimum spanning tree to reduce the routing cost
of the whole system. Based on the resilience of Blockchain, for nodes communication. Different from the P2P network-
the authors leverage Blockchain, constructed by ground con- ing, the packets are transmitted through multiple hops to
trol station, to store group keys and manage the membership achieve less latency between nodes’ broadcast. Similar work
certificates of FANET. Based on longest-lost-chain mecha- in [12], the authors propose a consensus of first-leader-then-
nism and collaboration of neighbors, nodes on the network- block, before the leader constructs blocks in Blockchain net-
ing can recover the lost blocks underneath different attack working, the credential of the leader is validated by the
models effectively [29]. clients [16]. Thereafter, the leader builds the block into
Indeed, Blockchain can improve the security and the ef- Blockchain with optimized routings in the Blockchain net-
ficiency of swarm UAS networking and system. However, working which could mitigate the duplication of message
most implementations need servers to store identification. broadcast and reduce the risk of Denial of Service (DoS) at-
The mechanism requires high quality communication be- tacks. To improve the acceptance ratio of transactions with
tween swarm UASs and ground terminals in real time. This low routing overhead, the authors proposed a hash timelock
poses an immense challenging for the construction of relia- contract to improve the security of the P2P transaction. In
bility and flexibility for 5G NR cellular communication and the routing, the mechanism will punish the nodes who are
deployment of swarm UAS networking on a large scale. dishonest and refuse to forward packets to next hops [52].
Different from [52], the authors, in [53], constructed two

Jian Wang et al.: Preprint submitted to Elsevier Page 3 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

payment paths to improve the success rate for payment via malicious vehicles in VANET need to be marked and mit-
P2P. With the modification of the hash timelock contract, the igated to improve the security of users and public proper-
transaction has one more flexibility of cancellation. ties. The combination of trustworthiness and attributes of
Blockchain enhanced routing has the advantages of im- vehicles is encrypted into Blockchain to provide the tamper-
mutability and distribution. With awareness of latency, the resistant and traceable services for authentication between
author studied the round trip time measurement for inter- vehicles to infrastructures [47]. However, the conventional
domain networking. The round trip time could be utilized key management relies on distributed k-anonymity of ve-
to validate the anomalies of two-side data integrity [4]. The hicles in VANET which has high possibilities of causing
measurement is stored in the blocks of Blockchain. Simi- privacy leakage and the trustworthiness of participants lost.
lar methodology like [4], the authors deployed Blockchain Based on this flaw, a Blockchain based behavior tracer is im-
to validate the prefix of border gateway broadcast and mark plemented to store the historical behaviors and identify the
the bogus routings to mitigate the risk of DoS attacks in malicious vehicles in VANET [34] and the evaluation shows
blocks of Blockchain. Blockchain as a database stores the the tracer can mitigate the malicious vehicles in VANET ef-
routing report which is considered as a reference to evaluate fectively.
the reliability and reputation of the router. The routers with a Different from VANET, MANET is a constraint with its
low reputation will be marked and isolated to eliminate the limited computational resources and low throughput of net-
threat of attacks [28]. Information on the whole network- working which is sluggish for researchers to deploy effec-
ing is stored into the Blockchain which allows all nodes to tive Blockchain on a large scale. The prominent researches
access. The nodes can calculate a routing which is less traf- mainly concentrate on routing and security data collection.
fic load and interference [26]. Securing users’ capsule from The absence of trustworthiness and reputation of partic-
cross-side channel attacks, Blockchain stores request from ipating nodes in MANET can cause unreliable handover
senders which can authenticate the identity of the senders. which is severe to the security of MANET. As an indica-
With authentication, the senders can access the specific host tor of malicious levels, the behaviors of routers is recorded
capsule on the cloud [37]. into Blockchain and quantified with reputation. The iden-
The conventional approaches of Blockchain are con- tified malicious routers will be removed and isolated from
strained of synchronizations which require extra computa- MANET [8]. Based on the immutable transaction, the his-
tional resource allocation and overhead of system to broad- tory of routing discovery of collecting data in MANET is
cast the new generated blocks that also is a prominent flaw stored in Blockchain. Mixed with secure tag, each success-
in the deployment on the mobile devices, especially swarm ful routing discovery is available, reliable, and secure in
UAS. The lightweight blockchain methods compatible with Blockchain. Without authentication, the nodes can not ac-
compact UAS on a large scale are required. cess the routing information which can avoid re-display at-
tacks efficiently [32]. Blockchain can provide outstanding
2.2.2. Blockchain assisted VANET and MANET storage services for MANET to maintaining security and pri-
With the ubiquitous of automatic self-driving, VANET vacy. However, the current researches still need to meet the
construction is becoming pivotal to the safety and security challenge between constraint resources and synchronization
of the automobiles. The 5G NR deployment on a large scale on a large scale.
stimulates the development of VANET. The majority of re- Blockchain implementations on VANET and MANET
search efforts focus on the improvement of security and effi- provide pioneering experiences for the deployment on the
ciency. However, synchronization is a challenge for the de- swarm UAS networking on a large scale securely. Due to
ployment of Blockchain on VANET. Meanwhile, the mobil- the power supplements of VANET and MANET are higher
ity of VANET decreases the reliability of Blockchain. With than FANET, the necessities for the lightweight blockchain
the improvement of security and trust on the vehicular IIoT, are not urgent. The development of blockchain implemen-
trust evaluation based on Proof-of-Stake (PoS) is imple- tations on VANET and MANET can stimulate the evolution
mented to manage the Blockchain generation. The vehicle of blockchain implementations of FANET partially.
with a priority of management of the Blockchain can collect
the road information and store it into the Blockchain which 2.3. Lightweight Blockchain
can be reliable proof for the investigation of traffic accidents The conventional Blockchain deployment has over-
[50]. The mobility of VANET has a significant effect on the whelmed requirements of computational resources and
new block generation of Blockchain. In [25], the authors in- synchronization to the system which is hard to embed
vestigated the effect of the interval of rendezvous of VANET Blockchain into the IIoT devices. The constrained com-
on the Blockchain generation. The results show that the con- putational resources and lifetime stimulate the evolution of
tention window size in the Blockchain. In VANET, trustwor- lightweight Blockchain. With remaining of the main back-
thiness is important to the security and privacy of users. The bone of Blockchain, currently, the majority of researches
common methods of privacy management are to keep the focuses on performance decreasing and functionality de-
users’ public key and smart contract in Blockchain automat- creasing.
ically [36]. With optimized synchronization of Blockchain, The performance decreasing focuses on the reduce of
the credentials of vehicles can be achieved [33]. Further, computational resources and synchronization frequency to

Jian Wang et al.: Preprint submitted to Elsevier Page 4 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

achieve the balance between the security and energy con-


sumption of IIoT devices [2]. Based on the data integrity
of IIoT communication, the miner of Blockchain is simpli-
fied to maintenance consensus in honest parties which aims
to manipulate the whole nodes in networking [22]. With
reduced synchronization frequency and minimum intrusion
execution space, the lightweight Blockchain based IIoT de-
vices can achieve efficiency and security [43]. The conven-
tional Blockchain needs to consume many computational re-
sources on PoW. The elimination of PoW can reduce the re-
quirement of Blockchain and is suitable for the deployment
of IIoT devices [46].
Different from performance decreasing, the functional- Hop Source UAS Destination UAS Malicious UAS
ity decreasing focus on lowing the computational burden on
embedded devices. The embedded devices afford the data Figure 1: Attackers in Swarm UAS Networking
collection and verification processing, and the computation
and storage tasks are completed on the clouds [6]. With op-
timized communication cost and adjustable updating period, UAS networking. To simplify the processing of computa-
the lightweight Blockchain can improve the quality of com- tion, we propose a novel consensus construction which can
munication and privacy of IIoT devices [11]. Another at- achieve better efficiency than PoW and PoS. We utilize the
tempt is on consensus construction. A consortium consen- traffic states of each UAS, marked by pheromone, to esti-
sus is applied in the lightweight Blockchain generation. Re- mate the authority of each UAS. Based on the traffic status,
placed with simplified Proof-of-Authority (PoA), the IIoT the swarm UAS networking constructs consensus with PoT.
devices can execute the lightweight Blockchain effectively To save routing construction, PoT synchronizes the updated
and efficiently [1]. A Proof of Block and Trade (PoBT) con- blocks with the passive broadcast. The specification of the
sensus is implemented to reduce the computation time and proposed approach is as follows.
memory requirements for IIoT devices [7].
The lightweight Blockchain can improve data integrity, 3.1. Problem Statement
efficiency, and overhead reduction on IIoT devices. Both The performance of the mission complement of swarm
performance decreasing and function decreasing are two UAS is dependent on the quality of swarm UAS networking
promising approaches [23] to improve the deployment of seriously. Each intrusion and captured data can be deliv-
IIoT devices. However, there are still more specific opti- ered to the destination efficiently which relies on the swarm
mizations to need to pursue to adapt to different scenarios. UAS networking effectiveness. As Figure 1 shows, swarm
Corresponding to the different power supplement require- UAS can achieve an immense swarm to finish the mission
ment, the adaptive balance between blockchain generation which has a requirement of complexities and simultaneous-
and abortion is required to release the burden of storage ness. The ubiquitous deployment of swarm UAS accelerates
space and efficiency, computational resource allocation, and the efficiency of civilian development and industrial produc-
communication efficiency in real time and periodical aggre- tion. Concurrently, swarm UAS enables human beings to
gations. finish missions with remote control in some poisonous envi-
ronments and safety absence scenarios.
However, once the attacker scatters malicious UAS into
3. Methodology the swarm UAS which can lead to a catastrophic loss for the
Enhanced with 5G NR, swarm UAS networking can controllers. The malicious UAS can play attacks (eavesdrop-
achieve more capacities of throughput, latency, robustness, ping, injection, man-in-the-middle, etc.) to manipulate the
and spectrum efficiency. The advantages of swarm UAS net- swarm UAS networking. The malicious UAS in the swarm
working also provide conveniences to attackers to penetrate (as Figure 1 shows) refuse to deliver packets which can de-
the swarm UAS networking more severely. With the manip- crease the bandwidth, throughput, and robustness of routing
ulation of swarm UAS networking, the attackers can trans- between the source and destination. Further, the malicious
fer the UAS in swarm into malicious threats to the public can transmit malicious packets to mislead the normal UAS
properties and safety. The secure and robust swarm UAS commit aggressive motion to disrupt the whole mission of
networking is urgent to construct to mitigate the threat of swarm UAS.
attackers. In this section, we aim to propose a novelty ap- It is critical to recognize the malicious UAS in the swarm
proach to implement lightweight Blockchain to swarm UAS and prevent the access of malicious UAS into swarm UAS
networking which can improve the security and efficiency packets delivery. The normal UAS in the swarm UAS net-
of swarm UAS networking. Constrained with the limited working needs to block the packets derived from the ma-
energy consumption and computational resource, the con- licious ones to maximize the elimination of injection from
ventional Blockchain is hard to implement into the swarm attackers. With the beamforming of 5G NR, the UAS in the

Jian Wang et al.: Preprint submitted to Elsevier Page 5 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

swarm can deliver the packets to the desired UAS with beam
steering. The secure hops of routing can prevent the mali-
cious UAS eavesdrop and inject the packets delivered be-
tween normal UAS. Thus, the routing problem of the swarm
UAS networking is converted to a secure hop selection. At
the same time, the joining UAS from the outer swarm needs
authentication to assure its identification. The conventional
Blockchain approaches are static storage in the swarm UAS
which distributed all the information in the all swarm which
needs many computational resources to broadcast the up- Hop with
dated blocks. And also, if one UAS in the swarm is com- Pheromone Source UAS Destination UAS Malicious UAS
promised to the attackers which have high possibilities of
identification leakage and manipulation of attackers. The at-
Figure 2: Security Routing of Swarm UAS Networking
tackers can utilize the brutal methods to explore the secrets
of each block information which is sensitive to the privacy
of ground controllers.
to the last 𝑢𝑛 is less than 𝜋. For the next hops of 𝑢𝑠𝑜𝑢𝑟𝑐𝑒 :
3.2. Blockchain Assisted Secure Routing 𝑈(𝑠𝑜𝑢𝑟𝑐𝑒, ℎ𝑜𝑝𝑠) = {𝑢𝑛 | 𝜃(𝑉⃖⃖⃖⃖⃖⃖⃖⃗, 𝑉⃖⃖⃖⃖⃖⃖⃖⃗) ≤ 𝜋} (2)
To achieve secure routing for swarm UAS networking, (𝑠, 𝑑) (𝑠, 𝑛)

we leverage the lightweight Blockchain to secure the rout- Thereafter, the next hops, 𝑈(𝑛, ℎ𝑜𝑝𝑠) , for 𝑢𝑛 is :
ing hops selection in the swarm UAS networking. Different
from the conventional Blockchain implementations, we con- 𝑈(𝑛, ℎ𝑜𝑝𝑠) = {𝑢𝑛 | 𝜃(𝑉⃖⃖⃖⃖⃖⃖⃖⃗, 𝑉⃖⃖⃖⃖⃖⃖⃖⃖⃖⃖⃗) ≤ 𝜋} (3)
(𝑠, 𝑑) (𝑛, 𝑛+1)
sider each UAS, 𝑢𝑛 , as a block container in Blockchain which
obtains its whole detailed identification, 𝐼𝑛 , for verification With bundle hops for selection, 𝑢𝑛 needs to select the
and block digests, 𝐻𝑁 , of the whole Blockchain for authen- next secure hops from 𝑈(𝑛, ℎ𝑜𝑝𝑠) . 𝑢𝑛 checks the block digest
tication. record from 𝐻𝑁 . The next 𝑢𝑛 in 𝑈(𝑛, ℎ𝑜𝑝𝑠) with record 𝐻𝑛
can be selected for the next secure hop. The malicious UAS

𝑁
and the unauthenticated UAS will not be selected as the next
𝐻𝑁 = 𝐻𝑖 , 𝐻𝑖 ∈ {𝑢𝑛 | 𝑢𝑛 ∉ 𝑈𝑚 } (1)
hops.
𝑖=1

Here, 𝑈𝑚 is a set of malicious UAS in recognition; 𝑢𝑛 is each 𝑈(𝑛, ℎ𝑜𝑝𝑠) = {𝑢𝑛 | 𝑢𝑛 ∈ 𝑈𝑛𝑒𝑖𝑔𝑏𝑜𝑟𝑠 − 𝑈𝑚 } (4)
UAS 𝑛, in swarm 𝑈𝑛 . 𝐻𝑖 is each block digest of Blockchain Each time, 𝑢𝑛 updates the mark of the next-hop with
for the current swarm UAS. This information is stored in pheromone 𝑃 ℎ𝑛 (shown as Figure 2) derived from the suc-
flash memory previously before UAS is taking off. We as- cessful routing and packet delivery. The pheromone stim-
sume attackers can not compromise the UAS is joining the ulation 𝜏 is dependent on the latency of 𝑙𝜏 of each routing.
swarm UAS networking. Due to the characteristics of beam- The next-hop with the highest pheromone indicates the 𝑢𝑛
forming of 5G NR, the power leakage on the side lopes is has more busy traffic which is updated frequently and hard
suppressed theoretically which can be neglected. In our as- to be compromised.
sumption, without directional transmission, the malicious
UAS can not recover the signal with side lopes leakage of ∑
𝑚

beamforming. 𝑃 ℎ𝑛 ← (1 − 𝛼) × 𝑃 ℎ𝑛 + △𝑃 ℎ𝑛 (5)
As Figure 2 shows, each UAS in the swarm, delivers 𝑘=1

packets to its neighbors, 𝑈𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 , directly with beamform- Here, 𝛼 is decay parameter of pheromone, 𝛼 ∈ (0, 1).
ing. The neighbors selection, 𝑈ℎ𝑜𝑝𝑠 , is based on the desti- and △𝑃 ℎ𝑛 is:
nation, 𝑢𝑑𝑒𝑠𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛 , and the record of digest in Blockchain,
1
𝐻𝑁 , which is stored on the flash memory. 𝑢𝑑𝑒𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛 ∈ 𝑈𝑛 . △𝑃 ℎ𝑛 = (6)
The source UAS, 𝑢𝑠𝑜𝑢𝑟𝑐𝑒 in Figure 2, sends Routing Request 𝑙𝑛
(RREQ) to 𝑢𝑑𝑒𝑠𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛 for constructing routings for com- With less latency, the hop is prone to be selected easily which
munication. 𝑢𝑠𝑜𝑢𝑟𝑐𝑒 ∈ 𝑈𝑛 . Apparently, 𝑢𝑛 acquire loca- also indicates 𝑢𝑛 obtains the more busy traffic in the local net-
tions of other UAS with Automatic Dependent Surveillance- working. The 𝑢𝑛 with the highest pheromone is the critical
Broadcast (ADS-B). Thus, 𝑢𝑠𝑜𝑢𝑟𝑐𝑒 can achieve the directions factor for the next authentication of the joining UAS.
of broadcast for RREQ, 𝑉 (𝑠, 𝑑) . 𝑉(𝑠, 𝑑) is the vector from
⃖⃖⃖⃖⃖⃖⃖⃖⃖
⃗ ⃖⃖⃖⃖⃖⃖⃖⃖⃖⃗ The specific routing processing is shown as the pseu-
𝑢𝑠𝑜𝑢𝑟𝑐𝑒 to 𝑢𝑑𝑒𝑠𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛 geographically. Based on 𝑉 docode of Algorithm 1.
(𝑠, 𝑑) , 𝑢𝑠𝑜𝑢𝑟𝑐𝑒
⃖⃖⃖⃖⃖⃖⃖⃖⃖

can select 𝑢𝑛 which fall in the direction of 𝑉 (𝑠, 𝑑) . In the space
⃖⃖⃖⃖⃖⃖⃖⃖⃖

3.3. Blockchain based Authentication
definition, we assume the searching space is 𝜋, which means Blockchain based authentication has shown its immense
the next 𝑢𝑛 fall in the space with the vector 𝑉 (𝑠, 𝑛) that directs
⃖⃖⃖⃖⃖⃖⃖⃖⃖

potential to improve the security and efficiency of authen-
tication. Compared with the conventional authentications,

Jian Wang et al.: Preprint submitted to Elsevier Page 6 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

Algorithm 1 The Next Secure Hops Selection


1: procedure N EXT H OP S ELECTION (𝑈(𝑛, ℎ𝑜𝑝𝑠) )
2: 𝑢𝑛 ← 𝑅𝑅𝐸𝑄;
3: 𝑢𝑛 ← 𝑠𝑜𝑢𝑟𝑐𝑒_𝐼𝐷;
4: 𝑢𝑛 ← 𝑑𝑒𝑠𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛_𝐼𝐷;
5: 𝑢𝑛 ← 𝑉 ⃖⃖⃖⃖⃖⃖⃖⃖⃖⃗
(𝑠, 𝑑) ;
6: 𝑢𝑛 ← 𝑈𝑛𝑒𝑖𝑔𝑏𝑜𝑟𝑠 ;
7: if 𝜃(𝑉⃖⃖⃖⃖⃖⃖⃖⃗,𝑉⃖⃖⃖⃖⃖⃖⃖⃖⃖⃖⃗) ≤ 𝜋 𝑎𝑛𝑑 𝑢𝑛+1 ∈ 𝐻𝑁 then
(𝑠, 𝑑) (𝑛, 𝑛+1)
8: 𝑈(𝑛, ℎ𝑜𝑝𝑠)←𝑢𝑛+1 ;
9: end if
10: 𝑅𝑅𝐸𝑄 → 𝑈(𝑛, ℎ𝑜𝑝𝑠) ;
11: 𝑢𝑛 ← 𝑙1 ;
𝜏
1
12: △𝑃 ℎ𝑛 ← △𝑃 ℎ𝑛 + ; Figure 4: Operation of Authentication for Swarm UAS Net-
𝑙𝜏
13: 𝑃 ℎ𝑛 ← (1 − 𝛼) × 𝑃 ℎ𝑛 + △𝑃 ℎ𝑛 ; working
14: end procedure

joining UAS, 𝑢𝑗𝑜𝑖𝑛 . After authentication of joining UAS, the


Blockchain will distribute the updated block digests to the
whole swarm UAS networking with the proposed synchro-
nization approach.
Joining UAS
As illustrated in Figure 3, a new UAS, 𝑢𝑗𝑜𝑖𝑛 , is going
to join the swarm UAS networking. At beginning, 𝑢𝑗𝑜𝑖𝑛
sends joining networking request, 𝑅𝑄𝑗𝑜𝑖𝑛 , to the UAS (de-
noted as 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 ) which is located in the edge of swarm
UAS. After receiving 𝑅𝑄𝑗𝑜𝑖𝑛 , 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 broadcasts 𝑅𝑄𝑗𝑜𝑖𝑛 to
its own neighbors, 𝑈𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 , with Hashed TimeLock Con-
Packet Delivery Message UAS Verification UAS Judge UAS
tract (HTLC), 𝜔 and signature of 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 . 𝑈𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 re-
turned its 𝑃 ℎ𝑛 within HTLC. We set HTLC at 0.01 sec-
Figure 3: Consensus Construction for Joining Swarm UAS
onds for the jointing UAS to give a response. The 𝑢𝑛 , de-
Networking
noted 𝑢𝑗𝑢𝑑𝑔𝑒 , with the most 𝑃 ℎ𝑛 is selected by 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 as
the authority to judge the joining event. 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 sends con-
firmation of judge selection to 𝑢𝑗𝑢𝑑𝑔𝑒 . With signed of reply,
Blockchain based approaches show more outstanding on the 𝑢𝑗𝑢𝑑𝑔𝑒 sends the random selection authentication number, 𝜁 ,
immutability and the distribution. However, the require- to 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 and request the random selection blocks speci-
ments of computational resource and synchronized network- fication 𝑅𝑄𝑎𝑢𝑡ℎ𝑒𝑛𝑡𝑖𝑐𝑎𝑡𝑖𝑜𝑛 of the verification UAS, 𝑢𝜁 , in the
ing for the performance of Blockchain decelerate the pro- swarm UAS. 𝑢𝜁 encrypts 𝐼𝜁 and timestamp, 𝑡𝜁 , with 𝑢𝑗𝑢𝑑𝑔𝑒 ’s
cessing of Blockchain deployment on the tiny and ubiqui- public key 𝑃𝑢𝑗𝑢𝑑𝑔𝑒 . With the routing from 𝑢𝑗𝑢𝑑𝑔𝑒 to 𝑢𝜁 , 𝑢𝜁 re-
tous embedded devices on a large scale. The challenge of
turns the encrypted verification to 𝑢𝑗𝑢𝑑𝑔𝑒 . 𝑢𝑗𝑢𝑑𝑔𝑒 decrypts the
Blockchain deployment on a large scale derives from the
verification with its own secret key, 𝑆𝑢𝑗𝑢𝑑𝑔𝑒 . After receiving
consensus construction and the synchronization of blocks.
𝜁 , 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 relays the number to 𝑢𝑗𝑜𝑖𝑛 with request of block
In this section, we will propose a novel consensus
digest, 𝐻𝜁 , of Blockchain. 𝑢𝑗𝑜𝑖𝑛 extracts 𝐻𝜁 and timestamp,
construction and synchronization to achieve lightweight
𝑡𝑗𝑜𝑖𝑛 and sends the packet to 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 . After verifying the
Blockchain which is compatible with the computation-
timestamp within HTLC, 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒 attaches its own signa-
constrained and synchronization-limited networking, swarm
ture with the packet and transfers it to 𝑢𝑗𝑢𝑑𝑔𝑒 . The 𝑢𝑗𝑢𝑑𝑔𝑒
UAS networking. The lightweight Blockchain is also the
digests 𝐼𝜁 to 𝐻𝜁′ , and compare 𝐻𝜁 and 𝐻𝜁′ . If 𝐻𝜁 and 𝐻𝜁′
main support of secure routing for swarm UAS network-
ing. Due to the characteristics of UAS, swarm UAS net- match, 𝑢𝑗𝑢𝑑𝑔𝑒 sends authentication confirmation to 𝑢𝑚𝑒𝑠𝑠𝑎𝑔𝑒
working can not afford the requirement of infinite compu- and 𝑢𝑗𝑜𝑖𝑛 . 𝑢𝑗𝑜𝑖𝑛 sends its own 𝐻𝑗𝑜𝑖𝑛 and to 𝑢𝑗𝑢𝑑𝑔𝑒 for broad-
tation resources and high synchronization. The lightweight cast. Each traffic through 𝑢𝑗𝑢𝑑𝑔𝑒 will be attached with 𝐻𝑗𝑜𝑖𝑛
Blockchain is urgent to implement to improve the scalability for broadcast. each communication, 𝑢𝑛 checks 𝐻𝑁 and up-
and the security of swarm UAS networking. dates 𝐻𝑁 ′ . The specific operation map is shown as Figure 4.

As mentioned in subsection 3.2, different from the con-


ventional Blockchain distributions, we consider each UAS For attackers to brute force the authentication, they need
as a block in Blockchain. Each UAS stores its own spe- to catch all the information of the Blockchain which is as-
cific identification, 𝐼𝑖 , and the block digest of the whole sumed not to leakage to attackers. The possibilities for at-
Blockchain, 𝐻𝑁 . Blockchain is extended based on the new tackers to get through authentication randomly for each at-

Jian Wang et al.: Preprint submitted to Elsevier Page 7 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

Table 1 Table 2
Maximum Attacking Probability For Each Encryption Type Parameters of Swarm UAS Configuration
𝜂𝜁 (bits) 64 128 256 512 Swarm Distribution Space 100 m * 100 m * 5 m
𝑃 𝑟𝑏𝑟𝑢𝑡𝑒𝐹 𝑜𝑟𝑐𝑒 1.8070𝑒−20 9.7958𝑒−40 2.8787𝑒−78 2.4861𝑒−155 Speed 10-15 𝑚∕𝑠
Transmission Range 15 m
Transmission Protocol UDP
tempt: Latency of Legitimated UAS 100 𝑢𝑠
1 Latency of Malicious UAS 300 𝑢𝑠
𝑃 𝑟𝑏𝑟𝑢𝑡𝑒𝐹 𝑜𝑟𝑐𝑒 = (7) Bandwidth 2 𝑀𝑏𝑝𝑠
𝑁 × 2 𝐻𝜁
Routing Algorithm AODV
The attackers need to guess the specific digest of Blockchain Evaluation Runs 10000
𝐻𝜁 which is hashed with 𝜂𝜁 bits. At the same time, within Each Evaluation Time 20 s
𝜔, the attackers need to obtain powerful computational re-
sources to find the digest of 𝐻𝜁 . The maximum probabilities
of attacking to Blockchain is shown as Table 1.
For the synchronization of Blockchain, we adopt a pas-
sive approach to broadcast the updated blocks with the com-
munication of the swarm UAS networking. The updated
blocks, 𝐻𝑛′ is stored in 𝑢𝑗𝑢𝑑𝑔𝑒 which has main traffic streams.
Each packet 𝑝𝜇 passes through 𝑢𝑗𝑢𝑑𝑔𝑒 will be attached to the
updated blocks to synchronize the its neighbors 𝑈𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 .
The updated 𝑢𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 will be marked in 𝑈𝑢𝑝𝑑𝑎𝑡𝑒𝑑 . The up-
dated UAS will check its neighbors 𝑈𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠
′ and deliver the
updated 𝐻𝑛 when 𝑝𝜇 passes through. The specific process-

ing is shown as the pseudocode of Algorithm 2.

Algorithm 2 The Blockchain Synchronization


1: procedure B LOCKCHAIN SYNCHRONIZATION (𝐻𝑛′ )
Figure 5: Routing Processing
2: if 𝑈𝑢𝑝𝑑𝑎𝑡𝑒𝑑 = 𝑈𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 then
3: 𝐵𝑟𝑒𝑎𝑘;
4: end if
the hops selection, we adopt the Ad-hoc On-demand Dis-
5: 𝑢 𝑛 ← 𝑝𝜇 ;
tance Vector (AODV) to generate routing for swarm UAS
6: 𝑢𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 = 𝑈(𝑛, ℎ𝑜𝑝𝑠) ;
which has promising potentials in the deployment on a large
7: 𝑢 𝑛 → 𝑝𝜇 ;
scale. The latency caused by the system of each legitimated
8: 𝑢𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 ← 𝑝𝜇 ;
UAS is configured as 100 𝑢𝑠, and the malicious one is con-
9: 𝑢𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 → 𝐻𝑛 ;
figured as 300 𝑢𝑠 respectively. To achieve the dynamics of
10: 𝑢𝑛 ← 𝐻𝑛 ;
the performance, the decay parameter also can be set accord-
11: if 𝐻𝑛′ ≠ 𝐻𝑛 𝑎𝑛𝑑 𝑢𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 ∉ 𝑈𝑢𝑝𝑑𝑎𝑡𝑒𝑑 then
ing to the traffic status which means that the decay parameter
12: 𝑢𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 ← 𝐻𝑛′ ;
has a negative relationship with the traffic status. However,
13: 𝑈𝑢𝑝𝑑𝑎𝑡𝑒𝑑 ← 𝑢𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟𝑠 ;
the decay parameter optimization is not our research focus,
14: end if
we just chose 0.5 to achieve the balanced performance ca-
15: end procedure
pacities. Corresponding to the HTLC, we chose SHA 256
as encryption method. The whole evaluation is executed for
10000 runs and each run costs 20 seconds averagely.
4. Evaluation Figure 5 shows the processing of routing generation.
With lightweight Blockchain, the malicious UAS is marked
In this section, the evaluation is conducted with Mat- in a red filled circle. The legitimated UAS is marked in a
lab 2019b and the configuration of hardware is as follows. cyan filled circle. The purple filled circle is source UAS
CPU: E5-1607 v4 @ 3.10GHz × 4; Memory: 15.6 GiB; OS: and the blue one is destination respectively. The source
Ubuntu 18.04 LTS. sends RREQ to its neighbors to find the destination which
The specific configuration of evaluation is illustrated as is marked in the blue line. Once the destination received the
Table 2. In the configuration, the speed of each UAS ranges RREQ and it feedbacks RREP with the hops of routing to
from 10𝑚∕𝑠 to 15𝑚∕𝑠 which creates the randomness for the source. The generated routing is marked in the red line.
links between UASs locally. The swarm UAS is distributed Figure 6 shows the average latency of routing between
in the space of 100𝑚 ∗ 100𝑚 ∗ 5𝑚 relatively under ran- the blockchain-assisted algorithm and non Blockchain-
dom walk model for randomness. The maximum transmis- assisted algorithm. Generally, the latency of non Blockchain-
sion range in the swarm is limited to 15𝑚. Compatible with

Jian Wang et al.: Preprint submitted to Elsevier Page 8 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

98
Blockchain-assisted
non Blockchain-assisted

96
Average Latency of Routing (ms)

94

92

90

88

86
0 10 20 30 40 50 60 70 80 90
Proportion of Malicious UAS(%)

Figure 6: Average Latency of Routing Figure 8: Distribution of Traffic of Swarm UAS Networking

0.5 0.34

0.45 Blockchain-assisted
0.32
non Blockchain-assisted
Average Malicious Involving Rate of Routing

0.4 0.3

Average Maximum Pheromone


0.35
0.28
0.3
0.26
0.25
0.24
0.2
0.22
0.15
0.2
0.1
0.18
0.05

0.16
0 0 20 40 60 80 100
0 10 20 30 40 50 60 70 80 90
Broadcast Hops
Proportion of Malicious UAS(%)

Figure 7: Average Malicious Involving Rate of Routing Figure 9: Average Maximum Broadcast Pheromone

assisted algorithms is overwhelming than the blockchain- ors and sizes in Figure 8. We also observed that the UASs
assisted algorithm. With the increase of the proportion of with high traffic status concentrates on the central zones of
malicious UASs in swarm UAS networking, the ratio of be- swarm UAS.
ing selected as relay nodes is increasing which causes the Figure 9 illustrates the average pheromone for consensus
non blockchain-assisted algorithm to cost more latency than construct. In HTLC processing, we simplify the HTLC into
the blockchain-assisted algorithms. hops generated by each 𝑅𝑄𝑗𝑜𝑖𝑛 , we collected the maximum
Figure 7 shows the involving rate of malicious UASs in pheromones in the limited HTLC. With 𝑅𝑄𝑗𝑜𝑖𝑛 broadcast
swarm UAS networking. We compared the performance be- in the swarm UAS networking, we can observe the maxi-
tween Blockchain-assisted and non Blockchain-assisted ap- mum of pheromone keep steady once the hops exceed 10.
proaches. As the proportion of malicious UASs in swarm The maximum of pheromone used for consensus construc-
UAS networking increases, the ratio of the selection of ma- tion keeps 0.3308 as the hops increase.
licious UASs in routing expands. With identification stored Figure 10 exhibits the comparison between PoW, PoS
in Blockchain, the lightweight Blockchain-assisted approach and our proposed consensus construction (PoT). Based on
can keep the malicious UASs participating in the routing of the scalability of PoS, we choose 20%, 30%, 40% of PoS
swarm UAS networking. as the comparison. Figure 10, shows as the amounts of
Figure 8 presents the traffic distribution of swarm UAS swarm UASs increase, the routing for consensus construc-
networking. The traffic status is updated according to the tion surges. Compared with 20%, 30%, 40% of PoS, PoT
pheromone generated with each communication. Each suc- keeps lower routings consumption as the amounts of swarm
cessful communication mark the links in the swarm UAS UAS rises which means the overhead of PoT is much lower
networking and the UAS will count the pheromone it owns than PoW and PoS. The outstanding routing consumption
which can be requested by other validated UASs in swarm shows the feasibility of implementation in the resource con-
UAS networking. We marked each UAS with different col- straint platforms.
Figure 11 shows the routing consumption in the blocks

Jian Wang et al.: Preprint submitted to Elsevier Page 9 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

10000
the swarm UAS networking constructs consensus with PoT.
Proof-of-Work
To save routing construction, PoT synchronizes the updated
9000
20% of Proof-of-Stake
30% of Proof-of-Stake
blocks with the passive broadcast. The evaluation shows
PoT can reduce the routing consumption in the processes of
8000
Routings for Consensus Construction

40% of Proof-of-Stake
Proof-of-Traffic
7000
consensus construction and blocks synchronization. Com-
6000
patible with the constrained resource of swarm UASs, the
5000 lightweight Blockchain-assisted approach proposed in this
4000 paper can maintain the efficiency of swarm UAS network-
3000 ing.
2000
In the future, we will continue to explore the potential
1000
of efficiency of passive synchronization, and optimize the
HTLC to enhance the consensus construction processing.
0
10 20 30 40 50 60 70 80 90 100 The passive synchronization shows significant potential to
Amount of Swarm UAS
improve the efficiency of lightweight Blockchain implemen-
Figure 10: Routings for Consensus Construction tation in the resource constraint devices. The optimized se-
lection of HTLC based on machine learning may stimulate
the passive synchronization more robust and smart that can
100 enhance the secure defense of swarm UASs in the joining
90
Proof-of-Work processing and leaving processing.
20% of Proof-of-Stake
30% of Proof-of-Stake
80 40% of Proof-of-Stake
Routings for Blocks Synchronization

Proof-of-Traffic
70 6. Acknowledgement
60 This material is based upon work supported by the Na-
50 tional Science Foundation under Grant No. 1956193 and
40 Embry-Riddle Aeronautical University’s Faculty Innovative
30
Research in Science and Technology (FIRST) Program.
20

10
References
0 [1] Alghamdi, T.A., Ali, I., Javaid, N., Shafiq, M., 2020. Secure service
10 20 30 40 50 60 70 80 90 100 provisioning scheme for lightweight iot devices with a fair payment
Amount of Swarm UAS
system and an incentive mechanism based on blockchain. IEEE Ac-
cess 8, 1048–1061.
Figure 11: Routings for Synchronization [2] Alladi, T., Chamola, V., Naren, Kumar, N., 2020a. Parth: A two-
stage lightweight mutual authentication protocol for uav surveillance
networks. Computer Communications 160, 81 – 90. URL: http:
//www.sciencedirect.com/science/article/pii/S0140366419318456,
synchronization. For PoW and PoS, the lead needs to gen-
doi:https://doi.org/10.1016/j.comcom.2020.05.025.
erated additional routings to broadcast the blocks for syn- [3] Alladi, T., Chamola, V., Sahu, N., Guizani, M., 2020b. Applica-
chronization which will cost much overhead in the swarm tions of blockchain in unmanned aerial vehicles: A review. Vehic-
UASs. PoT leverages the passive broadcast to synchronize ular Communications 23, 100249. URL: http://www.sciencedirect.
the blocks which do not need to generate additional routings com/science/article/pii/S2214209620300206, doi:https://doi.org/10.
1016/j.vehcom.2020.100249.
for broadcast.
[4] Arins, A., 2018. Blockchain based inter-domain latency aware routing
The evaluation shows that our proposed lightweight proposal in software defined network, in: 2018 IEEE 6th Workshop
Blockchain approach can reduce the consumption of over- on Advances in Information, Electronic and Electrical Engineering
head and increase the security of swarm UAS networking. (AIEEE), pp. 1–2.
In the evaluation, we compared PoW, PoS, and PoT, and the [5] Asheralieva, A., Niyato, D., 2020. Distributed dynamic resource man-
agement and pricing in the iot systems with blockchain-as-a-service
results show that PoT can achieve outstanding performance
and uav-enabled mobile edge computing. IEEE Internet of Things
than PoW and PoS in the resource constraint platform. Journal 7, 1974–1993.
[6] Bai, L., Hu, M., Liu, M., Wang, J., 2019. Bpiiot: A light-weighted
blockchain-based platform for industrial iot. IEEE Access 7, 58381–
5. Conclusion 58393.
In this paper, we leverage lightweight Blockchain to as- [7] Biswas, S., Sharif, K., Li, F., Maharjan, S., Mohanty, S.P., Wang,
Y., 2020. Pobt: A lightweight consensus algorithm for scalable iot
sist the swarm UASs to improve the security of routing business blockchain. IEEE Internet of Things Journal 7, 2343–2355.
with constraint computation resources. With lightweight [8] Careem, M.A.A., Dutta, A., 2020. Reputation based routing in manet
Blockchain, swarm UASs can prevent the malicious UAS using blockchain, in: 2020 International Conference on COMmuni-
connection to the swarm UAS networking and mitigate the cation Systems NETworkS (COMSNETS), pp. 1–6.
attacks from malicious UASs. Different from PoW and PoS, [9] Chamola, V., Hassija, V., Gupta, V., Guizani, M., 2020. A compre-
hensive review of the covid-19 pandemic and the role of iot, drones,
we leverage pheromone to mark the traffic status of each ai, blockchain, and 5g in managing its impact. IEEE Access 8, 90225–
UAS in swarm UAS networking. Based on the traffic status, 90265.

Jian Wang et al.: Preprint submitted to Elsevier Page 10 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

[10] Chiaraviglio, L., D’Andreagiovanni, F., Idzikowski, F., Vasilakos, [26] Lazrag, H., Chehri, A., Saadane, R., Rahmani, M.D., 2019. A
A.V., 2019. Minimum Cost Design of 5G Networks with UAVs, Tree- blockchain-based approach for optimal and secure routing in wireless
based Optical Backhauling, Micro-generation and Batteries, in: 2019 sensor networks and iot, in: 2019 15th International Conference on
21st International Conference on Transparent Optical Networks (IC- Signal-Image Technology Internet-Based Systems (SITIS), pp. 411–
TON), pp. 1–4. doi:10.1109/ICTON.2019.8840395. 415.
[11] Danzi, P., Kalør, A.E., C̆. Stefanović, Popovski, P., 2019. Delay and [27] Lei, K., Zhang, Q., Lou, J., Bai, B., Xu, K., 2019. Securing icn-
communication tradeoffs for blockchain systems with lightweight iot based uav ad hoc networks with blockchain. IEEE Communications
clients. IEEE Internet of Things Journal 6, 2354–2365. Magazine 57, 26–32.
[12] Ersoy, O., Ren, Z., Erkin, Z., Lagendijk, R.L., 2018. Transaction [28] Li, M., Tang, H., Wang, X., 2019a. Mitigating routing misbehavior
propagation on permissionless blockchains: Incentive and routing using blockchain-based distributed reputation management system for
mechanisms, in: 2018 Crypto Valley Conference on Blockchain Tech- iot networks, in: 2019 IEEE International Conference on Communi-
nology (CVCBT), pp. 20–30. cations Workshops (ICC Workshops), pp. 1–6.
[13] Ge, X., Yang, J., Gharavi, H., Sun, Y., 2017. Energy Efficiency Chal- [29] Li, X., Wang, Y., Vijayakumar, P., He, D., Kumar, N., Ma, J., 2019b.
lenges of 5G Small Cell Networks. IEEE Communications Magazine Blockchain-based mutual-healing group key distribution scheme in
55, 184–191. doi:10.1109/MCOM.2017.1600788. unmanned aerial vehicles ad-hoc network. IEEE Transactions on
[14] Han, T., Almeida, J.S., da Silva, S.P.P., Filho, P.H., de Oliveira Ro- Vehicular Technology 68, 11309–11322.
drigues, A.W., de Albuquerque, V.H.C., Rebouças Filho, P.P., 2020. [30] Lin, F.Y., Hsiao, C., Wen, Y., Su, Y., 2018. Adaptive broadcast rout-
An effective approach to unmanned aerial vehicle navigation using vi- ing assignment algorithm for blockchain synchronization services, in:
sual topological map in outdoor and indoor environments. Computer 2018 Tenth International Conference on Ubiquitous and Future Net-
Communications 150, 696 – 702. URL: http://www.sciencedirect. works (ICUFN), pp. 487–492.
com/science/article/pii/S0140366419307868, doi:https://doi.org/10. [31] Liu, E., Effiok, E., Hitchcock, J., 2020a. Survey on health care appli-
1016/j.comcom.2019.12.026. cations in 5g networks. IET Communications 14, 1073–1080.
[15] Hassija, V., Chamola, V., Krishna, D.N.G., Guizani, M., 2020. A [32] Liu, G., Dong, H., Yan, Z., Zhou, X., Shimizu, S., 2020b. B4sdc:
distributed framework for energy trading between uavs and charging A blockchain system for security data collection in manets. IEEE
stations for critical applications. IEEE Transactions on Vehicular Transactions on Big Data , 1–1.
Technology 69, 5391–5402. [33] Liu, X., Huang, H., Xiao, F., Ma, Z., 2020c. A blockchain-based
[16] Hassija, V., Saxena, V., Chamola, V., 2020. Scheduling trust management with conditional privacy-preserving announcement
drone charging for multi-drone network based on consensus scheme for vanets. IEEE Internet of Things Journal 7, 4101–4112.
time-stamp and game theory. Computer Communications 149, [34] Luo, B., Li, X., Weng, J., Guo, J., Ma, J., 2020. Blockchain enabled
51 – 61. URL: http://www.sciencedirect.com/science/article/ trust-based location privacy protection scheme in vanet. IEEE Trans-
pii/S014036641930948X, doi:https://doi.org/10.1016/j.comcom.2019. actions on Vehicular Technology 69, 2034–2048.
09.021. [35] Ma, R., Teo, K.H., Shinjo, S., Yamanaka, K., Asbeck, P.M., 2017.
[17] Islam, A., Sadia, K., Masuduzzaman, M., Shin, S.Y., 2020. Bumar: A gan pa for 4g lte-advanced and 5g: Meeting the telecommunica-
A blockchain-empowered uav-assisted smart surveillance architecture tion needs of various vertical sectors including automobiles, robotics,
for marine areas, in: Proceedings of the International Conference health care, factory automation, agriculture, education, and more.
on Computing Advancements, Association for Computing Machin- IEEE Microwave Magazine 18, 77–85.
ery, New York, NY, USA. URL: https://doi.org/10.1145/3377049. [36] Ma, Z., Zhang, J., Guo, Y., Liu, Y., Liu, X., He, W., 2020. An efficient
3377062, doi:10.1145/3377049.3377062. decentralized key management mechanism for vanet with blockchain.
[18] Islam, A., Shin, S.Y., 2019a. Bhmus: Blockchain based secure out- IEEE Transactions on Vehicular Technology , 1–1.
door health monitoring scheme using uav in smart city, in: 2019 7th [37] Magdy, Y., Kashkoush, M.S., Azab, M., Rizk, M.R.M., 2020. Anony-
International Conference on Information and Communication Tech- mous blockchain based routing for moving-target defense across fed-
nology (ICoICT), pp. 1–6. erated clouds, in: 2020 IEEE 21st International Conference on High
[19] Islam, A., Shin, S.Y., 2019b. Buav: A blockchain based secure uav- Performance Switching and Routing (HPSR), pp. 1–7.
assisted data acquisition scheme in internet of things. Journal of [38] Na, Z., Wang, Y., Xiong, M., Liu, X., Xia, J., 2018. Modeling and
Communications and Networks 21, 491–502. Throughput Analysis of an ADO-OFDM Based Relay-Assisted VLC
[20] Islam, A., Shin, S.Y., 2019c. Bus: A blockchain-enabled data acqui- System for 5G Networks. IEEE Access 6, 17586–17594. doi:10.1109/
sition scheme with the assistance of uav swarm in internet of things. ACCESS.2018.2817487.
IEEE Access 7, 103231–103249. [39] Olwal, T.O., Djouani, K., Kurien, A.M., 2016. A Survey of Resource
[21] Jensen, I.J., Selvaraj, D.F., Ranganathan, P., 2019. Blockchain tech- Management Toward 5G Radio Access Networks. IEEE Communi-
nology for networked swarms of unmanned aerial vehicles (uavs), in: cations Surveys Tutorials 18, 1656–1686. doi:10.1109/COMST.2016.
2019 IEEE 20th International Symposium on "A World of Wireless, 2550765.
Mobile and Multimedia Networks" (WoWMoM), pp. 1–7. [40] Pirbhulal, S., Wu, W., Muhammad, K., Mehmood, I., Li, G., de Albu-
[22] Jiang, S., Cao, J., McCann, J.A., Yang, Y., Liu, Y., Wang, X., Deng, querque, V.H.C., 2020. Mobility enabled security for optimizing iot
Y., 2019. Privacy-preserving and efficient multi-keyword search based intelligent applications. IEEE Network 34, 72–77.
over encrypted data on blockchain, in: 2019 IEEE International [41] Qiu, J., Grace, D., Ding, G., Yao, J., Wu, Q., 2020. Blockchain-based
Conference on Blockchain (Blockchain), pp. 405–410. doi:10.1109/ secure spectrum trading for unmanned-aerial-vehicle-assisted cellular
Blockchain.2019.00062. networks: An operator’s perspective. IEEE Internet of Things Journal
[23] Jiang, S., Cao, J., Wu, H., Yang, Y., Ma, M., He, J., 2018. Blochie: 7, 451–466.
A blockchain-based platform for healthcare information exchange, in: [42] Rana, T., Shankar, A., Sultan, M.K., Patan, R., Balusamy, B., 2019.
2018 IEEE International Conference on Smart Computing (SMART- An intelligent approach for uav and drone privacy security using
COMP), pp. 49–56. doi:10.1109/SMARTCOMP.2018.00073. blockchain methodology, in: 2019 9th International Conference on
[24] Kapitonov, A., Lonshakov, S., Krupenkin, A., Berman, I., 2017. Cloud Computing, Data Science Engineering (Confluence), pp. 162–
Blockchain-based protocol of autonomous business activity for multi- 167.
agent systems consisting of uavs, in: 2017 Workshop on Research, [43] Reilly, E., Maloney, M., Siegel, M., Falco, G., 2019. An iot integrity-
Education and Development of Unmanned Aerial Systems (RED- first communication protocol via an ethereum blockchain light client,
UAS), pp. 84–89. in: 2019 IEEE/ACM 1st International Workshop on Software Engi-
[25] Kim, S., 2019. Impacts of mobility on performance of blockchain in neering Research Practices for the Internet of Things (SERP4IoT), pp.
vanet. IEEE Access 7, 68646–68655. 53–56.

Jian Wang et al.: Preprint submitted to Elsevier Page 11 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

[44] Sharma, V., You, I., Jayakody, D.N.K., Reina, D.G., Choo, K.R., research assistant in the Security and Optimiza-
2019. Neural-blockchain-based ultrareliable caching for edge- tion for Networked Globe Laboratory (SONG Lab,
enabled uav networks. IEEE Transactions on Industrial Informatics www.SONGLab.us). He received his M.S. from
15, 5723–5736. Embry-Riddle Aeronautical University (ERAU) in
[45] Sodhro, A.H., Rodrigues, J.J.P.C., Pirbhulal, S., Zahid, N., Roberto L. 2018 and B.S. from Civil Aviation University of
de Macedo, A., de Albuquerque, V.H.C., 2020. Link optimization in China (CAUC) in 2015. His major research in-
software defined iov driven autonomous transportation system. IEEE terests include machine learning, data mining, and
Transactions on Intelligent Transportation Systems , 1–10. signal processing.
[46] Srivastava, G., Crichigno, J., Dhar, S., 2019. A light and secure
healthcare blockchain for iot medical devices, in: 2019 IEEE Cana-
dian Conference of Electrical and Computer Engineering (CCECE), Houbing Song received the Ph.D. degree in elec-
pp. 1–5. trical engineering from the University of Virginia,
[47] Wang, C., Shen, J., Lai, J., Liu, J., 2020. B-tsca: Blockchain assisted Charlottesville, VA, in August 2012, and the M.S.
trustworthiness scalable computation for v2i authentication in vanets. degree in civil engineering from the University of
IEEE Transactions on Emerging Topics in Computing , 1–1. Texas, El Paso, TX, in December 2006.
[48] Wang, J., Jin, A., Shi, D., Wang, L., Shen, H., Wu, D., Hu, L., Gu, In August 2017, he joined the Department
L., Lu, L., Chen, Y., Wang, J., Saito, Y., Benjebbour, A., Kishiyama, of Electrical Engineering and Computer Science,
Y., 2017a. Spectral Efficiency Improvement With 5G Technologies: Embry-Riddle Aeronautical University, Daytona
Results From Field Tests. IEEE Journal on Selected Areas in Com- Beach, FL, where he is currently an Assistant Pro-
munications 35, 1867–1875. doi:10.1109/JSAC.2017.2713498. fessor and the Director of the Security and Opti-
[49] Wang, Y., Zhang, Z., Zhang, P., Ma, Z., Liu, G., 2017b. A new cloud- mization for Networked Globe Laboratory (SONG
based network framework for 5G massive Internet of Things con- Lab, www.SONGLab.us). He served on the faculty
nections, in: 2017 IEEE 17th International Conference on Commu- of West Virginia University from August 2012 to
nication Technology (ICCT), pp. 412–416. doi:10.1109/ICCT.2017. August 2017. In 2007 he was an Engineering Re-
8359672. search Associate with the Texas A&M Transporta-
[50] Xie, L., Ding, Y., Yang, H., Wang, X., 2019. Blockchain-based secure tion Institute. He has served as an Associate Tech-
and trustworthy internet of things in sdn-enabled 5g-vanets. IEEE nical Editor for IEEE Communications Magazine
Access 7, 56656–56666. (2017-present), an Associate Editor for IEEE In-
[51] Yang, T., Zhao, J., Hong, T., Chen, W., Fu, X., 2018. Automatic Iden- ternet of Things Journal (2020-present) and IEEE
tification Technology of Rotor UAVs Based on 5G Network Architec- Journal on Miniaturization for Air and Space Sys-
ture, in: 2018 IEEE International Conference on Networking, Archi- tems (J-MASS) (2020-present), and a Guest Edi-
tecture and Storage (NAS), pp. 1–9. doi:10.1109/NAS.2018.8515719. tor for IEEE Journal on Selected Areas in Commu-
[52] Yu, R., Xue, G., Kilari, V.T., Yang, D., Tang, J., 2018. Coinexpress: A nications (J-SAC), IEEE Internet of Things Jour-
fast payment routing mechanism in blockchain-based payment chan- nal, IEEE Transactions on Industrial Informatics,
nel networks, in: 2018 27th International Conference on Computer IEEE Sensors Journal, IEEE Transactions on In-
Communication and Networks (ICCCN), pp. 1–9. telligent Transportation Systems, and IEEE Net-
[53] Zhang, Y., Yang, D., 2019. Robustpay: Robust payment routing work. He is the editor of six books, including Big
protocol in blockchain-based payment channel networks, in: 2019 Data Analytics for Cyber-Physical Systems: Ma-
IEEE 27th International Conference on Network Protocols (ICNP), chine Learning for the Internet of Things, Elsevier,
pp. 1–4. 2019, Smart Cities: Foundations, Principles and
Applications, Hoboken, NJ: Wiley, 2017, Secu-
rity and Privacy in Cyber-Physical Systems: Foun-
Jian Wang is a Ph.D. candidate in the Depart- dations, Principles and Applications, Chichester,
ment of Electrical Engineering and Computer UK: Wiley-IEEE Press, 2017, Cyber-Physical Sys-
Science, Embry-Riddle Aeronautical University tems: Foundations, Principles and Applications,
(ERAU), Daytona Beach, Florida, and a graduate Boston, MA: Academic Press, 2016, and Industrial
research assistant in the Security and Optimiza- Internet of Things: Cybermanufacturing Systems,
tion for Networked Globe Laboratory (SONG Lab, Cham, Switzerland: Springer, 2016. He is the au-
www.SONGLab.us). He received his M.S. from thor of more than 100 articles. His research inter-
South China Agricultural University in 2017 and ests include cyber-physical systems, cybersecurity
B.S. from Nanyang Normal University in 2014. and privacy, internet of things, edge computing,
His major research interests include wireless net- AI/machine learning, big data analytics, unmanned
works, unmanned aircraft systems, and machine aircraft systems, connected vehicle, smart and con-
learning. nected health, and wireless communications and
networking. His research has been featured by pop-
ular news media outlets, including IEEE Global-
Yongxin Liu received his B.S. and M.S. from Spec’s Engineering360, USA Today, U.S. News
SCAU in 2011 and 2014, respectively, and he re- & World Report, Fox News, Association for Un-
ceived Ph.D. from the School of Civil Engineer- manned Vehicle Systems International (AUVSI),
ing and Transportation, South China University Forbes, WFTV, and New Atlas.
of Technology. His major research interests in- Dr. Song is a senior member of ACM. Dr.
clude data mining, wireless networks, the Internet Song was a recipient of the Best Paper Award from
of Things, and unmanned aerial vehicles. the 12th IEEE International Conference on Cyber,
Physical and Social Computing (CPSCom-2019),
the Best Paper Award from the 2nd IEEE Inter-
Shuteng Niu is a Ph.D. candidate in the De- national Conference on Industrial Internet (ICII
partment of Electrical Engineering and Computer 2019), the Best Paper Award from the 19th In-
Science, Embry-Riddle Aeronautical University tegrated Communication, Navigation and Surveil-
(ERAU), Daytona Beach, Florida, and a graduate lance technologies (ICNS 2019) Conference, the

Jian Wang et al.: Preprint submitted to Elsevier Page 12 of 13


Lightweight Blockchain Assisted Secure Routing of Swarm UAS Networking

prestigious Air Force Research Laboratory’s In-


formation Directorate (AFRL/RI) Visiting Faculty
Research Fellowship in 2018, and the very first
recipient of the Golden Bear Scholar Award, the
highest campus-wide recognition for research ex-
cellence at West Virginia University Institute of
Technology (WVU Tech), in 2016.

Jian Wang et al.: Preprint submitted to Elsevier Page 13 of 13

You might also like