Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2024

26-10-2023

Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles

Authors: S. Rajasoundaran, S. V. N. Santhosh Kumar, M. Selvi, Arputharaj Kannan

Published in: Peer-to-Peer Networking and Applications | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles (UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs face many challenges, like security breaches, malfunctions, link failures, and handover failures. UAVs can easily malfunction by external threats to create data loss, theft, signal jamming, misrouting, false handover, and location spoofing. Failures in UAV handover principles make overall gradual downtime in FANET. Against these issues, existing UAV protection mechanisms deliver location monitoring mechanisms (graphs and trees), multi-link handover mechanisms, and distributed authentication principles. However, the implantation of recent-day techniques may fail against migrating attacker events executed in electronic warfare systems. The existing security methods need improvements for protecting Multi-UAV layers effectively through end-to-end security principles. For this purpose, a new Reactive Handover Coordination System with Regenerative Blockchain (RHCRB) Principles is proposed that takes novel high-security features specially made for swarm UAVs. The proposed RHCRB implements more crucial distributed functions in each UAV on demand. The executed operations of RHCRB comprise trusted location monitoring schemes (internal and cooperative UAV movements), dynamic location-based cost magnitude calculations, regenerative blockchain principles (authentication of each UAV and active edges), confidential link management principles, secure handover coordination, and on-demand topology management principles. The technical aspects of RHCRB build lightweight and shielded handover principles against airfield vulnerabilities. The proposed model suggests implementing an entirely protected handover environment from node localization to handover events. The inspired technical aspects of RHCRB contribute to the swarm UAV environment through confidentiality using Advanced Encryption Standard (AES) and distributed authentication (blockchain-based node and edge management) principles to engage protected handover practices. The experimental section of this article has been tested using testbed in FlyNetSim tool for implementing RHCRB and notable recent security techniques such as the Internet of Vehicles with Decentralized Blockchains (IoV-DB), Group Handover for Internet of Defense (GH-IoD), and Handover and Optimized Security Principles for UAVs (HOOPOE). The results obtained by this system show RHCRB's 8% to 14% of betterment than existing techniques through various measures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gupta A, Barthwal A, Vardhan H, Kakria S, Kumar S, Parihar AS (2023) Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET. Multimedia Tools and Applications 11:1–20 Gupta A, Barthwal A, Vardhan H, Kakria S, Kumar S, Parihar AS (2023) Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET. Multimedia Tools and Applications 11:1–20
2.
go back to reference Shayea I, Dushi P, Banafaa M, Rashid RA, Ali S, Sarijari MA, Daradkeh YI, Mohamad H (2022) Handover management for drones in future mobile networks—a survey. Sensors 22(17):6424CrossRefPubMedPubMedCentralADS Shayea I, Dushi P, Banafaa M, Rashid RA, Ali S, Sarijari MA, Daradkeh YI, Mohamad H (2022) Handover management for drones in future mobile networks—a survey. Sensors 22(17):6424CrossRefPubMedPubMedCentralADS
3.
go back to reference Bharany S, Sharma S, Bhatia S, Rahmani MK, Shuaib M, Lashari SA (2022) Energy efficient clustering protocol for FANETS using moth flame optimization. Sustainability 14(10):6159CrossRef Bharany S, Sharma S, Bhatia S, Rahmani MK, Shuaib M, Lashari SA (2022) Energy efficient clustering protocol for FANETS using moth flame optimization. Sustainability 14(10):6159CrossRef
4.
go back to reference You W, Dong C, Wu Q, Qu Y, Wu Y, He R (2022) Joint task scheduling, resource allocation, and UAV trajectory under clustering for FANETs. China Communications 19(1):104–118CrossRef You W, Dong C, Wu Q, Qu Y, Wu Y, He R (2022) Joint task scheduling, resource allocation, and UAV trajectory under clustering for FANETs. China Communications 19(1):104–118CrossRef
5.
go back to reference Hadi HJ, Cao Y, Nisa KU, Jamil AM, Ni Q (2023) A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. J Netw Comput Appl 1(213):103607CrossRef Hadi HJ, Cao Y, Nisa KU, Jamil AM, Ni Q (2023) A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. J Netw Comput Appl 1(213):103607CrossRef
6.
go back to reference Rajasekaran AS, Maria A, Al-Turjman F, Altrjman C, Mostarda L (2022) Anonymous mutual and batch authentication with location privacy of UAV in FANET. Drones 6(1):14CrossRef Rajasekaran AS, Maria A, Al-Turjman F, Altrjman C, Mostarda L (2022) Anonymous mutual and batch authentication with location privacy of UAV in FANET. Drones 6(1):14CrossRef
7.
go back to reference Beegum TR, Idris MY, Ayub MN, Shehadeh HA. Optimized routing of UAVs using bio-inspired algorithm in FANET: A systematic review. IEEE Access. 2023 Feb 10. Beegum TR, Idris MY, Ayub MN, Shehadeh HA. Optimized routing of UAVs using bio-inspired algorithm in FANET: A systematic review. IEEE Access. 2023 Feb 10.
8.
go back to reference Bashir MN, Iqbal S, Yusof KM. Design principles for cooperative relaying on UAVs-based FANET. In 2022 Advances in Science and Engineering Technology International Conferences (ASET) 2022 Feb 21 (pp. 1–6). IEEE. Bashir MN, Iqbal S, Yusof KM. Design principles for cooperative relaying on UAVs-based FANET. In 2022 Advances in Science and Engineering Technology International Conferences (ASET) 2022 Feb 21 (pp. 1–6). IEEE.
9.
go back to reference Liu C, Zhang Z (2022) Towards a robust FANET: Distributed node importance estimation-based connectivity maintenance for UAV swarms. Ad Hoc Netw 1(125):102734CrossRef Liu C, Zhang Z (2022) Towards a robust FANET: Distributed node importance estimation-based connectivity maintenance for UAV swarms. Ad Hoc Netw 1(125):102734CrossRef
10.
go back to reference El-Basioni BM, Abd El-Kader SM (2023) Mission-based PTR triangle for multi-UAV systems flight planning. Ad Hoc Netw 1(142):103115CrossRef El-Basioni BM, Abd El-Kader SM (2023) Mission-based PTR triangle for multi-UAV systems flight planning. Ad Hoc Netw 1(142):103115CrossRef
11.
12.
go back to reference Kim T, Lee S, Kim KH, Jo YI (2023) FANET routing protocol analysis for multi-UAV-based reconnaissance mobility models. Drones 7(3):161CrossRef Kim T, Lee S, Kim KH, Jo YI (2023) FANET routing protocol analysis for multi-UAV-based reconnaissance mobility models. Drones 7(3):161CrossRef
13.
go back to reference Tsao KY, Girdler T, Vassilakis VG (2022) A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Netw 1(133):102894CrossRef Tsao KY, Girdler T, Vassilakis VG (2022) A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Netw 1(133):102894CrossRef
14.
go back to reference Skondras E, Kosmopoulos I, Michailidis ET, Michalas A, Vergados DD (2022) A group handover scheme for supporting drone services in IoT-based 5G network architectures. Drones 6(12):425CrossRef Skondras E, Kosmopoulos I, Michailidis ET, Michalas A, Vergados DD (2022) A group handover scheme for supporting drone services in IoT-based 5G network architectures. Drones 6(12):425CrossRef
15.
go back to reference Ayass T, Coqueiro T, Carvalho T, Jailton J, Araújo J, Francês R (2022) Unmanned aerial vehicle with handover management fuzzy system for 5G networks: challenges and perspectives. Intelligence & Robotics 2(1):20–36 Ayass T, Coqueiro T, Carvalho T, Jailton J, Araújo J, Francês R (2022) Unmanned aerial vehicle with handover management fuzzy system for 5G networks: challenges and perspectives. Intelligence & Robotics 2(1):20–36
16.
go back to reference Mehta P, Gupta R, Tanwar S (2020) Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. Comput Commun 1(151):518–538CrossRef Mehta P, Gupta R, Tanwar S (2020) Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. Comput Commun 1(151):518–538CrossRef
17.
go back to reference Tu S, Yu H, Badshah A, Waqas M, Halim Z, Ahmad I (2023) Secure internet of vehicles (IoV) with decentralized consensus blockchain mechanism. IEEE Trans Veh Technol Tu S, Yu H, Badshah A, Waqas M, Halim Z, Ahmad I (2023) Secure internet of vehicles (IoV) with decentralized consensus blockchain mechanism. IEEE Trans Veh Technol
18.
go back to reference Jan SU, Abbasi IA, Algarni F (2022) A mutual authentication and cross verification protocol for securing Internet-of-Drones (IoD). Computers, Materials & Continua 72(3):5845–5869CrossRef Jan SU, Abbasi IA, Algarni F (2022) A mutual authentication and cross verification protocol for securing Internet-of-Drones (IoD). Computers, Materials & Continua 72(3):5845–5869CrossRef
19.
go back to reference Khalid H, Hashim SJ, Hashim F, Ahamed SM, Chaudhary MA, Altarturi HH, Saadoon M (2023) HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs. IEEE Trans Veh Technol Khalid H, Hashim SJ, Hashim F, Ahamed SM, Chaudhary MA, Altarturi HH, Saadoon M (2023) HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs. IEEE Trans Veh Technol
20.
go back to reference Khan AS, Sattar MA, Nisar K, Ibrahim AA, Annuar NB, Abdullah JB, Karim MS (2023) A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions. Appl Sci 13(1):277CrossRef Khan AS, Sattar MA, Nisar K, Ibrahim AA, Annuar NB, Abdullah JB, Karim MS (2023) A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions. Appl Sci 13(1):277CrossRef
21.
go back to reference Chriki A, Touati H, Snoussi H, Kamoun F (2019) FANET: Communication, mobility models and security issues. Comput Netw 9(163):106877CrossRef Chriki A, Touati H, Snoussi H, Kamoun F (2019) FANET: Communication, mobility models and security issues. Comput Netw 9(163):106877CrossRef
22.
go back to reference Dwivedi SK, Amin R, Vollala S, Khan MK. B-HAS: Blockchain-assisted efficient handover authentication and secure communication protocol in VANETs. IEEE Transactions on Network Science and Engineering. 2023 Apr 24. Dwivedi SK, Amin R, Vollala S, Khan MK. B-HAS: Blockchain-assisted efficient handover authentication and secure communication protocol in VANETs. IEEE Transactions on Network Science and Engineering. 2023 Apr 24.
23.
go back to reference Indushree M, Raj M, Mishra VK, Shashidhara R, Das AK, Bhat V (2023) Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks. Comput Commun 15(200):1–6 Indushree M, Raj M, Mishra VK, Shashidhara R, Das AK, Bhat V (2023) Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks. Comput Commun 15(200):1–6
25.
go back to reference Chandrakar P, Bagga R, Kumar Y, Dwivedi SK, Amin R (2023) Blockchain based security protocol for device to device secure communication in internet of things networks. Security and Privacy 6(1):e267CrossRef Chandrakar P, Bagga R, Kumar Y, Dwivedi SK, Amin R (2023) Blockchain based security protocol for device to device secure communication in internet of things networks. Security and Privacy 6(1):e267CrossRef
26.
go back to reference Lang P, Tian D, Duan X, Zhou J, Sheng Z, Leung VC (2023) Blockchain-based cooperative computation offloading and secure handover in vehicular edge computing networks. IEEE Trans Intell Veh Lang P, Tian D, Duan X, Zhou J, Sheng Z, Leung VC (2023) Blockchain-based cooperative computation offloading and secure handover in vehicular edge computing networks. IEEE Trans Intell Veh
27.
go back to reference Akram MA, Ahmad H, Mian AN, Jurcut AD, Kumari S (2023) Blockchain-based privacy-preserving authentication protocol for UAV networks. Comput Netw 1(224):109638CrossRef Akram MA, Ahmad H, Mian AN, Jurcut AD, Kumari S (2023) Blockchain-based privacy-preserving authentication protocol for UAV networks. Comput Netw 1(224):109638CrossRef
28.
go back to reference Tan Y, Wang J, Liu J, Kato N (2022) Blockchain-assisted distributed and lightweight authentication service for industrial unmanned aerial vehicles. IEEE Internet Things J 9(18):16928–16940CrossRef Tan Y, Wang J, Liu J, Kato N (2022) Blockchain-assisted distributed and lightweight authentication service for industrial unmanned aerial vehicles. IEEE Internet Things J 9(18):16928–16940CrossRef
29.
go back to reference Usman M, Amin R, Aldabbas H, Alouffi B (2022) Lightweight challenge-response authentication in SDN-based UAVs using elliptic curve cryptography. Electronics 11(7):1026CrossRef Usman M, Amin R, Aldabbas H, Alouffi B (2022) Lightweight challenge-response authentication in SDN-based UAVs using elliptic curve cryptography. Electronics 11(7):1026CrossRef
30.
go back to reference Srivastava A, Prakash J (2023) Internet of Low-Altitude UAVs (IoLoUA): a methodical modeling on integration of Internet of “Things” with “UAV” possibilities and tests. Artif Intell Rev 56(3):2279–2324CrossRef Srivastava A, Prakash J (2023) Internet of Low-Altitude UAVs (IoLoUA): a methodical modeling on integration of Internet of “Things” with “UAV” possibilities and tests. Artif Intell Rev 56(3):2279–2324CrossRef
31.
go back to reference Selvi M, Santhosh Kumar SVN, Ganapathy S, Ayyasamy A, Khanna Nehemiah H, Kannan A (2021) An energy efficient clustered gravitational and fuzzy based routing algorithm in WSNs. Wireless Personal Communications, Springer 116(1):61–90CrossRef Selvi M, Santhosh Kumar SVN, Ganapathy S, Ayyasamy A, Khanna Nehemiah H, Kannan A (2021) An energy efficient clustered gravitational and fuzzy based routing algorithm in WSNs. Wireless Personal Communications, Springer 116(1):61–90CrossRef
32.
go back to reference Thangaramya K, Kulothungan K, Indira Gandhi S, Selvi M, Santhosh Kumar SVN, Kannan A (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, Springer 24:16483–16497CrossRef Thangaramya K, Kulothungan K, Indira Gandhi S, Selvi M, Santhosh Kumar SVN, Kannan A (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, Springer 24:16483–16497CrossRef
33.
go back to reference Nancy P, Muthurajkumar S, Ganapathy S, Santhosh Kumar SVN, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications 14(5):88–895CrossRef Nancy P, Muthurajkumar S, Ganapathy S, Santhosh Kumar SVN, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications 14(5):88–895CrossRef
34.
go back to reference Santhosh Kumar SVN, Palanichamy Y, Selvi M, Ganapathy S, Kannan A, Perumal SP (2021) Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Networks, Springer 27:3873–3894CrossRef Santhosh Kumar SVN, Palanichamy Y, Selvi M, Ganapathy S, Kannan A, Perumal SP (2021) Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Networks, Springer 27:3873–3894CrossRef
Metadata
Title
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles
Authors
S. Rajasoundaran
S. V. N. Santhosh Kumar
M. Selvi
Arputharaj Kannan
Publication date
26-10-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2024
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01572-z

Other articles of this Issue 1/2024

Peer-to-Peer Networking and Applications 1/2024 Go to the issue

Premium Partner