Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones
Abstract
:1. Introduction
- UAV-based aerial base stations (UABSs) provide network, uplink, and downlink communications for users on the ground, such as in disaster relief.
- UAV-based aerial users provide consistent and low-latency connectivity, including real-time video streaming, using UAVs as flying mobile users.
- UAV-based wireless rerouting enhances a coverage area.
1.1. Motivation for the Study
1.2. Contributions
- The combination of Federated Learning (FL) and blockchain technology can address security and privacy concerns related to Mobile Edge Computing (MEC) networks supported by Unmanned Aerial Vehicles (UAVs). FL prevents data leakage but lacks clear evaluation procedures for local models. Blockchain enables model decentralization, secure data collection from multiple locations, tracking of updates, incentivizing users for model training or validation, and ensuring secure and immutable updates.
- Using Paillier Additive Homomorphic Encryption (PHE) to improve data privacy by encrypting model gradients with Homomorphic’s public key before uploading them to the blockchain. This prevents unauthorized access to the information. PHE is preferred over FHE due to its lower computational cost and higher efficiency, making it suitable for industrial applications. Furthermore, stochastic gradient descent (SGD) can be used to share optimal solutions.
- The off-chain and on-chain storage strategies introduced to address the challenges of transmitting large gradient data on the blockchain, the original large-size weight off-chain (IPFS), and storing the relatively small-size IPFS hash of the original weight on the blockchain.
- The proposed DeepAL-based classification model aims to improve global learning accuracy while reducing communication costs. DenseNet is a beneficial tool in this model as it addresses the issue of vanishing gradients, reduces parameters, and improves feature propagation. Additionally, pre-trained DenseNet can efficiently process and train binary samples while facilitating better information flow between layers through output concatenation.
- Finally, we discuss the proposed FDSS model and its limitations for managing floods in remote regions using artificial intelligence and blockchain technology. A framework for implementing these services is being developed, which is one part of our future work.
1.3. Structure of the Paper
2. Related Works
3. Preliminaries
3.1. Blockchain Technology
3.2. InterPlanetary File System (IPFS)
3.3. Deep Active Learning
Algorithm 1. DeepAL features extraction for images. |
Input: θ: The initialized parameter of the DL model or pre-trained on the labeled training set SL0 SU: sample set of the unlabeled pool SL: labeled sample set SN: new label training sample set Si: unlabeled samples; = 1, 2, …, n Output: produce SN ∈ SL must label sample from SU For each Si ∈ SU; i = 1, 2, …, n Step 1: Pick samples that are difficult for the current DL network to classify. Step 2: Use entropy analysis to select the unlabeled samples with the greatest degree of uncertainty Si where it has the class prediction information with the highest entropy by using the following equation: where is the activation value of the unit j in the upper layer out of N deep learning layers. Step 3: Add label Sn samples to SL. SL ← SN ∪ SL Step 4: update SU SU ← SU − SN End for |
3.4. DenseNet
3.5. Federated Learning (FL)
- (i)
- a set of of participants where where each participant ki ∈ K has a local dataset Di, and
- (ii)
- a central server or central node S.
Algorithm 2. Federated learning architecture motivated by FedAvg |
Section 1: Global trained model Operations on the server side: Initialize the global model parameters Wt. for each communication round t = 1, 2, …, do Select m = C × K, C ∈ (0, 1) Download Wt to each FL participants k. for each FL participants (k ∈ m) do Wait Client k for synchronization. Compute Download the federated gradient end for end for Section 2: Operations on the clients’ side (suppose client at k): Update local weights using and η. B ← (split Pk into batches of size B) for each local epoch i from 1 to E do for batch b ∈ B do end for end for Return to central node. |
3.6. Homomorphic Encryption (HE)
3.7. Security Analysis
3.7.1. Data Confidentiality
3.7.2. Data Integrity
3.7.3. Authentication and Authorisation
3.7.4. Data Fabrication
3.7.5. SkyJack Attack
3.7.6. False Data Injection
3.7.7. Denial of Service (DoS) Attacks
3.7.8. Wireless Interface Attack
3.7.9. Tampering Attacks
4. Secure Sharing Gradient Model Process
- (1)
- Updating local model: The central node broadcasting weight of the global model and the learning rate η for all participants to update their local model and execute the DL training process based on SGD was downloaded from the latest block. Then, it saves it as an unencrypted local model as follows:
- (2)
- Download the federated gradient
- (3)
- For an SGD-based optimisation: The updated local weights using and learning rate η are calculated as follows:
- (4)
- Return Wlocal_k to central node.
- (5)
- Repeat the local model updates: Repeat the steps in the second and third phases until the iteration number of training reaches the upper limit to produce the global model, which means the loop-end condition is when the gradient is.
Algorithm 3. Server model training with labeled data and encrypted model aggregation |
Input: L: Labeled example set P1: public key K: the number of clients Wlocal_k: weight of client model Wlocal_k: weight of client model Output: Aggregated weight of global model Wagg_F(i); i = 1, 2, … Process 1: Initial global model training with labeled data 1. Foreach h ∈ Wlocal_k; K = 1, 2, …, k do 2. h ← Wglobal 3. h. f it(L) 4. foreach layer ∈ h do 5. Wglobal ← Encrp1(layer, weights) //encrypted weight of global model 6. send_to_client Wglobal Process 2: Encrypted model aggregation 7.Wagg_F(i)← Wglobal // initial weight aggregation 8. foreach h ∈ Wlocal_k; K = 1, 2, …, k do 9. foreach [row] ∈ h do 10. [row] ← layer.weight //get the core row for layer 11.Wagg_F(i) = Wagg_F(i) ⊕ [row] //homomorphic addition 12. foreach [row] ∈ Wagg_F(i) do* 13.[row] ← [row] ⊗ 1/K //homomorphic multiplication 14. Return Wagg_F(i) |
Algorithm 4: Active learning using unlabeled data in each client |
Input: U: Unlabeled example set P2: private key Wglobal ← Encrp1(layer, weights): encrypted weight of global model Output: Encrypted weight of local model Wlocal_k Step 1: decrypt global model and save it as unencrypted local model 1. Foreach h ∈ Wlocal_k; K = 1,2, ….k do 2. h ← Wglobal 3. foreach layer ∈ h do 4. [row] ← layer.weight //get the core row for layer 5. foreach layer ∈ hun do 6. hun_K ← Decp2([row])global // save unencrypted local model. Step 2: execute AL training and updated local model 7. While (!Query Stop Criteria) do 8.batch_samples← predict(U) // predict unlabeled instances. 9. hup_K = active_learning(hun_K, batch_samples) // updated local model 10. Step 3: encrypt the weight of local model and shares it to the server. 11. foreach layer ∈ hup_K do 12. Wlocal_k ← Encrp1(layer, weight) of hup_K 13. Return Wlocal_k to the server. |
- IoT devices or users: The IoT devices send requests to the cloud server to start the mission. Only authenticated users can start the UAV device.
- Secure server: Upon receiving a request from the IoT device, the secure server will check the IoT device ID in a secure database in the secure server. The secure server will assign a drone to the IoT device if it is authenticated. Information about the assigned drone, such as its drone ID and timestamp, will be encrypted and sent to the IoT device.
- UAV device: A UAV receives requests from a secure server. These devices are composed of actuators and sensors. They enable tasks to be performed and sense the environment. UAV devices contain sensors to collect data such as images, altitude, longitude, RGB images, speed, and battery level, as well as IoT sensors in dams and torrents.
- MEC server: The MEC server collects data (images, IoT sensor data) from various UAVs and trains them as local models. The MEC server will synchronize all communications between UAVs and IoT sensors. Once the mission is complete, the MEC server will send the encrypted gradients (results from different nodes training on different datasets) to the core network as a blockchain.
- IoT sensors: The sensors will be installed where floods may occur, such as areas prone to torrents, and will synchronize with the MEC devices.
- Core network: Local models aggregate their updates into a global model that is added to the blockchain. A secure place to keep sensitive data is needed to store updated blockchains. The server is encrypted using two-factor authentication to ensure high levels of integrity and confidentiality. It is important to note that not all data will be stored as a blockchain. Mission information will be stored in blockchain format at the core network to maintain secrecy and privacy. To decrease the core network load, other inessential data is stored in an off-chain database, such as flight information, longitude, altitude, and battery level.
5. The Proposed Method of Negotiations
Applications of the Proposed Method
- Drones to detect and monitor floods: A proposed method to detect and monitor floods using drones is shown as an algorithm in Figure 9. Drones with high-resolution cameras are suggested for this proposed method. Data collected from drones report the status in a specific area and give an overview of the situation.
- Drones to rescue people: Drone footage can be used to rescue individuals. Once a picture detects thermal images and the MEC server analyzes them and confirms the results with the local sensors, the emergency alert is raised. As shown in Figure 10, there is a place in the drone to hold the compressed inflatable rescue boat.
- Civil defence receives the report, or the MEC server raises the alarm.
- The mission starts, and the drone flies to the desired location.
- The MEC server reports the emergency rescue mission if thermal images are detected.
- Drones can provide inflatable rescue boats and the mission’s progress.
6. Discussion and Challenges
7. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Li, L.; Sun, Y.; Cheng, Q.; Wang, D.; Lin, W.; Chen, W. Optimal trajectory and downlink power control for multi-type UAV aerial base stations. Chin. J. Aeronaut. 2021, 34, 11–23. [Google Scholar] [CrossRef]
- Yazid, Y.; Ez-Zazi, I.; Guerrero-González, A.; El Oualkadi, A.; Arioua, M. UAV-Enabled Mobile Edge-Computing for IoT Based on AI: A Comprehensive Review. Drones 2021, 5, 148. [Google Scholar] [CrossRef]
- Zeng, Y.; Lyu, J.; Zhang, R. Cellular-connected UAV: Potential, challenges, and promising technologies. IEEE Wirel. Commun. 2018, 26, 120–127. [Google Scholar] [CrossRef]
- Abbas, N.; Zhang, Y.; Taherkordi, A.; Skeie, T. Mobile Edge Computing: A Survey. IEEE Internet Things J. 2017, 5, 450–465. [Google Scholar] [CrossRef]
- Qi, M.; Wang, Z.; Wu, F.; Hanson, R.; Chen, S.; Xiang, Y.; Zhu, L. A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design. In Proceedings of the Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, 1–3 December 2021; pp. 473–489. [Google Scholar] [CrossRef]
- Islam, A.; Shin, S.Y. BUAV: A blockchain based secure UAV-assisted data acquisition scheme in Internet of Things. J. Commun. Netw. 2019, 21, 491–502. [Google Scholar] [CrossRef]
- Calderon, R. The Benefits of Artificial Intelligence in Cybersecurity. Master’s Thesis, La Salle University, Philadelphia, PA, USA, 2019. [Google Scholar]
- Shahbazi, A. Machine Learning Techniques for UAV-Assisted Networks. Ph.D. Thesis, Université Paris-Saclay, Paris, France, 2022. [Google Scholar]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the Artificial Intelligence and Statistics, Ft. Lauderdale, FL, USA, 20–22 April 2017; pp. 1273–1282. [Google Scholar]
- Li, D.; Luo, Z.; Cao, B. Blockchain-based federated learning methodologies in smart environments. Clust. Comput. 2021, 25, 2585–2599. [Google Scholar] [CrossRef]
- Ghanem, M.; Dawoud, F.; Gamal, H.; Soliman, E.; El-Batt, T. FLoBC: A Decentralized Blockchain-Based Federated Learning Framework. In Proceedings of the 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), San Antonio, TX, USA, 5–7 September 2022; pp. 85–92. [Google Scholar]
- Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 2019, 10, 1–19. [Google Scholar] [CrossRef]
- De Aguiar, E.J.; Faiçal, B.S.; Krishnamachari, B.; Ueyama, J. A Survey of Blockchain-Based Strategies for Healthcare. ACM Comput. Surv. 2020, 53, 27. [Google Scholar] [CrossRef]
- Houtan, B.; Hafid, A.S.; Makrakis, D. A Survey on Blockchain-Based Self-Sovereign Patient Identity in Healthcare. IEEE Access 2020, 8, 90478–90494. [Google Scholar] [CrossRef]
- Alrayes, F.S.; Alotaibi, S.S.; Alissa, K.A.; Maashi, M.; Alhogail, A.; Alotaibi, N.; Mohsen, H.; Motwakel, A. Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems. Drones 2022, 6, 222. [Google Scholar] [CrossRef]
- Singh, P.; Masud, M.; Hossain, M.S.; Kaur, A. Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid. Comput. Electr. Eng. 2021, 93, 107209. [Google Scholar] [CrossRef]
- Li, Y.; Chen, C.; Liu, N.; Huang, H.; Zheng, Z.; Yan, Q. A Blockchain-Based Decentralized Federated Learning Framework with Committee Consensus. IEEE Netw. 2020, 35, 234–241. [Google Scholar] [CrossRef]
- Gray, P.C.; Fleishman, A.B.; Klein, D.J.; McKown, M.W.; Bézy, V.S.; Lohmann, K.J.; Johnston, D.W. A convolutional neural network for detecting sea turtles in drone imagery. Methods Ecol. Evol. 2018, 10, 345–355. [Google Scholar] [CrossRef]
- Hong, S.-J.; Han, Y.; Kim, S.-Y.; Lee, A.-Y.; Kim, G. Application of Deep-Learning Methods to Bird Detection Using Unmanned Aerial Vehicle Imagery. Sensors 2019, 19, 1651. [Google Scholar] [CrossRef]
- Krizhevsky, A.; Sutskever, I.; Hinton, G.E. Imagenet classification with deep convolutional neural networks. Commun. ACM 2017, 60, 84–90. [Google Scholar] [CrossRef]
- Simonyan, K.; Zisserman, A. Very deep convolutional networks for large-scale image recognition. arXiv 2014, arXiv:1409.1556. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27–30 June 2016. [Google Scholar] [CrossRef]
- Huang, G.; Liu, Z.; van der Maaten, L.; Weinberger, K.Q. Densely connected convolutional networks. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017. [Google Scholar]
- Szegedy, C.; Ioffe, S.; Vanhoucke, V.; Alemi, A. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, San Francisco, CA, USA, 4–9 February 2017. [Google Scholar]
- Wang, D.; Shang, Y. A new active labeling method for deep learning. In Proceedings of the 2014 International Joint Conference on Neural Networks (IJCNN), Beijing, China, 6–11 July 2014. [Google Scholar]
- Cabuk, U.C.; Dalkilic, G.; Dagdeviren, O. CoMAD: Context-Aware Mutual Authentication Protocol for Drone Networks. IEEE Access 2021, 9, 78400–78414. [Google Scholar] [CrossRef]
- Abdalla, M.; Fouque, P.-A.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. IEE Proc. Inf. Secur. 2006, 153, 27. [Google Scholar] [CrossRef]
- De Melo, C.F.E.; e Silva, T.D.; Boeira, F.; Stocchero, J.M.; Vinel, A.; Asplund, M.; de Freitas, E.P. UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks. IEEE Access 2021, 9, 82930–82946. [Google Scholar] [CrossRef]
- Cho, G.; Cho, J.; Hyun, S.; Kim, H. SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles. Appl. Sci. 2020, 10, 3149. [Google Scholar] [CrossRef]
- Jan, S.U.; Abbasi, I.A.; Algarni, F. A Key Agreement Scheme for IoD Deployment Civilian Drone. IEEE Access 2021, 9, 149311–149321. [Google Scholar] [CrossRef]
- Deebak, B.; Al-Turjman, F. A smart lightweight privacy preservation scheme for IoT-based UAV communication systems. Comput. Commun. 2020, 162, 102–117. [Google Scholar] [CrossRef]
- Hu, F.; Qian, H.; Liu, L. A Random Label and Lightweight Hash-Based Security Authentication Mechanism for a UAV Swarm. Wirel. Commun. Mob. Comput. 2021, 2021, 6653883. [Google Scholar] [CrossRef]
- Jan, S.U.; Khan, H.U. Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone. IEEE Access 2021, 9, 130247–130263. [Google Scholar] [CrossRef]
- Hussain, S.; Chaudhry, S.A.; Alomari, O.A.; Alsharif, M.H.; Khan, M.K.; Kumar, N. Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones. IEEE Syst. J. 2021, 15, 4431–4438. [Google Scholar] [CrossRef]
- Jiang, C.; Fang, Y.; Zhao, P.; Panneerselvam, J. Intelligent UAV Identity Authentication and Safety Supervision Based on Behavior Modeling and Prediction. IEEE Trans. Ind. Inform. 2020, 16, 6652–6662. [Google Scholar] [CrossRef]
- Ever, Y.K. A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications. Comput. Commun. 2020, 155, 143–149. [Google Scholar] [CrossRef]
- Khan, M.A.; Ullah, I.; Alkhalifah, A.; Rehman, S.U.; Shah, J.A.; Uddin, I.I.; Alsharif, M.H.; Algarni, F. A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems. IEEE Trans. Ind. Inform. 2021, 18, 3416–3425. [Google Scholar] [CrossRef]
- Li, J.; Wang, Y.; Ding, Y.; Wu, W.; Li, C.; Wang, H. A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks. Secur. Commun. Netw. 2021, 2021, 9463606. [Google Scholar] [CrossRef]
- Veerappan, C.S.; Loh, P.K.K.; Chennattu, R.J. Smart Drone Controller Framework—Toward an Internet of Drones. In AI and IoT for Smart City Applications; Springer Nature: Singapore, 2022; pp. 1–14. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Karimipour, H. Federated learning for drone authentication. Ad Hoc Netw. 2021, 120, 102574. [Google Scholar] [CrossRef]
- Wang, H.; Fang, H.; Wang, X. Safeguarding Cluster Heads in UAV Swarm Using Edge Intelligence: Linear Discriminant Analysis-Based Cross-Layer Authentication. IEEE Open J. Commun. Soc. 2021, 2, 1298–1309. [Google Scholar] [CrossRef]
- Gai, K.; Wu, Y.; Zhu, L.; Choo, K.-K.R.; Xiao, B. Blockchain-Enabled Trustworthy Group Communications in UAV Networks. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4118–4130. [Google Scholar] [CrossRef]
- Yahuza, M.; Idris, M.Y.I.; Wahab, A.W.A.; Nandy, T.; Bin Ahmedy, I.; Ramli, R. An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network. IEEE Access 2021, 9, 31420–31440. [Google Scholar] [CrossRef]
- Bera, B.; Das, A.K.; Sutrala, A.K. Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment. Comput. Commun. 2020, 166, 91–109. [Google Scholar] [CrossRef]
- Abunadi, I.; Althobaiti, M.M.; Al-Wesabi, F.N.; Hilal, A.M.; Medani, M.; Hamza, M.A.; Rizwanullah, M.; Zamani, A.S. Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks. Comput. Mater. Contin. 2022, 72, 1195–1212. [Google Scholar] [CrossRef]
- Yuan, K.; Yan, Y.; Xiao, T.; Zhang, W.; Zhou, S.; Jia, C. Privacy-Protection Scheme of a Credit-Investigation System Based on Blockchain. Entropy 2021, 23, 1657. [Google Scholar] [CrossRef]
- Gürsoy, G.; Brannon, C.M.; Gerstein, M. Using Ethereum blockchain to store and query pharmacogenomics data via smart contracts. BMC Med. Genom. 2020, 13, 74. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.-N.; Chen, W.; Weng, J.; Imran, M. An overview on smart contracts: Challenges, advances and platforms. Future Gener. Comput. Syst. 2020, 105, 475–491. [Google Scholar] [CrossRef]
- Azbeg, K.; Ouchetto, O.; Andaloussi, S.J.; Fetjah, L.; Sekkaki, A. Blockchain and IoT for security and privacy: A platform for diabetes self-management. In Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech), Brussels, Belgium, 26–28 November 2018; pp. 1–5. [Google Scholar]
- Prasetiyowati, M.I.; Maulidevi, N.U.; Surendro, K. Diagnostic wisconsin breast cancer database. PeerJ Comput. Sci. 2022, 8, e1041. [Google Scholar] [CrossRef]
- Steichen, M.; Fiz, B.; Norvill, R.; Shbair, W.; State, R. Blockchain-based, decentralized access control for IPFS. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1499–1506. [Google Scholar]
- Lv, W.; Wang, X. Overview of Hyperspectral Image Classification. J. Sens. 2020, 2020, 4817234. [Google Scholar] [CrossRef]
- Ren, P.; Xiao, Y.; Chang, X.; Huang, P.-Y.; Li, Z.; Gupta, B.B.; Chen, X.; Wang, X. A Survey of Deep Active Learning. ACM Comput. Surv. 2021, 54, 180. [Google Scholar] [CrossRef]
- Ahmed, L.; Ahmad, K.; Said, N.; Qolomany, B.; Qadir, J.; Al-Fuqaha, A. Active Learning Based Federated Learning for Waste and Natural Disaster Image Classification. IEEE Access 2020, 8, 208518–208531. [Google Scholar] [CrossRef]
- Wu, M.; Li, C.; Yao, Z. Deep Active Learning for Computer Vision Tasks: Methodologies, Applications, and Challenges. Appl. Sci. 2022, 12, 8103. [Google Scholar] [CrossRef]
- Kurniawan, H.; Mambo, M. Homomorphic Encryption-Based Federated Privacy Preservation for Deep Active Learning. Entropy 2022, 24, 1545. [Google Scholar] [CrossRef] [PubMed]
- Li, Y.; Chen, M.; Liu, Y.; He, D.; Xu, Q. An Empirical Study on the Efficacy of Deep Active Learning for Image Classification. arXiv 2022, arXiv:2212.03088. [Google Scholar] [CrossRef]
- Hu, W.; Huang, Y.; Wei, L.; Zhang, F.; Li, H. Deep Convolutional Neural Networks for Hyperspectral Image Classification. J. Sens. 2015, 2015, 258619. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, H.; Shen, Q. Spectral–Spatial Classification of Hyperspectral Imagery with 3D Convolutional Neural Network. Remote Sens. 2017, 9, 67. [Google Scholar] [CrossRef]
- Yue, J.; Zhao, W.; Mao, S.; Liu, H. Spectral–spatial classification of hyperspectral images using deep convolutional neural networks. Remote Sens. Lett. 2015, 6, 468–477. [Google Scholar] [CrossRef]
- Hasan, N.; Bao, Y.; Shawon, A.; Huang, Y. DenseNet Convolutional Neural Networks Application for Predicting COVID-19 Using CT Image. SN Comput. Sci. 2021, 2, 389. [Google Scholar] [CrossRef]
- Hemalatha, J.; Roseline, S.A.; Geetha, S.; Kadry, S.; Damaševičius, R. An Efficient DenseNet-Based Deep Learning Model for Malware Detection. Entropy 2021, 23, 344. [Google Scholar] [CrossRef]
- Qin, J.; Pan, W.; Xiang, X.; Tan, Y.; Hou, G. A biological image classification method based on improved CNN. Ecol. Inform. 2020, 58, 101093. [Google Scholar] [CrossRef]
- Yang, G.; Gewali, U.B.; Ientilucci, E.; Gartley, M.; Monteiro, S.T. Dual-Channel Densenet for Hyperspectral Image Classification. In Proceedings of the IGARSS 2018—2018 IEEE International Geoscience and Remote Sensing Symposium, Valencia, Spain, 22–27 July 2018; pp. 2595–2598. [Google Scholar]
- Xianjia, Y.; Queralta, J.P.; Heikkonen, J.; Westerlund, T. Federated Learning in Robotic and Autonomous Systems. Procedia Comput. Sci. 2021, 191, 135–142. [Google Scholar] [CrossRef]
- Rivest, R.L.; Adleman, L.; Dertouzos, M.L. On data banks and privacy homomorphisms. Found. Secur. Comput. 1978, 4, 169–180. [Google Scholar]
- Fontaine, C.; Galand, F. A Survey of Homomorphic Encryption for Nonspecialists. EURASIP J. Inf. Secur. 2007, 2007, 13801. [Google Scholar] [CrossRef]
- Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the Advances in Cryptolo-gy—EUROCRYPT’99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; pp. 223–238, Proceedings 18. [Google Scholar]
- Phong, L.T.; Aono, Y.; Hayashi, T.; Wang, L.; Moriai, S. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 2017, 13, 1333–1345. [Google Scholar] [CrossRef]
- Zhang, L.; Xu, J.; Vijayakumar, P.; Sharma, P.K.; Ghosh, U. Homomorphic encryption-based privacy-preserving federated learning in iot-enabled healthcare system. IEEE Trans. Netw. Sci. Eng. 2022, 1–17. [Google Scholar] [CrossRef]
- Fang, H.; Qian, Q. Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning. Future Internet 2021, 13, 94. [Google Scholar] [CrossRef]
- Haider, M.; Ahmed, I.; Rawat, D.B. Cyber Threats and Cybersecurity Reassessed in UAV-assisted Cyber Physical Systems. In Proceedings of the 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN), Barcelona, Spain, 5–8 July 2022; pp. 222–227. [Google Scholar]
- Guo, L.; Gao, W.; Cao, Y.; Lai, X. Research on medical data security sharing scheme based on homomorphic encryption. Math. Biosci. Eng. 2022, 20, 2261–2279. [Google Scholar] [CrossRef]
- Zhu, C.; Zhu, X.; Ren, J.; Qin, T. Blockchain-enabled federated learning for UAV edge computing network: Issues and solutions. ACM Comput. Surv. 2022, 21, 1–27. [Google Scholar] [CrossRef]
- Zhu, H.; Jin, Y. Multi-Objective Evolutionary Federated Learning. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31, 1310–1322. [Google Scholar] [CrossRef]
- Mahmudnia, D.; Arashpour, M.; Bai, Y.; Feng, H. Drones and Blockchain Integration to Manage Forest Fires in Remote Regions. Drones 2022, 6, 331. [Google Scholar] [CrossRef]
- Kyrkou, C.; Theocharides, T. Deep-Learning-Based Aerial Image Classification for Emergency Response Applications Using Unmanned Aerial Vehicles. In Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, 16–17 June 2019; pp. 517–525. [Google Scholar] [CrossRef]
Notation | Description | Notation | Description |
---|---|---|---|
N | Nonce | No | Normal |
TS | Time Stamp | En | Encryption |
Dv | IoT Device | De | Decryption |
Ms | MEC server | Pu | Public key |
Ud | UAV device | Pv | Private key |
Ss | Secure server | H | Hash |
V | Validation process | N | Nonce |
La&l | latitude and longitude | XORf | XOR filter |
MACA | MAC address | FDA | Federated Averaging |
S | Suspicious | SGD | stochastic gradient descent |
M | Malicious |
Reference and Name | Advantages and Achieved Performance | Type of Threat Model | Network Environment | Limitations |
---|---|---|---|---|
[26] CoMAD | Security layer and obscurity are increased | Extended DY Model | FANET | CoMAD makes use of a centralized architecture and not tested with decentralized |
[28] UAVouch | A high level of detection accuracy with an acceptable overhead | Informal threat Model | FANET | RSA key size can be a problem for hardware-limited systems |
[29] SENTINEL | A low computational overhead, reduced traffic, and an efficient execution | Dolev-Yao (DY) Model | Typical IoD | - |
[30] PKI-based authentication protocol | An efficient and robust system | Informal threat Model | Typical IoD | The communication cost of the proposed scheme is slightly Different |
[31] L-PPS | Energy efficiency, computation cost and robustness | Informal threat Model | UAV-based IoT | Less computation and communication costs |
[32] A Random Label and Lightweight Hash-Based Security Authentication | Throughput and delay have been increased | Informal threat Model | Large-scale UAV Swarm | - |
[33] Identity and Aggregate Signature-Based Authentication Protocol | Complexity is low, and communication and computation are low | Informal threat Model | IoD for military Scenarios | - |
[34] An ECC-Based Authentication Scheme | Security vs efficiency trade-off | eCK adversary model | Typical IoD | - |
[35] Intelligent UAV Identity Authentication and Safety Supervision | Modeling complexity is low, while accuracy is good | - | UAV-based Network | - |
[36] A secure authentication scheme framework | Cost-effective computation | Informal threat Model | Wireless Sensor Network (WSN) | Limited resources and energy available |
[37] A Provable and Privacy-Preserving Authentication Scheme | Low computation and communication costs, small key size and enhanced secrecy are all benefits | DY model | UAV-enabled IntelligentTransportation Systems (ITS) | - |
[38] pairing-free authentication scheme (CLAS) | The ability to be unforgeable and practical | Informal threat model | UAV-based Network | - |
[39] SDC framework prototype | Detection of drone intrusions | - | UAV swarm | - |
[40] a federated learning-based drone authentication model | An excellent accuracy rate | Informal threat Model | UAV-based IoT | - |
[41] CH safeguarding mechanism | The system is accurate and low in computational overhead | Informal threat Model | UAV swarm | Low computational complexity in the UAV network |
[42] a novel blockchain-based technique | An efficient and secure peer-to-peer network | Informal threat Model | UAV-based Network | - |
[43] (SLPAKA) technique for IoD deployment | Cost-effective computation and communication, low energy consumption | Canetti– Krawczyk (CK) Model | Typical IoD | Lower energy consumption and computational time |
[44] ACSUD-IoD | Communication and computation overhead is low, and robustness is high | DY and CK Models | Typical IoD | - |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alsumayt, A.; El-Haggar, N.; Amouri, L.; Alfawaer, Z.M.; Aljameel, S.S. Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones. Sensors 2023, 23, 5148. https://doi.org/10.3390/s23115148
Alsumayt A, El-Haggar N, Amouri L, Alfawaer ZM, Aljameel SS. Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones. Sensors. 2023; 23(11):5148. https://doi.org/10.3390/s23115148
Chicago/Turabian StyleAlsumayt, Albandari, Nahla El-Haggar, Lobna Amouri, Zeyad M. Alfawaer, and Sumayh S. Aljameel. 2023. "Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones" Sensors 23, no. 11: 5148. https://doi.org/10.3390/s23115148
APA StyleAlsumayt, A., El-Haggar, N., Amouri, L., Alfawaer, Z. M., & Aljameel, S. S. (2023). Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones. Sensors, 23(11), 5148. https://doi.org/10.3390/s23115148