Scheduling and Securing Drone Charging System Using Particle Swarm Optimization and Blockchain Technology
Abstract
:1. Introduction
2. Literature Review
3. Scheduling and Securing Drone Charging System
- (1)
- Charging scheduling: using this operation, the proposed system utilizes three algorithms for optimizing drone scheduling on charging station points. The first algorithm is particle swarm optimization (PSO) [40], which maximizes drone routing to prevent collisions during charging flights. The second algorithm is proof-of-schedule (PoSch) consensus algorithm [41], which can be adapted for scheduling drone charging requests based on four random scheduling techniques. Finally, the third algorithm is the Stackelberg game-based auction [16] to optimize drone charging schedules produced by proof-of-schedule (PoSch) consensus algorithm
- (2)
- Charging authentication and verification: using this operation, a proposed blockchain protocol can secure, authenticate, and verify the charging transactions between scheduled drones and charging station points. The main objective of this operation is to validate the drone charging requests to detect unauthorized drones in the blockchain network. The valid charging transactions are then encapsulated and securely stored in a new block, which is then added to the blockchain.
Algorithm 1: Scheduling and Authenticating Drone Charging Transactions |
Procedure: Scheduling and Authenticating Drone Charging Transactions |
// optimization step using Particle Swarm Algorithm |
// Scheduling Step using Proof-of-schedule (PoSch) Algorithm |
// verifying charging transactions using a Blockchain Protocol |
Blockchain= a new block |
Print (“Invalid Charging Transaction”) |
3.1. Authenticating Drones and Charging Stations’ Identities
- (1)
- ED25519 is a public-key signature system based on Edwards-curve Digital Signature Algorithm (EdDSA). This recent and secure digital signature technique depends on the performance of optimized elliptic curves, such as the 255-bit curve (Curve 25519) [42]. Ed25519 uses short private keys (32 or 57 bytes), short public keys (32 or 57 bytes), and small signatures (64 or 114 bytes) with a high security level at the same time. The two generated ED25519-based keys (private and public) can authenticate the identities of drones and charge station points, as depicted in Figure 2. We use the ED25519 as an authentication technique due to the following attractive security features:
- (1)
- fast single-signature verification,
- (2)
- very fast message signing,
- (3)
- fast key generation,
- (4)
- small signatures and small keys,
- (5)
- high security level against side-channel attacks and twist-security attacks [43],
- (6)
- hash function collisions resilience,
- (7)
- foolproof session key.
- (2)
- Blockchain is the second technique we use as a secure decentralized repository of the generated ED25519 public keys assigned to drones and charging stations. Moreover, blockchain can manage and verify the charging transactions between drones and secure charging stations. The applicability of using blockchain for storing transaction states in real time and verifying the validity of charging transactions can be justified based on a set of criteria explained in [44] and can be clarified as follows:
- (1)
- Do you need to store the state of data? The answer is YES because, in our proposed system, we need a decentralized repository (as blockchain) to store the generated ED25519 public keys assigned to drones and charging stations, which will be used later to verify charging transactions between drones and charging stations during a session of charging transaction. In addition, the details of the real-time transactions (i.e., states of a transaction between a drone and a station) have to be securely stored in this repository.
- (2)
- Are there multiple participants? The answer is YES because, in our system, drones and charging stations represent the nodes/participants that constitute a decentralized and P2P network system.
- (3)
- Can you use an always online trusted third-party TTP? The answer is NO because, in our system, a proposed blockchain consensus/protocol is responsible for verifying a charging transaction, which will be called automatically once a drone requests a connection with a charging station. Therefore, the blockchain protocol is the alternative verifier to TTP, which works only with a centralized system, but our drone–charging station system is decentralized. Hence. TTP is useless with our proposed approach.
- (4)
- Are all participants known? The answer is YES because, in our proposed system, we have a limited number of drones and charging stations labeled from 1 to N.
- (5)
- Are all participants trusted? The answer is NO because, in our proposed system, some drones or charging stations can work as fake or Sybille nodes; this normally requires a verifier to authenticate and validate charging transactions between drones and charging stations.
- (6)
- Is public verifiability required? The answer with simplicity is YES because transactions have to be validated before storing them in a new block in blockchain. Hence, we proposed a novel blockchain protocol to verify the drone charging process. Hence, our system can be classified as public permission blockchain system.
3.2. Scheduling Drones’ Charging Method
- (1)
- All drones and charging stations are connected based on a P2P network, and the charging transactions are authenticated and verified using a blockchain protocol, as explained in Section 4.1 and Section 4.2.
- (2)
- The PSO algorithm optimizes drone routes while flying toward charging stations to prevent collisions while requesting charging transactions.
- (3)
- The proof-of-schedule (PoSch) consensus algorithm [41] can be adapted to schedule drone charging requests on the charging stations in the blockchain network.
- (4)
- The Stackelberg game theory provided in [16] is then used to optimize the best scheduling technique that has to be followed by all drones. This is to maximize the number of drones that are allowed to charge and minimize the number of dead drones that do not have any available charging stations (dead drones here do not mean crashed drones but mean they are a set of drones that cannot charge through this network; hence, these drones have to search for another network of charging stations).
- (1)
- The new scheduling scenario is a drone–charging station not a client–cloud transaction.
- (2)
- In scheduling drone charging problems, each charging station has two charging slots and can randomly select one of six scheduling algorithms of PoSch to schedule the arriving drones. These algorithms are the most common schedules used by the control processing unit (CPU), which deal with the issue of deciding which of the processes in the ready queue is to be allocated to the CPU: First-Come, First-Served (FCFS) scheduling, Shortest-Job-Next (SJN) scheduling, Priority (Pr) scheduling, Shortest Remaining Time (SRT), Round Robin (RR) scheduling, or Multiple-Level Queues (MLQ) scheduling [45]. In scheduling drone charging problems, these algorithms decide which drones are allocated to a specific charging station point in the ready queue. The successful drone (i.e., the first drone) is guaranteed a charge at the fixed, pre-set price of the charging station. It is allocated to the first charging slot in the charging station, while the other drones enter a game theory-based auction to decide the highest possible charging price to win the second slot in the charging station. The novel update of the PoSch methodology can be depicted in Figure 4. The PoSch protocol is randomly called three times with different scheduling algorithms (i.e., SRT, FCFS, and RR) for three different charging stations, S1, S2, and S3, respectively. In charging station S1, the drone D3 wins fixed price-based charging and is allocated to slot 1 of charging, while drones D1, D4, and D2 enter a game theory-based auction to decide which one will allocate slot 2. The same scenario is repeated in the charging stations S2 and S3 but with different schedules, as clarified in Figure 4.
- (1)
- the drone charging fingerprint code,
- (2)
- the time-stamp of arriving drones to a charging station,
- (3)
- mileage of the drone (i.e., the distance traveled by the drone per unit charge),
- (4)
- drone battery status (i.e., how much drone’s battery is available concerning the total capacity of the drone’s battery),
- (5)
- the price that the drone is ready to pay for being charged.
3.3. Verifying Security of Charging Transactions
- Step 1:
- A drone D sends a charging request to a charging station S.
- Step 2:
- A charging station replies by asking for the private key (PVK) of the drone D.
- Step 3:
- A drone D sends its PVK to the charging station S.
- Step 4:
- Both of PVKs of the drone D and charging station S are then sent to block chain to verify their authenticity.
- Step 5:
- Using the built-in MD5 hash function in the blockchain, a fingerprint code of the charging session is produced and returned to the drone, which requests a charging transaction. This can be achieved if both PVKs match the corresponding public keys of the drone D and charging station S stored in the blockchain.
- Step 6:
- Drone D provides the fingerprint code of the session of charging to the charging station S.
- Step 7:
- The drone D and charging station S check hands and establish a secure and valid charging transaction.
4. Simulation and Experimental Results
4.1. Drones’ Optimization and Scheduling Results
- (1)
- Mean Absolute Error (MAE): It is a metric for evaluating error between two observations in the same experiment. Examples of Y versus X include comparisons of predicted values versus observed values. MAE is calculated as in Equation (1)
- (2)
- Mean Square Error (MSE): This metric evaluates the absolute average distance between real and predicted values. MSE is calculated as in Equation (2)
- (3)
- Root Mean Square Error (RMSE): is the standard deviation of the errors, which result when a prediction is made on a dataset. RMSE is the same as MSE, but the root of the value is considered while evaluating the accuracy of the model. MSE is calculated as in Equation (3)
4.2. The Proposed Blockchain Protocol Results
- (1)
- Read latency (RL). Before defining read latency and it is computed, it is important to differentiate between reading and transaction operations in the blockchain. The read operation refers to an internal mechanism that a blockchain node can implicitly execute to fetch the required data to verify specific transactions. Still, it does not update the blockchain status. On the other hand, a transaction is a state transition that updates data in the blockchain by adding a new block to the chain. Therefore, a transaction is explicitly executed by a blockchain node and verified using a blockchain protocol against a set of rules called a smart contract. If a transaction is valid, the blockchain system will commit the transaction and add a new block to the chain containing all details of this transaction. Therefore, the RL is the time between the read request submitted by a drone and the charging response by the charging station. RL can be calculated as in Equation (4)
- (2)
- Transaction latency (TL) refers to a blockchain network-wide view of the amount of time taken for a transaction from creation to be available across the blockchain network according to the specified network threshold. TL can be calculated as in Equation (4)
- (3)
- Read throughput (RT) is a measure of how many read operations are executed by drones in a specified time interval, where drones can perform several read operations per second (RPS) while they crest transactions with charging stations. Equation (6) is used to calculate RT
- (4)
- Transaction throughput (TT) is the rate at which the blockchain system executes valid transactions of drones with charging stations in a defined time interval, where many drones can do many transactions with many charging stations. This is not the rate at a single blockchain node but across the entire blockchain network. This rate is expressed as transactions per second (TPS) at a specified network size. Equation (7) is used to calculate TT
- (5)
- Ethereum GAZ refers to the fee required to successfully execute a transaction on the Ethereum blockchain platform. GAZ is represented as small fractions of the cryptocurrency ether (ETH), commonly called Gwei and nanoethics. GAZ is used to assign resources to the Ethereum Virtual Machine (EVM) so that decentralized applications, such as smart contracts can self-execute in a secured but decentralized manner. Hence, in our study, GAZ measures how computationally expensive a drone transaction is or how much charging transaction processing is needed.
5. Discussion
- The investigation of optimizing the scheduling of drone charging has shown the efficiency of the PSO algorithm for optimizing drone routes and preventing the drones’ collisions during charging flights with low error rates (MAE = 0.0017 and MSE = 0.0159).
- The proposed scheduling methodology based on the PoSch technique achieved 96.8% success in drone charging cases, while only 3.2% of drones failed to charge after three scheduling rounds.
- The simulation results in Ethereum proved the good performance of the proposed blockchain protocol in managing drone charging transactions within a short time and with low latency.
6. Conclusions and Future Works
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A. Read and Transaction Latency Results
References
- Merkert, R.; Bushell, J. Managing the drone revolution: A systematic literature review into the current use of airborne drones and future strategic directions for their effective control. J. Air Transp. Manag. 2020, 89, 101929. [Google Scholar] [CrossRef] [PubMed]
- Hassanalian, M.; Abdelkefi, A. Classifications, applications, and design challenges of drones: A review. Prog. Aerosp. Sci. 2017, 91, 99–131. [Google Scholar] [CrossRef]
- GlobeNewswire, UAV Drones Market Size to Worth Around US$ 102.38 Bn by 2030. Available online: https://www.globenewswire.com/news-release/2022/03/01/2394915/0/en/UAV-Drones-Market-Size-to-Worth-Around-US-102-38-Bn-by-2030.html#:~:text=The%20global%20unmanned%20aerial%20vehicle,18.2%25%20from%202022%20to%202030 (accessed on 4 November 2021).
- Glade, D. Unmanned Aerial Vehicles: Implications for Military Operations; Center for Strategy and Technology, Air War College, Air University, Maxwell Air Force Base: Montgomery, AL, USA, 2000. [Google Scholar]
- Mahadevan, P. The military utility of drones. In CSS Analyses in Security Policy; Center for Security Studies, ETH: Zurich, Switzerland, 2010; p. 78. [Google Scholar]
- Markets and Markets, Unmanned Aerial Vehicle (UAV) Market. Available online: https://www.marketsandmarkets.com/Market-Reports/unmanned-aerial-vehicles-uav-market-662.html?gclid=Cj0KCQjwgMqSBhDCARIsAIIVN1XI97yxa0c2z_fKIXgR9DmmGrAw924CNXpV4B9J-wJD-lLPlC_MMQsaAttwEALw_wcB (accessed on 4 November 2021).
- Asadzadeh, S.; de Oliveira, W.J.; Filho, C.R.D.S. UAV-based remote sensing for the petroleum industry and environmental monitoring: State-of-the-art and perspectives. J. Pet. Sci. Eng. 2021, 208, 109633. [Google Scholar] [CrossRef]
- Insider Intelligence, Drone Technology Uses and Applications for Commercial, Industrial, and Military Drones in 2021 and the Future. Available online: https://www.businessinsider.com/drone-technology-uses-applications (accessed on 2 August 2021).
- Matt Satell, 16 Eye-Opening Drone Stats for 2021. Available online: https://www.phillybyair.com/blog/drone-stats/ (accessed on 22 December 2021).
- Max Wales, Top 10 Drones with Longest Flight Time for 2021. Available online: https://filmora.wondershare.com/drones/drones-with-longest-flight-time.html (accessed on 2 August 2021).
- Jung, H.; Kim, J. Drone scheduling model for delivering small parcels to remote islands considering wind direction and speed. Comput. Ind. Eng. 2021, 163, 107784. [Google Scholar] [CrossRef]
- Liu, C.; Chen, H.; Li, X.; Liu, Z. A scheduling decision support model for minimizing the number of drones with dynamic package arrivals and personalized deadlines. Expert Syst. Appl. 2020, 167, 114157. [Google Scholar] [CrossRef]
- Xia, J.; Wang, K.; Wang, S. Drone scheduling to monitor vessels in emission control areas. Transp. Res. Part B Methodol. 2018, 119, 174–196. [Google Scholar] [CrossRef]
- Chowdhury, S.; Shahvari, O.; Marufuzzaman, M.; Li, X.; Bian, L. Drone routing and optimization for post-disaster inspection. Comput. Ind. Eng. 2021, 159, 107495. [Google Scholar] [CrossRef]
- Wang, D.; Tan, D.; Liu, L. Particle swarm optimization algorithm: An overview. Soft Comput. 2018, 22, 387–408. [Google Scholar] [CrossRef]
- Hassija, V.; Saxena, V.; Chamola, V. Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory. Comput. Commun. 2019, 149, 51–61. [Google Scholar] [CrossRef]
- Otto, A.; Agatz, N.; Campbell, J.; Golden, B.; Pesch, E. Optimization approaches for civil applications of unmanned aerial vehicles (UAVs) or aerial drones: A survey. Networks 2018, 72, 411–458. [Google Scholar] [CrossRef]
- Liu, Y. An optimization-driven dynamic vehicle routing algorithm for on-demand meal delivery using drones. Comput. Oper. Res. 2019, 111, 1–20. [Google Scholar] [CrossRef]
- Chang, Y.S.; Lee, H.J. Optimal delivery routing with wider drone-delivery areas along a shorter truck-route. Expert Syst. Appl. 2018, 104, 307–317. [Google Scholar] [CrossRef]
- Moshref-Javadi, M.; Winkenbach, M. Applications and Research avenues for drone-based models in logistics: A classification and review. Expert Syst. Appl. 2021, 177, 114854. [Google Scholar] [CrossRef]
- Anwar, N.; Izhar, M.A.; Najam, F.A. Construction monitoring and reporting using drones and unmanned aerial vehicles (UAVs). In Proceedings of the Tenth International Conference on Construction in the 21st Century (CITC-10), Colombo, Sri Lanka, 2–4 July 2018; pp. 2–4. [Google Scholar]
- Khan, A.A.; Shaikh, Z.A.; Laghari, A.A.; Bourouis, S.; Wagan, A.A.; Ali, G.A.A.A. Blockchain-Aware Distributed Dynamic Monitoring: A Smart Contract for Fog-Based Drone Management in Land Surface Changes. Atmosphere 2021, 12, 1525. [Google Scholar] [CrossRef]
- Rottondi, C.; Malandrino, F.; Bianco, A.; Chiasserini, C.F.; Stavrakakis, I. Scheduling of emergency tasks for multiservice UAVs in post-disaster scenarios. Comput. Netw. 2020, 184, 107644. [Google Scholar] [CrossRef]
- Kumar, A.; Singh, Y.; Kumar, N. Secure Unmanned Aerial Vehicle (UAV) Communication using Blockchain Technology. In Recent Innovations in Computing; Springer: Singapore, 2022; pp. 201–211. [Google Scholar] [CrossRef]
- Alkadi, R.; Alnuaimi, N.; Yeun, C.Y.; Shoufan, A. Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues. IEEE Access 2022, 10, 14463–14479. [Google Scholar] [CrossRef]
- Aldhaher, S.; Mitcheson, P.D.; Arteaga, J.M.; Kkelis, G.; Yates, D.C. Light-weight wireless power transfer for mid-air charging of drones. In Proceedings of the 2017 11th European Conference on Antennas and Propagation (EUCAP), Paris, France, 19–24 March 2017; IEEE: New York, NY, USA, 2017; pp. 336–340. [Google Scholar]
- Zhang, S.; Qian, Z.; Wu, J.; Kong, F.; Lu, S. Optimizing Itinerary Selection and Charging Association for Mobile Chargers. IEEE Trans. Mob. Comput. 2016, 16, 2833–2846. [Google Scholar] [CrossRef]
- Raciti, A.; Rizzo, S.A.; Susinni, G. Drone charging stations over the buildings based on a wireless power transfer system. In Proceedings of the 2018 IEEE/IAS 54th Industrial and Commercial Power Systems Technical Conference (I&CPS), Niagara Falls, ON, Canada, 7 May 2018; IEEE: New York, NY, USA, 2018; pp. 1–6. [Google Scholar]
- Kim, S.J.; Lim, G.J. A Hybrid Battery Charging Approach for Drone-Aided Border Surveillance Scheduling. Drones 2018, 2, 38. [Google Scholar] [CrossRef]
- Jin, Y.; Xu, J.; Wu, S.; Xu, L.; Yang, D.; Xia, K. Bus network assisted drone scheduling for sustainable charging of wireless re-chargeable sensor network. J. Syst. Archit. 2021, 116, 102059. [Google Scholar] [CrossRef]
- Rovira-Sugranes, A.; Razi, A.; Afghah, F.; Chakareski, J. A review of AI-enabled routing protocols for UAV networks: Trends, challenges, and future outlook. Ad. Hoc. Netw. 2022, 130, 102790. [Google Scholar] [CrossRef]
- Gonzalez-R, P.L.; Canca, D.; Andrade-Pineda, J.L.; Calle, M.; Leon-Blanco, J.M. Truck-drone team logistics: A heuristic approach to multi-drop route planning. Transp. Res. Part C Emerg. Technol. 2020, 114, 657–680. [Google Scholar] [CrossRef]
- Moshref-Javadi, M.; Hemmati, A.; Winkenbach, M. A truck and drones model for last-mile delivery: A mathematical model and heuristic approach. Appl. Math. Model. 2019, 80, 290–318. [Google Scholar] [CrossRef]
- Das, D.N.; Sewani, R.; Wang, J.; Tiwari, M.K. Synchronized Truck and Drone Routing in Package Delivery Logistics. IEEE Trans. Intell. Transp. Syst. 2020, 22, 5772–5782. [Google Scholar] [CrossRef]
- Fu, J.; Nunez, A.; De Schutter, B. Real-time UAV routing strategy for monitoring and inspection for post-disaster restoration of distribution networks. IEEE Trans. Ind. Inform. 2021, 18, 2582–2592. [Google Scholar] [CrossRef]
- Kim, S.J.; Lim, G.J. Drone-aided border surveillance with an electrification line battery charging system. J. Intell. Robot. Syst. 2018, 92, 657–670. [Google Scholar] [CrossRef]
- Kim, J.; Kim, S.; Jeong, J.; Kim, H.; Park, J.-S.; Kim, T. CBDN: Cloud-Based Drone Navigation for Efficient Battery Charging in Drone Networks. IEEE Trans. Intell. Transp. Syst. 2018, 20, 4174–4191. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Krishna, D.N.G.; Guizani, M. A Distributed Framework for Energy Trading between UAVs and Charging Stations for Critical Applications. IEEE Trans. Veh. Technol. 2020, 69, 5391–5402. [Google Scholar] [CrossRef]
- Shin, M.; Kim, J.; Levorato, M. Auction-Based Charging Scheduling with Deep Learning Framework for Multi-Drone Networks. IEEE Trans. Veh. Technol. 2019, 68, 4235–4248. [Google Scholar] [CrossRef]
- Zhang, Y.; Wang, S.; Ji, G. A comprehensive survey on particle swarm optimization algorithm and its applications. Math. Probl. Eng. 2015. [Google Scholar] [CrossRef] [Green Version]
- Wilczyński, A.; Kołodziej, J. Modelling and simulation of security-aware task scheduling in cloud computing based on Blockchain technology. Simul. Model. Pr. Theory 2019, 99, 102038. [Google Scholar] [CrossRef]
- Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.-Y. High-speed high-security signatures. J. Cryptogr. Eng. 2012, 2, 77–89. [Google Scholar] [CrossRef] [Green Version]
- Fan, J.; Guo, X.; De Mulder, E.; Schaumont, P.; Preneel, B.; Verbauwhede, I. State-of-the-art of secure ECC implementations: A survey on known side-channel attacks and coun-termeasures. In 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST); IEEE: Anaheim, CA USA, 2010; pp. 76–87. [Google Scholar]
- Wüst, K.; Gervais, A. Do you need a blockchain? In Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, 20 June 2018; 2018; pp. 45–54. [Google Scholar]
- H-Educate, CPU Scheduling Algorithms. Available online: https://h-educate.in/cpu-scheduling-algorithms/ (accessed on 22 December 2021).
Round #1 | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Arriving Drones | 50 | 100 | 150 | 200 | 250 | 300 | AVG | ||||||
Number of Charging Stations | 8 | 17 | 26 | 34 | 42 | 50 | |||||||
Number and Percentages of Charging Drones | 41 | 82% | 78 | 78% | 83 | 56% | 98 | 49% | 117 | 46.8% | 136 | 45.4% | 59.5% |
Number and Percentages of Dead Drones | 9 | 18% | 22 | 22% | 67 | 44% | 102 | 51% | 133 | 53.2% | 164 | 54.6% | 40.5% |
Round #2 | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Arriving Drones | 9 | 22 | 67 | 102 | 133 | 164 | AVG | ||||||
Number of Charging Stations | 8 | 17 | 26 | 34 | 42 | 50 | |||||||
Number and Percentages of Charging Drones | 9 | 100% | 19 | 87% | 56 | 84% | 81 | 79.5% | 90 | 67.7% | 87 | 53.1% | 78.55% |
Number and Percentages of Dead Drones | 0 | 0% | 3 | 13% | 11 | 16% | 21 | 20.5% | 43 | 32.3% | 77 | 46.9% | 21.45% |
Round #3 | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Arriving Drones | 0 | 3 | 11 | 21 | 43 | 77 | AVG | ||||||
Number of Charging Stations | 8 | 17 | 26 | 34 | 42 | 50 | |||||||
Number and Percentages of Charging Drones | 0 | 0 | 3 | 100% | 11 | 100% | 21 | 100% | 43 | 100% | 64 | 84% | 96.8% |
Number and Percentages of Dead Drones | 0 | 0% | 0 | 0% | 0 | 0% | 0 | 0% | 0 | 0% | 13 | 16% | 3.2% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Torky, M.; El-Dosuky, M.; Goda, E.; Snášel, V.; Hassanien, A.E. Scheduling and Securing Drone Charging System Using Particle Swarm Optimization and Blockchain Technology. Drones 2022, 6, 237. https://doi.org/10.3390/drones6090237
Torky M, El-Dosuky M, Goda E, Snášel V, Hassanien AE. Scheduling and Securing Drone Charging System Using Particle Swarm Optimization and Blockchain Technology. Drones. 2022; 6(9):237. https://doi.org/10.3390/drones6090237
Chicago/Turabian StyleTorky, Mohamed, Mohamed El-Dosuky, Essam Goda, Václav Snášel, and Aboul Ella Hassanien. 2022. "Scheduling and Securing Drone Charging System Using Particle Swarm Optimization and Blockchain Technology" Drones 6, no. 9: 237. https://doi.org/10.3390/drones6090237
APA StyleTorky, M., El-Dosuky, M., Goda, E., Snášel, V., & Hassanien, A. E. (2022). Scheduling and Securing Drone Charging System Using Particle Swarm Optimization and Blockchain Technology. Drones, 6(9), 237. https://doi.org/10.3390/drones6090237