A Hierarchical Blockchain-Based Trust Measurement Method for Drone Cluster Nodes
Abstract
:1. Introduction
- (1)
- To address the issues of a single trust evaluation factor and inadequate trust computation in the assessment of trustworthiness for UAV nodes, this paper proposes a UAV node dynamic trust evaluation method, which utilizes multiple trust factors. The model incorporates a dynamic trust decay factor to effectively leverage the historical trustworthiness of UAV nodes. It employs an information entropy-based optimization method for calculating the trustworthiness weight and computes the reputation value for each node through a reputation fusion algorithm.
- (2)
- To address the need for real-time trust evaluation of newly joined nodes during the dynamic composition of drone formations, we propose a trust management mechanism for UAVs based on a hierarchical blockchain. According to the characteristics of a cross-domain combination of UAVs, the layered blockchain is used to manage and record its trust value to improve the efficiency of the blockchain’s transaction validation process. Additionally, considering that regular UAV nodes may have limited computational power, we leverage the high computational power of cluster head nodes to offload the consensus validation tasks of UAV nodes, reducing the consensus latency and enhancing the overall efficiency of the blockchain system.
- (3)
- We build a simulated drone cluster scene through the NS3 and MATLAB simulation platform, install the reputation value evaluation algorithm on the UAV node, and compare it with other existing schemes to verify the effectiveness of the evaluation algorithm in this paper. By comparing the blockchain delays of different resource allocation schemes, the efficiency of the blockchain system scheme in this paper is verified.
2. Trust Metric Model of Unmanned Aerial Vehicle Cluster Nodes Based on Hierarchical Blockchain
2.1. The Proposed Model
2.2. A Dynamic Evaluation Method for Drone Node Trust Based on Task Perception
2.2.1. Direct Trust Evaluation
2.2.2. Recommendation Trust Evaluation
2.2.3. Comprehensive Trust Calculation and Update
- (1)
- Integrated trust calculation
- (2)
- Trust renewal
- The evaluation node first calculates the direct trust degree and indirect trust degree of the node to be evaluated.
- The evaluation node queries the historical trust degree of the node to be evaluated from the first-level blockchain of the trust management area.
- The evaluation node calculates the comprehensive trust based on direct trust, indirect trust, and historical trust.
- After evaluating the trust of all surrounding nodes, the trust record is stored in the tier-1 blockchain.
- (3)
- Trust calculation process
Algorithm 1 Trust Evaluation Algorithm |
|
2.2.4. Trust Fusion Algorithm
2.3. Blockchain Data Sharing Mechanism under Resource Constraints
2.3.1. Integrated Blockchain and UAV System
2.3.2. Election of the Consensus Leader Node
2.3.3. Consensus Process
- S1
- Within each cluster, the cluster head node updates the reputation evaluation based on the historical block generation behavior of the nodes. At the same time, the cluster head node sets the mining task difficulty based on its computational power used to solve the PoW nonce problem and the reputation update cycle requirement for the second blockchain.
- S2
- After completing the mining difficulty assessment, the cluster head node starts solving the PoW problem by finding a valid nonce to ensure the security of the block header. The cluster nodes collect interaction information.
- S3
- The slave nodes, upon receiving the reputation evaluation, are led by the leader node to reach the PBFT consensus.
- S4
- After completing one PBFT-block generation, the cluster nodes switch to the next leader node for the next PBFT consensus.
- S5
- During the mining process, the cluster head node continuously receives PBFT blocks and records the metadata of valid blocks in the block list.
- S6
- After finding the valid nonce, the cluster head node broadcasts it among the cluster heads to achieve consensus among other clusters.
2.3.4. Latency Analysis
- S1
- Request: The block-generating node sends an unverified content block to the leader node. The content block includes the signature of the transaction user, and the block-generating node signs the content block. After the leader node verifies the signature, it proceeds to the next step.
- S2
- Latency Analysis: The delay in the request phase mainly comes from the leader node’s verification of the block-generating node’s signature. Assuming that the CPU cycles required for signature verification are , the offloaded verification computational power of the leader node is , the size of the received message is , and the offloading rate is ; the time required to complete this step can be expressed as
- S3
- Pre-Prepare: Nodes sign the unverified content block and send the signed pre-prepared message to other nodes.
- S4
- Latency Analysis: The delay in the pre-prepare phase mainly comes from the leader node signing the received message and multicasting it to all other slave nodes. Assuming that the CPU cycles required for signing and verifying the received message digest are , the size of the received message is , and the broadcast rate of the leader node is ; the time required for the leader node to complete this step is calculated as
- S5
- Prepare: In the prepare phase, slave nodes validate the signature of the leader node to ensure that no one has forged the message. After checking the integrity of the message, the signature indicates agreement to validate and acknowledge receipt. The signed prepared message is then sent to other nodes. Each node receives (f being the number of tolerated Byzantine nodes) and prepares messages before proceeding to the next step.
- S6
- Latency Analysis: In the prepare phase, the leader node needs to generate its signature for the prepare message and send it to the secondary nodes. It also needs to validate to prepare messages from other slave nodes. Let us assume that the CPU cycles required for signature verification of the prepared message are , and the size of the prepared message is . The leader node requiresIt should be noted that the final delay required for this step depends on the time taken by the last node to complete the task. Thus, the array is created by arranging the time required for each node to complete the task in ascending order, giving us .
- S7
- Commit: In the commit phase, all nodes verify the integrity of the content. Slave nodes also verify if the content block is from the block-producing node. After verification, each node sends confirmation messages to other nodes. When a node receives confirmation messages, it knows that the data are correct and proceeds to the next step.
- S8
- Latency Analysis: In the commit phase, all nodes need to verify the integrity of the block content, sign it, and multicast the commit message to each slave node. Slave nodes also need to verify the signature of the block-producing node. Let represent the CPU cycles required for verifying the integrity, represent the CPU cycles required for signing and verifying the commit message, represent the size of unloaded information, and represent the size of the broadcast message. The latency for the leader node can be calculated asThe latency for slave nodes can be calculated asSimilarly, the array contains the time required for each node to complete the task, sorted in ascending order as .
- S9
- Reply: All nodes send their signed commit messages to the blockchain, where the data becomes a pending transaction awaiting inclusion in a new block.
- S10
- Latency Analysis: In the reply phase, all nodes include their signatures in the reply messages and send them to the blockchain. The time required for each node to complete this task can be represented asBy arranging the completion times of all nodes in ascending order, we obtain an array , and the final latency, denoted as .The total block generation time of the PBFT consensus within a drone cluster is calculated asTherefore, the optimization problem can be formulated as
3. Simulation and Results
3.1. Construction of the UAV Simulation Experiment Environment Based on the NS3 Platform
- (1)
- Number of drones in each cluster: A UAV cluster in three simulated airspaces is selected, with 10 UAVs in each airspace, and the communication requirements among UAVs in the cluster are considered.
- (2)
- Data transmission rate: To simulate the rate of data transmission, we set the appropriate data transmission rate. According to the communication technology and transmission requirements used in the UAV cluster, we set the data rate of 11 Mbps transmission per second to ensure the reliability of the data transmission performance of the UAV cluster.
- (3)
- Routing protocol: To transmit data between drones, the ad hoc on-demand distance vector (AODV) routing protocol is selected as the communication protocol. AODV is a commonly used wireless ad hoc network routing protocol, which is suitable for the dynamic network environment in UAV clusters. At the same time, the wireless device is set to AdhocWifiMac, and the networking mode of the drone cluster is set to ad-hoc, which is more in line with the data networking behavior of real drones.
- (4)
- Wireless scenario: Using the appropriate wireless WIFI scene in the simulation model, to simulate the real environment of the wireless communication environment, the GroupMobilityModel mobile model and FriisPropagationLossModel path loss model are chosen to accurately describe the wireless transmission characteristics between the unmanned aerial vehicles (UAVs). GroupMobilityModel is a group movement model that is used to simulate simulation nodes to form groups and carry out cooperative movement according to certain rules, and can simulate the cooperative task movement of UAV clusters. The FriisPropagationLossModel fries propagation loss model, also called the free space propagation loss model, is a kind based on free space transmission theory, suitable for no obstacle of the simple path loss model of the open space environment, which will simulate UAV cluster signal propagation loss in a three-dimensional space.
- (5)
- Communication distance: In the simulation, we set the communication distance between drones. This is determined according to the communication technology and scenario requirements of the UAV. We set the communication range of each UAV to 50 m to simulate the communication distance in the real environment; when the communication distance is too large, the communication efficiency will rapidly decline.
3.2. Analysis of UAV Node Trust Evaluation Results
- (1)
- Malicious node judgment accuracy
- (2)
- Trust value change rate
3.3. Simulation Parameters of the Blockchain System
3.4. Analysis of Blockchain Simulation Results
4. Discussion and Future Work
- (1)
- For the layered blockchain-based UAV reputation management mechanism proposed in this paper, the PoW consensus mechanism is used. Since the PoW consensus mechanism depends on computing power, there may be a certain burden on UAV energy management. In the subsequent research, we will conduct in-depth research on blockchain technology and select the consensus mechanism more suitable for the UAV scenario, reducing the burden on UAV endurance.
- (2)
- For the DEMDT-TPT proposed in this paper, there may be improper trust management of UAVs under certain circumstances. Considering the resource scheduling problem of trust management in the UAV scenario, we will optimize the processing flow of UAV trust data and improve the algorithm to achieve better performance.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
- The following abbreviations are used in this manuscript:
Acronym | Implication |
PoW | Proof of Work |
PoS | Proof of Stake |
PBFT | Practical Byzantine Fault Tolerance |
DEMDT-TPT | Dynamic Evaluation Method for Drone Node Trust Based on Task Perception |
AODV | Ad hoc On-Demand Distance Vector Routing |
References
- Jia, Y.; Tian, S.; Li, Q. Recent development of unmanned aerial vehicle swarms. Acta Aeronaut. Astronaut. Sin. 2020, 41, 723738. [Google Scholar]
- Noor, F.; Khan, M.A.; Al-Zahrani, A.; Ullah, I.; Al-Dhlan, K.A. A review on communications perspective of flying ad-hoc networks: Key enabling wireless technologies, applications, challenges and open research topics. Drones 2020, 4, 65. [Google Scholar] [CrossRef]
- Ge, C.; Zhou, L.; Hancke, G.P.; Su, C. A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks. IEEE Internet Things J. 2021, 8, 12481–12489. [Google Scholar] [CrossRef]
- Xin, D.; Tunan, X.; Xianchang, L. Future-oriented Collaborative Incentive Mechanism of UAV Cross-domain Tasks: Based on the Token Idea. J. Command. Control. 2023, 9, 66–75. [Google Scholar]
- Lakew, D.S.; Sa’ad, U.; Dao, N.N.; Na, W.; Cho, S. Routing in flying ad hoc networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2020, 22, 1071–1120. [Google Scholar] [CrossRef]
- Wen, S.; Deng, L.; Shi, S.; Fan, X.; Li, H. Distributed congestion control via outage probability model for delay-constrained flying Ad Hoc networks. Wirel. Commun. Mob. Comput. 2020, 2020, 1–9. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V.; Sahu, N.; Guizani, M. Applications of blockchain in unmanned aerial vehicles: A review. Veh. Commun. 2020, 23, 100249. [Google Scholar] [CrossRef]
- Chen, Y.; Jia, L. Two-layer grouped Byzantine fault tolerance algorithm for UAV swarm. J. Commun. 2022, 43, 96–103. [Google Scholar]
- Alaa, M.; Oumayma, A.D.; Mohamad, A.J. Towards Trust Model in Unmanned Aerial Vehicle Ad Hoc Networks. J. Commun. Softw. Syst. 2021, 17, 213–220. [Google Scholar] [CrossRef]
- Singh, K.; Verma, A.K. TBCS: A trust based clustering scheme for secure communication in flying ad-hoc networks. Wirel. Pers. Commun. 2020, 114, 3173–3196. [Google Scholar] [CrossRef]
- Nivedita, V.; Nandhagopal, N. Improving QoS and efficient multi-hop and relay based communication framework against attacker in MANET. J. Ambient. Intell. Humaniz. Comput. 2020, 12, 4081–4091. [Google Scholar] [CrossRef]
- Singh, K.; Verma, A.K. A fuzzy-based trust model for flying ad hoc networks(FANETs). Int. J. Commun. Syst. 2018, 31, 23–47. [Google Scholar] [CrossRef]
- Pouyan, A.A.; Yadollahzadeh Tabari, M. FPN-SAODV: Using fuzzy Petri nets for securing AODV routing protocol in mobile Ad hoc network. Int. J. Commun. Syst. 2017, 30, e2935. [Google Scholar] [CrossRef]
- Zeng, Y.; Zhou, J.; Liu, Y.; Cao, T.; Yang, D.; Liu, Y.; Shi, X. Trustworthy Routing Protocol for Unmanned Aerial Vehicle Ad Hoc Networks. J. Comput. Sci. Explor. 2021, 15, 2304–2314. [Google Scholar]
- Asuquo, P.; Cruickshank, H.; Ogah, C.P.A.; Lei, A.; Sun, Z. A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J. Sel. Areas Commun. 2018, 36, 246–256. [Google Scholar] [CrossRef]
- Cho, J.H.; Chen, R. PROVEST: Provenance-based trust model for delay tolerant networks. IEEE Trans. Dependable Secur. Comput. 2016, 15, 151–165. [Google Scholar] [CrossRef]
- Ge, C.; Ma, X.; Liu, Z. A semi-autonomous distributed blockchain-based framework for UAVs system. J. Syst. Archit. 2020, 107, 101728. [Google Scholar] [CrossRef]
- Gai, K.; Wu, Y.; Zhu, L.; Choo, K.K.R.; Xiao, B. Blockchain-enabled trustworthy group communications in UAV networks. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4118–4130. [Google Scholar] [CrossRef]
- Chen, A.G.; Zhou, X.C.; Wen, X.Y.; Li, J.H.; Yan, K.; Xie, X.R. A Hierarchical Blockchain-based Identity Authentication Scheme for Drone Clusters. In Proceedings of the 2021 Chinese Automation Congress, Beijing, China, 22–24 October 2021; pp. 378–383. [Google Scholar]
- Tan, Y.; Liu, J.; Kato, N. Blockchain-based key management for heterogeneous flying ad hoc network. IEEE Trans. Ind. Inform. 2020, 17, 7629–7638. [Google Scholar] [CrossRef]
- Xiao, Y.; Zhang, N.; Lou, W.; Hou, Y.T. A Survey of Distributed Consensus Protocols for Blockchain Networks. IEEE Commun. Surv. Tutor. 2020, 22, 1432–1465. [Google Scholar] [CrossRef]
- Cui, L.; Yang, S.; Chen, Z.; Pan, Y.; Xu, M.; Xu, K. An Efficient and Compacted DAG-Based Blockchain Protocol for Industrial Internet of Things. IEEE Trans. Ind. Inform. 2020, 16, 4134–4145. [Google Scholar] [CrossRef]
- Xu, G.; Liu, Y.; Khan, P.W. A Survey of Distributed Consensus Protocols for Blockchain Networks. IEEE Trans. Ind. Inform. 2020, 16, 4252–4259. [Google Scholar] [CrossRef]
- Xu, Y.; Zhang, H.; Ji, H.; Yang, L.; Li, X.; Leung, V.C.M. Transaction Throughput Optimization for Integrated Blockchain and MEC System in IoT. IEEE Trans. Wirel. Commun. 2022, 21, 1022–1036. [Google Scholar] [CrossRef]
- Barka, E.; Kerrache, C.A.; Benkraouda, H.; Shuaib, K.; Ahmad, F.; Kurugollu, F. Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure. Trans. Emerg. Telecommun. Technol. 2022, 33, e3706. [Google Scholar] [CrossRef]
- Kang, J.; Xiong, Z.; Niyato, D.; Ye, D.; Kim, D.I.; Zhao, J. Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory. IEEE Trans. Veh. Technol. 2019, 68, 2906–2920. [Google Scholar] [CrossRef]
- Keshavarz, M.; Gharib, M.; Afghah, F.; Ashdown, J.D. UASTrustChain: A decentralized blockchain-based trust monitoring framework for autonomous unmanned aerial systems. IEEE Access 2020, 8, 226074–226088. [Google Scholar] [CrossRef]
- Yang, J.; Liu, X.; Jiang, X.; Zhang, Y.; Chen, S.; He, H. Toward Trusted Unmanned Aerial Vehicle Swarm Networks: A Blockchain-Based Approach. IEEE Veh. Technol. Mag. 2023, 18, 98–108. [Google Scholar] [CrossRef]
- Chen, J.M.; Li, T.T.; Panneerselvam, J. TMEC: A trust management based on evidence combination on attack-resistant and collaborative internet of vehicles. IEEE Access 2018, 7, 148913–148922. [Google Scholar] [CrossRef]
Literature | Research Scheme | Main work | Disadvantage |
---|---|---|---|
[9] | Light-weight trust-quality routing protocol | Calculate trust values based on historical information in the network | Trust evaluation factor is single |
[10] | Fuzzy classification trust-based secure clustering scheme | Multi-criteria for classification and optimization to evaluate nodes’ trust | Communication overhead is large and high network failure rate |
[11] | Random Repeated Trust Computing Trust Management | Further considers the weight of multiple trust evaluation factors such as residual energy and channel quality | Trust evaluation weight is fixed |
[12] | A New Trust Model Based on Fuzzy Logic | Adjust the evaluation factor weights according to the cluster center and calculate the trust degree | The timeliness of trust is ignored, and the packet loss rate is high |
[13] | Secure Mobile Ad Hoc Network Routing Protocol FPN-SAODV | Divide trust levels to realize fuzzy security verification between nodes | The timeliness of trust is ignored, and the packet loss rate is high |
[14] | Adaptive Fuzzy Trust Aggregation Network | Multiple trust evaluation factors, introducing trust fluctuation penalty factors, and correcting node trust | Long network delay and high communication overhead |
[15] | Decentralized trust management scheme DTMS | Comparing the relationship between the forwarding number of the node and the energy consumption rate to obtain the trust value | Trust evaluation factor is single, and the communication overhead is large |
[16] | A trust model based on traceability-PROVEST | Reversely infer the trust value of the message-generating node or operating node according to the integrity of the message | Only use the trust value of the predecessor node to judge whether the task message has been tampered |
Simulation Parameters | Value |
---|---|
Number of clusters | 3 |
Number of drones in each cluster | 10 |
Bandwidth | 10 MHz |
UAV transmission power | DssRate 11 MHz |
Routing protocol | AODV |
Mobile model | GroupMobilityModel |
Loss model | FriisPropagationLossModel |
Communication distance | 50 m |
Initial trust value | s |
Simulation Parameters | Value |
---|---|
16 GHz | |
5 MHz | |
cycles | |
cycles | |
cycles | |
cycles | |
cycles | |
5 MHz, 15 MHz | |
1 Gb/s | |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zuo, J.; Cao, R.; Qi, J.; Gao, P.; Wang, Z.; Li, J.; Zhang, L.; Lu, Y. A Hierarchical Blockchain-Based Trust Measurement Method for Drone Cluster Nodes. Drones 2023, 7, 627. https://doi.org/10.3390/drones7100627
Zuo J, Cao R, Qi J, Gao P, Wang Z, Li J, Zhang L, Lu Y. A Hierarchical Blockchain-Based Trust Measurement Method for Drone Cluster Nodes. Drones. 2023; 7(10):627. https://doi.org/10.3390/drones7100627
Chicago/Turabian StyleZuo, Jinxin, Ruohan Cao, Jiahao Qi, Peng Gao, Ziping Wang, Jin Li, Long Zhang, and Yueming Lu. 2023. "A Hierarchical Blockchain-Based Trust Measurement Method for Drone Cluster Nodes" Drones 7, no. 10: 627. https://doi.org/10.3390/drones7100627
APA StyleZuo, J., Cao, R., Qi, J., Gao, P., Wang, Z., Li, J., Zhang, L., & Lu, Y. (2023). A Hierarchical Blockchain-Based Trust Measurement Method for Drone Cluster Nodes. Drones, 7(10), 627. https://doi.org/10.3390/drones7100627