Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture

Hui Xie, Jun Zheng, Shengjun Wei*, Changzhen Hu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Because of the inadequate network coverage and latency, Unmanned Aerial Vehicles (UAVs) may only move within the control range of the Ground Station (GS). The ability of UAVs to communicate with one another is also restricted by distance. These will make performing a task difficult. Simultaneously, data exchanged among UAVs as well as between UAVs and GSs encounter the threat of cyber attackers. This necessitates the development of a secure UAV task management system capable of achieving ubiquitous control of UAV swarms and secure UAV task management. In this work, we propose a Ubiquitous UAV Task Security Management Architecture (U-UTSM) using blockchain and 6G technologies. 6G technology is leveraged to enable real-time communication security and ubiquitous control of UAVs, as well as efficient network capacity. Various blockchains are designed to ensure the security of task data and the authenticity of entities. Furthermore, for the flight ad hoc network (FANET) and the distributed control network (DCN), respectively, a rapid consensus mechanism (RCS) and a UAV emergency consensus mechanism (UAV-Emergency) are developed to ensure data consistency. The experimental results reveal that the number of blocks generated per minute (BPM) and transaction per second (TPS) of RCS are 300x and 40x higher than the Proof-of-Work (PoW), respectively, while the BPM and TPS of UAV-Emergency are 100x and 15x higher than PoW, respectively.

Original languageEnglish
Pages (from-to)259-267
Number of pages9
JournalComputer Communications
Volume217
DOIs
Publication statusPublished - 1 Mar 2024

Keywords

  • 6G technology
  • Blockchain
  • Consensus mechanism
  • Data Security
  • UAV swarm
  • Ubiquitous control

Fingerprint

Dive into the research topics of 'Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture'. Together they form a unique fingerprint.

Cite this