0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Blockchain-based Secure UAV-assisted Battlefield Operation underlying 5G
Authors :
Dhruvi Pancholi
1
Nilesh Kumar Jadav
2
Sudeep Tanwar
3
Deepak Garg
4
S. Mohammadali Zanjani
5
1- Institute of Technology, Nirma University
2- Institute of Technology, Nirma University
3- Institute of Technology, Nirma University
4- SR University
5- دانشگاه آزاد اسلامی واحد نجف آباد
Keywords :
UAV security،UAV-assisted battlefield environment،Blockchain-based Battlefield Application،5G
Abstract :
The use of unmanned aerial vehicles (UAVs) has significantly increased during the past few years. UAVs have a wide range of applications, but their employment in the defense sector has grown significantly in recent years as a result of their exceptional effectiveness in reducing casualties and enabling the accomplishment of high-profile as well as time-sensitive operations. UAVs are helpful for numerous defense-related operations, such as border patrol, surveillance, emergency management, damage assessment, delivery of medical supplies and armaments, and many others. However, because wireless communication is open, UAVs can be used to undermine the effectiveness of military operations. In this paper, we developed a blockchain-based framework to mitigate security threats from UAVs operating in a combat scenario. The MATLAB virtual environment is used to simulate a battlefield scenario, including UAVs, sensors, enemies, and friendly nodes. The UAV scenario also includes an enemy that continuously manipulates the UAVs to endanger battlefield operations. The suggested framework employs machine learning algorithms to find malicious UAVs. Further, the proposed framework uses blockchain technology to increase security and lessen data tampering attempts. A smart contract (for data validation) is deployed on an IPFSbased public blockchain. In addition, 5G technology is used, which makes it possible for UAVs and the control station to communicate effectively with lower packet error rates and latency. The proposed framework is evaluated by considering evaluation metrics, such as 5G packet error rate, latency, and transaction and execution costs for the blockchain.
Papers List
List of archived papers
ارائه یک الگوریتم سلسله مراتبی جهت تشخیص نفوذ در شبکه های کامپیوتری
دکتر باقر رحیم پور کامی - سیدمحمد سیدی برشی باقر رحیم پور کامی - سیدمحمد سیدی برشی -
روش مهاجرت خوشهای برای بهبود بستربندی به مشتری در گردشکارهای بدون سرویسدهنده
محمدامین قسوری جهرمی - مهرداد آشتیانی - فاطمه بخشی
An Improved Drone Detection Method Using Deep Learning for Augmentation Detection Speed
Mohammad Bahrami - Seyyed Amir Asghari - Mohammadreza Binesh Marvasti - Sajjad Ansaria
AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure
Tanisha Patel - Nilesh Kumar Jadav - Tejal Rathod - Sudeep Tanwar - Deepak Garg - Hossein Shahinzadeh
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Neda Toghraee - Hamid Mala
پیاده سازی سیستم پیش بیمارستانی یافت آمبولانس مناسب در محیط رایانش ابری با استفاده از شبیه ساز کلودسیم
ریحانه حسن رحیمی - فهیمه یزدان پناه
Effective Classifier for Predicting Churn in Payment Terminals Using RFM model and Deep Neural Network
Dr Mahila Dadfarnia - Ali Alemi Matinpour - Dr Monireh Abdoos
Identifying Children's Personality Styles through Drawing Analysis using Machine Learning
Maedeh Mosharraf - Faezeh Banabazi
طبقه بندی آسیبهای لیگامنت با استفاده از تحلیل تصاویر تشدید مغناطیسی توسط الگوریتمهای یادگیری عمیق
محسن اکبری - دکتر مریم مؤمنی محسن اکبری - مریم مؤمنی -
AI-based Message Spam Classification Framework for Secure Autonomous Vehicles Communication
Riya Upadhyay - Mili Virani - Lakshit Pathak - Rajesh Gupta - Sudeep Tanwar - Hossein Shahinzadeh
more
Samin Hamayesh - Version 41.3.1