HTML conversions sometimes display errors due to content that did not convert correctly from the source. This paper uses the following packages that are not yet supported by the HTML conversion tool. Feedback on these issues are not necessary; they are known and are being worked on.

  • failed: eqparbox

Authors: achieve the best HTML results from your LaTeX submissions by following these best practices.

License: arXiv.org perpetual non-exclusive license
arXiv:2403.04796v1 [cs.CR] 05 Mar 2024

Blockchain-Enhanced UAV Networks for Post-Disaster Communication: A Decentralized Flocking Approach

Sana Hafeez, Runze Cheng, Lina Mohjazi, Yao Sun*{}^{*}start_FLOATSUPERSCRIPT * end_FLOATSUPERSCRIPT, Muhammad Ali Imran
James Watt School of Engineering, University of Glasgow
Glasgow G12 8QQ, UK
Abstract

Unmanned Aerial Vehicles (UAVs) have significant potential for agile communication and relief coordination in post-disaster scenarios, particularly when ground infrastructure is compromised. However, efficiently coordinating and securing flocks of heterogeneous UAVs from different service providers poses significant challenges related to privacy, scalability, lightweight consensus protocols, and comprehensive cybersecurity mechanisms. This study introduces a robust blockchain-enabled framework designed to tackle these technical challenges through a combination of consensus protocols, smart contracts, and cryptographic techniques. First, we propose a consortium blockchain architecture that ensures secure and private multi-agency coordination by controlling access and safeguarding the privacy of sensitive data. Second, we develop an optimized hybrid consensus protocol that merges Delegated Proof of Stake and Practical Byzantine Fault Tolerance (DPOS-PBFT), aiming to achieve an effective balance between efficiency, security, and resilience against node failures. Finally, we introduce decentralized flocking algorithms that facilitate adaptable and autonomous operations among specialized UAV clusters, ensuring critical disaster relief functions under conditions of uncertain connectivity. Comprehensive simulations demonstrate the system achieved linear scaling of throughput up to 500 UAV nodes, with only a 50ms increase in latency from 10 to 500 nodes. The framework maintained high throughput and low latency despite spoofing, denial-of-service (DoS), and tampering attacks, showing strong cyber resilience. Communication latencies were kept under 10ms for diverse UAV operations through self-optimizing network intelligence, with median values around 2-3ms.

keywords:
Blockchain, Unmanned Aerial Vehicles (UAVs), Emergency Communications, Data Privacy, Aerial Communications, Secure Wireless Networks.
footnotetext: This paper was submitted in part to IEEE VTC2024-Spring, Singapore.

1 Introduction

Natural disasters, such as hurricanes, floods, and earthquakes, accidents can severely damage critical communication infrastructure, disrupting access to aid and relief coordination. Unmanned aerial vehicles (UAVs) offer the potential for rapidly restoring connectivity, but coordinating heterogeneous UAV flocks poses challenges in security, privacy, and scalability hafeez2023blockchain . This motivates designing innovative blockchain-enabled UAV flocking networks to address limitations. This study proposes a novel framework using blockchain technology to improve UAV operations in post-disaster scenarios.

1.1 Background

Intelligent emergency communication systems are vital for ensuring effective network connectivity during disaster response scenarios. UAVs have proven effective at expanding wireless coverage for Internet-of-Things (IoT) devices due to their ability to hover in diverse locations and establish reliable links derhab2023internet . However, coordinating heterogeneous UAV fleets poses challenges such as limited flight endurance keller2019natural , restricted communication range hafeez2023blockchain , reliance on damaged ground networks and inadequate pre-planned routes wang2023secure , intermittent connectivity damavsevivcius2023sensors , lack of coordination between UAVs and human responders, security vulnerabilities from chaos, and insufficient transparency mechanisms. Recent research has explored decentralized blockchain approaches to help overcome some obstacles through inherent attributes like distribution, security, transparency, automation, and resilience cui2024efficient . However, significant gaps remain before blockchain technology can be successfully incorporated into UAV networks for disaster response ahad20246g , despite analytical frameworks optimizing UAV deployment. Blockchain integration introduces new consensus, interoperability, security, and smart contract design challenges, specifically for decentralized disaster-resilient UAV fleet coordination li2024formation .

Although blockchain-enabled UAV networks have been studied to address security issues in UAV swarms 10051720 , research gaps remain in areas such as real-time data processing efficiency, scalability of blockchain solutions in large swarms, integration with existing air traffic control systems, and the development of standardized interoperability protocols among diverse UAV systems. Further research is also needed on the potential environmental impact and ethical considerations related to surveillance and data privacy. Existing work focuses on building internal trust using blockchain math11102262 , such as UAV practical Byzantine fault tolerance (U-PBFT) for lightweight consensus and real-time trust evaluation zhang2023blockchain . However, dynamic topology and limited UAV resources pose challenges liu2024multistate , highlighting the need for secure, efficient, and intelligent blockchain coordination frameworks tailored for disaster response UAVs to fully realize their decentralized collaborative autonomy potential. This motivates designing a blockchain framework to realize the potential of UAVs for revolutionizing disaster response, addressing identified gaps through innovations in consensus protocols hafeez2024blockchainenabled , interoperability, security mechanisms, and smart contract architectures specialized for resource-constrained UAV disaster response coordination.

1.2 Motivation

This study proposes several innovative solutions to address the identified limitations related to optimized blockchain consensus protocols, heterogeneous network interoperability, security against threats, and adaptive smart contracts for evolving disaster coordination needs. The overarching motivation is to transform disaster response strategies by unlocking the full potential of UAV networks through blockchain integration. Specifically, the aim is to facilitate decentralized, efficient, and autonomous UAV-based operations even in challenging post-disaster environments. This has the potential to significantly improve the effectiveness of time-critical relief efforts wang2024unmanned . A hybrid Delegated Proof of Stake and Practical Byzantine Fault Tolerance (DPoS-PBFT) consensus approach that balances efficiency, security, and fault tolerance is promising for accommodating the constraints of the UAV platform and the volatility of the aerial environment. In addition, bio-inspired flocking techniques based on Reynolds rules olfati2006flocking can enable resilient coordination of UAV clusters under uncertain connectivity during disaster relief. However, decentralized flocking alone cannot address critical security and access control challenges. Therefore, this study holistically tackles these motivations by develo** an advanced decentralized ecosystem for secure, reliable, and optimized coordination among UAV fleets to enhance disaster management. The specific technical details that underpin the system design of the proposed novel framework are elaborated in Sections 3- 5.

1.3 Contributions and Organization

In this study, we introduce a novel framework aimed at enhancing operations in wireless networks. Specifically, we propose strategies to optimize network performance within our framework, while also suggesting additional enhancements. Through simulations, we demonstrate the efficiency and adaptability of our proposed blockchain-based coordination framework, especially in dynamic environments with fluctuating resources, variable channel conditions, and diverse service requirements. The key contributions of this study centre on pioneering advancements in system architecture, consensus protocols, and coordination algorithms to address existing limitations. The main contributions are

  • We propose a blockchain architecture enabling decentralized coordination across UAV networks, with a focus on preserving privacy and access control - crucial for efficient and secure disaster response.

  • We design an optimized DPOS-PBFT consensus protocol for resource-constrained UAVs, balancing efficiency, security, fault tolerance and achieving lightweight processing, high throughput, low latency, and robustness.

  • We present decentralized Reynolds flocking techniques enabling adaptable coordination of UAV swarms under uncertain connectivity.

  • We demonstrate through comprehensive simulations that our proposed framework overcomes limitations in existing UAV network coordination. Specifically, we achieve excellent scalability, cyber resilience, and optimized latency profiles that unlock the potential of decentralized and intelligent UAVs for disaster response.

The rest of the paper is organized as follows. Section 2 provides an overview of the relevant literature. Section 3 presents the architecture and the models of the proposed system. Section 4 details the decentralized flocking algorithm for UAV coordination. Section 5 describes a customized hybrid consensus protocol. Section 6 presents an analysis of the simulation setup and the results. Finally, Section 7 concludes the study and discusses future work.

Table 1: Comprehensive Overview of Challenges, Blockchain-Enabled Solutions, and Research Gaps in UAV Networks for Disaster Response.
Category

Description

Challenges in UAV-based Disaster Response keller2019natural -maza2011experimental
Limited Flight Endurance

Battery dependence limits flight time and operational capability.

Restricted Communication Range

Requires multi-hop routing which introduces delays.

Reliance on Damaged Infrastructure

Reduces navigation and control effectiveness.

Inadequate Pre-Planned Trajectories

Dynamic environments need real-time path replanning.

Intermittent Connectivity

Weather or mobility lead to disruptions.

Lack of Coordination

Between UAVs, ground robots, and human responders.

Security Vulnerabilities

Spoofing, tampering, hijacking due to chaos.

Communication and Delivery

Low efficiency in communication and relief delivery.

Transparency and Accountability

Lack of transparency in relief management.

Collaboration

Low collaboration due to different entity priorities.

Computing and Energy

Centralized paradigms leading to failure points; energy constraints in UAV networks.

Communication Channels

FL training issues due to UAV mobility and unreliable links.

Privacy and Security

Data privacy concerns in UAV-based services.

Caching and Delivery Services

Challenges in content caching and UAV deployment.

Existing and Proposed Blockchain-Enabled Solutions hafeez2022beta -hafeez2023birds -hafeez2024blockchain -hafeez2023blockchain -mendis2020blockchain
Permissioned Blockchains

For efficiency, and privacy compared to public chains.

Lightweight Consensus Protocols

E.g., PBFT, and PoA offer fault tolerance without mining.

Smart Contracts

Automate coordination for flight plans, and information sharing.

Tamper-Proof Data Logging

Using blockchain to record UAV data.

Access Control via Smart Contracts

Secure coordination by authentication.

Enhanced Data Integrity and Security

Secure and immutable ledger for data integrity.

Improved Resource Allocation

Automated resource allocation via smart contracts.

Decentralized Control

Reducing risks of central points of failure.

Transparent Supply Chain Management

Real-time tracking and auditing of relief materials.

Identity Management

Secure verification of individuals and organizations.

Real-Time Data Sharing

Blockchain for efficient information exchange.

Supply Chain Automation

Blockchain for logistics and supply chain optimization.

Tokenization for Incentivization

Rewards for participation in disaster response.

Interoperability Between Systems

Seamless data exchange and coordination.

Open Research Challenges li2024formation -wang2022platform -duan2024design
Adaptive Coordination Algorithms

For dynamic environments and evolving needs.

Handling Intermittent Connectivity

In UAV blockchain networks.

UAV Computational Constraints

Limit complex chaincode and ledger size.

Geo-spatial Smart Contract Support

Needed for location-based UAV coordination.

Security Modeling and Analysis

Against threats like DDoS, and spoofing.

Privacy Preservation

During UAV Surveillance Usage.

Multi-Agency Collaboration

For large-scale disaster response.

Optimization of UAV Payload and Range

For efficient delivery and operation.

Robust Systems for Transparency

Ensuring accountability in relief operations.

Multi-Stakeholder Collaboration Models

For effective information sharing.

Sustainable Energy Solutions

For UAV Networks.

Enhanced Privacy Protection Mechanisms

In UAV-based data gathering and AI model training.

Advanced Algorithms for Content Caching

Efficient delivery services in UAV networks.

Effective Tokenization Mechanisms

For incentivization in disaster response efforts.

Standards and Protocols for Interoperability

Enhanced system integration in UAV networks.

2 Literature Review

2.1 Blockchain-Enabled UAV Solutions for Disaster Response

UAV ad hoc networks have gained significant attention for their rapid deployment capabilities and resilience during disaster scenarios when ground infrastructure fails balakrishna2024device . However, ensuring secure decentralized coordination within these dynamic networks poses several challenges. Blockchain technology offers a promising approach through its inherent features of distributed trust, transparency, and consensus mechanisms to address these challenges chughtai2024drone . Nevertheless, consensus algorithms optimized for intermittent aerial links and resource-constrained UAV platforms are essential for effective implementation.

Existing blockchain solutions developed for vehicular networks have limited applicability when applied to the more volatile and dynamic nature of UAV swarms chughtai2024drone ; venkatesan2024blockchain . Numerous studies have explored blockchain-based systems for UAV coordination in disaster response scenarios, emphasizing secure information sharing raja2024ugen , transparent data recording hafeez2023birds , and accountability in relief distribution duan2024design . However, challenges related to scalability, lightweight optimized consensus protocols for resource-constrained UAVs, and comprehensive privacy mechanisms remain largely unaddressed raja2024ugen . Existing works in gc2023optimal utilize smart contracts solely for agency authentication and access control, relying on centralized network components that limit robustness and resilience.

2.2 Consensus Protocols and Smart Contracts for UAV Blockchains

Refer to caption
Fig. 1: The Architecture for Blockchain-Enabled UAV Coordination in Disaster Response.

The efficiency and fault tolerance of consensus protocols are critical factors for UAV networks, which typically involve resource-constrained nodes and intermittent connectivity. While the PBFT protocol provides resilience against byzantine failures, it suffers from high communication overhead sun2024joint . On the other hand, the Proof-of-Authority (PoA) consensus mechanism reduces overhead by involving fewer validators but introduces centralization issues. To address the trade-offs between efficiency and security, recent research has proposed hybrid protocols that combine PBFT and PoA wang2024decentralized . These hybrid approaches also incorporate techniques such as sharding and leveraging UAV mobility patterns to further improve throughput and reduce latency. Such optimized consensus protocols aim to achieve an effective balance between efficiency, security, and fault tolerance, making them suitable for time-sensitive UAV disaster response operations while maintaining the necessary security guarantees xing2022uavs .

In the context of disaster management, smart contracts have been explored to automate coordination and ensure transparency by encoding rules that are executed based on predefined conditions. Proposed applications of smart contracts in UAV disaster networks include autonomous flight planning, decentralized information exchange between responders, and transparent tracking of aid distribution afotanwo2024exploring . However, standard smart contract languages and data formats lack native support for spatial data required for geo-coordination of UAVs paulin2024application . Novel geospatial smart contracts tailored for location-based UAV coordination show promise but require further research and development to address challenges such as efficient storage and querying of spatial data on the blockchain. Recent advancements in areas such as geospatial smart contracts xing2022uavs , disaster-resilient communication protocols iyer2023perspectives , and privacy-preserving UAV coordination techniques nicolazzo2024privacy show promise in overcoming these limitations. This motivates the design of a comprehensive framework that emphasizes decentralization, efficiency, privacy, and resilience, tailored specifically for secure, blockchain-enabled coordination in real-world UAV-assisted disaster response scenarios. Table 1 summarizes the key challenges, existing solutions, and open research problems in blockchain-enabled UAV networks for disaster response scenarios.

In summary, UAV ad hoc networks are increasingly recognized for their rapid deployment capabilities and resilience when ground infrastructure is compromised mohsan2023unmanned . However, secure decentralized coordination within these dynamic networks remains a significant challenge. While blockchain technology offers distributed trust and consensus mechanisms to address these challenges, algorithms specifically tailored for intermittent aerial communication links and resource-constrained UAV platforms are essential gc2023optimal -mohsan2023unmanned . Existing blockchain solutions for vehicular networks have limited applicability to the more volatile nature of UAV swarms hadi2023comprehensive . Although UAV consensus protocols have been proposed, they often lack considerations for fluctuating nodes, link conditions, and the unique constraints of UAV platforms javed2024state . Numerous studies have focused on blockchain systems for disaster-response UAV coordination, addressing secure information sharing, transparent data recording, and accountability in relief distribution bibri2024smarter . However, issues remain with scalability, lightweight consensus protocols for resource-constrained UAVs, comprehensive privacy mechanisms, and effective utilization of smart contracts for spatial coordination of UAV fleets. Recent advancements in areas such as geospatial smart contracts, resilient communication protocols, and privacy-preserving coordination techniques show promise in addressing these limitations kirli2022smart . This study aims to advance secure, blockchain-enabled coordination specifically tailored for real-world disaster-response UAVs, with a focus on decentralization, efficiency, privacy, resilience, and effective utilization of smart contracts for spatial coordination of heterogeneous UAV fleets.

This Fig. 1 illustrates the deployment and coordination of UAVs in a post-disaster scenario. It depicts various UAV operations and activities aimed at facilitating effective disaster response and recovery efforts. The image shows UAV flocks engaged in different tasks, such as search and rescue operations, initial assessment and data collection, data management and coordination, and post-disaster recovery efforts. The UAVs are organized into flocks and exhibit flocking behaviour, characterized by separation, cohesion, and alignment, which enables coordinated movement and efficient coverage of the affected areas. The figure also highlights the establishment of communication networks, including aerial-to-aerial (A2A) and aerial-to-ground (A2G) links, to provide stable connectivity and enable drone delivery services. These communication networks are crucial for maintaining reliable communication channels, coordinating UAV operations, and facilitating the delivery of essential supplies to affected regions.

Additionally, the diagram depicts an attacker’s presence, indicating the potential security threats and the need for robust cybersecurity measures to protect the UAV networks and their operations from malicious actors. The diagram also shows damaged base stations (BS) and a roadside unit (RSU), representing the disruption of ground infrastructure commonly experienced in disaster scenarios. This emphasizes the importance of UAVs in providing alternative means of communication and support when traditional infrastructure is compromised. Overall, this main scenario illustrates the various components and activities involved in a coordinated UAV-based disaster response effort, highlighting the importance of communication networks, flocking behaviour, drone delivery services, and the need for security measures to ensure effective and resilient operations in challenging post-disaster environments.

3 System Architecture and Models

This section describes the mathematical models used to characterize the architecture for UAV-based disaster response. Specifically, it covers models related to communication, mobility, flocking algorithms, reliability, and security. The communication model under discussion is primarily centred around the propagation characteristics of wireless links between UAVs in an aerial network. A pivotal element of this model is the log-distance path-loss model. This model is prevalently used for modelling signal attenuation in A2A channels, especially in scenarios involving UAVs. The log-distance path-loss model is a fundamental concept in wireless communications. It is utilized to estimate the loss of signal strength, known as path loss, over a distance. The model calculates this loss based on the logarithm of the distance between the transmitter and the receiver. It takes into account the path-loss exponent and the loss at a reference distance, making it particularly relevant in the context of UAV communications. This relevance stems from its utility in understanding and predicting signal strength variations over different distances in three-dimensional airspace.

3.1 Communication Model

The communication model defines the propagation characteristics of the wireless links between UAVs in an aerial network. A2A propagation relies on the log-distance path-loss model, which is commonly used for modelling signal attenuation in A2A channels. The path loss PL(dij)PLsubscript𝑑𝑖𝑗\mathrm{PL}(d_{ij})roman_PL ( italic_d start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ) depends on the distance dijsubscript𝑑𝑖𝑗d_{ij}italic_d start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT between the transmitting UAV i𝑖iitalic_i and receiving UAV j𝑗jitalic_j. It describes how the signal strength decays with distance as it propagates through the medium. The path loss is calculated as

PL(dij)=PL0+10nlog10(dijd0).PLsubscript𝑑𝑖𝑗subscriptPL010𝑛subscript10subscript𝑑𝑖𝑗subscript𝑑0\mathrm{PL}(d_{ij})=\mathrm{PL}_{0}+10n\log_{10}\left(\frac{d_{ij}}{d_{0}}% \right).roman_PL ( italic_d start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ) = roman_PL start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT + 10 italic_n roman_log start_POSTSUBSCRIPT 10 end_POSTSUBSCRIPT ( divide start_ARG italic_d start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_d start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT end_ARG ) . (1)

where n𝑛nitalic_n is the path-loss exponent, d0subscript𝑑0d_{0}italic_d start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT is the reference distance, and PL0subscriptPL0\mathrm{PL}_{0}roman_PL start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT is the path loss at the reference distance d0subscript𝑑0d_{0}italic_d start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT. The path-loss exponent n𝑛nitalic_n depends on the specific environment. Using this path loss model, the received signal-to-noise ratio (SNR) between UAVs i𝑖iitalic_i and j𝑗jitalic_j can be computed as

SNRij=Pt+𝒢i+𝒢jPL(dij)subscriptSNR𝑖𝑗subscript𝑃𝑡subscript𝒢𝑖subscript𝒢𝑗PLsubscript𝑑𝑖𝑗\mathrm{SNR}_{ij}=P_{t}+\mathcal{G}_{i}+\mathcal{G}_{j}-\mathrm{PL}(d_{ij})roman_SNR start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = italic_P start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT + caligraphic_G start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + caligraphic_G start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - roman_PL ( italic_d start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ) (2)

where Ptsubscript𝑃𝑡P_{t}italic_P start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT is the transmit power of UAV i𝑖iitalic_i, and 𝒢isubscript𝒢𝑖\mathcal{G}_{i}caligraphic_G start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and 𝒢jsubscript𝒢𝑗\mathcal{G}_{j}caligraphic_G start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT are the antenna gains of UAVs i𝑖iitalic_i and j𝑗jitalic_j, respectively. The 3D positions 𝐏isubscript𝐏𝑖\mathbf{P}_{i}bold_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and 𝐏jsubscript𝐏𝑗\mathbf{P}_{j}bold_P start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT determine the separation distance dijsubscript𝑑𝑖𝑗d_{ij}italic_d start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT, which directly affects the path loss. The maximum achievable data rate Rijsubscript𝑅𝑖𝑗R_{ij}italic_R start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT for the A2A link is calculated using Shannon’s capacity formula

Rij=Blog2(1+SNRij).subscript𝑅𝑖𝑗𝐵subscript21subscriptSNR𝑖𝑗R_{ij}=B\log_{2}(1+\mathrm{SNR}_{ij}).italic_R start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = italic_B roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + roman_SNR start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ) . (3)

where B𝐵Bitalic_B denotes the channel bandwidth, sustaining adequately high mesh link data rates is crucial for reliable UAV coordination and message exchange control. To model mobility, 3rd Generation Partnership Project (3GPP) TR 36.777 is referenced, which provides standard statistical 3D trajectory models. 111https://www.3gpp.org/ftp/Specs/archive/36_series/36.777/ This allows the capturing of realistic fluctuations in UAV trajectories.

3.2 Consortium Blockchain Architecture

This section outlines the consortium blockchain architecture tailored for decentralized coordination and access control in disaster response scenarios, involving both service providers and UAV networks. We focus on key parameters such as transaction throughput T(N)𝑇𝑁T(N)italic_T ( italic_N ) and latency L(N)𝐿𝑁L(N)italic_L ( italic_N ), which are crucial for assessing the system’s performance and are analyzed using mathematical methods. The architecture is specifically designed to enhance communication, coordination, and data sharing among the involved parties. Utilizing smart contracts establishes robust access control policies. Each participating entity is assigned specific permissions P(x)𝑃𝑥P(x)italic_P ( italic_x ), dictating their level of access within the network. The function of the smart contract, denoted as SCac(P(x),aci){Allow, Deny}subscriptSCac𝑃𝑥𝑎subscript𝑐𝑖Allow, Deny\mathrm{SC_{ac}}(P(x),ac_{i})\rightarrow\{\text{Allow, Deny}\}roman_SC start_POSTSUBSCRIPT roman_ac end_POSTSUBSCRIPT ( italic_P ( italic_x ) , italic_a italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) → { Allow, Deny }, is to enforce these policies based on a set of predefined rules.

Performance metrics such as T(N)𝑇𝑁T(N)italic_T ( italic_N ) and L(N)𝐿𝑁L(N)italic_L ( italic_N ), where N𝑁Nitalic_N represents the number of nodes in the network, are analyzed to understand their impact on the system’s overall efficiency. This analysis is particularly important as it provides insights into how the system’s performance might vary with changes in scale and node density during disaster response operations. Moreover, the use of cryptographic methods, including zero-knowledge proofs, is highlighted as a means to facilitate privacy-preserving coordination, especially when handling sensitive information.

3.3 Security Measurements

Analytical models are used to quantify the overall risk 𝒳(t)𝒳𝑡\mathcal{X}(t)caligraphic_X ( italic_t ) and resilience R(t)𝑅𝑡R(t)italic_R ( italic_t ) based on various threat factors, including denial-of-service, spoofing, and tampering. This enables the evaluation of security mechanisms. We modelled the security risks faced by the UAV network, such as denial-of-service attacks, spoofing, tampering, and malware infections. The overall risk 𝒳(t)𝒳𝑡\mathcal{X}(t)caligraphic_X ( italic_t ) at time t𝑡titalic_t is given by

𝒳(t)=w𝒟D(t)+w𝒮S(t)+w𝒯T(t)+wM(t),𝒳𝑡subscript𝑤𝒟𝐷𝑡subscript𝑤𝒮𝑆𝑡subscript𝑤𝒯𝑇𝑡subscript𝑤𝑀𝑡\mathcal{X}(t)=w_{\mathcal{D}}D(t)+w_{\mathcal{S}}S(t)+w_{\mathcal{T}}T(t)+w_{% \mathcal{M}}M(t),caligraphic_X ( italic_t ) = italic_w start_POSTSUBSCRIPT caligraphic_D end_POSTSUBSCRIPT italic_D ( italic_t ) + italic_w start_POSTSUBSCRIPT caligraphic_S end_POSTSUBSCRIPT italic_S ( italic_t ) + italic_w start_POSTSUBSCRIPT caligraphic_T end_POSTSUBSCRIPT italic_T ( italic_t ) + italic_w start_POSTSUBSCRIPT caligraphic_M end_POSTSUBSCRIPT italic_M ( italic_t ) , (4)

where D(t)𝐷𝑡D(t)italic_D ( italic_t ), S(t)𝑆𝑡S(t)italic_S ( italic_t ), T(t)𝑇𝑡T(t)italic_T ( italic_t ), and M(t)𝑀𝑡M(t)italic_M ( italic_t ) represent the individual risk factors, and w𝒟subscript𝑤𝒟w_{\mathcal{D}}italic_w start_POSTSUBSCRIPT caligraphic_D end_POSTSUBSCRIPT, w𝒮subscript𝑤𝒮w_{\mathcal{S}}italic_w start_POSTSUBSCRIPT caligraphic_S end_POSTSUBSCRIPT, w𝒯subscript𝑤𝒯w_{\mathcal{T}}italic_w start_POSTSUBSCRIPT caligraphic_T end_POSTSUBSCRIPT, and wsubscript𝑤w_{\mathcal{M}}italic_w start_POSTSUBSCRIPT caligraphic_M end_POSTSUBSCRIPT are the weights for tuning their relative importance. The individual risk factors are modelled as follows

D(t)𝐷𝑡\displaystyle D(t)italic_D ( italic_t ) =λ𝒟eμ𝒟t,absentsubscript𝜆𝒟superscript𝑒subscript𝜇𝒟𝑡\displaystyle=\lambda_{\mathcal{D}}e^{-\mu_{\mathcal{D}}t},= italic_λ start_POSTSUBSCRIPT caligraphic_D end_POSTSUBSCRIPT italic_e start_POSTSUPERSCRIPT - italic_μ start_POSTSUBSCRIPT caligraphic_D end_POSTSUBSCRIPT italic_t end_POSTSUPERSCRIPT , (5)
S(t)𝑆𝑡\displaystyle S(t)italic_S ( italic_t ) =λ𝒮(1eμ𝒮t),absentsubscript𝜆𝒮1superscript𝑒subscript𝜇𝒮𝑡\displaystyle=\lambda_{\mathcal{S}}(1-e^{-\mu_{\mathcal{S}}t}),= italic_λ start_POSTSUBSCRIPT caligraphic_S end_POSTSUBSCRIPT ( 1 - italic_e start_POSTSUPERSCRIPT - italic_μ start_POSTSUBSCRIPT caligraphic_S end_POSTSUBSCRIPT italic_t end_POSTSUPERSCRIPT ) , (6)
T(t)𝑇𝑡\displaystyle T(t)italic_T ( italic_t ) =λ𝒯teμ𝒯t,absentsubscript𝜆𝒯𝑡superscript𝑒subscript𝜇𝒯𝑡\displaystyle=\lambda_{\mathcal{T}}te^{-\mu_{\mathcal{T}}t},= italic_λ start_POSTSUBSCRIPT caligraphic_T end_POSTSUBSCRIPT italic_t italic_e start_POSTSUPERSCRIPT - italic_μ start_POSTSUBSCRIPT caligraphic_T end_POSTSUBSCRIPT italic_t end_POSTSUPERSCRIPT , (7)
M(t)𝑀𝑡\displaystyle M(t)italic_M ( italic_t ) =λ(1eμt).absentsubscript𝜆1superscript𝑒subscript𝜇𝑡\displaystyle=\lambda_{\mathcal{M}}(1-e^{-\mu_{\mathcal{M}}t}).= italic_λ start_POSTSUBSCRIPT caligraphic_M end_POSTSUBSCRIPT ( 1 - italic_e start_POSTSUPERSCRIPT - italic_μ start_POSTSUBSCRIPT caligraphic_M end_POSTSUBSCRIPT italic_t end_POSTSUPERSCRIPT ) . (8)

Here, λ𝜆\lambdaitalic_λ denotes the initial risk magnitude, and μ𝜇\muitalic_μ represents the mitigation rate for each threat. This allows for an analytical quantification of the evolution of risk. The resilience R(t)𝑅𝑡R(t)italic_R ( italic_t ) is measured as

R(t)=1𝒳(t)𝒳(0),𝑅𝑡1𝒳𝑡𝒳0R(t)=1-\frac{\mathcal{X}(t)}{\mathcal{X}(0)},italic_R ( italic_t ) = 1 - divide start_ARG caligraphic_X ( italic_t ) end_ARG start_ARG caligraphic_X ( 0 ) end_ARG , (9)

where 𝒳(0)𝒳0\mathcal{X}(0)caligraphic_X ( 0 ) denotes the initial risk. Simulations assess R(t)𝑅𝑡R(t)italic_R ( italic_t ) under different attack scenarios and intensities. The results demonstrate that the system maintains resilience, with R(t)>80%𝑅𝑡percent80R(t)>80\%italic_R ( italic_t ) > 80 % under realistic threat levels, owing to the implemented security mechanisms. Quantitative evaluation of resilience through analytical modelling assures the robustness of the system against evolving attacks.

Refer to caption
Fig. 2: The 2D spatial distribution of flocking UAVs engaged in post-disaster activities. More detailed description is provided in Section 4.

4 Decentralized Flocking Model for UAV Disaster Response

This section presents a decentralized flocking model designed to enable resilient coordination among specialized UAV clusters conducting critical disaster-relief functions, even amidst disrupted connectivity.

4.1 Concrete Examples of Flocking Algorithms for UAV Disaster Relief Functions

The proposed UAV network is heterogeneous and comprises several specialized clusters: the delivery network Sλsubscript𝑆𝜆S_{\lambda}italic_S start_POSTSUBSCRIPT italic_λ end_POSTSUBSCRIPT, focused on transporting relief supplies; the survey network Sηsubscript𝑆𝜂S_{\eta}italic_S start_POSTSUBSCRIPT italic_η end_POSTSUBSCRIPT, assigned to rapid damage assessment; and the connectivity network SΩsubscript𝑆ΩS_{\Omega}italic_S start_POSTSUBSCRIPT roman_Ω end_POSTSUBSCRIPT, responsible for restoring communication links. A central UAV monitor, ΥmsubscriptΥ𝑚\Upsilon_{m}roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT, dynamically adjusts high-level coordination strategies based on evolving disaster-response priorities. The delivery flock 𝒮λsubscript𝒮𝜆\mathcal{S}_{\lambda}caligraphic_S start_POSTSUBSCRIPT italic_λ end_POSTSUBSCRIPT plays a pivotal role in immediate relief efforts by transporting essential supplies to affected areas. Using flocking algorithms, these UAVs maintain cohesion, alignment, and separation to ensure efficient and safe delivery of aid. The survey flock 𝒮ηsubscript𝒮𝜂\mathcal{S}_{\eta}caligraphic_S start_POSTSUBSCRIPT italic_η end_POSTSUBSCRIPT focuses on damage assessment and map**. Employing flocking strategies, these UAVs can systematically cover disaster areas, maintain communication, and avoid collisions. The connectivity flocks 𝒮Ωsubscript𝒮Ω\mathcal{S}_{\Omega}caligraphic_S start_POSTSUBSCRIPT roman_Ω end_POSTSUBSCRIPT are aligned with 3GPP UAV standards to ensure efficient communication restoration in disaster-stricken areas. UAVs use flocking rules to maintain optimal formation for wireless coverage and to navigate safely through the environment.

The central monitor UAV, ΥmsubscriptΥ𝑚\Upsilon_{m}roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT, coordinates the activities of these flocks by utilizing a decentralized coordination algorithm based on Reynolds flocking rules. The control input φisubscript𝜑𝑖\varphi_{i}italic_φ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for each UAV ΥisubscriptΥ𝑖\Upsilon_{i}roman_Υ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT comprises terms for separation, alignment, cohesion, and navigation, allowing for collision avoidance and coordinated trajectory planning. Additionally, a dynamic dissipating obstacle avoidance mechanism is incorporated, enabling UAVs to effectively navigate around obstacles.

4.2 Reynolds Flocking Rules and Their Application

The Reynolds flocking rules guide the decentralized coordination of the UAVs in our model. These rules consist of four key components: separation (φissubscriptsuperscript𝜑𝑠𝑖\varphi^{s}_{i}italic_φ start_POSTSUPERSCRIPT italic_s end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT), alignment (φiasubscriptsuperscript𝜑𝑎𝑖\varphi^{a}_{i}italic_φ start_POSTSUPERSCRIPT italic_a end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT), cohesion (φicsubscriptsuperscript𝜑𝑐𝑖\varphi^{c}_{i}italic_φ start_POSTSUPERSCRIPT italic_c end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT), and navigation (φinsubscriptsuperscript𝜑𝑛𝑖\varphi^{n}_{i}italic_φ start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT). Each UAV ΥisubscriptΥ𝑖\Upsilon_{i}roman_Υ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT receives a control input φisubscript𝜑𝑖\varphi_{i}italic_φ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, which is a combination of these components that facilitates coordinated movement while avoiding collisions.

Obstacle Avoidance Dynamics: To navigate effectively around obstacles, UAVs employ dynamically dissipating obstacle avoidance. This dynamic is mathematically represented as

𝐯γ,𝐯¯cos(ϑm)|𝐯¯|2.subscript𝐯𝛾¯𝐯subscriptitalic-ϑ𝑚superscript¯𝐯2\langle\mathbf{v}_{\gamma},\bar{\mathbf{v}}\rangle\geq\cos(\vartheta_{m})|\bar% {\mathbf{v}}|^{2}.⟨ bold_v start_POSTSUBSCRIPT italic_γ end_POSTSUBSCRIPT , over¯ start_ARG bold_v end_ARG ⟩ ≥ roman_cos ( italic_ϑ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) | over¯ start_ARG bold_v end_ARG | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT . (10)

Here, ϑmsubscriptitalic-ϑ𝑚\vartheta_{m}italic_ϑ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT denotes the maximum allowable misalignment angle between the UAV’s velocity vector 𝐯γsubscript𝐯𝛾\mathbf{v}_{\gamma}bold_v start_POSTSUBSCRIPT italic_γ end_POSTSUBSCRIPT and the desired direction 𝐯¯¯𝐯\bar{\mathbf{v}}over¯ start_ARG bold_v end_ARG. In our model, each UAV is considered an autonomous agent with a state comprising its position and velocity vectors, denoted by (xi,vi)subscript𝑥𝑖subscript𝑣𝑖(x_{i},v_{i})( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) for UAV i𝑖iitalic_i. The control protocol for obstacle avoidance, essential in cluttered post-disaster environments, is the sum of three terms ui=uiα+uiβ+uiγsubscript𝑢𝑖superscriptsubscript𝑢𝑖𝛼superscriptsubscript𝑢𝑖𝛽superscriptsubscript𝑢𝑖𝛾u_{i}=u_{i}^{\alpha}+u_{i}^{\beta}+u_{i}^{\gamma}italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_α end_POSTSUPERSCRIPT + italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_β end_POSTSUPERSCRIPT + italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_γ end_POSTSUPERSCRIPT, where each term represents specific control aspects for the UAV. Our approach emphasizes a peer-to-peer control mechanism, eschewing a centralized command structure. This design enhances the system’s resilience and adaptability. A central monitoring UAV, ΥmsubscriptΥ𝑚\Upsilon_{m}roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT, orchestrates the overall flocking behaviour and adapts to dynamic disaster response needs. The primary objective of this decentralized flocking system is to enable robust and autonomous coordination among UAV flocks, thereby facilitating key disaster response tasks. Each UAV’s state is defined by its position ρisubscript𝜌𝑖\rho_{i}italic_ρ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, velocity ΩisubscriptΩ𝑖\Omega_{i}roman_Ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, and designated flock type ζisubscript𝜁𝑖\zeta_{i}italic_ζ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, ensuring that every UAV contributes optimally to the overall mission.

4.3 Dynamic State Propagation and Battery Model

The state of each UAV evolves according to

ρi[κ+1]subscript𝜌𝑖delimited-[]𝜅1\displaystyle\rho_{i}[\kappa+1]italic_ρ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT [ italic_κ + 1 ] =ρi[κ]+ΔτΩi[κ],absentsubscript𝜌𝑖delimited-[]𝜅Δ𝜏subscriptΩ𝑖delimited-[]𝜅\displaystyle=\rho_{i}[\kappa]+\Delta\tau\cdot\Omega_{i}[\kappa],= italic_ρ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT [ italic_κ ] + roman_Δ italic_τ ⋅ roman_Ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT [ italic_κ ] , (11)
Ωi[κ+1]subscriptΩ𝑖delimited-[]𝜅1\displaystyle\Omega_{i}[\kappa+1]roman_Ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT [ italic_κ + 1 ] =Ωi[κ]+Δτ(φis+φia+φic+φin).absentsubscriptΩ𝑖delimited-[]𝜅Δ𝜏subscriptsuperscript𝜑𝑠𝑖subscriptsuperscript𝜑𝑎𝑖subscriptsuperscript𝜑𝑐𝑖subscriptsuperscript𝜑𝑛𝑖\displaystyle=\Omega_{i}[\kappa]+\Delta\tau\cdot(\varphi^{s}_{i}+\varphi^{a}_{% i}+\varphi^{c}_{i}+\varphi^{n}_{i}).= roman_Ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT [ italic_κ ] + roman_Δ italic_τ ⋅ ( italic_φ start_POSTSUPERSCRIPT italic_s end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_φ start_POSTSUPERSCRIPT italic_a end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_φ start_POSTSUPERSCRIPT italic_c end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_φ start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) . (12)

Here, ΔτΔ𝜏\Delta\tauroman_Δ italic_τ represents the discrete time step. The battery dynamics of the UAVs are modelled to account for power. This Fig. 2 presents the 2D spatial distribution of flocking UAVs engaged in post-disaster activities, including Navigation/Surveillance, Communication, Search and Rescue, Environmental Monitoring, Logistics/Delivery, and Infrastructure Repair, across consecutive timesteps labelled 1 through 6. Each scatter plot represents a specific timestep, with the x and y axes indicating the geographical coordinates within a 2D plane. The scattered dots within each plot represent individual UAVs, with their positions depicting the flocking patterns, deployment areas, and coverage for the corresponding post-disaster activity during that particular time interval.

4.4 Significance of Flocking Algorithms in Multi-Agent Systems

Consider a group of autonomous agents 𝒜={A1,A2,,AN}𝒜subscript𝐴1subscript𝐴2subscript𝐴𝑁\mathcal{A}=\{A_{1},A_{2},\ldots,A_{N}\}caligraphic_A = { italic_A start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_A start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_A start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT }, where each agent Aisubscript𝐴𝑖A_{i}italic_A start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT has a state (xi,vi)n×nsubscript𝑥𝑖subscript𝑣𝑖superscript𝑛superscript𝑛(x_{i},v_{i})\in\mathbb{R}^{n}\times\mathbb{R}^{n}( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT × blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT representing its position and velocity vectors, respectively. The control input Uisubscript𝑈𝑖U_{i}italic_U start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for each agent Aisubscript𝐴𝑖A_{i}italic_A start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT comprises three terms

Ui=U^icoh+U¯idamp+Uˇinav,subscript𝑈𝑖superscriptsubscript^𝑈𝑖cohsuperscriptsubscript¯𝑈𝑖dampsuperscriptsubscriptˇ𝑈𝑖navU_{i}=\hat{U}_{i}^{\text{coh}}+\bar{U}_{i}^{\text{damp}}+\check{U}_{i}^{\text{% nav}},italic_U start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = over^ start_ARG italic_U end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT coh end_POSTSUPERSCRIPT + over¯ start_ARG italic_U end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT damp end_POSTSUPERSCRIPT + overroman_ˇ start_ARG italic_U end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT nav end_POSTSUPERSCRIPT , (13)

where U^icohsuperscriptsubscript^𝑈𝑖coh\hat{U}_{i}^{\text{coh}}over^ start_ARG italic_U end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT coh end_POSTSUPERSCRIPT enables cohesion towards the flock center, U¯idampsuperscriptsubscript¯𝑈𝑖damp\bar{U}_{i}^{\text{damp}}over¯ start_ARG italic_U end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT damp end_POSTSUPERSCRIPT achieves velocity consensus through dam** force, and Uˇinavsuperscriptsubscriptˇ𝑈𝑖nav\check{U}_{i}^{\text{nav}}overroman_ˇ start_ARG italic_U end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT nav end_POSTSUPERSCRIPT drives navigation towards the group objective. We propose two flocking algorithms based on different interaction rules

Ui=Uiα,subscript𝑈𝑖superscriptsubscript𝑈𝑖𝛼U_{i}=U_{i}^{\alpha},italic_U start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_U start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_α end_POSTSUPERSCRIPT , (14)

where,

Uiα=Aj𝒩iϕb(xjxiσ)𝐧ijCohesion Term+Aj𝒩iaij(x)(vjvi)Dam** Term,superscriptsubscript𝑈𝑖𝛼subscriptsubscriptsubscript𝐴𝑗subscript𝒩𝑖subscriptitalic-ϕ𝑏subscriptdelimited-∥∥subscript𝑥𝑗subscript𝑥𝑖𝜎subscript𝐧𝑖𝑗Cohesion Termsubscriptsubscriptsubscript𝐴𝑗subscript𝒩𝑖subscript𝑎𝑖𝑗𝑥subscript𝑣𝑗subscript𝑣𝑖Dam** TermU_{i}^{\alpha}=\underbrace{\sum_{A_{j}\in\mathcal{N}_{i}}\phi_{b}(\lVert x_{j}% -x_{i}\rVert_{\sigma})\mathbf{n}_{ij}}_{\text{Cohesion Term}}+\underbrace{\sum% _{A_{j}\in\mathcal{N}_{i}}a_{ij}(x)(v_{j}-v_{i})}_{\text{Dam** Term}},italic_U start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_α end_POSTSUPERSCRIPT = under⏟ start_ARG ∑ start_POSTSUBSCRIPT italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_ϕ start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ( ∥ italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT italic_σ end_POSTSUBSCRIPT ) bold_n start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT end_ARG start_POSTSUBSCRIPT Cohesion Term end_POSTSUBSCRIPT + under⏟ start_ARG ∑ start_POSTSUBSCRIPT italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_a start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ( italic_x ) ( italic_v start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_ARG start_POSTSUBSCRIPT Dam** Term end_POSTSUBSCRIPT , (15)

where ϕbsubscriptitalic-ϕ𝑏\phi_{b}italic_ϕ start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT is used for the Reynolds flocking rule terms, and 𝒩isubscript𝒩𝑖\mathcal{N}_{i}caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT are the neighbor sets for agent i𝑖iitalic_i.

4.5 Alpha-Neighbors of Alpha-Agents: Proximity Net

Let 𝒱α={1,2,,nα}subscript𝒱𝛼12subscript𝑛𝛼\mathcal{V}_{\alpha}=\{1,2,\ldots,n_{\alpha}\}caligraphic_V start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT = { 1 , 2 , … , italic_n start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT } and 𝒱β={1,2,,nβ}subscript𝒱𝛽12subscript𝑛𝛽\mathcal{V}_{\beta}=\{1,2,\ldots,n_{\beta}\}caligraphic_V start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT = { 1 , 2 , … , italic_n start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT } denote the sets of alpha and beta agents, respectively. An obstacle βk𝒱βsubscript𝛽𝑘subscript𝒱𝛽\beta_{k}\in\mathcal{V}_{\beta}italic_β start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ caligraphic_V start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT is a neighbor of alpha-agent i𝒱α𝑖subscript𝒱𝛼i\in\mathcal{V}_{\alpha}italic_i ∈ caligraphic_V start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT if

(qi,rβ)Ok,subscript𝑞𝑖subscript𝑟𝛽subscript𝑂𝑘\mathcal{B}(q_{i},r_{\beta})\cap O_{k}\neq\emptyset,caligraphic_B ( italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_r start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT ) ∩ italic_O start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≠ ∅ , (16)

where (qi,rβ)subscript𝑞𝑖subscript𝑟𝛽\mathcal{B}(q_{i},r_{\beta})caligraphic_B ( italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_r start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT ) is a ball centered at qisubscript𝑞𝑖q_{i}italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT with radius rβsubscript𝑟𝛽r_{\beta}italic_r start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT, and Oksubscript𝑂𝑘O_{k}italic_O start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is the obstacle region. The alpha and beta neighbour sets are defined as

𝒩αisubscript𝒩𝛼𝑖\displaystyle\mathcal{N}_{\alpha i}caligraphic_N start_POSTSUBSCRIPT italic_α italic_i end_POSTSUBSCRIPT ={j𝒱α:qjqi<rα},absentconditional-set𝑗subscript𝒱𝛼normsubscript𝑞𝑗subscript𝑞𝑖subscript𝑟𝛼\displaystyle=\{j\in\mathcal{V}_{\alpha}:\|q_{j}-q_{i}\|<r_{\alpha}\},= { italic_j ∈ caligraphic_V start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT : ∥ italic_q start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∥ < italic_r start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT } , (17)
𝒩βisubscript𝒩𝛽𝑖\displaystyle\mathcal{N}_{\beta i}caligraphic_N start_POSTSUBSCRIPT italic_β italic_i end_POSTSUBSCRIPT ={k𝒱β:(qi,rβ)Ok}.absentconditional-set𝑘subscript𝒱𝛽subscript𝑞𝑖subscript𝑟𝛽subscript𝑂𝑘\displaystyle=\{k\in\mathcal{V}_{\beta}:\mathcal{B}(q_{i},r_{\beta})\cap O_{k}% \neq\emptyset\}.= { italic_k ∈ caligraphic_V start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT : caligraphic_B ( italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_r start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT ) ∩ italic_O start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≠ ∅ } . (18)

where qisubscript𝑞𝑖q_{i}italic_q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and visubscript𝑣𝑖v_{i}italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT are the position and velocity of agent i𝑖iitalic_i in the obstacle boundary dynamics, respectively. This induces a bipartite proximity graph 𝒢=(𝒱,)𝒢𝒱\mathcal{G}=(\mathcal{V},\mathcal{E})caligraphic_G = ( caligraphic_V , caligraphic_E ) between the alpha and beta agents, where 𝒱=𝒱α𝒱β𝒱subscript𝒱𝛼subscript𝒱𝛽\mathcal{V}=\mathcal{V}_{\alpha}\cup\mathcal{V}_{\beta}caligraphic_V = caligraphic_V start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT ∪ caligraphic_V start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT and 𝒱α×𝒱βsubscript𝒱𝛼subscript𝒱𝛽\mathcal{E}\subseteq\mathcal{V}_{\alpha}\times\mathcal{V}_{\beta}caligraphic_E ⊆ caligraphic_V start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT × caligraphic_V start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT. Here, rαsubscript𝑟𝛼r_{\alpha}italic_r start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT and rβsubscript𝑟𝛽r_{\beta}italic_r start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT are the radii for proximity in the alpha and beta neighbour sets, respectively.

5 Enhanced DPoS-PBFT Consensus Mechanism for UAV Networks

UAVs are pivotal in disaster management for rapid response and recovery. We propose an enhanced consensus mechanism that integrates DPoS-PBFT. This design leverages DPoS for efficient block validation and PBFT for heightened security, optimizing UAV network performance in adverse disaster conditions. Fig. 3 demonstrates the detailed sequence of steps in the proposed hybrid DPoS-PBFT consensus protocol for efficient and secure block validation among the UAVs.

Refer to caption
Fig. 3: Detailed Working Mechanism of the DPoS-PBFT Consensus Protocol.

5.1 Mechanism Overview

The mechanism is initiated by the stake-based selection of a block proposer. The UAV generates a block and circulates it among the chosen validators through the DPoS framework. Validators 𝒱𝒱\mathcal{V}caligraphic_V, which are assigned based on their UAV-specific metrics, authenticate the block. Approval by a two-thirds majority confirms the block, while PBFT intervenes in cases of disagreement or malicious activity to ensure consensus and network integrity.
Notation: Let 𝒱𝒱\mathcal{V}caligraphic_V represent a subset of UAVs serving as validators. Validator selection considers factors such as stakes, fuel, sensing capabilities, and historical performance. Each UAV i𝑖iitalic_i is assigned a validator score Visubscript𝑉𝑖V_{i}italic_V start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT calculated as

Vi=w1Si+w2Fi+w3Ci+w4Hi,subscript𝑉𝑖subscript𝑤1subscript𝑆𝑖subscript𝑤2subscript𝐹𝑖subscript𝑤3subscript𝐶𝑖subscript𝑤4subscript𝐻𝑖V_{i}=w_{1}S_{i}+w_{2}F_{i}+w_{3}C_{i}+w_{4}H_{i},italic_V start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT italic_S start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_w start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT italic_F start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_w start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT italic_C start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_w start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT italic_H start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , (19)

where Sisubscript𝑆𝑖S_{i}italic_S start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT denotes the stake, Fisubscript𝐹𝑖F_{i}italic_F start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT denotes the remaining fuel, Cisubscript𝐶𝑖C_{i}italic_C start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT denotes the sensing capability, and Hisubscript𝐻𝑖H_{i}italic_H start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT denotes historical utility. The weights w1,w2,w3,w4subscript𝑤1subscript𝑤2subscript𝑤3subscript𝑤4w_{1},w_{2},w_{3},w_{4}italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_w start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , italic_w start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT , italic_w start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT quantify the importance of these parameters. The top n𝑛nitalic_n UAVs form the validator set 𝒱𝒱\mathcal{V}caligraphic_V. The block proposer probability pisubscript𝑝𝑖p_{i}italic_p start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for UAV i𝑖iitalic_i is given by

pi=Sij𝒱Sj,subscript𝑝𝑖subscript𝑆𝑖subscript𝑗𝒱subscript𝑆𝑗p_{i}=\frac{S_{i}}{\sum_{j\in\mathcal{V}}S_{j}},italic_p start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = divide start_ARG italic_S start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_j ∈ caligraphic_V end_POSTSUBSCRIPT italic_S start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG , (20)

Process Flow: A PRE-PREPARE message, containing the new block, is broadcast by a validator to the other validators. The validators validate the block and broadcast a PREPARE message if the block is valid. A COMMIT state is reached, and the corresponding message is broadcast when more than 2323\frac{2}{3}divide start_ARG 2 end_ARG start_ARG 3 end_ARG of PREPARE messages are received. A block is added to the blockchain upon receiving a matching set of 2323\frac{2}{3}divide start_ARG 2 end_ARG start_ARG 3 end_ARG COMMIT messages. If consensus is not reached, a new view is initiated, potentially changing the block proposer. Having detailed the consensus protocol, we describe the simulation setup used to evaluate the performance of the proposed approach. Table 2 compares different consensus protocol options and their attributes relevant to UAV networks.

Table 2: Comparison of Consensus Protocols
Metrics PBFT DPoS Hybrid
Speed Low High Moderate
Throughput Low High Moderate
Fault Tolerance High Low Moderate
Permissioning Private Public Configurable
Algorithm 1 Blockchain-based UAV Coordination
1:Initialize: UAV uU𝑢𝑈u\in Uitalic_u ∈ italic_U has blockchain
2:for all uU𝑢𝑈u\in Uitalic_u ∈ italic_U do
3:    u𝑢uitalic_u has blockchain height B𝐵Bitalic_B
4:end for
5:Propose Block: Rotating schedule
6:Select UAV PV𝑃𝑉P\in Vitalic_P ∈ italic_V
7:P𝑃Pitalic_P gathers transactions, creates & broadcasts block B+1𝐵1B+1italic_B + 1
8:Verify Block:
9:for all vV𝑣𝑉v\in Vitalic_v ∈ italic_V do
10:    if v𝑣vitalic_v verifies B+1𝐵1B+1italic_B + 1 valid then
11:        v𝑣vitalic_v signs & broadcasts approval
12:    end if
13:end for
14:if approvals >(2/3)Nabsent23𝑁>(2/3)N> ( 2 / 3 ) italic_N then
15:    Add block B+1𝐵1B+1italic_B + 1 to blockchain
16:end if

Our consensus protocol combines DPoS-PBFT to address the unique challenges in UAV networks during disaster response. This novel approach enhances communication efficiency while maintaining robust security, advancing UAV applications in emergency management. As outlined in Algorithm 1, the DPoS phase involves selecting validators based on UAV stakes. An elected proposer creates a block, which is verified by the validators. In the PBFT phase, validators vote on the block. If insufficient votes are received, a view change occurs. Consensus through a supermajority results in adding the block to the blockchain, ensuring secure and efficient network operations.

Specifically, the Algorithm 2 combines DPoS and PBFT to achieve efficient decentralized consensus in UAV networks for disaster response scenarios. The DPoS phase selects validators and a leader node based on delegated stakes to propose a block. If faults exceed a threshold, PBFT is triggered for additional consensus through preparatory and commit phases before finalizing consensus on adding the approved block. The hybrid mechanism aims to balance efficiency, security, and fault tolerance for reliable coordination between resource-constrained UAVs with intermittent aerial connections. The proposed architecture runs on a permissioned quorum chain, supporting privacy-preserving transactions between approved disaster response agencies using zero-knowledge proofs. Each agency operates a local quorum node maintaining a ledger copy. Inter-agency consensus utilizes the hybrid protocol. Within agencies, lightweight UAV blockchain nodes connect to the quorum node to submit transactions and access chain data when required. On-chain access control is enforced via smart contracts, with agencies managing permissions for their UAV fleets.

Resilience is enhanced through the geographic distribution of nodes in regional clusters. Integrating location-based coordination requires supporting geospatial data like GPS coordinates alongside transactions. Since JSON burger2020elastic formats used in smart contract languages inefficiently store spatial data, we incorporate geospatial Ethereum extensions such as the FOAM protocol qu2019spatio to enable vector data storage. The 3D positions, boundaries, and disaster zones of UAVs can be encoded in GeoJSON, representing them as programmable contract objects. This allows spatial queries for proximity alerts, geofencing, and coordinated navigation. To trigger location-aware executions, oracles provide disaster scenario and situational data feeds.

Algorithm 2 DPoS-PBFT Consensus
1:Set 𝒰𝒰\mathcal{U}caligraphic_U of N𝑁Nitalic_N UAV nodes
2:Consensus on block B𝐵Bitalic_B
3:Initialize DPoS
4: Delegate stakes and select leader l𝑙litalic_l
5:l𝑙litalic_l validates and proposes block B𝐵Bitalic_B
6:DPoS Execution
7:if 2N3absent2𝑁3\geq\frac{2N}{3}≥ divide start_ARG 2 italic_N end_ARG start_ARG 3 end_ARG validators approve B𝐵Bitalic_B then
8:    Add B𝐵Bitalic_B to blockchain
9:else if faults >ϑabsentitalic-ϑ>\vartheta> italic_ϑ then
10:    Trigger PBFT consensus
11:end if
12:Initialize PBFT
13:l𝑙litalic_l broadcasts B𝐵Bitalic_B; nodes validate and broadcast prepares
14:PBFT Execution
15:if 2N3absent2𝑁3\geq\frac{2N}{3}≥ divide start_ARG 2 italic_N end_ARG start_ARG 3 end_ARG prepares then
16:    Nodes broadcast commit
17:end if
18:if 2N3absent2𝑁3\geq\frac{2N}{3}≥ divide start_ARG 2 italic_N end_ARG start_ARG 3 end_ARG commits then
19:    Nodes add B𝐵Bitalic_B
20:end if
21:Finalize Consensus
22: Update permissions, remove faulty nodes
23: Add B𝐵Bitalic_B if approved

Algorithm 3 presents a sample Solidity code for a smart contract that coordinates UAVs for search and rescue operations in a disaster response scenario. It defines key parameters, such as the centre of the disaster zone and search radius. Functions are included to assign search grid areas to UAVs, report the findings of trapped people or hazards, and update the UAV status. The comments explain each function’s purpose. This implements location-aware coordination logic to automate UAV search and rescue tasks via smart contracts executed based on location data and events.

Algorithm 3 SearchAndRescue Contract
1:struct UAV
2:  id
3:  location
4:  battery
5:  status
6:Address owner
7:Location disasterZoneCenter
8:Radius searchRadius
9:UAV Location[] availableUAVs
10:function AssignSearchGrid(UAV drone) \triangleright Divide disaster zone into grids \triangleright Assign grid to UAV for search & rescue
11:end function
12:function ReportFindings(Location location, FindingType type) \triangleright Log findings (people, hazards) \triangleright Notify authorities or UAVs
13:end function
14:function UpdateUAVStatus(UAV drone, Status status) \triangleright Update UAV status (battery, ops)
15:end function
Table 3: Key Parameters and Values of the Hybrid DPoS-PBFT Blockchain Mechanism
Parameter Example Value/Type

Network Latency

100-500 ms

DPoS Parameters

Number of Delegates: 20, Block Time: 5s, Voting Margin: 66%

Node Distribution

DPoS Nodes: Globally, PBFT Nodes: Regionally

Finality

DPoS: Probabilistic, PBFT: Instant

Energy Use

Prioritize DPoS, Use PBFT for finality as needed

Throughput

Target: 100 TPS, Fallback: 10 TPS

Security Thresholds

DPoS: \geq15 delegates, PBFT: \geq5 nodes

PBFT Parameters

Normal mode quorum: 4, Degraded mode quorum: 3

This Algorithm 4 presents blockchain-based decentralized coordination among UAVs to achieve consensus on block additions. It initializes each UAV with a blockchain ledger. A rotating schedule selects a UAV to propose the next block, gathering transactions and broadcasting the new block B+1. Other UAVs in the validator are set to check if the block is valid, sign it if so, and broadcast approvals. When 2/3 approvals are received, consensus is reached, and the block is added to the blockchain. This achieves decentralized agreement on the appending of new blocks in a peer-to-peer manner without a centralized authority.

Algorithm 4 Blockchain-based UAV Coordination
1:Initialize: \triangleright UAV u𝒰𝑢𝒰u\in\mathcal{U}italic_u ∈ caligraphic_U has blockchain
2:for each u𝒰𝑢𝒰u\in\mathcal{U}italic_u ∈ caligraphic_U do
3:    u𝑢uitalic_u has blockchain height B𝐵Bitalic_B
4:end for
5:Propose Block: \triangleright Rotating schedule
6:Select UAV P𝒱𝑃𝒱P\in\mathcal{V}italic_P ∈ caligraphic_V
7:P𝑃Pitalic_P gathers transactions, creates & broadcasts block B+1𝐵1B+1italic_B + 1
8:Verify Block:
9:for each v𝒱𝑣𝒱v\in\mathcal{V}italic_v ∈ caligraphic_V do
10:    if v𝑣vitalic_v verifies B+1𝐵1B+1italic_B + 1 valid then
11:        v𝑣vitalic_v signs & broadcasts approval
12:    end if
13:end for
14:if approvals >(2/3)Nabsent23𝑁>(2/3)N> ( 2 / 3 ) italic_N then
15:    Add block B+1𝐵1B+1italic_B + 1 to blockchain
16:end if

6 Simulations and Discussions

6.1 Simulation Settings

In the context of our disaster management simulation, a 25 × 25 km urban area severely impacted by a natural disaster with extensive infrastructure damage forms the backdrop. This environment incorporates critical locations, such as a primary base station (BS), a compromised BS in a power outage zone, an area under adversarial control, the disaster relief coordination hub, refugee camps, and essential medical facilities prioritized for aid delivery. The simulation involved a heterogeneous swarm of 200 drones, each equipped with lithium-ion batteries and functioning autonomously. These drones, unique in identifiers and energy profiles, are equipped with navigation and networking sensors and processors and feature A2A and A2G networking interfaces. They form a multi-tier mesh network 500 m above ground, adhering to aviation safety protocols, including collision avoidance systems. Key performance metrics evaluated include network performance, resilience against cyberattacks and malicious nodes, mobility and coordination of UAV flocks, packet delivery rate, and reliability.

Table 4: UAV Simulation Parameters
Parameter Value
Total number of drones 200
Flock 1 (delivery services) 90
Flock 2 (connectivity support) 25
Flock 3 (monitoring) 85
Disaster region size 25 x 25 km
Total UAV networks coverage radius 5.5 km
UAV flight altitude 30 m
UAV transmit power 2 mW
Network latency 30-100 ms
Supported data rate 15 Mbps

The blockchain-enabled UAV coordination framework within this simulation achieved a throughput of 100 transactions per second (TPS) and an average latency of 26 ms, with a packet delivery rate of 99.7%. The framework utilizes a DPoS consensus protocol complemented by PBFT for transactions that require immediate finality. The hybrid configuration balances resilience and computing demands with 20 DPoS delegates and five regional PBFT servers, ensuring efficient and robust transaction processing. The simulation adheres to 3GPP standards for realism and industry alignment. It uses the 3GPP TR 36.777 urban macro-mobility model to emulate UAV mobility and 3GPP TR 36.842 for BS deployment. The communication models for the A2G and A2A links are 3GPP-compliant, encompassing probabilistic propagation for A2G and loss of free-space path for A2A communications. Resilience to cyberattacks was validated by simulations of distributed denial-of-service (DDoS) traffic, spoofing, and message tampering, with the system maintaining its stability under these conditions. In summary, this comprehensive simulation validates the system’s applicability to real-world disaster response scenarios, particularly where the ground infrastructure is compromised. The effectiveness of the architecture is further tested in UAV testbeds to confirm its real-world capabilities.

Refer to caption
Fig. 4: (a) Throughput, Latency over Time (b) Latency Distribution.

6.2 Simulations Results

The simulation results show the effectiveness of the system in terms of security, efficiency, scalability, and resilience. Security measures include AES-256 encryption, ECDSA signatures, SHA-256 hashes, and hybrid blockchain consensus, which provide a robust defence against Byzantine failures. The system’s performance targets a throughput of 100 TPS, with less than two seconds of latency and 99% reliability for UAV packet delivery. Scalability tests involved increasing the UAV network size and load, demonstrating the system’s capability to handle high traffic volumes seamlessly.

As seen in Fig. 4 summarize the network throughput and latency metrics as the number of UAV nodes scales up to 500 on the private blockchain network. Throughput is measured in TPS processed across the flocking network, with a millisecond latency for transaction finality. Latency increased marginally from 50ms at 10 nodes to 68ms at 500 nodes. The blockchain-enabled network sustains transaction-processing speeds exceeding 100 TPS with reasonable finality times below 70ms, even at scale. The key insight is that leveraging blockchain and decentralization principles can enable scalable flock coordination between hundreds of UAVs, necessary for wide-area post-disaster surveying. Linear throughput scaling to 500 nodes shows that UAVs can independently coordinate paths and targets through fast, trustless transactions. Stable sub-100ms latency despite scaling offers viability for real-time decision-making.

Refer to caption
Fig. 5: Throughput and Latency Over Time.

Fig. 5 exemplifies the network throughput and latency as the number of UAV nodes increases from 10 to 100. Throughput scales linearly up to  100 TPS with 60 nodes, then saturates. Latency remains below 50 ms despite higher loads. Max transaction volumes occur at saturation with 100 nodes, without increased latency. This demonstrates linear throughput scalability to a saturation point without latency impacts as the UAV network expands. Testing beyond 100 nodes revealed upper scalability limits. Peak transactions during saturation did not affect latency. The results validate the system’s ability to deliver real-time coordination for sizable UAV fleets via a decentralized blockchain backbone, with excellent throughput scalability to a saturation threshold without latency degradation.

Refer to caption
Fig. 6: Resilience Against Cyberattacks.

As shown in Fig. 6, the system maintains high throughput and low latency despite spoofing, DDoS, and tampering attacks. This validates strong resilience capabilities. The system architecture demonstrated good overall cyber resilience across four attack types: DDoS, malware, phishing, and SQL injection. Resilience exceeded 70% even for the most successful attack, SQL injection 75%. DDoS attacks were most effectively mitigated by 95%. The system also showed strong resilience to malware 90% and phishing 80%. The results indicate acceptable cyber resilience for safe UAV fleet operations across attack types, especially against network-level attacks like DDoS. Risks remain from application-layer attacks like SQL injection, needing further database server hardening. Insufficient end-user device protections likely explain the higher phishing and malware effectiveness.

Refer to caption
Fig. 7: Distribution of Latency Across UAV Operations.

Fig. 7 highlights the distribution of communication latency across UAV operational scenarios using violin plots. Latency remains under 10 ms in all cases, with median values around 2-3 ms. However, distinct distribution shapes were observed. Surveillance exhibited a normal-like profile centred at 3 ms. The assessment followed a right-skewed shape peaking near 1 ms. The delivery showed multimodal performance. Tracking displayed a left-skewed distribution with the highest density below 2 ms. The differential latency characteristics demonstrate adaptability to meet specialized requirements. For instance, sub-2 ms latency enables rapid location updates for tracking. Minimal latency facilitates quick analysis in assessment. Network intelligence allows self-optimization to the demands of each context.

Refer to caption
Fig. 8: Within-Cluster Latency.
Refer to caption
Fig. 9: Accross-Cluster Latency.

In summary, the tuned latency distributions maintain medians under 5 ms for diverse UAV applications. Optimized profile shapes provide differentiated capabilities, allowing the network to conform to the specific demands of post-disaster use cases through intelligent resource allocation.

Fig. 8 compares within-cluster and across-cluster coordination communication latency. Within 50-drone clusters, latency ranges from 1-50 ms (median  25 ms), enabling rapid in-group synchronization. In Fig. 9, across-cluster latency is higher at 50-100 ms between distant leaders, allowing necessary deconfliction. The bifurcated profile validates efficient localized coordination within clusters while sustaining fleet visibility via across-cluster transactions. This hierarchy supports both tight drone flocking and high-level swarm oversight. In summary, the exhibited latency dichotomy provides rapid decentralized responses within clusters along with sufficient global communication quality across the architecture by partitioning the blockchain ledger. The key insight is how communication locality enabled by blockchain transactions results in bifurcated latency that delivers both localized control and fleet coordination - crucial for decentralized multi-UAV flocking at scale.

7 Conclusion

This study introduces a blockchain-based framework to enable secure and efficient coordination of UAV networks for disaster response scenarios. The decentralized architecture enhances resilience against single points of failure while overcoming limitations in autonomy, information sharing, and inter-agency collaboration. Key innovations include a consortium blockchain model that facilitates private and trusted data exchange across diverse stakeholders, an optimized hybrid DPOS-PBFT consensus protocol catered to resource-constrained UAV platforms, and bio-inspired flocking techniques for adaptable swarm coordination even with disrupted connectivity. Extensive simulations demonstrated the effectiveness of the integrated framework in improving transparency, scalability, reliability, and cyber-attack resilience during UAV-enabled emergency response operations, with notable gains in throughput and latency metrics. Future research will focus on testbed validation and the incorporation of advanced technologies, such as deep reinforcement learning, geospatial smart contracts, and privacy-preserving data sharing. This study makes significant contributions towards reliable, intelligent UAV coordination for disaster management by synergistically combining distributed ledger technology, optimization, game theory, and collective autonomy.

References

  • (1) S. Hafeez, A. R. Khan, M. Al-Quraan, L. Mohjazi, A. Zoha, M. A. Imran, Y. Sun, Blockchain-assisted uav communication systems: A comprehensive survey, IEEE Open Journal of Vehicular Technology.
  • (2) A. Derhab, O. Cheikhrouhou, A. Allouch, A. Koubaa, B. Qureshi, M. A. Ferrag, L. Maglaras, F. A. Khan, Internet of drones security: Taxonomies, open issues, and future directions, Vehicular Communications 39 (2023) 100552.
  • (3) E. A. Keller, D. E. DeVecchio, Natural hazards: earth’s processes as hazards, disasters, and catastrophes, Routledge, 2019.
  • (4) Y. Wang, Z. Su, Q. Xu, R. Li, T. H. Luan, P. Wang, A secure and intelligent data sharing scheme for uav-assisted disaster rescue, IEEE/ACM Transactions on Networking.
  • (5) R. Damaševičius, N. Bacanin, S. Misra, From sensors to safety: Internet of emergency services (ioes) for emergency response and disaster management, Journal of Sensor and Actuator Networks 12 (3) (2023) 41.
  • (6) J. Cui, Y. Zhu, H. Zhong, Q. Zhang, C. Gu, D. He, Efficient blockchain-based mutual authentication and session key agreement for cross-domain iiot, IEEE Internet of Things Journal.
  • (7) A. Ahad, Z. Jiangbina, M. Tahir, I. Shayea, M. A. Sheikh, F. Rasheed, 6g and intelligent healthcare: Taxonomy, technologies, open issues and future research directions, Internet of Things (2024) 101068.
  • (8) T. Li, T. Meng, G. Meng, C. Wang, B. Wang, M. Zhou, X. Han, Formation optimization of airborne radar coordinated detection system using an improved artificial fish swarm algorithm, Scientific Reports 14 (1) (2024) 248.
  • (9) J. Yang, X. Liu, X. Jiang, Y. Zhang, S. Chen, H. He, Toward trusted unmanned aerial vehicle swarm networks: A blockchain-based approach, IEEE Vehicular Technology Magazine 18 (2) (2023) 98–108. doi:10.1109/MVT.2023.3242834.
  • (10) A. Aldaej, T. A. Ahanger, I. Ullah, Blockchain-enabled m2m communications for uav-assisted data transmission, Mathematics 11 (10). doi:10.3390/math11102262.
    URL https://www.mdpi.com/2227-7390/11/10/2262
  • (11) Y. Zhang, X. Lin, J. Wu, B. Pei, Y. Han, Blockchain-assisted uav data free-boundary spatial querying and authenticated sharing, in: 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD), IEEE, 2023, pp. 565–570.
  • (12) T. Liu, G. Bai, J. Tao, Y.-A. Zhang, Y. Fang, A multistate network approach for resilience analysis of uav swarm considering information exchange capacity, Reliability Engineering & System Safety 241 (2024) 109606.
  • (13) S. Hafeez, R. Cheng, L. Mohjazi, M. A. Imran, Y. Sun, A blockchain-enabled framework of uav coordination for post-disaster networks (2024). arXiv:2402.15331.
  • (14) X. Wang, Y. Guo, Y. Gao, Unmanned autonomous intelligent system in 6g non-terrestrial network, Information 15 (1) (2024) 38.
  • (15) R. Olfati-Saber, Flocking for multi-agent dynamic systems: Algorithms and theory, IEEE Transactions on automatic control 51 (3) (2006) 401–420.
  • (16) I. Maza, F. Caballero, J. Capitán, J. R. Martínez-de Dios, A. Ollero, Experimental results in multi-uav coordination for disaster management and civil security applications, Journal of intelligent & robotic systems 61 (2011) 563–585.
  • (17) S. Hafeez, M. A. Shawky, M. Al-Quraan, L. Mohjazi, M. A. Imran, Y. Sun, Beta-uav: Blockchain-based efficient and trusted authentication for uav communication, in: 2022 IEEE 22nd International Conference on Communication Technology (ICCT), IEEE, 2022, pp. 613–617.
  • (18) S. Hafeez, H. U. Manzoor, L. Mohjazi, A. Zoha, M. A. Imran, Y. Sun, Blockchain-empowered immutable and reliable delivery service (birds) using uav networks.
  • (19) S. Hafeez, L. Mohjazi, M. A. Imran, Y. Sun, Blockchain-enabled clustered and scalable federated learning (bcs-fl) framework in uav networks, arXiv preprint arXiv:2402.05973.
  • (20) G. J. Mendis, Y. Wu, J. Wei, M. Sabounchi, R. Roche, A blockchain-powered decentralized and secure computing paradigm, IEEE Transactions on Emerging Topics in Computing 9 (4) (2020) 2201–2222.
  • (21) Y. Wang, H. Peng, Z. Su, T. H. Luan, A. Benslimane, Y. Wu, A platform-free proof of federated learning consensus mechanism for sustainable blockchains, IEEE Journal on Selected Areas in Communications 40 (12) (2022) 3305–3324.
  • (22) X. Duan, Y. Guo, Y. Guo, Design of anonymous authentication scheme for vehicle fog services using blockchain, Wireless Networks 30 (1) (2024) 193–207.
  • (23) Y. M. Balakrishna, V. Shivashetty, Device-to-device based path selection for post disaster communication using hybrid intelligence, International Journal of Electrical and Computer Engineering (IJECE) 14 (1) (2024) 796–810.
  • (24) O. Chughtai, N. Nawaz, Z. Kaleem, C. Yuen, Drone-assisted cooperative routing scheme for seamless connectivity in v2x communication, IEEE Access.
  • (25) K. Venkatesan, S. B. Rahayu, Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques, Scientific Reports 14 (1) (2024) 1149.
  • (26) G. Raja, A. Manoharan, H. Siljak, Ugen: Uav and gan-aided ensemble network for post-disaster survivor detection through oran, IEEE Transactions on Vehicular Technology.
  • (27) D. GC, C. Politis, Optimal 3d trajectory design for uav-assisted cellular communications in the post-disaster scenarios, Internet Technology Letters (2023) e423.
  • (28) G. Sun, L. He, Z. Sun, Q. Wu, S. Liang, J. Li, D. Niyato, V. C. Leung, Joint task offloading and resource allocation in aerial-terrestrial uav networks with edge and fog computing for post-disaster rescue, IEEE Transactions on Mobile Computing.
  • (29) Z. Wang, J. Li, J. Li, C. Liu, A decentralized decision-making algorithm of uav swarm with information fusion strategy, Expert Systems with Applications 237 (2024) 121444.
  • (30) R. Xing, Z. Su, T. H. Luan, Q. Xu, Y. Wang, R. Li, Uavs-aided delay-tolerant blockchain secure offline transactions in post-disaster vehicular networks, IEEE Transactions on Vehicular Technology 71 (11) (2022) 12030–12043.
  • (31) A. AFOTANWO, Exploring blockchain based smart contracts and privacy preserving cryptocurrencies, FUPRE Journal of Scientific and Industrial Research (FJSIR) 8 (2) (2024) 55–68.
  • (32) G. Paulin, S. Sambolek, M. Ivasic-Kos, Application of raycast method for person geolocalization and distance determination using uav images in real-world land search and rescue scenarios, Expert Systems with Applications 237 (2024) 121495.
  • (33) C. K. Iyer, S. Ganguli, V. Pandey, Perspectives on geospatial artificial intelligence platforms for multimodal spatiotemporal datasets, Advances in Scalable and Intelligent Geospatial Analytics (2023) 17–63.
  • (34) S. Nicolazzo, M. Arazzi, A. Nocera, M. Conti, et al., Privacy-preserving in blockchain-based federated learning systems, arXiv preprint arXiv:2401.03552.
  • (35) S. A. H. Mohsan, N. Q. H. Othman, Y. Li, M. H. Alsharif, M. A. Khan, Unmanned aerial vehicles (uavs): Practical aspects, applications, open challenges, security issues, and future trends, Intelligent Service Robotics 16 (1) (2023) 109–137.
  • (36) H. J. Hadi, Y. Cao, K. U. Nisa, A. M. Jamil, Q. Ni, A comprehensive survey on security, privacy issues and emerging defence technologies for uavs, Journal of Network and Computer Applications 213 (2023) 103607.
  • (37) S. Javed, A. Hassan, R. Ahmad, W. Ahmed, R. Ahmed, A. Saadat, M. Guizani, State-of-the-art and future research challenges in uav swarms, IEEE Internet of Things Journal.
  • (38) S. E. Bibri, J. Krogstie, A. Kaboli, A. Alahi, Smarter eco-cities and their leading-edge artificial intelligence of things solutions for environmental sustainability: A comprehensive systematic review, Environmental Science and Ecotechnology 19 (2024) 100330.
  • (39) D. Kirli, B. Couraud, V. Robu, M. Salgado-Bravo, S. Norbu, M. Andoni, I. Antonopoulos, M. Negrete-Pincetic, D. Flynn, A. Kiprakis, Smart contracts in energy systems: A systematic review of fundamental approaches and implementations, Renewable and Sustainable Energy Reviews 158 (2022) 112013.
  • (40) A. Burger, C. Cichiwskyj, S. Schmeißer, G. Schiele, The elastic internet of things-a platform for self-integrating and self-adaptive iot-systems with support for embedded adaptive hardware, Future Generation Computer Systems 113 (2020) 607–619.
  • (41) Q. Qu, I. Nurgaliev, M. Muzammal, C. S. Jensen, J. Fan, On spatio-temporal blockchain query processing, Future Generation Computer Systems 98 (2019) 208–218.