Submitted:
30 April 2024
Posted:
01 May 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Classes/Types of UAV Devices
2.1. Single-Rotor UAVs
2.2. Multi-Rotor UAVs
2.3. Fixed Wing UAVs
3. A Glimpse on Trust And Reputation Systems in UAV Networks
4. Survey On UAV Reputation, Trust, and Feedback Systems
4.1. Trust
4.1.1. Reliability Trust
4.1.2. Decision Trust
4.1.3. Behavioural Trust
4.1.4. Direct Trust
4.1.5. Derived trust
4.2. Reputation Systems
4.2.1. Centralized Reputation System
4.2.2. Decentralized Reputation System
4.2.3. Hybrid Reputation System
4.3. Reputation data
4.4. Challenges of Reputation System
4.4.1. Data Sparsity
4.4.2. Malicious Participant
4.4.3. Privacy and Security
4.5. Feedback
4.5.1. Input Unit
4.5.2. The Processing Unit
4.5.3. Output Unit
5. Taxonomy Of Reputation Attacks
5.1. Reputation Manipulation Attacks
5.1.1. Sybil Attack
- Decentralized Blockchain: Implementing a decentralized blockchain-based system for managing UAV reputation can significantly augment security measures [44]. The inherent characteristic of blockchain technology guarantees that once a reputation is recorded and stored, it becomes resistant to modification or tampering. Verifying reputation updates is facilitated through a consensus process, mitigating potential vulnerability to Sybil assaults. Incorporating a Proof of Work (PoW) or Proof of Stake (PoS) method can introduce a supplementary level of security. UAVs must solve a computational challenge or stake a certain amount of resources to provide reputation feedback [44]. Creating several fraudulent identities is rendered economically and computationally burdensome for potential attackers.
- Reputation Source Validation: One viable strategy for mitigating Sybil attacks involves verifying reputation data sources. UAVs ought to exclusively consider reputation input originating from trustworthy sources. Reputation information can be reliably sourced from trusted nodes or authorities, which can then be cryptographically authenticated to guarantee its veracity.
- Continuous Monitoring and Anomaly Detection: Continuous monitoring and Anomaly Detection play a crucial role in upholding the integrity and security of a UAV reputation system. These strategies facilitate detecting anomalous activity, such as abrupt increases in reputation scores, which could signify a Sybil attack or other types of manipulation [45]. Utilization of continuous monitoring and anomaly detection tools to discern abrupt increases in reputation scores or atypical patterns of conduct. When the UAV system identifies such irregularities, it can implement proactive measures to mitigate attacks on the systems.
5.1.2. Collusion Attack
5.1.3. Self Promotion attack
5.2. Reputation Poisoning Attack
5.2.1. False Feedback Attack
5.2.2. Malicious Data Injection Attack
5.2.3. Reputation Poisoning Man-in-the-Middle Attack
| Approach | Model/Method | Model/MethodGoals | Weaknesses | |
|---|---|---|---|---|
| [53] | Computational intelligence approach, including ML algorithms for UAV systems | Semi-autonomous blockchain-based UAV framework | Enhancing the security, efficiency, and reliability of UAV communication networks using blockchain technology | The limited scalability of blockchain for UAV applications, as well as the potential vulnerabilities in smart contracts |
| [41] | Reputation management framework that determines the trust of an event message and the reputation of the message producer | Majority voting protocol | Enhances event detection, trust management, reliable data transmission, and security purposes in UAVs and IoTs | It does not explicitly mention the trade-offs or limitations of the proposed reputation management framework |
| [54] | Auction-based game theory, ML, and blockchain | ML | The autonomous selection and operation of UAV for network coverage, along with real-time service monitoring and SLA management in wireless networks | It does not explicitly mention the specific ML algorithm used in developing the service reputation-based trust model |
| [55] | Optimization models such as MILP to achieve efficient task assignments and resource allocation for persistent and efficient missions | Optimization and scheduling aspects of surveillance missions | Enhances the ability to conduct continuous, long-term, and efficient surveillance missions with multiple UAVs | Mixed Integer Linear Program (MILP) model |
| [56] | Analyzing the overall architecture of TM and its development | Subjective Logic Theory, Fuzzy Logic theory, Theory of Evidence, and Neural Network Model | Addresses the need for trust management to detect false messages while enhancing the understanding of trust management in IoT environments and its impact on security and reliability | It does not explicitly mention the use of blockchain technology |
| Approach | Model/Method | Model/MethodGoals | Weaknesses | |
|---|---|---|---|---|
| [57] | Design and implementation of the blockchain-based reputation system, focusing on ensuring transparency, reliability, and privacy in reputation management | Cryptographic and blockchain-based design | High privacy guarantees for consumers, efficiency, and security when integrated with a PoS blockchain. Enhances transparency and reliability in reputation management | Implementation challenges of a blockchain-based architecture and the need for further improvement in the overall system efficiency |
| [38] | Exploit the features of blockchain to extend conventional public key infrastructure (PKI) with an efficient privacy-preserving authentication mechanism | Blockchain-based anonymous reputation system (BARS) | BARS extends conventional PKI with an efficient privacy-preserving authentication mechanism, and eliminate linkability between the public key and the real identity of a vehicle | The paper makes assumptions about the security levels of the law enforcement authority (LEA) and the capability of adversaries to compromise roadside units (RSUs) |
| [58] | ReFIoV, which leverages ML and the artificial immune system (AIS) to address the data accessibility problem in vehicular networks | Bayesian learning and classification, K-Means clustering, and Danger Theory | Presents a slow convergence in reputation establishment | Enhances and solves the improvement of data accessibility in vehicular networks, providing incentives for caching and stimulating nodes’ cooperation |
| [19] | Dynamic decentralized reputation system that utilizes blockchain technology for reputation storage and update | Full Decentralization, General-Purpose, Global Reputation, Privacy, and employed Technologies | This enhances the security and decentralization of the reputation management system in decentralized environments | The potential limitations of blockchain scalability, which requires special attention in decentralized systems relying on blockchain |
| [59] | Use of blockchain technology, particularly the Ethereum blockchain, for privacy-preserving authentication in ITS networks | Not Specific | The model aims to address the vulnerabilities and loopholes present in existing systems, such as fake message delivery and privacy concerns | Lack of detailed discussion on the specific ML techniques or classification models used in the proposed BPPAU model |
| Approach | Model/Method | Model/MethodGoals | Weaknesses | |
|---|---|---|---|---|
| [60] | The malicious UAV detection algorithm (MDA) based on linear regression and Gaussian clustering algorithms | Linear regression and Gaussian clustering algorithms | It enhances the accuracy of malicious node detection, with the accuracy of MDA outperforming existing methods by 10% - 20% | Does not address the use of blockchain technology for enhancing security in the UAV ad-hoc network |
| [61] | Leveraging blockchain technology to manage the reputation values of IoT devices based on their geographical location. | Tree data structure | geocoding techniques and geospatial smart contracts for the system’s performance and efficiency and the decentralized management of device services and their reputation values | Gas limits in Ethereum transactions, hardware limitations of fog devices, and the lack of a positioning module for edge devices |
| [62] | Incentive scheme to choose UAVs with a high reputation to perform sensing tasks, protecting data sharing between UAVs and task publishers from internal attacks | Deep reinforcement learning model | The security of data sharing among UAVs and task publishers, as well as the successful mining probabilities and utilities of UAVs | It does not thoroughly discuss the potential scalability issues or computational overhead associated with the blockchain-based secure data transmission scheme |
| [63] | A temporary center node called the miner is elected from vehicles through specific rules to generate rating blocks and broadcast them to other vehicles | Message Detection Accuracy | Improve credibility assessment of received messages based on observations of traffic environments and the consensus of ratings stored in the blockchain | Lack of specific details about the consensus protocol used in the blockchain-based reputation system |
| [64] | Fully distributed, secure, scalable, and efficient reputation aggregation scheme | Gossip-based reputation aggregation and decentralized reputation management | Enhances trustworthiness and cooperation in P2P networks by discouraging maliciousness | It does not guarantee computational efficiency and scalability |
6. Defense Mechanism
6.1. Blockchain Technology
6.2. Reputation Management System
6.3. Machine Learning
6.4. Collusion Identification
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Abbreviations
| 5G | the Fifth Generation |
| AIS | Artificial Immune System |
| BARS | Blockchain-based Anonymous Reputation System |
| BES | Behavior-based Reputation Assessment Scheme |
| CA | Certificate Authority |
| CerBC | Certificate Blockchain |
| CPU | Central Processing Unit |
| FL | Federated Learning |
| IIoT | Industrial Internet of Things |
| IoT | Internet of Things |
| LEA | Law Enforcement Authority |
| MDA | Malicious UAV Detection Algorithm |
| MILP | Mixed Integer Linear Program |
| ML | Machine Learning |
| ORES | Organization Reputation Evaluation Scheme |
| PKI | Public Key Infrastructure |
| PoS | Proof of Stake |
| PoW | Proof of Work |
| QoE | Quality of Experience |
| QoS | Quality of Service |
| RevBC | Revocation Blockchain |
| RSU | Roadside Units |
| SCA | Successive Convex Approximation |
| SDN | Software-Defined Network |
| UAV | Unmanned Aerial Vehicles |
References
- Muchiri, G.; Kimathi, S. A review of applications and potential applications of UAV. Proceedings of the Sustainable Research and Innovation Conference, 2022, pp. 280–283.
- Utsav, A.; Abhishek, A.; Suraj, P.; Badhai, R.K. An IoT based UAV network for military applications. 2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2021, pp. 122–125.
- Hildmann, H.; Kovacs, E. Using unmanned aerial vehicles (UAVs) as mobile sensing platforms (MSPs) for disaster response, civil security and public safety. Drones 2019, 3, 59. [Google Scholar] [CrossRef]
- Jøsang, A.; Ismail, R.; Boyd, C. A survey of trust and reputation systems for online service provision. Decision support systems 2007, 43, 618–644. [Google Scholar] [CrossRef]
- Tsouros, D.C.; Bibi, S.; Sarigiannidis, P.G. A review on UAV-based applications for precision agriculture. Information 2019, 10, 349. [Google Scholar] [CrossRef]
- Angraal, S.; Krumholz, H.M.; Schulz, W.L. Blockchain technology: applications in health care. Circulation: Cardiovascular quality and outcomes 2017, 10, e003800. [Google Scholar] [CrossRef] [PubMed]
- Hein, D.; Kraft, T.; Brauchle, J.; Berger, R. Integrated uav-based real-time mapping for security applications. ISPRS International Journal of Geo-Information 2019, 8, 219. [Google Scholar] [CrossRef]
- Xu, R.; Wei, S.; Chen, Y.; Chen, G.; Pham, K. LightMAN: A Lightweight Microchained Fabric for Assurance-and Resilience-Oriented Urban Air Mobility Networks. Drones 2022, 6, 421. [Google Scholar] [CrossRef]
- Biswas, S.; Anavatti, S.G.; Garratt, M.A. Chapter 4 - Path planning and task assignment for multiple UAVs in dynamic environments. In Unmanned Aerial Systems; Koubaa, A.; Azar, A.T., Eds.; Advances in Nonlinear Dynamics and Chaos (ANDC), Academic Press, 2021; pp. 81–102. [CrossRef]
- Hassija, V.; Chamola, V.; Agrawal, A.; Goyal, A.; Luong, N.C.; Niyato, D.; Yu, F.R.; Guizani, M. Fast, reliable, and secure drone communication: A comprehensive survey. IEEE Communications Surveys & Tutorials 2021, 23, 2802–2832. [Google Scholar] [CrossRef]
- Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarné, G.M. Trust and reputation in the internet of things: State-of-the-art and research challenges. IEEE Access 2020, 8, 60117–60125. [Google Scholar] [CrossRef]
- Fortino, G.; Messina, F.; Rosaci, D.; Sarné, G.M. Using blockchain in a reputation-based model for grouping agents in the Internet of Things. IEEE Transactions on Engineering Management 2019, 67, 1231–1243. [Google Scholar] [CrossRef]
- Liang, Q.; Gan, X. Research on trust evaluation algorithm for e-commerce based on reputation. 2011 International Conference on Business Computing and Global Informatization. IEEE, 2011, pp. 39–42.
- Fotia, L.; Delicato, F.; Fortino, G. Trust in edge-based internet of things architectures: state of the art and research challenges. ACM Computing Surveys 2023, 55, 1–34. [Google Scholar] [CrossRef]
- Bhoi, S.K.; Jena, K.K.; Jena, A.; Panda, B.C.; Singh, S.; Behera, P. A reputation deterministic framework for true event detection in unmanned aerial vehicle network (UAVN). 2019 International Conference on Information Technology (ICIT). IEEE, 2019, pp. 257–262.
- Battah, A.A.; Iraqi, Y.; Damiani, E. A Trust and Reputation System for IoT Service Interactions. IEEE Transactions on Network and Service Management 2022, 19, 2987–3005. [Google Scholar] [CrossRef]
- Mrabet, K.; El Bouanani, F.; Ben-Azza, H. Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty Computation. Journal of Sensor and Actuator Networks 2023, 12, 14. [Google Scholar] [CrossRef]
- Ogunbunmi, S.; Hatmai, M.; Xu, R.; Chen, Y.; Blasch, E.; Ardiles-Cruz, E.; Aved, A.; Chen, G. A Lightweight Reputation System for UAV Networks. Security and Privacy in Cyber-Physical Systems and Smart Vehicles; Chen, Y., Lin, C.W., Chen, B., Zhu, Q., Eds.; Springer Nature Switzerland: Cham, 2024; pp. 114–129. [Google Scholar]
- Mrabet, K.; El Bouanani, F.; Ben-Azza, H. Generalized Secure and Dynamic Decentralized Reputation System With a Dishonest Majority. IEEE Access 2023, 11, 9368–9388. [Google Scholar] [CrossRef]
- El Husseini, A.; M’hamed, A.; El Hassan, B.; Mokhtari, M. Trust-Based Authentication Scheme with User Rating for Low-Resource Devices in Smart Environments. Personal Ubiquitous Comput. 2013, 17, 1013–1023. [Google Scholar] [CrossRef]
- Pereira, R.H.; Gonçalves, M.J.; Magalhães, M.A.G. Reputation Systems: A framework for attacks and frauds classification. Journal of Information Systems Engineering and Management 2023, 8. [Google Scholar] [CrossRef]
- Carholt, O.; Fresk, E.; Andrikopoulos, G.; Nikolakopoulos, G. Design, modelling and control of a single rotor UAV. 2016 24th Mediterranean Conference on Control and Automation (MED). IEEE, 2016, pp. 840–845.
- Ventura Diaz, P.; Yoon, S. High-fidelity computational aerodynamics of multi-rotor unmanned aerial vehicles. 2018 AIAA Aerospace Sciences Meeting, 2018, p. 1266.
- Cazaurang, F.; Cohen, K.; Kumar, M. Multi-rotor Platform Based UAV Systems; Elsevier, 2020.
- Panagiotou, P.; Yakinthos, K. Aerodynamic efficiency and performance enhancement of fixed-wing UAVs. Aerospace Science and Technology 2020, 99, 105575. [Google Scholar] [CrossRef]
- Ngu, A.H.; Gutierrez, M.; Metsis, V.; Nepal, S.; Sheng, Q.Z. IoT Middleware: A Survey on Issues and Enabling Technologies. IEEE Internet of Things Journal 2017, 4, 1–20. [Google Scholar] [CrossRef]
- Guo, L.; Zhang, C.; Fang, Y. A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks. IEEE Transactions on Dependable and Secure Computing 2015, 12, 413–427. [Google Scholar] [CrossRef]
- Wu, Y.; Yan, C.; Ding, Z.; Liu, G.; Wang, P.; Jiang, C.; Zhou, M. A Novel Method for Calculating Service Reputation. IEEE Transactions on Automation Science and Engineering 2013, 10, 634–642. [Google Scholar] [CrossRef]
- Ghahramani, M.H.; Zhou, M.; Hon, C.T. Toward cloud computing QoS architecture: analysis of cloud systems and cloud services. IEEE/CAA Journal of Automatica Sinica 2017, 4, 6–18. [Google Scholar] [CrossRef]
- Hoffman, K.; Zage, D.; Nita-Rotaru, C. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR) 2009, 42, 1–31. [Google Scholar] [CrossRef]
- Chen, J.; Tian, Z.; Cui, X.; Yin, L.; Wang, X. Trust architecture and reputation evaluation for internet of things. Journal of Ambient Intelligence and Humanized Computing 2019, 10, 3099–3107. [Google Scholar] [CrossRef]
- Chen, D.; Chang, G.; Sun, D.; Li, J.; Jia, J.; Wang, X. TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Computer Science and Information Systems 2011, 8, 1207–1228. [Google Scholar] [CrossRef]
- Malik, S.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trustchain: Trust management in blockchain and iot supported supply chains. 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 2019, pp. 184–193.
- Hendrikx, F.; Bubendorfer, K.; Chard, R. Reputation systems: A survey and taxonomy. Journal of Parallel and Distributed Computing 2015, 75, 184–197. [Google Scholar] [CrossRef]
- Tu, Z.; Zhou, H.; Li, K.; Song, H.; Yang, Y. A blockchain-based trust and reputation model with dynamic evaluation mechanism for IoT. Computer Networks 2022, 218, 109404. [Google Scholar] [CrossRef]
- Putra, G.D.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trust management in decentralized iot access control system. 2020 IEEE international conference on blockchain and cryptocurrency (ICBC). IEEE, 2020, pp. 1–9.
- Jain, P.; Gyanchandani, M.; Khare, N. Differential privacy: its technological prescriptive using big data. Journal of Big Data 2018, 5, 1–24. [Google Scholar] [CrossRef]
- Lu, Z.; Wang, Q.; Qu, G.; Liu, Z. BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, pp. 98–103. [CrossRef]
- Rahman, M.M.; Rifat, M.M.H.; Tanin, M.Y.; Hossain, N. A feedback system using blockchain technology. 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 2020, pp. 1114–1118. [CrossRef]
- Lee, H.; Yoon, J.; Jang, M.S.; Park, K.J. A robot operating system framework for secure uav communications. Sensors 2021, 21, 1369. [Google Scholar] [CrossRef]
- Bhoi, S.K.; Jena, K.K.; Jena, A.; Panda, B.C.; Singh, S.; Behera, P. A Reputation Deterministic Framework for True Event Detection in Unmanned Aerial Vehicle Network (UAVN). 2019 International Conference on Information Technology (ICIT), 2019, pp. 257–262. [CrossRef]
- Levine, B.N.; Shields, C.; Margolin, N.B. A survey of solutions to the sybil attack. University of Massachusetts Amherst, Amherst, MA 2006, 7, 224. [Google Scholar]
- Zhang, K.; Liang, X.; Lu, R.; Shen, X. Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal 2014, 1, 372–383. [Google Scholar] [CrossRef]
- Hafeez, S.; Khan, A.R.; Al-Quraan, M.; Mohjazi, L.; Zoha, A.; Imran, M.A.; Sun, Y. Blockchain-Assisted UAV Communication Systems: A Comprehensive Survey. IEEE Open Journal of Vehicular Technology 2023. [Google Scholar] [CrossRef]
- Marche, C.; Nitti, M. Trust-related attacks and their detection: A trust management model for the social IoT. IEEE Transactions on Network and Service Management 2020, 18, 3297–3308. [Google Scholar] [CrossRef]
- Meamari, E.; Guo, H.; Shen, C.C.; Hur, J. Collusion attacks on decentralized attributed-based encryption: analyses and a solution. arXiv preprint arXiv:2002.07811, arXiv:2002.07811 2020.
- Huang, C.; Wang, Z.; Chen, H.; Hu, Q.; Zhang, Q.; Wang, W.; Guan, X. Repchain: A reputation-based secure, fast, and high incentive blockchain system via sharding. IEEE Internet of Things Journal 2020, 8, 4291–4304. [Google Scholar] [CrossRef]
- Sharma, A.; Pilli, E.S.; Mazumdar, A.P.; Gera, P. Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes. Computer Communications 2020, 160, 475–493. [Google Scholar] [CrossRef]
- Gyawali, S.; Qian, Y.; Hu, R.Q. Machine learning and reputation based misbehavior detection in vehicular communication networks. IEEE Transactions on Vehicular Technology 2020, 69, 8871–8885. [Google Scholar] [CrossRef]
- Sayghe, A.; Hu, Y.; Zografopoulos, I.; Liu, X.; Dutta, R.G.; Jin, Y.; Konstantinou, C. Survey of machine learning methods for detecting false data injection attacks in power systems. IET Smart Grid 2020, 3, 581–595. [Google Scholar] [CrossRef]
- Salem, O.; Alsubhi, K.; Shaafi, A.; Gheryani, M.; Mehaoua, A.; Boutaba, R. Man-in-the-Middle attack mitigation in internet of medical things. IEEE Transactions on Industrial Informatics 2021, 18, 2053–2062. [Google Scholar] [CrossRef]
- Nigam, A.; Sharma, S.; Patel, R.K.; Agrawal, M. Man-in-the-middle-attack and proposed algorithm for detection. 2022 International Mobile and Embedded Technology Conference (MECON). IEEE, 2022, pp. 83–88.
- Ahamed Ahanger, T.; Aldaej, A.; Atiquzzaman, M.; Ullah, I.; Yousufudin, M. Distributed blockchain-based platform for unmanned aerial vehicles. Computational Intelligence and Neuroscience 2022, 2022. [Google Scholar] [CrossRef] [PubMed]
- Khan, A.S.; Chen, G.; Rahulamathavan, Y.; Zheng, G.; Assadhan, B.; Lambotharan, S. Trusted UAV Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms. IEEE Access 2020, 8, 118219–118234. [Google Scholar] [CrossRef]
- Leahy, K.; Zhou, D.; Vasile, C.I.; Oikonomopoulos, K.; Schwager, M.; Belta, C. Persistent surveillance for unmanned aerial vehicles subject to charging and temporal logic constraints. Auton. Robots 2016, 40, 1363–1378. [Google Scholar] [CrossRef]
- Li, X.; Li, R. A Comprehensive Review for Four-Dimensional Trust Management in Distributed IoT. IEEE Internet of Things Journal 2023. [Google Scholar] [CrossRef]
- Liu, D.; Alahmadi, A.; Ni, J.; Lin, X.; Shen, X. Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain. IEEE Transactions on Industrial Informatics 2019, 15, 3527–3537. [Google Scholar] [CrossRef]
- Magaia, N.; Sheng, Z. ReFIoV: A Novel Reputation Framework for Information-Centric Vehicular Applications. IEEE Transactions on Vehicular Technology 2019, 68, 1810–1823. [Google Scholar] [CrossRef]
- Qureshi, K.N.; Jeon, G.; Hassan, M.M.; Hassan, M.R.; Kaur, K. Blockchain-Based Privacy-Preserving Authentication Model Intelligent Transportation Systems. IEEE Transactions on Intelligent Transportation Systems 2023, 24, 7435–7443. [Google Scholar] [CrossRef]
- Sun, S.; Ma, Z.; Liu, L.; Gao, H.; Peng, J. Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms. 2020 16th International Conference on Mobility, Sensing and Networking (MSN).
- Weerapanpisit, P.; Trilles, S.; Huerta, J.; Painho, M. A decentralized location-based reputation management system in the IoT using blockchain. IEEE Internet of Things Journal 2022, 9, 15100–15115. [Google Scholar] [CrossRef]
- Xie, L.; Su, Z.; Chen, N.; Xu, Q. Secure Data Sharing in UAV-assisted Crowdsensing: Integration of Blockchain and Reputation Incentive. 2021 IEEE Global Communications Conference (GLOBECOM), 2021, pp. 1–6. [CrossRef]
- Yang, Z.; Zheng, K.; Yang, K.; Leung, V.C.M. A blockchain-based reputation system for data credibility assessment in vehicular networks. 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017, pp. 1–5. [CrossRef]
- Zhou, R.; Hwang, K.; Cai, M. Gossip-Based Reputation Management for Unstructured Peer-to-Peer Networks. IEEE Transactions on Knowledge and Data Engineering - TKDE.
- Hu, N.; Tian, Z.; Sun, Y.; Yin, L.; Zhao, B.; Du, X.; Guizani, N. Building Agile and Resilient UAV Networks Based on SDN and Blockchain. IEEE Network 2021, 35, 57–63. [Google Scholar] [CrossRef]
- Jensen, I.J.; Selvaraj, D.; Ranganathan, P. Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs). 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). [CrossRef]
- Alkadi, R.; Alnuaimi, N.; Yeun, C.; Shoufan, A. Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues. IEEE Access 2022, 10, 14463–14479. [Google Scholar] [CrossRef]
- feng Lin, X.; Zhang, J.; Xiang, L.; Ge, X. Energy Consumption Optimization for UAV Assisted Private Blockchain-based IIoT Networks. 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall). [CrossRef]
- Obaid, A.A.; Koyuncu, H. Obstacle Avoidance in Unmanned Aerial Vehicles Using Image Segmentation and Deep Learning. 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT). [CrossRef]
- Hale, B.; Bossuyt, D.L.V.; Papakonstantinou, N.; O’Halloran, B. A Zero-Trust Methodology for Security of Complex Systems With Machine Learning Components. Volume 2: 41st Computers and Information in Engineering Conference (CIE). [CrossRef]
- Shen, Y.; Qu, Y.; Dong, C.; Zhou, F.; hui Wu, Q. Joint Training and Resource Allocation Optimization for Federated Learning in UAV Swarm. IEEE Internet of Things Journal 2023, 10, 2272–2284. [Google Scholar] [CrossRef]







Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).