Next Article in Journal
On New Fractional Version of Generalized Hermite-Hadamard Inequalities
Next Article in Special Issue
Matrix Approach for Analyzing n-Site Generalized ASIP Systems: PGF and Site Occupancy Probabilities
Previous Article in Journal
A Linear-Active-Disturbance-Rejection-Based Vertical Takeoff and Acceleration Strategy with Simplified Vehicle Operations for Electric Vertical Takeoff and Landing Vehicles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Advanced Drone Swarm Security by Using Blockchain Governance Game

by
Song-Kyoo (Amang) Kim
Faculty of Applied Sciences, Macao Polytechnic University, R. de Luis Gonzaga Gomes, Macao SAR, China
Mathematics 2022, 10(18), 3338; https://doi.org/10.3390/math10183338
Submission received: 12 August 2022 / Revised: 10 September 2022 / Accepted: 12 September 2022 / Published: 15 September 2022
(This article belongs to the Special Issue Queue and Stochastic Models for Operations Research II)

Abstract

:
This research contributes to the security design of an advanced smart drone swarm network based on a variant of the Blockchain Governance Game (BGG), which is the theoretical game model to predict the moments of security actions before attacks, and the Strategic Alliance for Blockchain Governance Game (SABGG), which is one of the BGG variants which has been adapted to construct the best strategies to take preliminary actions based on strategic alliance for protecting smart drones in a blockchain-based swarm network. Smart drones are artificial intelligence (AI)-enabled drones which are capable of being operated autonomously without having any command center. Analytically tractable solutions from the SABGG allow us to estimate the moments of taking preliminary actions by delivering the optimal accountability of drones for preventing attacks. This advanced secured swarm network within AI-enabled drones is designed by adapting the SABGG model. This research helps users to develop a new network-architecture-level security of a smart drone swarm which is based on a decentralized network.

1. Introduction

Drones have been widely adapted for both the military and civilians in ways which include criminal investigations, public safety, and surveillance forces [1]. Their dynamic mobility, rapid reaction, and simple development offer new possibilities for applications with affordable expenses [2,3,4]. A drone swarm is a coordination of multiple drones in which they communicate to make decisions for collective actions. One application of a drone swarm is a drone light show (see Figure 1) and this swarm has a central computer on the ground that tracks all individual drones and controls their swarm behavior [5].
The movements of the drones are designed to achieve a flight path that minimizes the collisions between the individual ones, while each individual drone does not contribute in the decision making process [6]. Drone swarms are beneficial for performing casualty strikes. Particularly in a militarized drone swarm, a smart drone swarm which is intelligently guided without a control center has been considered as a single or integrated AI-enabled weapon system [7]. One example is the 103 Perdix drones launched by the Department of Defense (DOD) in 2016 [8]. The smart drones are operated by using artificial intelligence (AI) that allows the drones to transform in several formations, fly across sample battlefields, and update configuration factors [7,8,9]. A drone swarm could be adapted for states lacking nuclear weapons and for assassination weapons. It could be also extended for enhanced delivery systems for biochemical weapons [10].
Cybersecurity threats on drones have increased in sophistication, which increases high risks for attacks in drone communications. Their deployments face huge difficulties and criticism as a result. Recently, the vulnerability of DJI drones has been discovered through drone hijacking [11]. The absence of suitable drone security mechanisms made the attack possible [12]. The security treats in a military environment setting have brought harmful effects that damage classified military information. The session hijacking attack in a drone swarm is one of the examples in which an attacker is enabled to extract previously exchanged information for various malfunctioned activities [3]. For defending these cybersecurity threats, blockchain technology has been adapted after being implemented for cryptocurrency [13,14]. Blockchain-adapted security models have been widely studied [15,16,17,18,19] because blockchain is highly secured by design and exemplifies a federated computing system, although its records are alterable. Hence, blockchain-based network security is even more extended to the drones [20,21].
The recent studies are targeted on the presence of Byzantine robots which allow for logging events in a zero-knowledge proof to analyze the behavior of the robots in the swarm without incurring the risk that some malicious agent has modified them [13,15,16,22,23]. Blockchain-based smart contracts in autonomous robots allow decentralized systems with equally distrusting nodes to agree on the outcome of the programs [15,22]. The Autonomous Robots Go Swarming (ARGoS) model has been developed for analyzing a collective decision scenario in a robot swarm [23]. Despite the presence of Byzantine robots, blockchain technology allows a robot swarm to achieve consensus in a collective decision problem [15,16].
The Blockchain Governance Game (BGG) and its variants have been designed for preventing blockchain-based attacks and keeping the network decentralized [24,25]. The BGG is the stochastic game model to predict the moments of taking preliminary security actions before attacks [24]. One of the BGG variants is the Strategic Alliance for Blockchain Governance Game (SABGG), which introduces a strategic alliance within the nodes [25] instead of keeping the backups [24] (see Figure 2). This innovative game model is applied for improving drone securities in this research. The analytical function of the smart drone swarm network architecture for enhancing securities and protecting from attackers is constructed for avoiding a conventional drone attack in a swarm.
The advanced blockchain-based secured smart drone swarm network is a decentralized network for drones in a swarm to defend attacks by adapting the SABGG. The SABGG could secure the smart drones in a swarm on the network architecture level. The network architecture level of security by using the BGG has been studied recently [26] and this research is a successor of the BGG application. The objective of this research is adapting an innovative mathematical model into a practical application. It is the first practical BGG adaptation into a military domain, particularly, a network architecture security design in a smart drone swarm communication. The mathematically proven SABGG model provides a guideline for actual implementations into real-world security situations, including healthcare, Internet-of-Things, and federated machine learning, which is one of the main advantages of this research.
The paper begins with the introduction of an advanced blockchain-based secured smart drone swarm network and the smart drone swarm network is described by using the BGG variant in Section 2. This stochastic game model predicts how many blocks are generated and finds the moment of taking the security actions in advance. The mixed strategic game for constructing a cost function of the model is also provided in this section. The optimization of the drone swarm network for a special case is analytically calculated and numerically simulated in Section 3. The paper finally ends with the conclusion in Section 4.

2. Stochastic Game for Smart Drone Network Framework

The Strategic Alliance for Blockchain Governance Game (SABGG) [25] is applied into the drone swarm network architecture to improve the communication network security. Two players are involved in this game. One player is an attacker who intends to fork a private chain and the other player is a defender who honestly mines blocks. The explicit function from the SABGG predicts the moment of one step prior to 51 percent attack [24,25] and this function is applied to a drone swarm network architecture.

2.1. Advanced Blockchain-Based Secured Smart Drone Swarm Network Structure

The advanced secured drone swarm network structure is considered when the drones in a swarm are connected to one another and the swarm is hooked up as a single blockchain network (see Figure 3). Although drones in a swarm are fully connected, they may not be connected with a command center (or a control center). Such a drone swarm could execute their commands artificially and independently despite their disconnection with a command center. Each drone randomly generates unique data (e.g., GPS coordinates or motor RPM values) and broadcasts these data to others. These activities are equivalent with transactions in a typical blockchain network.
Unlike other conventional blockchain networks, BGG-based networks do not have a reward system but use the verifiable random function (VRF) for generating new blocks [27,28]. Alternatively, the weighted-mean-subsequence-reduced (WMSR) algorithm is designed for achieving resilient consensus in decentralized sensor networks and smart robot swarms [15,29,30,31,32]. By applying the VRF or WMSR on the EVM (Ethereum virtual machine), all drones in the swarm network shall have nearly equal chances to generate the blocks without or only with minimal computational power. The mechanism for protecting a smart drone swarm network is identical to the SABGG. The governance in a swarm network is driven by the decision making parameters that include a prior time before catching more than half of the total drones by an attacker.

2.2. SABGG Models for Advanced Blockchain-Based Secured Smart Drone Swarm Network

The SABGG which is a antagonistic game of two players describes the smart drone swarm network structure. Each player becomes either a defender or an attacker (called “A” and “B”). They compete each other to win the game by building blocks either for true or false ones in a drone swarm network.
The probability space ( Ω , F Ω , P ) is considered with independent σ -subalgebras F A , F B , F τ F Ω . Two processes
A : = k 0 X k ε s k , s 0 = 0 < s 1 < s 2 < , a . s .
B : = j 0 Y j ε t j , t 0 = 0 < t 1 < t 2 < , a . s .
are F A -measurable and F B -measurable marked Poisson processes with respective intensities λ a and λ b . These two values λ a and λ b represent the computing performance for generating the blocks of an attacker and a defender in a blockchain network. The above processes indicate the actions of players A (an attacker) and B (a defender). An attacker generates blocks with fake transactions and builds blocks of magnitudes X 1 , X 2 , …formalized by this process. The processes A and B are transformed as follows:
E g A s = e λ a s g 1 , E z B t = e λ b t z 1 .
This game system is monitored at random times in accordance with the point process and this observation process is equivalent with the PoW (Proof-of-Work) completion duration in a typical blockchain-based network:
T : = i 0 ε τ i , τ 0 > 0 , τ 1 , ,
which is a delayed renewal process, and the formalization of the observation process is as follows:
A τ B τ : = k 0 X k , Y k ε τ k ,
and it is with position-dependent marking and with X k and Y k being dependent with the notation:
Δ k : = τ k τ k 1 , k = 0 , 1 , , τ 1 = 0 ,
and
γ g , z = E g X k · z Y k , g > 0 , z > 0 .
By using the double expectation,
γ g , z = δ λ a 1 g + λ b 1 z ,
and
γ 0 g , z = E g A 0 z B 0 = δ 0 λ A 1 g + λ b 1 z ,
where
δ θ = E e θ Δ 1 , δ 0 θ = E e θ τ 0 ,
are the magical transforms of increments τ 1 , τ 2 , …. The game is ended when the total number of attacked drones A j in the swarm network becomes more than the half of the total drones in a swarm by player A or when player B keeps more than the half of the total drones respectively in advance (i.e., B l > M 2 ). To further formalize the game, the exit indexes are defined as follows:
ν : = m i n j : A j ( = A 0 + X 1 + + X j ) M 2 ,
ν 1 : = m i n j : A j ( = A 0 + X 1 + + X j ) C M 2 ,
μ : = m i n l : B l ( = B 0 + Y 1 + + Y l ) M 2 ,
where C is the random number of available intact nodes (i.e., drones) and the capability of the allies is less than the half of the total nodes in the network system (i.e., C < M 2 ). The defender (player B) might still win the game even without requesting an alliance but the chance of winning is lower than with a strategic alliance because an attacker should govern both the allied nodes and half of the total nodes at t ν . Contrarily, the attacker (player A) could win the game at τ μ when it takes the place beforehand. The game is ended at m i n ν , ν 1 , μ and the σ -subalgebra of the process A , B can be analogously denoted as F Ω ν < ν 1 < μ . The confined game of player A is targeted. The first passage time τ ν is the associated exit time from this confined game and formula (5) is modified as
A t ¯ B t ¯ : = n 0 ν X n , Y n ε Δ n ,
which provides an explicit definition of the basic model observed until t ν and the joint functional of the swarm network model is as follows:
Φ M 2 ξ , g 0 , g 1 , b , z 0 , z 1 = E ξ ν · g 0 A ν 1 · g 1 A ν · b A ν C · z 0 B μ 1 · z 1 B μ 1 ν < ν 2 < μ ,
ξ 1 , g 0 1 , g 1 1 , b 1 , z 0 1 , z 1 1 ,
where M indicates the total number of drones in the swarm network (see Figure 3). The SABGG Theorem establishes an explicit formula Φ M 2 from (7)–(10). According to the theorem in [25], the functional Φ M 2 of the process of (15) satisfies the following expression:
Φ M 2 ξ , g 0 , g 1 , z 0 , z 1 = D q , r , s M 2 , M 2 , M 2 Λ ,
where
Λ = σ · Γ 1 Γ 1 1 Γ γ 0 1 γ 0 + ζ Θ 0 1 ζ Θ γ 1 γ ,
and
Θ : = γ g 0 g 1 b q r , z 0 z 1 s ,
Θ 0 : = γ 0 g 0 g 1 b q r , z 0 z 1 s ,
γ : = γ g 1 b q , z 1 ,
γ 0 : = γ 0 g 1 b q , z 1 ,
γ 1 : = γ g 1 b , z 1 ,
γ 0 1 : = γ 0 g 1 b , z 1 ,
Γ : = γ b r , s ,
Γ 1 : = γ r , 1 ,
σ : = E b C .
Additionally, the operator D q , r , s a , b , c in (17) is defined as follows [24,25]:
D q , r , s a , b , c = 1 a ! · b ! · c ! lim q , r , s 0 a b c q a r b s c 1 1 q 1 r 1 s , a , b , c 0 0 , otherwise .
and then we can find
h a , b , c = D q , r , s a , b , c D a , b , c h a , b , c q , r , s
where
D a , b , c q , r , s h a , b , c : = 1 q 1 r 1 s a 0 b 0 c 0 h a , b , c q a r b s c ,
| | q | | < 1 , | | r | | < 1 , | | s | | < 1 .
From (11)–(13), we can find the PGFs (probability-generating functions) of the exit index ν :
E ξ ν = Φ M 2 ξ , 1 , 1 , 1 , 1 ,
and the general decision making parameters are ν , τ ν 1 , A ν , and A ν 1 . Calculating a marginal mean of certain parameters is occasionally more efficient than finding an explicit PGF of each parameter, and the particular decision making parameters of the smart drone swarm network can be found as follows:
E τ ν 1 = E τ 0 + E Δ 1 E ν 1 ,
E A ν = E E A ν | ν = E A 0 + E [ ν 1 ] E X k ,
E A ν C = E A ν E C ,
E A ν 1 = E E A ν | ν 1 = E A 0 + E [ ν 2 ] E X k .

2.3. Mixed Strategy Game Design for SABGG

A two-person mixed strategy game is considered for drone swarm security and player B is a defender who has two strategies at each monitoring moment, one step before an attacker completes generating alternative blocks with false transactions. Player B has the following two strategies: (1) Regular—regular operations that the smart drone swarm network is running as usual and (2) Safety—the network is operating under the safety mode by executing a preliminary action in the drone swarm. In the view of player A (an attacker), he might either succeed or fail to catch the intact drones. Therefore, the responses of player A would be either NotBurst or Burst. Let us assume that the cost for maintaining the alliance is c b , where b is the number of drones in a swarm. If the attacks succeed at generating alternative blocks within the smart drones, the drone network bursts and the whole value of the drone swarm V shall be lost. The drone swarm network might still be busted although the smart drones are fully connected with its allies before catching blocks by an attacker. In this case, the cost shall be counted by all drones in the swarm on top of the alliance costs. The normal form of this game is as follows:
. Players : N = A , B .
. Strategy sets : s
s a = NotBurst , Burst .
s b = Regular , Safety .
The conventional cost matrix at the prior time to burst at τ ν 1 could be constructed as follows (see Table 1).
Here, q s b is the bursting probability of a swarm network, which depends on the strategic decision of player B:
q s b = E 1 A ν M 2 , s b = Regular , E 1 A ν C M 2 , s b = Safety ,
and the alliance cost should be less than the cost of other strategies. Otherwise, player B spends a greater cost for the strategic alliance than for the cost of a whole drone swarm. Recalling from (38), the probability of bursting a blockchain network becomes a Poisson compound process when the observation process is memoryless (see Section 3.1 in detail):
q s b = k > N 2 E 1 A ν = k , s b = Regular , E E k > N 2 + C E 1 A ν = k | C , s b = Safety ,
where
E 1 A ν = k = E E λ a τ ν k ! · e λ a τ ν | τ ν .
Although the total number of the drones in a swarm is determined, the actual alliance C remains uncertain until an alliance request is actually accepted from others. Let us assume that the number of available allied drones C follows the binomial distribution with the average acceptance rate for each strategic ally as ϱ . The Laplace transform of C (i.e., σ from (27)) is as follows:
σ = E b C = ϱ b 1 ϱ M 2 1 .
The number of allies C at the moment τ ν 1 might be arbitrary with satisfying the number of allies C 0 , 1 , , M 2 1 . Even though any discrete random variable might be considered for the strategic alliance, the binomial random variable well describes these kinds of binary sum decision making situations. The optimal value ϱ * is the mean of the Bernoulli distribution when the intact drones are reserved. The rate of accountability ϱ could be defined as follows:
ϱ * = inf η 0 : S 0 q 0 S 1 ϱ ,
where (at the moment τ ν 1 ),
S 0 q 0 = V · q 0 ,
S 1 ϱ = c ϱ 1 q 1 ϱ + c ϱ + V q 1 ϱ ,
q 0 = E 1 A ν M 2 , q n , ρ 1 = E E 1 A ν M 2 + C | C .
Therefore,
S ϱ = S 1 · p A 1 + S 0 · 1 p A 1 ,
where
p A 1 = P A ν 1 < M 2 = k = 0 M 2 P A ν 1 = k .

3. The Optimization Practice for SABGG-Based Drone Security

The drone security optimization practice in a swarm network is introduced in this section. The best strategy for defending a swarm network is providing the strategic alliance to give the least chance for governing drones by an attacker with false command requests. This practice case is targeting to optimize the accountability of the strategic alliance with other drones in a swarm.

3.1. Special Case for Advanced Drone Swarm Security

The memoryless observation process has been adapted into various stochastic models because the model does not need to spend any additional cost for the past information. This special condition is practical particularly for the actual implementations (i.e., numerical simulations or coding) of our theoretical model. It is noted that the operator D from (28) is defined on the space of all analytic functions at 0. Under the memoryless condition, we can explicitly find the solutions of q 0 and p A 1 and calculate the exit index ν , the decision making moments (i.e., τ ν and τ ν 1 ), and the probabilities of the number of blocks from (17). To construct the cost function of the advanced drone swarm, Formulas (7)–(10) shall be reformulated as follows:
γ g , z = δ λ a 1 g + λ b 1 z = γ a g · γ b z ,
γ a g = δ λ a 1 g ,
γ b z = δ λ b 1 z ,
and
γ 0 g , z = δ 0 λ a 1 g + λ b 1 z = γ a 0 g · γ b 0 z ,
γ a 0 g = E g A 0 = δ 0 λ a 1 g ,
γ b 0 z = E z B 0 = δ 0 λ b 1 z ,
From (20)–(28) and (48)–(53),
Θ = Θ a · Θ b : = γ a g 0 g 1 b q r · γ b z 0 z 1 s ,
Θ 0 = Θ a 0 · Θ b 0 : = γ 0 g 0 g 1 b q r · γ 0 z 0 z 1 s ,
γ = γ a γ b : = γ a g 1 b q γ b z 1 ,
γ 0 = γ a 0 · γ b 0 : = γ a 0 g 1 b q γ b 0 z 1 ,
γ 1 : = γ g 1 b , z 1 = γ a g 1 b γ b z 1 ,
γ 0 1 : = γ 0 g 1 b , z 1 = γ a 0 g 1 b α b 0 z 1 ,
Γ : = γ b r , s = γ a b r γ b s ,
Γ 1 : = γ r , 1 = γ a r
The memoryless observation process allows the process to be exponentially distributed and the functionals from (48)–(61) are transformed as follows:
γ a 0 q = 1 1 + α 0 ˜ · λ a α 0 ˜ · λ a q = b a 0 1 a a 0 · q ,
γ a q = 1 1 + α ˜ · λ a α ˜ · λ a q = b a 1 a a · q ,
γ b 0 s = 1 1 + α 0 ˜ · λ b α 0 ˜ · λ b s = b b 0 1 a b 0 · s ,
γ b s = 1 1 + α ˜ · λ b α ˜ · λ b s = b b 1 a b · s ,
b a 0 = 1 1 + γ 0 ˜ · λ a , a a 0 = γ 0 ˜ · λ a 1 + γ 0 ˜ · λ a ,
b a = 1 1 + γ ˜ · λ a , a a 0 = γ ˜ · λ a 1 + γ ˜ · λ a ,
b b 0 = 1 1 + γ 0 ˜ · λ b , a b 0 = γ 0 ˜ · λ b 1 + γ 0 ˜ · λ b ,
b b = 1 1 + γ ˜ · λ b , a b 0 = γ ˜ · λ b 1 + γ ˜ · λ b ,
γ 0 ˜ = E τ 0 , γ ˜ = E Δ k .
The first exceed level (also called the exit index) is the most vital factor that can be fully analyzed at first [33]. Other decision making parameters, including the marginal mean of τ ν 1 , A ν , and A ν 1 , can be easily calculated once the exit index is explicitly solved. From (32) and (54)–(61), the functional of the exit index is as follows:
E ξ ν = Φ M 2 ξ , 1 , 1 , 1 , 1 = R 1 + R 2 R 3 ,
where
R 1 = a b b a b b 1 b a b b Ξ N 2 0 1 b a + b a l 0 M 2 a a 0 l Ξ N 2 0 b a 0 a b k 0 M 2 1 + a b b a b b 1 b a b b k + 1 l 0 M 2 a a 0 l ,
R 2 = ξ b a 0 b a b b 0 a a 0 1 b a b b a a a b a a + 1 · l 0 a b 0 l Ξ M 2 l ξ a b Ξ M 2 l 1 ξ j = l j l 1 a b 0 j + 1 ,
R 3 = ξ b a b a 0 2 1 b a b b a a a b a a + 1 · j 0 k j a b 0 j 1 k j a a 0 a b 0 k Ξ M 2 j ξ a b Ξ M 2 j 1 ξ + ξ b a 0 b b 0 b a 2 a a 0 1 a a 1 1 b a b b a a a b 1 a a · j 0 k j a b 0 j k j a a 0 a b 0 k + 1 Ξ M 2 j ξ a b k Ξ M 2 j 1 ξ ,
and
Ξ j 0 = Ξ M 2 0 = u = 0 m M 2 ! M 2 u ! j = 1 M 2 j ! 1 a a 1 b a b b ,
Ξ m ξ : = Ξ m ξ = u = 0 m m ! m u ! l = 1 m l ! 1 a b 0 1 ξ b a 0 b b 0 .
The explicit solution of the first exceed index under the memoryless observation from (71)–(76) is exactly the same as the solution of the SABGG, and the functional has been analytically proven by Kim [25].

3.2. Linear Programming Practice

A drone swarm network security is considered for a linear programming (LP) practice. The strategy direction for protecting the drone swarm is for priority connection with neighbor drones to lower the change in an attacker catching blocks with false control requests. This case deals with the drone swarm which consists of 20 AI-enabled drones with the estimated cost of USD 1500 per each drone (see Table 2). It is noted that all values shown in the table shall be only for demonstration purposes and these numeric values shall be invested further for the real cases.
Since the SABGG-based advanced drone swarm network has been analytically solved, calculating the values for the cost function and the required probability distributions is straightforward. The LP model based on the above conditions is as follows from (43)–(46):
Objective:
Min G = S ϱ
Subject to:
ϱ V · q 0 c ϱ · M 2 1 .
From (46), the total cost function S ϱ is as follows:
S ϱ = c ϱ 1 q η 1 + c ϱ + V q 1 ϱ p A 1 + V · q 0 1 p A 1
where
p A 1 = k = 0 M 2 λ a δ ˜ λ a δ 0 ˜ + E ν 1 δ ˜ k k ! · e λ a δ 0 ˜ + E ν 1 δ ˜ ,
q 0 1 k = 0 M 2 λ a γ 0 ˜ + E ν 1 γ ˜ k k ! · e λ a γ 0 ˜ + E ν 1 γ ˜
q 1 ϱ = j = 0 M 2 1 k M 2 + j λ a δ 0 ˜ + E ν 1 δ ˜ k ! · e λ a δ 0 ˜ + E ν 1 δ ˜ P j ,
P j = M 2 1 j ϱ j 1 ϱ M 2 1 j .
The total cost S ϱ shall be minimized by the given ϱ , which is the optimal value of the alliance accountability (i.e., the acceptance rate). The illustration in Figure 4 visualizes an optimal result by using the SABGG-based drone swarm network with the given conditions. According to the initial setup in Table 2, the minimal cost for executing one smart drone swarm operation is USD 876 when the drone swarm keeps a 48 percent acceptance rate (i.e., ϱ * = 0.48 ) for the alliance request to other drones. The moment of alliance request τ ν 1 shall be one step prior to the time when an attacker catches more than half of the total drones. This practice is targeted only for visualizing cost optimization, not for simulating smart drone management. It is noted that the visualization (see Figure 4) is aimed for showing how the SABGG closed forms (e.g., (17) and (78)) could be applied for analyzing the operation costs of a secured smart drone swarm.

4. Conclusions

An advanced secure drone swarm network architecture protects a drone swarm from an attacker by adapting a blockchain governance game variant. The Strategic Alliance for Blockchain Governance Game (SABGG) which is an analytically proven game model has been applied as a blockchain governance game variant. The SABGG has been adapted for a decentralized network to improve drone swarm security. The special SABGG case demonstrates how the theoretical model is actually implemented for smart drone security. Although this research is still theoretical and there are several steps remaining for actual implementation into real drones, the practical case demonstrates how an SABGG network could be implemented for smart drone securities and its feasibility. This paper is the first piece of research that applies an SABGG model into a swarm network architecture security. The advanced smart drone swarm network is the successor of blockchain-governance-game-based IoT security applications, particularly in the intelligent military domain. The managerial aspects and actual implementations of smart drone operations could be the next step. Additionally, expending the domains for applying the BGG and its variants could definitely be another direction of future research.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

There are no available data to be stated.

Acknowledgments

Special thanks to the guest editor Tuan Phung-Duc who has guided the author to submit the proper topic of the journal. In addition, thanks to Jongwhi Kim who gives her meritorious efforts for proofreading and English editing on a voluntary basis.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Vergouw, B.; Nagel, H.; Bondt, G.; Custers, B. Drone technology: Types, payloads, applications, frequency spectrum issues and future developments. In The Future of Drone Use; TMC Asser Press: Hague, The Netherlands, 2016; pp. 21–45. [Google Scholar]
  2. Shahmoradi, J.; Talebi, E.; Roghanchi, P.; Hassanalian, M. A Comprehensive Review of Applications of Drone Technology in the Mining Industry. Drones 2020, 4, 34. [Google Scholar] [CrossRef]
  3. Ko, Y.; Kim, J.; Duguma, D.G.; Astillo, P.V.; You, I.; Pau, G. Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors 2021, 21, 2057. [Google Scholar] [CrossRef] [PubMed]
  4. Sliusar, N.; Filkin, T.; Huber-Humer, M.; Ritzkowski, M. Drone technology in municipal solid waste management and landfilling: A comprehensive review. Waste Manag. 2022, 139, 1–16. [Google Scholar] [CrossRef] [PubMed]
  5. Intel. Drone100 Performed by Ars Electronica Futurelab. 2015. Available online: https://inteldronelightshows.com/ (accessed on 1 December 2021).
  6. Hambling, D. What Are Drone Swarms and Why Does Every Military Suddenly Want One? Forbes 2021. Available online: https://www.forbes.com/sites/davidhambling/2021/03/01/what-are-drone-swarms-and-why-does-everyone-suddenly-want-one/ (accessed on 1 December 2021).
  7. Kallenborn, Z. Israel’s Drone Swarm over Gaza Should Worry Everyone. 2021. Available online: https://www.defenseone.com/ideas/2021/07/israels-drone-swarm-over-gaza-should-worry-everyone/183156/ (accessed on 1 December 2021).
  8. DOD; Department of Defense Announces Successful Micro-Drone Demonstration. US Dep. of Defense; 9 January 2017. Available online: https://www.defense.gov/ (accessed on 1 December 2021).
  9. Naqvi, S.A.; Hassan, S.A.; Pervaiz, H.; Ni, Q. Drone-Aided communication as a key enabler for 5G and resilient public safety networks. IEEE Commun. Mag. 2018, 56, 36–42. [Google Scholar] [CrossRef]
  10. Kallenborn, Z. Meet the future weapon of mass destruction, the drone swarm. Bull. At. Sci. 2021. Available online: https://thebulletin.org/2021/04/meet-the-future-weapon-of-mass-destruction-the-drone-swarm/ (accessed on 1 December 2021).
  11. Choudhary, G.; Sharma, V.; You, I. Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Comput. Electr. Eng. 2019, 74, 59–73. [Google Scholar] [CrossRef]
  12. He, D.; Chan, S.; Guizani, M. Communication security of unmanned aerial vehicles. IEEE Wirel. Commun. 2016, 24, 134–139. [Google Scholar] [CrossRef]
  13. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 1 December 2021).
  14. Wood, G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper. 2014. Available online: http://gavwood.com/paper.pdf (accessed on 1 December 2021).
  15. Strobel, V.; Ferrer, E.C.; Dorigo, M. Managing Byzantine Robots via Blockchain Technology in a Swarm Robotics Collective Decision Making Scenario. In Proceedings of the 17th International Conference on Autonomous Agents and Multi Agent Systems, Stockholm, Sweden, 10–15 July 2018; pp. 541–549. [Google Scholar]
  16. Strobel, V.; Ferrer, E.C.; Dorigo, M. Blockchain Technology Secures Robot Swarms: A Comparison of Consensus Protocols and Their Resilience to Byzantine Robots. Front. Robot. AI. 2020, 7, 54. [Google Scholar] [CrossRef] [PubMed]
  17. Millard, A.G.; Timmis, J.; Winfield, A.F.T. Towards Exogenous Fault Detection in Swarm Robotic Systems. In Proceedings of the 14th Annual Conference, TAROS 2013, Oxford, UK, 28–30 August 2013; pp. 429–430. [Google Scholar]
  18. Restuccia, F. Blockchain for the Internet of Things: Present and Future. arXiv 2019, arXiv:1903.07448. [Google Scholar]
  19. Jesus, E.F.; Chicarino, V.R.L.; de Albuquerque, C.V.N.; Rocha, A.A.D.A. Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. Secur. Commun. Netw. 2018, 2018, 9675050. [Google Scholar] [CrossRef]
  20. Wazid, M.; Bera, B.; Mitra, A.; Das, A.K.; Ali, R. Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services. In Proceedings of the 2020 DroneCom, London, UK, 25 September 2020; pp. 37–42. [Google Scholar]
  21. Cheema, M.A.; Shehzad, M.K.; Qureshi, H.K.; Hassan, S.A.; Jung, H. A Drone-Aided Blockchain-Based Smart Vehicular Network. IEEE Trans. Intel. Trans. Sys. 2021, 22, 4160–4170. [Google Scholar] [CrossRef]
  22. Buterin, V. A Next-Generation Smart Contract and Decentralized Application Platform. Ethereum Project White Paper. 2014. Available online: https://github.com/ethereum/wiki/wiki/White-Paper (accessed on 1 December 2021).
  23. Pinciroli, C.; Trianni, V.; O’Grady, R.; Pini, G.; Brutschy, A.; Brambilla, M.; Mathews, N.; Ferrante, E.; Di Caro, G.; Ducatelle, F.; et al. ARGoS: A modular, parallel, multi-engine simulator for multi-robot systems. Swarm Intell. 2012, 6, 271–295. [Google Scholar] [CrossRef] [Green Version]
  24. Kim, S.-K. Blockchain Governance Game. Comput. Ind. Eng. 2019, 136, 373–380. [Google Scholar] [CrossRef]
  25. Kim, S.-K. Strategic Alliance for Blockchain Governance Game. Probab. Eng. Inf. Sci. 2020, 36, 184–200. [Google Scholar] [CrossRef]
  26. Kim, S.-K. Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics 2021, 9, 109. [Google Scholar] [CrossRef]
  27. Micali, S.; Rabin, M.O.; Vadhan, S.P. Verifiable random functions. In Proceedings of the 40th IEEE Symposium on Foundations of Computer Science, New York, NY, USA, 17–18 October 1999; pp. 120–130. [Google Scholar]
  28. Goldberg, S.; Reyzin, L.; Papadopoulos, D.; Vcelak, J. Verifiable Random Functions. IETF. 2022. Available online: https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/ (accessed on 1 September 2022).
  29. Guerrero-Bonilla, L.; Prorok, A.; Kumar, V. Formations for resilient robot teams. IEEE Robot. Autom. Lett. 2017, 2, 741–848. [Google Scholar] [CrossRef]
  30. Saldana, D.; Prorok, A.; Sundaram, S.; Campos, M.F.; Kumar, V. Resilient consensus for time-varying networks of dynamic agents. In Proceedings of the American Control Conference, Seattle, WA, USA, 24–26 May 2017; pp. 252–258. [Google Scholar]
  31. LeBlanc, H.J.; Zhang, H.; Koutsoukos, X.; Sundaram, S. Resilient asymptotic consensus in robust networks. IEEE J. Select. Areas Commun. 2013, 31, 766–781. [Google Scholar] [CrossRef]
  32. Saulnier, K.; Saldana, D.; Prorok, A.; Pappas, G.J.; Kumar, V. Resilien flocking for mobile robot teams. IEEE Robot. Autom. Lett. 2017, 2, 1039–1046. [Google Scholar] [CrossRef]
  33. Dshalalow, J.H. First Excess Level Process, Advances in Queueing; CRC Press: Boca Raton, FL, USA, 1995; pp. 244–261. [Google Scholar]
Figure 1. Drone swarm art performance [5].
Figure 1. Drone swarm art performance [5].
Mathematics 10 03338 g001
Figure 2. BGG vs. SABGG [24,25].
Figure 2. BGG vs. SABGG [24,25].
Mathematics 10 03338 g002
Figure 3. Adapting SABGG for the drone swarm network architecture.
Figure 3. Adapting SABGG for the drone swarm network architecture.
Mathematics 10 03338 g003
Figure 4. Optimization practice for the drone swarm security.
Figure 4. Optimization practice for the drone swarm security.
Mathematics 10 03338 g004
Table 1. Cost matrix.
Table 1. Cost matrix.
NotBurst 1 q s b Burst q s b
Regular0V
Safety c b c b + V
Table 2. Initial conditions for the smart drone swarm optimization.
Table 2. Initial conditions for the smart drone swarm optimization.
NameValueDescription
M20 (drones)Total number of the nodes in the drone swarm
V1500 · M (USD)Total value of a blockchain-enabled drone
c ϱ = 3 · M 2 1 · ϱ (USD)Cost for reserving nodes to avoid attacks per each car
E ν 3 (trial)Average number of the observation until the attacker governs the smart drone swarm
C M 2 (drone)Random number of accepted drones at τ ν 1
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kim, S.-K. Advanced Drone Swarm Security by Using Blockchain Governance Game. Mathematics 2022, 10, 3338. https://doi.org/10.3390/math10183338

AMA Style

Kim S-K. Advanced Drone Swarm Security by Using Blockchain Governance Game. Mathematics. 2022; 10(18):3338. https://doi.org/10.3390/math10183338

Chicago/Turabian Style

Kim, Song-Kyoo (Amang). 2022. "Advanced Drone Swarm Security by Using Blockchain Governance Game" Mathematics 10, no. 18: 3338. https://doi.org/10.3390/math10183338

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop