179 research outputs found

    Scheduling and securing drone charging system using particle swarm optimization and blockchain technology

    Get PDF
    Unmanned aerial vehicles (UAVs) have emerged as a powerful technology for introducing untraditional solutions to many challenges in non-military fields and industrial applications in the next few years. However, the limitations of a drone's battery and the available optimal charging techniques represent a significant challenge in using UAVs on a large scale. This problem means UAVs are unable to fly for a long time; hence, drones' services fail dramatically. Due to this challenge, optimizing the scheduling of drone charging may be an unusual solution to drones' battery problems. Moreover, authenticating drones and verifying their charging transactions with charging stations is an essential associated problem. This paper proposes a scheduling and secure drone charging system in response to these challenges. The proposed system was simulated on a generated dataset consisting of 300 drones and 50 charging station points to evaluate its performance. The optimization of the proposed scheduling methodology was based on the particle swarm optimization (PSO) algorithm and game theory-based auction model. In addition, authenticating and verifying drone charging transactions were executed using a proposed blockchain protocol. The optimization and scheduling results showed the PSO algorithm's efficiency in optimizing drone routes and preventing drone collisions during charging flights with low error rates with an MAE = 0.0017 and an MSE = 0.0159. Moreover, the investigation to authenticate and verify the drone charging transactions showed the efficiency of the proposed blockchain protocol while simulating the proposed system on the Ethereum platform. The obtained results clarified the efficiency of the proposed blockchain protocol in executing drone charging transactions within a short time and low latency within an average of 0.34 s based on blockchain performance metrics. Moreover, the proposed scheduling methodology achieved a 96.8% success rate of drone charging cases, while only 3.2% of drones failed to charge after three scheduling rounds.Web of Science69art. no. 23

    PENERAPAN METODE MANUFAKTUR TERBARU PADA BODY DRONE UAV SKYWALKER

    Get PDF
    Penelitian ini bertujuan untuk merancang dan memproduksi body drone UAV yang sesuai dengan spesifikasi pada desain. Langkah awal melibatkan pengukuran dimensi body drone dan kemudian merancangnya menggunakan perangkat lunak Solidworks. Setelah melalui proses yang panjang, didapatkan desain body drone UAV Skywalker. Proses selanjutnya yaitu assembly, di mana beberapa bagian yang telah di desain terlebih dahulu dirangkai menjadi satu bagian menggunakan toolbar mate. Konsep perakitan produk mempertimbangkan faktor-faktor seperti dimensi, berat, dan keterhubungan antar komponen. Model 3D dari produk tersebut kemudian dibuat menggunakan perangkat lunak CAD. Untuk pembuatan body drone, digunakan bahan komposit fiber glass yang memiliki kekuatan tinggi dan berat yang ringan. Proses vakum infus digunakan untuk memastikan resin meresap merata pada material. Pengujian jatuh dilakukan untuk menguji ketahanan dan keamanan produk terhadap kerusakan akibat jatuh atau benturan. Dari simulasi menggunakan Solidworks, drone yang telah dirancang terbukti dapat bertahan dari gaya benturan 1 N. Proses perancangan dan pembuatan body drone ini melibatkan penggunaan aplikasi Solidworks dan mesin printer 3D. Material yang digunakan adalah ABS untuk 3D printing dan Karbon Fiber Glass untuk pembuatan body UAV Skywalker. Pada pengujian, body drone ini memiliki tebal material ±1 cm dengan total massa 63 gram. Seluruh proses dari desain hingga pembuatan molding dan pencetakan body memakan waktu satu minggu. Simulasi analisis menggunakan Solidworks menghasilkan data deformasi, tegangan volume, dan massa pada body drone

    3D indoor modeling and game theory based navigation for pre and post COVID-19 situation

    Get PDF
    The COVID-19 pandemic has greatly affected human behavior, creating a need for individuals to be more cautious about health and safety protocols. People are becoming more aware of their surroundings and the importance of minimizing the risk of exposure to potential sources of infection. This shift in mindset is particularly important in indoor environments, especially hospitals, where there is a greater risk of virus transmission. The implementation of route planning in these areas, aimed at minimizing interaction and exposure, is crucial for positively influencing individual behavior. Accurate maps of buildings help provide location-based services, prepare for emergencies, and manage infrastructural facilities. There aren’t any maps available for most installations, and there are no proven techniques to categorize features within indoor areas to provide location-based services. During a pandemic like COVID-19, the direct connection between the masses is one of the significant preventive steps. Hospitals are the main stakeholders in managing such situations. This study presents a novel method to create an adaptive 3D model of an indoor space to be used for localization and routing purposes. The proposed method infuses LiDAR-based data-driven methodology with a Quantum Geographic Information System (QGIS) model-driven process using game theory. The game theory determines the object localization and optimal path for COVID-19 patients in a real-time scenario using Nash equilibrium. Using the proposed method, comprehensive simulations and model experiments were done using QGIS to identify an optimized route. Dijkstra algorithm is used to determine the path assessment score after obtaining several path plans using dynamic programming. Additionally, Game theory generates path ordering based on the custom scenarios and user preference in the input path. In comparison to other approaches, the suggested way can minimize time and avoid congestion. It is demonstrated that the suggested technique satisfies the actual technical requirements in real-time. As we look forward to the post-COVID era, the tactics and insights gained during the pandemic hold significant value. The techniques used to improve indoor navigation and reduce interpersonal contact within healthcare facilities can be applied to maintain a continued emphasis on safety, hygiene, and effective space management in the long term. The use of three-dimensional (3D) modeling and optimization methodologies in the long-term planning and design of indoor spaces promotes resilience and flexibility, encouraging the adoption of sustainable and safe practices that extend beyond the current pandemic

    Integration of Blockchain and Auction Models: A Survey, Some Applications, and Challenges

    Get PDF
    In recent years, blockchain has gained widespread attention as an emerging technology for decentralization, transparency, and immutability in advancing online activities over public networks. As an essential market process, auctions have been well studied and applied in many business fields due to their efficiency and contributions to fair trade. Complementary features between blockchain and auction models trigger a great potential for research and innovation. On the one hand, the decentralized nature of blockchain can provide a trustworthy, secure, and cost-effective mechanism to manage the auction process; on the other hand, auction models can be utilized to design incentive and consensus protocols in blockchain architectures. These opportunities have attracted enormous research and innovation activities in both academia and industry; however, there is a lack of an in-depth review of existing solutions and achievements. In this paper, we conduct a comprehensive state-of-the-art survey of these two research topics. We review the existing solutions for integrating blockchain and auction models, with some application-oriented taxonomies generated. Additionally, we highlight some open research challenges and future directions towards integrated blockchain-auction models

    Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey

    Get PDF
    Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural changes are not made, the upcoming drone applications will not be able to serve their actual purpose. Therefore, in this paper, we present a detailed review of the security-critical drone applications, and security-related challenges in drone communication such as DoS attacks, Man-in-the-middle attacks, De-Authentication attacks, and so on. Furthermore, as part of solution architectures, the use of Blockchain, Software Defined Networks (SDN), Machine Learning, and Fog/Edge computing are discussed as these are the most emerging technologies. Drones are highly resource-constrained devices and therefore it is not possible to deploy heavy security algorithms on board. Blockchain can be used to cryptographically store all the data that is sent to/from the drones, thereby saving it from tampering and eavesdropping. Various ML algorithms can be used to detect malicious drones in the network and to detect safe routes. Additionally, the SDN technology can be used to make the drone network reliable by allowing the controller to keep a close check on data traffic, and fog computing can be used to keep the computation capabilities closer to the drones without overloading them.The work of Vinay Chamola and Fei Richard Yu was supported in part by the SICI SICRG Grant through the Project Artificial Intelligence Enabled Security Provisioning and Vehicular Vision Innovations for Autonomous Vehicles, and in part by the Government of Canada's National Crime Prevention Strategy and Natural Sciences and Engineering Research Council of Canada (NSERC) CREATE Program for Building Trust in Connected and Autonomous Vehicles (TrustCAV)

    Integration of UTM and U-Space on Norwegian continental shelf

    Get PDF
    In this master thesis, we present an overview of the U-Space and Regulations in Europe, while also taking into consideration the progression of the integration of both parts in Norwegian airspace over the Norwegian continental shelf. This thesis is mainly separated into three parts. The first part is taking a look into the European Union's roadmap/plan for establishing an Unmanned Aircraft System Traffic Management (UTM) and how they plan to develop their system into a single European sky. The end goal is that essentially every operator of a drone can do so all over Europe without having any issues with crossing borders or different regulations. The second part of the thesis is dedicated to a detailed insight into the technical side of a UTM, the different layers, examples of which systems are the most relevant to be utilized on the Norwegian continental shelf. The third part of this thesis is dedicated to looking at the regulatory side of things, in regards of the UTM system in itself, different factors of drone operations, requirements for every part of an operation. In addition, discussing and concluding about everything we have been though in the thesis. Additionally, there are uses cases where everything comes together to see how it would work in practise and in certain scenarios. In the final part of the thesis the previous parts of the project will be discussed, as well as drawing final conclusions to the project

    A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques

    Get PDF
    Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening on making UAVs more robust using energy harvesting techniques to have a better battery lifetime, network performance and to secure against attackers. UAV networks are many times used for unmanned missions. There have been many attacks on civilian, military, and industrial targets that were carried out using remotely controlled or automated UAVs. This continued misuse has led to research in preventing unauthorized UAVs from causing damage to life and property. In this paper, we present a literature review of UAVs, UAV attacks, and their prevention using anti-UAV techniques. We first discuss the different types of UAVs, the regulatory laws for UAV activities, their use cases, recreational, and military UAV incidents. After understanding their operation, various techniques for monitoring and preventing UAV attacks are described along with case studies

    BC4LLM: Trusted Artificial Intelligence When Blockchain Meets Large Language Models

    Full text link
    In recent years, artificial intelligence (AI) and machine learning (ML) are reshaping society's production methods and productivity, and also changing the paradigm of scientific research. Among them, the AI language model represented by ChatGPT has made great progress. Such large language models (LLMs) serve people in the form of AI-generated content (AIGC) and are widely used in consulting, healthcare, and education. However, it is difficult to guarantee the authenticity and reliability of AIGC learning data. In addition, there are also hidden dangers of privacy disclosure in distributed AI training. Moreover, the content generated by LLMs is difficult to identify and trace, and it is difficult to cross-platform mutual recognition. The above information security issues in the coming era of AI powered by LLMs will be infinitely amplified and affect everyone's life. Therefore, we consider empowering LLMs using blockchain technology with superior security features to propose a vision for trusted AI. This paper mainly introduces the motivation and technical route of blockchain for LLM (BC4LLM), including reliable learning corpus, secure training process, and identifiable generated content. Meanwhile, this paper also reviews the potential applications and future challenges, especially in the frontier communication networks field, including network resource allocation, dynamic spectrum sharing, and semantic communication. Based on the above work combined and the prospect of blockchain and LLMs, it is expected to help the early realization of trusted AI and provide guidance for the academic community

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp
    • …
    corecore