DroneCom ’22, October 17, 2022, Sydney, NSW, Australia Akram et al.
validate the authenticity of these transactions. Proof of work (PoW)
and proof of authority (PoA) are two examples. In the PoW method,
each network node contributes to the solution of the mathemati-
cal problem. The rst node to answer the challenge is responsible
for transaction verication. First, the transactions are validated
for correctness before being added to the blockchain. Moreover,
blockchain makes use of smart contracts, the purpose of which is to
nalize all rules and conditions. In addition, it removes the need for
an intermediary. In addition, blockchain ensures network security
by evaluating the trust between nodes, and by detecting malicious
nodes using the Merkle tree [5].
Multiple blockchain-based solutions for scalability concerns,
high costs, and single points of failure have been suggested [
4
].
However, blockchain is a highly expensive storage method, and
all of these networks store their data there. Currently, it costs
$14,151.68 to store one megabyte of data on a blockchain network.
In addition, a proof-of-work consensus mechanism is used in [
4
],
which is inappropriate in a low-resource context.
In the context of IoDT networks, routing refers to the process
by which individual nodes establish connections with one another
and transfer data from its source to its eventual destination. Dier-
ent nodes within the IoDT, including drones, cluster heads (CH),
and base stations (BSs), supervise the transfer of data . It is the
responsibility of the CHs to do any required data processing before
transmitting it to the BSs [
6
,
10
,
12
,
16
]. However, there are no
authenticated network nodes. Since any node may get network
access, any harmful action is conceivable. Moreover, data storage
on a blockchain is costly since no cost-eective storage strategy
is presented in [
6
]. Since blockchains are intended to record trans-
actions in perpetuity, the problem of inadequate capacity to store
these data quickly becomes apparent. In an IoDT conguration,
an excessive energy drain on CHs may also aect network per-
formance. In [
4
], no new CH selection processes are suggested. In
order to add new blocks to the blockchain and validate transactions,
PoW needs miners to solve this problem. This mining procedure
is time-consuming due to the intricacy of the underlying problem,
which increases the network’s computational expenses over time.
The main contributions of this work are as follows:
•
IPFS is used for IoDT’s distributed storage requirements. A
payment scheme is recommended as an incentive for archival
use of IPFS.
•
To exclude untrustworthy nodes, each node’s identication
is veried. The suggested LEACH technique, named "R2D",
identies and selects CHs from drones using the least dis-
tance, highest degree, and maximum residual energy.
•
Blockchain technology is used for secure service provision-
ing systems, with the suggestion that an advanced symmet-
ric encryption technique with a 128-bit key be employed to
protect sensitive data.
•
For the purpose of determining the validity of the smart
contract, a formal security analysis is undertaken.
The paper moves on to the subsequent sections. In Section 2,
the proposed system model is provided. Section 3 presents the
simulation outcomes and system model validation. In Section 4, the
formal security analysis is addressed. The sixth section provides an
overview of the accomplished activities.
2 SYSTEM MODEL
Figure 1 depicts the system model, which will be analyzed and
reviewed below. IoDT, end-users, the Interplanetary File System
(IPFS), and a blockchain are system components. The ultimate shift
of drones’ backends to IoDT will be enabled by technologies such
as the Internet of Things, intelligent computer vision, cloud com-
puting, enhanced wireless connectivity, big data, and cutting-edge
security. A growing variety of industries are embracing the use of
drones, including agriculture and industry, government and com-
mercial organizations, and the monitoring of smart cities and rural
areas. Each user must register for the blockchain network and
undergo the authentication process to guarantee the network’s
security. This objective is motivated by the usage of registration
and authentication procedures [
4
]. IPFS is a distributed system
that utilizes data and information chunks for storage and retrieval.
Any time information is saved on IPFS, a hash is generated. The
32-bit hash is a result of the IPFS technique for storing data. The
blockchain is then updated with this hash.
2.1 Initialization
A smart contract is a computerized contract whose conditions
may be carried out with little or no requirement for a third party.
Blockchain technology makes this capability possible. It is de-
ployed on the transaction-controlling BSs of the network. Utiliz-
ing blockchain technology, sensor node credentials are kept in a
blockchain for subsequent authentication, as part of the process of
enrolling nodes in the network. The credentials are sent using a
message like the equation shown below.
𝑀𝑒𝑠𝑠𝑎𝑔𝑒 =𝑃𝑎𝑐𝑘𝑒𝑡 (𝐼𝐷𝑁, 𝑀𝐴𝐶𝑁, 𝑅𝑒𝑝𝑁)(1)
Drone Node ID (
𝐼𝐷𝑁
), MAC addresses (
𝑀𝐴𝐶𝑁
), and reputations
(
𝑅𝑒𝑝𝑁
) are utilized as part of the registration and authentication
procedure for nodes.
𝑅𝑒𝑝𝑁
is a measure of a node’s network stand-
ing that takes into account the node’s past behaviors and its con-
nections to other nodes and the rest of the system. If the node’s
reporting is not honest, its reputation will decrease, but if it is, it
will grow. The credentials are recorded in an asymmetrical manner
on a blockchain-based distributed ledger. Their addresses are also
recorded on the blockchain, which provides an additional degree of
security against fraudulent system usage. Throughout the authenti-
cation procedure, the credentials are compared to the information
already on blockchain. When credentials do not match previously
saved data, the node in question is marked as malicious.
2.2 Cluster Head Selection
Drone nodes, cluster heads, and base stations make up the IoDT’s
infrastructure. The drone nodes transmit data to the CHs, where
computations are done. CHs must rst gather drone node data
before relaying it to base stations (BSs). When BS wants to store
data, it makes a request to IPFS, which responds with a hash of the
data. During data processing and storage, the available energy of
CHs is quickly depleted. Our suggested solution to this problem
is based on a technique known as R2D, which chooses CHs from
regular nodes. CHs is determined by three factors: available spare
energy, proximity to BSs, and maximum node degree. If there is
a single node that meets all of the given requirements, it will be