首页 > 最新文献

Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond最新文献

英文 中文
Federated learning meets blockchain at 6G edge: a drone-assisted networking for disaster response 联邦学习在6G边缘与区块链结合:无人机辅助的灾难响应网络
Shiva Raj Pokhrel
We consider a new blockchain empowered federated learning approach which uses wireless mobile miners at drones in the future sixth generation (6G) networks for a disaster response system. Our focus is on the blockchain latency, and energy consumption in the proposed architecture of the network of drones. Maintaining low delay in wireless communication between the drones is required to minimize blockchain forking events while performing blockchain operations. Therefore, we quantify the probability of occurrence of forking events to analyze the uncertainty of the system towards the additional energy wastage. The forked block (due to channel impairments or mobility) incurs re-computation energy. We develop pragmatic analyses of the expected energy consumption by considering the parameters like the number of miners as well as the power consumed during computing, block transfer and 6G channel dynamics for the system.
我们考虑了一种新的区块链授权联邦学习方法,该方法在未来的第六代(6G)网络中使用无人机的无线移动矿工,用于灾难响应系统。我们的重点是区块链延迟,以及无人机网络架构中的能耗。在执行区块链操作时,需要保持无人机之间无线通信的低延迟,以最大限度地减少区块链分叉事件。因此,我们量化分叉事件发生的概率,以分析系统对额外能量浪费的不确定性。分叉块(由于通道损坏或移动)会产生重新计算能量。我们通过考虑矿工数量等参数以及系统在计算、块传输和6G通道动态过程中消耗的功率,对预期的能耗进行了实用的分析。
{"title":"Federated learning meets blockchain at 6G edge: a drone-assisted networking for disaster response","authors":"Shiva Raj Pokhrel","doi":"10.1145/3414045.3415949","DOIUrl":"https://doi.org/10.1145/3414045.3415949","url":null,"abstract":"We consider a new blockchain empowered federated learning approach which uses wireless mobile miners at drones in the future sixth generation (6G) networks for a disaster response system. Our focus is on the blockchain latency, and energy consumption in the proposed architecture of the network of drones. Maintaining low delay in wireless communication between the drones is required to minimize blockchain forking events while performing blockchain operations. Therefore, we quantify the probability of occurrence of forking events to analyze the uncertainty of the system towards the additional energy wastage. The forked block (due to channel impairments or mobility) incurs re-computation energy. We develop pragmatic analyses of the expected energy consumption by considering the parameters like the number of miners as well as the power consumed during computing, block transfer and 6G channel dynamics for the system.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Intelligent vehicle collision avoidance system using 5G-enabled drone swarms 使用5g无人机群的智能车辆防撞系统
Sunil Jacob, Varun G. Menon, R. Parvathi, Shynu Gopalan Padinjappurathu, KS FathimaShemim, B. Mahapatra, M. Mukherjee
The number of vehicular collisions is on a toll worldwide. Despite enforcing stringent laws and incorporating various safety features, the causalities are still on the rise. Existing techniques such as vision zero strategy and safe system approach provides only post-crash aid. Although numerous works have been carried out on Intelligent Transportation Systems (ITS), a well-coordinated vehicular collision avoidance system is still missing. In this paper, we utilize the tremendous opportunity provided by ITS, Light Detection and Ranging (LIDAR), Wireless Sensor Networks (WSN), 5G, and propose an effective system using drones with swarm intelligence that can automatically control the vehicles to prevent the collision. The proposed method, Bidirectional Multi-Tier IoT drone with Swarm optimization (BMTD-IoT-S) uses intelligent coordination of the drone swarms with the vehicular networks and always ensures a safe distance between the vehicles using the principle of magnetic levitation. The system is further investigated for optimizing the power, altitude, and angular frequency allocation for static and dynamic BMTD-IoT-S'. The results from simulation confirm the excellent performance of the system in ensuring collision avoidance.
在世界范围内,车辆碰撞的数量正在增加。尽管执行了严格的法律,并加入了各种安全措施,但伤亡人数仍在上升。现有的技术,如零视觉策略和安全系统方法,只能提供事故后的援助。尽管在智能交通系统(ITS)方面已经开展了大量的工作,但一个协调良好的车辆防撞系统仍然缺失。在本文中,我们利用ITS,光探测和测距(LIDAR),无线传感器网络(WSN), 5G提供的巨大机会,并提出了一个有效的系统,使用具有群体智能的无人机,可以自动控制车辆以防止碰撞。提出的双向多层物联网无人机群优化方法(BMTD-IoT-S)利用无人机群与车辆网络的智能协调,利用磁悬浮原理始终保证车辆之间的安全距离。对该系统进行了进一步的研究,以优化静态和动态BMTD-IoT-S的功率、高度和角频率分配。仿真结果表明,该系统具有良好的避碰性能。
{"title":"Intelligent vehicle collision avoidance system using 5G-enabled drone swarms","authors":"Sunil Jacob, Varun G. Menon, R. Parvathi, Shynu Gopalan Padinjappurathu, KS FathimaShemim, B. Mahapatra, M. Mukherjee","doi":"10.1145/3414045.3415938","DOIUrl":"https://doi.org/10.1145/3414045.3415938","url":null,"abstract":"The number of vehicular collisions is on a toll worldwide. Despite enforcing stringent laws and incorporating various safety features, the causalities are still on the rise. Existing techniques such as vision zero strategy and safe system approach provides only post-crash aid. Although numerous works have been carried out on Intelligent Transportation Systems (ITS), a well-coordinated vehicular collision avoidance system is still missing. In this paper, we utilize the tremendous opportunity provided by ITS, Light Detection and Ranging (LIDAR), Wireless Sensor Networks (WSN), 5G, and propose an effective system using drones with swarm intelligence that can automatically control the vehicles to prevent the collision. The proposed method, Bidirectional Multi-Tier IoT drone with Swarm optimization (BMTD-IoT-S) uses intelligent coordination of the drone swarms with the vehicular networks and always ensures a safe distance between the vehicles using the principle of magnetic levitation. The system is further investigated for optimizing the power, altitude, and angular frequency allocation for static and dynamic BMTD-IoT-S'. The results from simulation confirm the excellent performance of the system in ensuring collision avoidance.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123376424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An intelligent UAV based data aggregation strategy for IoT after disaster scenarios 基于智能无人机的灾后物联网数据聚合策略
Xiaoding Wang, Jia Hu, Hui Lin
The study on data aggregation in Internet of Things (IoT) has drawn a great attention in recent years. Since a large-scale disaster could damage the entire communication network and cut off data aggregation completely, an Intelligent UAV based Data Aggregation Strategy, named (IDAS), is proposed for after disaster scenarios in IoT. Specifically, IDAS first employs an task distribution mechanism to achieve the trade-off between the aggregation ratio and the energy cost. Then, a deep reinforcement learning method is developed for UAV route design to perform corresponding task. Thus, all data are aggregated toward the rescue headquarter by UAV deployment. The simulation results indicate that IDAS has a higher aggregation ratio and a lower energy cost while compared with contemporary strategies.
近年来,物联网数据聚合的研究备受关注。针对大规模灾害可能破坏整个通信网络,导致数据聚合完全中断的问题,提出了一种基于智能无人机的物联网灾后场景数据聚合策略(IDAS)。具体来说,IDAS首先采用任务分配机制来实现聚合率与能量成本之间的权衡。然后,开发了一种用于无人机航路设计的深度强化学习方法来执行相应的任务。通过无人机部署,将所有数据汇总到救援指挥部。仿真结果表明,与现有策略相比,该策略具有更高的聚合率和更低的能量成本。
{"title":"An intelligent UAV based data aggregation strategy for IoT after disaster scenarios","authors":"Xiaoding Wang, Jia Hu, Hui Lin","doi":"10.1145/3414045.3415940","DOIUrl":"https://doi.org/10.1145/3414045.3415940","url":null,"abstract":"The study on data aggregation in Internet of Things (IoT) has drawn a great attention in recent years. Since a large-scale disaster could damage the entire communication network and cut off data aggregation completely, an Intelligent UAV based Data Aggregation Strategy, named (IDAS), is proposed for after disaster scenarios in IoT. Specifically, IDAS first employs an task distribution mechanism to achieve the trade-off between the aggregation ratio and the energy cost. Then, a deep reinforcement learning method is developed for UAV route design to perform corresponding task. Thus, all data are aggregated toward the rescue headquarter by UAV deployment. The simulation results indicate that IDAS has a higher aggregation ratio and a lower energy cost while compared with contemporary strategies.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134151742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Quality-aware trajectory planning of cellular connected UAVs 蜂窝互联无人机的质量感知轨迹规划
Muhammad Usman Sheikh, M. Riaz, Furqan Jameel, R. Jäntti, Navuday Sharma, Vishal Sharma, M. Alazab
The use of Unmanned Aerial Vehicles (UAVs) is becoming common in our daily lives and cellular networks are effective in providing support services to UAVs for long-range applications. The main target of this paper is to propose a modified form of well-known graph search methods i.e., Dijkstra and A-star also known as A* algorithm, for quality-aware trajectory planning of the UAV. The aerial quality map of the propagation environment is used as an input for UAV trajectory planning, and the quality metric considered for this work is Signal to Interference plus Noise Ratio (SINR). The UAV trajectory is quantified in terms of three performance metrics i.e., path length, Quality Outage Ratio (QOR), and maximum Quality Outage Duration (QOD). The proposed path planning algorithm aims at achieving a trade-off between the path length and other quality metrics of the UAV trajectory. The simulations are performed using an agreed 3GPP macro cell LOS scenario for UAVs in MATLAB. Simulation results illustrate that the proposed algorithm significantly improves the QOR by slightly increasing the path length compared with the naive shortest path. Similarly, the outage avoidance path achieves high QOR at the expense of large path length, and our proposed method finds a compromise and provides an optimal quality-aware path.
无人机的使用在我们的日常生活中变得越来越普遍,蜂窝网络可以有效地为无人机的远程应用提供支持服务。本文的主要目标是提出一种改进形式的众所周知的图搜索方法,即Dijkstra和a -star,也称为a *算法,用于无人机的质量感知轨迹规划。将传播环境的空中质量图作为无人机轨迹规划的输入,考虑的质量度量是信噪比(SINR)。无人机轨迹根据三个性能指标进行量化,即路径长度、质量中断比(QOR)和最大质量中断持续时间(QOD)。提出的路径规划算法旨在实现路径长度与无人机轨迹的其他质量指标之间的权衡。仿真是在MATLAB中使用商定的无人机3GPP宏单元LOS场景进行的。仿真结果表明,与朴素最短路径相比,该算法通过略微增加路径长度,显著提高了QOR。同样,中断避免路径以牺牲大路径长度为代价获得高QOR,我们提出的方法找到了一个折衷方案,并提供了一个最优的质量感知路径。
{"title":"Quality-aware trajectory planning of cellular connected UAVs","authors":"Muhammad Usman Sheikh, M. Riaz, Furqan Jameel, R. Jäntti, Navuday Sharma, Vishal Sharma, M. Alazab","doi":"10.1145/3414045.3415943","DOIUrl":"https://doi.org/10.1145/3414045.3415943","url":null,"abstract":"The use of Unmanned Aerial Vehicles (UAVs) is becoming common in our daily lives and cellular networks are effective in providing support services to UAVs for long-range applications. The main target of this paper is to propose a modified form of well-known graph search methods i.e., Dijkstra and A-star also known as A* algorithm, for quality-aware trajectory planning of the UAV. The aerial quality map of the propagation environment is used as an input for UAV trajectory planning, and the quality metric considered for this work is Signal to Interference plus Noise Ratio (SINR). The UAV trajectory is quantified in terms of three performance metrics i.e., path length, Quality Outage Ratio (QOR), and maximum Quality Outage Duration (QOD). The proposed path planning algorithm aims at achieving a trade-off between the path length and other quality metrics of the UAV trajectory. The simulations are performed using an agreed 3GPP macro cell LOS scenario for UAVs in MATLAB. Simulation results illustrate that the proposed algorithm significantly improves the QOR by slightly increasing the path length compared with the naive shortest path. Similarly, the outage avoidance path achieves high QOR at the expense of large path length, and our proposed method finds a compromise and provides an optimal quality-aware path.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134180467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BioUAV BioUAV
S. Patel, Hamza Abubakar Kheruwala, M. Alazab, N. Patel, R. Damani, Pronaya Bhattacharya, S. Tanwar, Neeraj Kumar
Modern cloud-based UAV communications authenticate user identity through hash-based biometric authentication schemes, but are limited in scope due to high-end processing and user template matching delays, coupled with latency and storage overheads. Motivated from the aforementioned discussions, the paper proposes a BC- envisioned identity framework to secure next-generation UAV communication. In BioUAV, a dual layer of security is exploited. In the first layer, user identity registration to UAVs are done in BC through input random oracles, that generates diffusion in biometric values. The values are then fed to a transformation function that generates biocodes as second layer of authentication. Based on generated biocodes values, smart contracts (SC) are executed for transaction verification through encrypted wallets with user public/private pairs. For 80 biohashes, BioUAV has an overall latency of 22.5 milliseconds (ms), compared to 33.78 ms for conventional matching schemes. The framework has a accuracy of 98.37% under receiver operating characteristic (ROC) curve, with an attack probability of less than 0.5 at a proposed low performance indicator (PI) of 0.48. For security evaluation, the computation cost (CC) of BioUAV is 144.58 ms, and communication cost (CCM) is 123 bytes, that indicates the viability of the proposed framework against conventional approaches.
{"title":"BioUAV","authors":"S. Patel, Hamza Abubakar Kheruwala, M. Alazab, N. Patel, R. Damani, Pronaya Bhattacharya, S. Tanwar, Neeraj Kumar","doi":"10.1145/3414045.3415945","DOIUrl":"https://doi.org/10.1145/3414045.3415945","url":null,"abstract":"Modern cloud-based UAV communications authenticate user identity through hash-based biometric authentication schemes, but are limited in scope due to high-end processing and user template matching delays, coupled with latency and storage overheads. Motivated from the aforementioned discussions, the paper proposes a BC- envisioned identity framework to secure next-generation UAV communication. In BioUAV, a dual layer of security is exploited. In the first layer, user identity registration to UAVs are done in BC through input random oracles, that generates diffusion in biometric values. The values are then fed to a transformation function that generates biocodes as second layer of authentication. Based on generated biocodes values, smart contracts (SC) are executed for transaction verification through encrypted wallets with user public/private pairs. For 80 biohashes, BioUAV has an overall latency of 22.5 milliseconds (ms), compared to 33.78 ms for conventional matching schemes. The framework has a accuracy of 98.37% under receiver operating characteristic (ROC) curve, with an attack probability of less than 0.5 at a proposed low performance indicator (PI) of 0.48. For security evaluation, the computation cost (CC) of BioUAV is 144.58 ms, and communication cost (CCM) is 123 bytes, that indicates the viability of the proposed framework against conventional approaches.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116149713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autonomous detection of malicious events using machine learning models in drone networks 在无人机网络中使用机器学习模型自主检测恶意事件
Nour Moustafa, A. Jolfaei
Drone systems, the so-called Unmanned Autonomous Vehicles (UAVs), have been widely employed in military and civilian sectors. Drone systems have been used for cyber warfare, warfighting and surveillance purposes of modern military and civilian applications. However, they have increasingly suffered from sophisticated malicious activities that exploit their vulnerabilities through network communications. As drones comprise a complex infrastructure as piloted aircraft but without operators, they still need a reliable security control to assert their safe operations. This paper proposes an autonomous intrusion detection scheme for discovering advanced and sophisticated cyberattacks that exploit drone networks. A testbed was configured to launch malicious events against a drone network for collecting legitimate and malicious observations and evaluate the performances of machine learning in real-time. Machine learning algorithms, including decision tree, k-nearest neighbors, naive Bayes, support vector machine and deep learning multi-layer perceptron, were trained and evaluated using the data collections, with promising results in terms of detection accuracy, false alarm rates, and processing times.
无人机系统,即所谓的无人驾驶汽车(uav),已广泛应用于军事和民用领域。无人机系统已被用于现代军事和民用的网络战、作战和监视目的。然而,他们越来越多地遭受通过网络通信利用其漏洞的复杂恶意活动。由于无人机像有人驾驶的飞机一样构成复杂的基础设施,但没有操作员,因此它们仍然需要可靠的安全控制来确保其安全运行。本文提出一种自主入侵检测方案,用于发现利用无人机网络的高级和复杂的网络攻击。配置了一个测试平台,针对无人机网络发起恶意事件,收集合法和恶意的观察结果,并实时评估机器学习的性能。机器学习算法,包括决策树、k近邻、朴素贝叶斯、支持向量机和深度学习多层感知器,使用数据收集进行训练和评估,在检测精度、误报率和处理时间方面取得了令人鼓舞的结果。
{"title":"Autonomous detection of malicious events using machine learning models in drone networks","authors":"Nour Moustafa, A. Jolfaei","doi":"10.1145/3414045.3415951","DOIUrl":"https://doi.org/10.1145/3414045.3415951","url":null,"abstract":"Drone systems, the so-called Unmanned Autonomous Vehicles (UAVs), have been widely employed in military and civilian sectors. Drone systems have been used for cyber warfare, warfighting and surveillance purposes of modern military and civilian applications. However, they have increasingly suffered from sophisticated malicious activities that exploit their vulnerabilities through network communications. As drones comprise a complex infrastructure as piloted aircraft but without operators, they still need a reliable security control to assert their safe operations. This paper proposes an autonomous intrusion detection scheme for discovering advanced and sophisticated cyberattacks that exploit drone networks. A testbed was configured to launch malicious events against a drone network for collecting legitimate and malicious observations and evaluate the performances of machine learning in real-time. Machine learning algorithms, including decision tree, k-nearest neighbors, naive Bayes, support vector machine and deep learning multi-layer perceptron, were trained and evaluated using the data collections, with promising results in terms of detection accuracy, false alarm rates, and processing times.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A deep learning approach to efficient drone mobility support 一种高效无人机机动性支持的深度学习方法
Yun Chen, Xingqin Lin, T. Khan, Mohammad Mozaffari
The growing deployment of drones in a myriad of applications relies on seamless and reliable wireless connectivity for safe control and operation of drones. Cellular technology is a key enabler for providing essential wireless services to drones flying in the sky. Existing cellular networks targeting terrestrial usage can support the initial deployment of low-altitude drone users, but there are challenges such as mobility support. In this paper, we propose a novel handover framework for providing efficient mobility support and reliable wireless connectivity to drones served by a terrestrial cellular network. Using tools from deep reinforcement learning, we develop a deep Q-learning algorithm to dynamically optimize handover decisions to ensure robust connectivity for drone users. Simulation results show that the proposed framework significantly reduces the number of handovers at the expense of a small loss in signal strength relative to the baseline case where a drone always connect to a base station that provides the strongest received signal strength.
无人机在各种应用中的部署越来越多,这依赖于无缝可靠的无线连接,以实现无人机的安全控制和操作。蜂窝技术是向空中飞行的无人机提供基本无线服务的关键推动者。针对地面使用的现有蜂窝网络可以支持低空无人机用户的初始部署,但存在移动性支持等挑战。在本文中,我们提出了一种新的切换框架,为地面蜂窝网络服务的无人机提供有效的移动性支持和可靠的无线连接。利用深度强化学习的工具,我们开发了一种深度q -学习算法来动态优化切换决策,以确保无人机用户的鲁棒连接。仿真结果表明,与无人机始终连接到提供最强接收信号强度的基站的基线情况相比,所提出的框架以信号强度的小损失为代价显著减少了切换次数。
{"title":"A deep learning approach to efficient drone mobility support","authors":"Yun Chen, Xingqin Lin, T. Khan, Mohammad Mozaffari","doi":"10.1145/3414045.3415948","DOIUrl":"https://doi.org/10.1145/3414045.3415948","url":null,"abstract":"The growing deployment of drones in a myriad of applications relies on seamless and reliable wireless connectivity for safe control and operation of drones. Cellular technology is a key enabler for providing essential wireless services to drones flying in the sky. Existing cellular networks targeting terrestrial usage can support the initial deployment of low-altitude drone users, but there are challenges such as mobility support. In this paper, we propose a novel handover framework for providing efficient mobility support and reliable wireless connectivity to drones served by a terrestrial cellular network. Using tools from deep reinforcement learning, we develop a deep Q-learning algorithm to dynamically optimize handover decisions to ensure robust connectivity for drone users. Simulation results show that the proposed framework significantly reduces the number of handovers at the expense of a small loss in signal strength relative to the baseline case where a drone always connect to a base station that provides the strongest received signal strength.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132654324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain-enabled secure communication for drone delivery: a case study in COVID-like scenarios 支持区块链的无人机交付安全通信:类似covid - 19场景的案例研究
Maninderpal Singh, G. Aujla, R. S. Bali, Sahil Vashisht, Amritpal Singh, Anish Jindal
COVID-19 made the world stop, with people trapped inside their homes and governments trying to restrict the public movement. However, to accomplish this, one big problem that emerged and outscored everything else was catering to the day to day necessary items of the people without human involvement. In this regard, we propose a blockchain-enabled secure communication framework for delivering the goods in COVID-19 like scenarios by leveraging the drones that are available with commercial retail providers. The blockchain scheme is used to create smart contracts to build the trust of buyers and sellers on the framework as the payments are made through the smart contract executions. The blockchain based order processing ensures the integrity and authenticity of the information. Moreover, a communication model is presented along with the order, delivery and payment phases. The results prove the effectiveness of the proposed scheme by evaluating it based on gas price, transaction time, and mining time.
COVID-19让世界停滞不前,人们被困在家中,政府试图限制公共行动。然而,为了实现这一目标,出现了一个比其他任何事情都重要的大问题,那就是在没有人类参与的情况下满足人们的日常必需品。在这方面,我们提出了一个支持区块链的安全通信框架,通过利用商业零售供应商提供的无人机,在类似COVID-19的情况下交付货物。区块链方案用于创建智能合约,以在框架上建立买卖双方的信任,因为付款是通过智能合约执行的。基于区块链的订单处理确保了信息的完整性和真实性。此外,还提出了与订单、交付和支付阶段一起的通信模型。通过对gas价格、交易时间和挖矿时间进行评价,验证了该方案的有效性。
{"title":"Blockchain-enabled secure communication for drone delivery: a case study in COVID-like scenarios","authors":"Maninderpal Singh, G. Aujla, R. S. Bali, Sahil Vashisht, Amritpal Singh, Anish Jindal","doi":"10.1145/3414045.3415937","DOIUrl":"https://doi.org/10.1145/3414045.3415937","url":null,"abstract":"COVID-19 made the world stop, with people trapped inside their homes and governments trying to restrict the public movement. However, to accomplish this, one big problem that emerged and outscored everything else was catering to the day to day necessary items of the people without human involvement. In this regard, we propose a blockchain-enabled secure communication framework for delivering the goods in COVID-19 like scenarios by leveraging the drones that are available with commercial retail providers. The blockchain scheme is used to create smart contracts to build the trust of buyers and sellers on the framework as the payments are made through the smart contract executions. The blockchain based order processing ensures the integrity and authenticity of the information. Moreover, a communication model is presented along with the order, delivery and payment phases. The results prove the effectiveness of the proposed scheme by evaluating it based on gas price, transaction time, and mining time.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116857868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV 基于NOMA的全双工无人机的无线供电D2D用户能量管理方案
Ishan Budhiraja, Neeraj Kumar, M. Alazab, Sudhanshu Tyagi, S. Tanwar, G. Srivastava
Device-to-Device (D2D) communications underlaying Unmanned aerial vehicle (UAV) with its mobility extend the coverage and improve the data rate. In this paper, we propose an energy management scheme for wireless powered D2D users with NOMA underlaying full-duplex (FD) UAV. Here, the cellular transmitters (CTs) and D2D transmitters (DDTs) first harvest energy from the radio frequency (RF) signals of the UAV. Then, the CT communicates with the cellular receivers (CRs) using the FD-UAV as a relay. On the other hand, DDT communicates with its two D2D receivers (DDRs) using the NOMA. We formulate the problem as a mixed-integer non-linear programming (MINLP) form and then divide it into two sub-problems. In the first sub-problem, an optimal value of time allocation for energy harvesting (EH) for DMG is estimated, whereas, in the second subproblem, the power of DDT in each DMG is optimized using the variable changing technique. Finally, the joint time allocation and power control scheme is proposed to achieve the maximum energy-efficiency (EE). Numerical results demonstrated that the proposed scheme achieves better results as compared to the existing conventional NOMA and orthogonal multiple access (OMA) schemes.
基于设备对设备(D2D)通信的无人机(UAV)以其机动性扩展了覆盖范围并提高了数据速率。在本文中,我们提出了一种基于NOMA的全双工(FD)无人机的无线供电D2D用户的能量管理方案。在这里,蜂窝发射机(ct)和D2D发射机(ddt)首先从无人机的射频(RF)信号中获取能量。然后,CT使用FD-UAV作为中继与蜂窝接收器(cr)通信。另一方面,DDT使用NOMA与它的两个D2D接收器(ddr)通信。我们将问题化为混合整数非线性规划(MINLP)形式,然后将其分成两个子问题。在第一个子问题中,估计了DMG能量收集(EH)的最优时间分配值,而在第二个子问题中,使用变量变化技术对每个DMG的DDT功率进行优化。最后,提出了时间分配和功率控制的联合方案,以实现最大的能效。数值结果表明,与现有的传统NOMA和正交多址(OMA)方案相比,该方案取得了更好的效果。
{"title":"Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV","authors":"Ishan Budhiraja, Neeraj Kumar, M. Alazab, Sudhanshu Tyagi, S. Tanwar, G. Srivastava","doi":"10.1145/3414045.3415946","DOIUrl":"https://doi.org/10.1145/3414045.3415946","url":null,"abstract":"Device-to-Device (D2D) communications underlaying Unmanned aerial vehicle (UAV) with its mobility extend the coverage and improve the data rate. In this paper, we propose an energy management scheme for wireless powered D2D users with NOMA underlaying full-duplex (FD) UAV. Here, the cellular transmitters (CTs) and D2D transmitters (DDTs) first harvest energy from the radio frequency (RF) signals of the UAV. Then, the CT communicates with the cellular receivers (CRs) using the FD-UAV as a relay. On the other hand, DDT communicates with its two D2D receivers (DDRs) using the NOMA. We formulate the problem as a mixed-integer non-linear programming (MINLP) form and then divide it into two sub-problems. In the first sub-problem, an optimal value of time allocation for energy harvesting (EH) for DMG is estimated, whereas, in the second subproblem, the power of DDT in each DMG is optimized using the variable changing technique. Finally, the joint time allocation and power control scheme is proposed to achieve the maximum energy-efficiency (EE). Numerical results demonstrated that the proposed scheme achieves better results as compared to the existing conventional NOMA and orthogonal multiple access (OMA) schemes.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126180353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services 私有区块链设想的基于ai的基于物联网的无人机辅助医疗保健服务安全框架
M. Wazid, Basudeb Bera, Ankush Mitra, A. Das, Rashid Ali
Internet of Drones (IoD) architecture is designed to support a co-ordinated access for the airspace using the unmanned aerial vehicles (UAVs) known as drones. Recently, IoD communication environment is extremely useful for various applications in our daily activities. Artificial intelligence (AI)-enabled Internet of Things (IoT)-based drone-aided healthcare service is a specialized environment which can be used for different types of tasks, for instance, blood and urine samples collections, medicine delivery and for the delivery of other medical needs including the current pandemic of COVID-19. Due to wireless nature of communication among the deployed drones and their ground station server, several attacks (for example, replay, man-in-the-middle, impersonation and privileged-insider attacks) can be easily mounted by malicious attackers. To protect such attacks, the deployment of effective authentication, access control and key management schemes are extremely important in the IoD environment. Furthermore, combining the blockchain mechanism with deployed authentication make it more robust against various types of attacks. To mitigate such issues, we propose a private-blockchain based framework for secure communication in an IoT-enabled drone-aided healthcare environment. The blockchain-based simulation of the proposed framework has been carried out to measure its impact on various performance parameters.
无人机互联网(IoD)架构旨在支持使用无人驾驶飞行器(uav)对空域的协调访问。近年来,IoD通信环境在我们日常生活中的各种应用中非常有用。基于人工智能(AI)的基于物联网(IoT)的无人机辅助医疗保健服务是一个专门的环境,可用于不同类型的任务,例如血液和尿液样本收集,药物交付以及其他医疗需求的交付,包括当前的COVID-19大流行。由于部署的无人机与其地面站服务器之间的通信具有无线性质,恶意攻击者可以很容易地进行几种攻击(例如,重播,中间人,冒充和特权内部人员攻击)。为了防止此类攻击,在IoD环境中部署有效的身份验证、访问控制和密钥管理方案非常重要。此外,将区块链机制与已部署的身份验证相结合,使其对各种类型的攻击更加健壮。为了缓解这些问题,我们提出了一个基于私有区块链的框架,用于在支持物联网的无人机辅助医疗环境中进行安全通信。已经对所提出的框架进行了基于区块链的模拟,以衡量其对各种性能参数的影响。
{"title":"Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services","authors":"M. Wazid, Basudeb Bera, Ankush Mitra, A. Das, Rashid Ali","doi":"10.1145/3414045.3415941","DOIUrl":"https://doi.org/10.1145/3414045.3415941","url":null,"abstract":"Internet of Drones (IoD) architecture is designed to support a co-ordinated access for the airspace using the unmanned aerial vehicles (UAVs) known as drones. Recently, IoD communication environment is extremely useful for various applications in our daily activities. Artificial intelligence (AI)-enabled Internet of Things (IoT)-based drone-aided healthcare service is a specialized environment which can be used for different types of tasks, for instance, blood and urine samples collections, medicine delivery and for the delivery of other medical needs including the current pandemic of COVID-19. Due to wireless nature of communication among the deployed drones and their ground station server, several attacks (for example, replay, man-in-the-middle, impersonation and privileged-insider attacks) can be easily mounted by malicious attackers. To protect such attacks, the deployment of effective authentication, access control and key management schemes are extremely important in the IoD environment. Furthermore, combining the blockchain mechanism with deployed authentication make it more robust against various types of attacks. To mitigate such issues, we propose a private-blockchain based framework for secure communication in an IoT-enabled drone-aided healthcare environment. The blockchain-based simulation of the proposed framework has been carried out to measure its impact on various performance parameters.","PeriodicalId":189206,"journal":{"name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132279367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
期刊
Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1