Next Article in Journal
Thermo-Optic Phase Shifter with Interleaved Suspended Design for Power Efficiency and Speed Adjustment
Next Article in Special Issue
A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles
Previous Article in Journal
Integrating Microfluidics and Electronics in Point-of-Care Diagnostics: Current and Future Challenges
Previous Article in Special Issue
Monitoring Colonies of Large Gulls Using UAVs: From Individuals to Breeding Pairs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient and Secure WiFi Signal Booster via Unmanned Aerial Vehicles WiFi Repeater Based on Intelligence Based Localization Swarm and Blockchain

by
Gehad Abdullah Amran
1,†,
Shuang Wang
2,†,
Mohammed A. A. Al-qaness
3,
Syed Agha Hassnain Mohsan
4,*,
Rizwan Abbas
5,
Eissa Ghaleb
6,
Samah Alshathri
7,* and
Mohamed Abd Elaziz
8,9,10,11
1
Department of Management Science and Engineering, Dalian University of Technology, Dalian 116024, China
2
College of Software Engineering, Northeastern University, Shenyang 110169, China
3
College of Physics and Electronic Information Engineering, Zhejiang Normal University, Jinhua 321004, China
4
Optical Communications Laboratory, Ocean College, Zhejiang University, Zheda Road 1, Zhoushan 316021, China
5
Department of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
6
College of Computer and Information Science, Southwest University, Chongqing 400715, China
7
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
8
Department of Mathematics, Faculty of Science, Zagazig University, Zagazig 44519, Egypt
9
Faculty of Computer Science &Engineering, Galala University, Suze 435611, Egypt
10
Artificial Intelligence Research Center (AIRC), Ajman University, Ajman 346, United Arab Emirates
11
Department of Electrical and Computer Engineering, Lebanese American University, Byblos 4307, Lebanon
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Micromachines 2022, 13(11), 1924; https://0-doi-org.brum.beds.ac.uk/10.3390/mi13111924
Submission received: 15 September 2022 / Revised: 16 October 2022 / Accepted: 4 November 2022 / Published: 8 November 2022
(This article belongs to the Special Issue Micro Air Vehicles)

Abstract

:
Recently, the unmanned aerial vehicles (UAV) under the umbrella of the Internet of Things (IoT) in smart cities and emerging communities have become the focus of the academic and industrial science community. On this basis, UAVs have been used in many military and commercial systems as emergency transport and air support during natural disasters and epidemics. In such previous scenarios, boosting wireless signals in remote or isolated areas would need a mobile signal booster placed on UAVs, and, at the same time, the data would be secured by a secure decentralized database. This paper contributes to investigating the possibility of using a wireless repeater placed on a UAV as a mobile booster for weak wireless signals in isolated or rural areas in emergency situations and that the transmitted information is protected from external interference and manipulation. The working mechanism is as follows: one of the UAVs detect a human presence in a predetermined area with the thermal camera and then directs the UAVs to the location to enhance the weak signal and protect the transmitted data. The methodology of localization and clusterization of the UAVs is represented by a swarm intelligence localization (SIL) optimization algorithm. At the same time, the information sent by UAV is protected by blockchain technology as a decentralization database. According to realistic studies and analyses of UAVs localization and clusterization, the proposed idea can improve the amplitude of the wireless signals in far regions. In comparison, this database technique is difficult to attack. The research ultimately supports emergency transport networks, blockchain, and IoT services.

1. Introduction

The interest in UAVs has grown in many applications due to developments in manufacturing technology. In addition, UAVs have established various applications and solutions in multiple areas, such as search, rescue, parcel distribution, and telecommunications. As a result, UAVs have appeared as a potential emerging technology in the next decade [1,2]. It is also worth noting that using UAVs in a wide area requires securing database servers and embedding additional devices. In rescue scenarios, for efficient data processing, a high-performance UAV movable network with repeaters and surveillance cameras is required to achieve the rescue mission successfully [3]. New UAV research will likely continue, as all of these experiments will benefit from linking UAVs to the 5G network for improved monitoring and connectivity. There are some studies that explore the obstacles and prospects for developing UAVs using the 5G ground base station (5G-BSs) or emergency communication vehicles. Integrating UAVs and 5G-BSs will increase equipment interference. Some researchers open the door to new techniques to ensure that aerial and land equipment can merge into the same system [4]. There is a shortage of adequate assistance for data transmission in crises and epidemics. For example, the coronavirus outbreak was an issue around the world. UAVs have emerged as a suggested approach to improve the usage of networks in epidemic areas by acting as an alternative transport system integrated with radio signal boosters [5]. One could say that an emergency communication network is essential in the emergency rescue and the event of exceptional circumstances, particularly when the integrated communication system is lost. However, existing approaches lack durability has and have limited space and environment. To address these weaknesses, unmanned aerial vehicles (UAVs), 5G-BSs, UAV signal boosters, and database servers provide an effective wireless coverage area with stability and mobility advantages [6].
This study contributes to utilizing the UAVs embedded with smart thermal cameras to monitor crowds in a specific area that is supported by a wireless signal booster device to strengthen the weak wireless signal in remote areas in emergencies. Figure 1 illustrates the contributions to this paper, which are summarized as follows:
  • We used UAVs equipped with a thermal camera and signal repeater to identify persons in a specific area and boost the wireless signal in this specific area. The procedure of requesting help through UAVs starts with recognizing indicators in specific regions that will be a gathering point for the people who need help in the case of a request for assistance. UAV cameras employ vision processing technology to recognize the help requesting indicators.
  • The UAVs localization and clusterization scenario is optimized using a swarm intelligence localization (SIL) algorithm.
  • To secure data transmission, blockchain decentralized data is used.
The remaining structure of the paper is as follows. The related work is presented in Section 2. The preliminaries about the swarm method and blockchain cooperative to optimize the wireless signal are introduced in Section 3. Implementation of the system is illustrated in Section 4, and the results are summarized in Section 5. The analysis of the results is shown in Section 6. Finally, the closing and forward-looking comments are in Section 7.

2. Related Work

The contribution of previous studies concerning the localization and clustering of UAV applications has recently resulted in detailed research. Fleet operators of UAVs, such as Facebook, Google, and Amazon, aim to transport products and data concurrently by flying drones that follow specified routes and locations. In addition, cellular UAV networks can follow human addresses and travel that can be accomplished by public transit systems [7,8,9,10]. An interesting UAV prototype for low-altitude applications is called the Nokia F-Cell project [11]. In addition, a Huawei Wireless UAV lab under the Digital-Sky project [12,13] involves drones attached to air quality control agencies in Shanghai, China. The gaps in these studies reflected a high cost, no creative form of optimization to identify the target node, and no substantial self-configuration to coordinate drones using a centralized database that may be under attack. Several papers have been published in recent years suggesting novel algorithms for optimizing positioning. Earth observation by UAV uses the convolutional neural network (CNN) for disaster relief in the smart city [14]; the ultra-violet spectrum (UV) [15,16,17] uses the Hough transform process and UVDAR system, which is more efficient and less computationally intensive. There have also been novel experiments using distance-based docking [18,19], blurry approach [20], radar-based high-precision 3D location [21], and UAV relative distances [22,23] of UAVs used to land in environments that have been banned. Other authors proposed a multi-UAV based on a crowd surveillance system that employs UAVs to monitor a group of walking people [24]. Some researchers focused on the security issue of the Internet of Drones Things (IoDT), whereby lightweight blockchain is considered a security solution [25,26]. The combination of cuckoo and Hampel filters [27] is used as a type of blockchain security. Some other studies noted UAV applications in the 5G or 5GB era, from the aspect of wireless communication and its underlying physical characteristics, such as air-to-ground common, energy-efficient channels [28,29]. Some other recent research about UAVs about tasks such as search and rescue, trajectory planning, and artificial intelligence are attractive [30,31]. In addition, it is good to note and compare some other existing work on UAV combined with blockchain [32,33]. Some studies have explored using digital twins in unmanned aerial vehicles to rapidly and efficiently deliver medical resources during an epidemic. The feasibility of DTs in COVID-19 prevention and control is investigated. Algorithms for deep learning (DL) are introduced. The DTs information prediction model is based on an upgraded AlexNet network, the performance of which is evaluated via simulation [34]. Some other studies used UAVs in many applications, for instance, the scenario of a 3D terrain environment represented by triangular mesh data based on the Gaussian factor [35], joint UAV position optimization based on DNS [36], cloud-edge computing [37], crowd systems [38], and safety-critical systems [39]. Other studies are directed towards improving the ability of internal UAVs by optimizing hovering efficiency [40], energy-aware relay [41], oblique photogrammetry with multiple cameras onboard UAVs [42], or environmental sense optimization for UAVs [43,44]. Table 1 highlights existing work along with the limitations. All previous work noted above relies primarily on the representation of nature. The most current study assumes a fixed or non-modulated environment. The theory of early weather prediction is not adopted. Moreover, much of the reviewed work does not care about the decentralization of data and does not care about fixed IoT data backups that are vulnerable to infiltration.

3. Preliminaries

This section contains theoretical information about using UAVs to boost wireless signals in isolated cities. SIL, as a specific form of the swarm, considers an ideal solution to the localization problem. Blockchain is regarded as data sharing with decentralization advantages and tamper-resistant functionality. SIL and blockchain must work together to ensure a synchronized, secure and efficient wireless signal. As defined in the following subsections, the SIL strategy focused on coordination in decision-making between group and individual intelligence. In comparison, the blockchain is distinct from the centralized system, as all transactions are maintained in blocks of entities within the blockchain, which has made blockchain popular in digital currency implementations and has opened the door to comprehensive research on the Internet of Things. The assumptions of the proposed scheme are:
  • The UAVs could be used to boost wireless signals in far cities during emergency cases.
  • The swarm is an ideal solution to the localization problem.
  • Blockchain technology is an appropriate data sharing technology for decentralization advantages.
  • SIL and blockchain could work together to ensure a synchronized signal booster.

3.1. Swarm Intelligence-Based Localization (SIL)

Swarm intelligence localization is an intelligent optimization algorithm based on the swarm intelligence model inspired by animal behavior, such as in bird colonies. The suggested position is determined based on the particle’s direction and the location of the neighbor [45]. The follower-UAVs are searching for the address of the leader-UAV in a particular range area. Follower-UAVs are working together to solve this localization problem. Each follower-UAV measures the local position based on the best private position (Pbest) and the best general swarm position (Gbest) in the search space and informs each other of the measured location, and they can choose the best general location for the leader-UAV. All UAVs have the memory to store their best position and velocity value after each iteration round. The challenge with optimization is to find a better position to find the right location; this level of intelligence is utterly unreachable for any member of the swarm, but it can be achieved by coordination among the swarm members [46].

3.2. Computational Complexity

As seen in Figure 2, the swarm comprises three follower-UAV candidates represented by Xi(t), where “X” is the location of the UAV, “i” is the number of iterations, and “t” is the function of time for each search space. In addition to the position, there is a velocity for each part, denoted by Vi(t). The trajectory of Xi(t) and Vi(t) are the same, where the velocity term represents the follower-UAV motion in the direction and time. Each swarm candidate has a recollection of its own best location Pi(t), and this is the best experience of a partial “i”. Often, the swarm has the best-shared among the participants of the swarm G(t) without the “i” index, since it belongs to the entire swarm. The follower-UAV travels into a new position and velocity using all three of the elements represented by Pi(t), G(t), and their updated position and velocity denoted by Vi(t + 1) and Xi(t + 1). Equations (1)–(5) fully explain the mathematical complicity behind SIL optimization.
V i j   t + 1 = I n e r t i a   t e r m + C o g n i t i v e   c o m p o n e n t + S o c i a l   c o m p o n e n t  
I n e r t i a   t e r m = W   · i = 0 n j = 0 m V i j   t
C o g n i t i v e   c o m p o n e n t = R 1   ·   C 1   · i = 0 n j = 0 m ( P i j   t X i j   t )                                                      
S o c i a l   c o m p o n e n t = R 2   ·   C 2   · i = 0 n j = 0 m ( G j   t X i j   t )                                                              
X i j   t + 1 = i 0 n j = 0 m X i j   t + V i j   t + 1  
where:
Vij(t), velocity per time;
Xij(t), position per time;
Pij(t), best private position for follower-UAV;
Gj(t), the best general position towards leader-UAV;
Vij(t + 1), new velocity per time;
Xij(t + 1), new position per time;
W, real value coefficient;
C1,2, acceleration coefficient;
R1,2, random number uniformly distributed in the range of 0 to 1.
Figure 2. Swarm intelligence base localization (SIL) model. Drone movement from Xi(t) to Xi(t + 1) dependent on Vi(t), Pbest, and Gbest.
Figure 2. Swarm intelligence base localization (SIL) model. Drone movement from Xi(t) to Xi(t + 1) dependent on Vi(t), Pbest, and Gbest.
Micromachines 13 01924 g002

3.3. Blockchain: Decentralization of Big Data

Blockchain is the transfer of functions among all the units concerned rather than the central unit. A copy of the transaction ledger [47] is given to each blockchain drone. In the decentralized environment, the network functions under a peer-to-peer (user-to-user) policy. The blockchain protocol has four characteristics:
  • All nodes are supposed to have the same output.
  • All non-fault nodes have a value.
  • There is resistance during recovery of the failure node.
  • Blocks in the blockchain network regularly search for self-audit every 10 s [48].
The structure of the blockchain is clearly shown in Figure 3. Blockchain is a continuously expanding collection of records called blocks. The blocks are connected and guarded by cryptography. Each block contains the hash tree (root, node, and leaf), timestamp, and transaction details. If UAVs discover wireless signal weakness, the transaction details will change the information within the relevant block. All blocks comply with the latest upgrade created by the leader-UAV block.

4. Proposed System Implementation

The simulated system consists of four UAVs configured as one leader-UAV and three follower-UAVs, as shown in Figure 4. Simulation software was written to handle the network using MATLAB simulator. The proposed software consists of two technologies, the first is SIL optimization, and the second is blockchain for each UAV. The information in UAV blocks changes every 10 s. Leader-UAV binds to follower-UAVs and sends hash information within the data block. All UAV blocks are following over the blockchain communication protocol. All UAVs float over the far region inside the emergency wireless network to conduct a signal-boosting mission. The UAV scheme was designed by merging the network layer and the blockchain layer, as illustrated in Figure 3 and below:
  • Network layer: In the network layer, UAVs are divided into leader-UAV and follower-UAVs. In the case where a drone investigated and found a weak wireless signal, the drone becomes a leader-UAV and broadcasts its position in swarm space. Then, the leader-UAV interacts with other UAVs, who become follower-UAVs. During the contact, the follower-UAVs affirm reception of the location of the leader-UAV. At the same time, follower-UAVs coordinate with each other using the SIL swarm technique to travel into the weak signal zone. UAVs boost the signal region after the operation. A decentralization database is a secure connection database between UAV swarms.
  • Blockchain layer: The blockchain layer is responsible for protecting all transactions preserved by block actors within the UAV structure in the blockchain layer. In particular, the UAV block is created within the platform program. Both blocks are free to gather data in the blockchain from the leader-UAV block after modifying the location information and upgrading their inside block hash tables. Each UAV block in the blockchain network creates a Merkle tree that depends on the number of transactions. The transections here show the data on velocity and position. Within the umbrella of the blockchain, the evolved version of the Ethereum protocol from the point of view of decentralization selectivity, Gj(t) is picked as the best-chosen position for UAVs swarm, and Pij(t) is the best position for a particular UAV; Gj(t) and Pij(t) together determine which UAV token to transfer.
Figure 4. Demonstration of UAVs based on SIL and blockchain during emergency.
Figure 4. Demonstration of UAVs based on SIL and blockchain during emergency.
Micromachines 13 01924 g004

UAV Network Architecture

The proposed SIL is inspired by the social behavior of bird flocking. The method is simulated in MATLAB 0.9 U.S, where all particles travel through a computational search space to find an optimal solution. The virtualized area of the simulation network is 1000 × 1000 m, where the UAVs are evenly distributed. The UAV transmission range is roughly 250–300 m. 64 UAV nodes (a suitable number of nodes to show good resolution after several trials) are uniformly distributed in this region. Among these nodes, 1 and 63 UAV nodes are the leader and follower nodes, respectively. These nodes are randomly spread. The correction factor is 2, the inertia factor between (0–1), the blockchain number 64, and the highest iteration number 50. The simulation was performed on a Windows 10 OS [49] with four intel core i5-2430M central processing units (CPU) of ~2.4 GHz and 8GB of DDR4 random access memory. Simulation parameters are summarized in Table 2. Algorithm 1 indicates the structure of the scheme suggested. The algorithm starts with initializing all the particle swarms (steps 1–4). The leader-UAV forwards the goal location and the velocity of the environment (Steps 5–7). Based on the leader-UAV role, the best UAV position, and the best global address, the particle solution is changed (Steps 8–16) with each iteration. Particle velocity and location are measured and modified using Equations (1)–(5). As in Algorithm 1, blockchain hash information is updated as an entity in a decentralized system throughout the iteration.
Algorithm 1. Localization and clustering
Input: S, Vij(t), Xij(t), W, C1, 2, R1, 2, N, K.
Output:Pij(t), Gj(t), Vij(t + 1), Xij(t + 1).
/* Initialization*/
//Generate the initial S, Vij(t), and Xij(t) of dimensions where each particle’s position and velocity are randomly generated in the searching space.
1: Initialize S, W, Vij(t)
2: for ∀ UAVs ∈ S (1≤ i ≤ N) do
3: Initial Xij(t)
4: end for
/* Leader-UAV*/
//Generate the target position and velocity in the searching space.
5: If the thermal signature (is true) then
6: UAV position send to update in blockchain
7: end if
/* Main loop*/
8: while (Stopping criteria (false)) do
9: for each k do
/* Computation*/
//Calculate the suitable position for follower-UAV Xij(t + 1) by using current Xij(t) and Vij(t + 1) = {Pij(t), Gj(t)} based on Equations (1) and (5).
10:Calculate Vij(t + 1) using Equation (1)
11:if Vij(t + 1) > Vmax then
12:Set Vij(t + 1) = Vmax
13:end if
14:if Vij(t + 1) ≤ Vmax then
15:Set Vij(t + 1) = Vmin
16:end if
/* Blockchain*/
//Update the velocity and position of the current generation.
17:for ∀ UAVs ∈ S (1≤ i ≤ N) do
18:Update ∀ 10 sec the position Xij(t + 1) and Pij(t)
19:Conform receive all hash UAVs updated position
20:end for
/* Output*/
//Private best position Pij(t) for UAV, Global best position Gj(t) for swarm, next velocity Vij(t + 1), next position Xij(t + 1).
21:Calculate Pij(t), Gj(t), Vij(t + 1), Xij(t + 1).
22:the end for
23:end while

5. Results

A numerical simulation was carried out in MATLAB to confirm the validity of the analytical model. Figure 5 demonstrates transition probabilities for UAVs that rely on swarm and blockchain principles. The processing time of the UAVs to adjust their position corresponding to the leader-UAV position is about 5–6 s, depending on the location of the follower-UAVs, at the time of randomly selecting the first implementation. As shown in Figure 6, the scenario starts with assembling 64 UAVs as a matrix. The UAVs’ locations in the network are in random positions, where all UAVs must change direction depending on the leader-UAV. The follower-UAVs are distributed randomly at an unknown address within the network at the start of the deployment. The leader-UAV shares its position with the rest of the follower-UAVs. Follower-UAVs confirm receipt of the leader-UAV location, and this confirmation was achieved by blockchain procedure. Then, the follower-UAVs go to the leader-UAV spot, following the swarm strategy, to get the fastest way there. Figure 5 and Figure 6 display the phases of UAV motions from random positions to one position, and a 3D diagram shows the direction of all the red nodes towards the green node, represented by the leader-UAV. The number of leader-UAVs is not analyzed here, as UAVs are not affected by the number of leader-UAVs. The blockchain usage in the proposed structure is handled as follows. The leader-UAV sends a block consisting of the current hash information and the previous hash address, timestamp, and other information. This information is frequently compared in all decentralization blocks, and in the event of a signal weakness alert in any UAV block, UAVs transfer directly to the location by following the location information in that hash address.

6. Performance Analysis

6.1. Localization Analysis and Discussion

Figure 7 depicts the implementation of four representative nodes in the proposed UAV network. The red, green, and blue lines indicate the follower-UAV movements, and the green drone marks the leader-UAV target node. The figure clearly shows that all the lines point to the anchor node. The location error is inversely proportional to increasing the number of nodes, where the best general swarm position Gj(t) and the best personal position Pij(t) values both contribute to correcting the position of the next follower-UAV Xij(t + 1). In the scenario of 64 follower-UAVs reaching the leader-UAV in 5–6 s during 50 iterations, the increasing number of nodes would minimize the iterations and time consumption to get the target node. An adequate number of anchor nodes may help to improve the coordination system. There are also some unpredictable values in (18–20) iterations for several nodes that cause them to miss their target and re-correct their location to return to the time-consuming global swarm path. In addition, having more leader-UAVs would boost the UAVs’ network behavior. The number of hops and the destination among UAVs to reach the swarm mainline are inversely proportional. The nearest node is greater than the global swarm value, and the simulation performance of the proposed method shows less localization error. All follower-UAVs reach the leader-UAV position after (~26) iterations. Although the swarm intelligence location (SIL) algorithm follows partial swarm optimization (PSO), which works on a known location, SIL depends on an unstructured node network that depends on the unknown location of neighbor nodes. SIL’s flexibility makes it more ideal for the Internet of Drone Things (IoDT), which relies on an unpredictable location approach, unlike other state-of-art bio-inspired algorithms, such as dragonfly and penguin.

6.2. Security Analysis and Discussion

According to the findings, using blockchain as a decentralized database in the Internet of Things applications will be beneficial in reducing time consumption. The Internet of Things relies on working with different devices, which need separate memory for each one that obeys the blockchain protocol. In reality, it is not easy for an attacker to attack all devices in the system individually, and there is no point in including malicious software in one of the device blocks, as the device is continuously upgrading data. As explained above, in the proposed model, blockchain synchronized interconnected blocks for the UAV network depend on the idea of updating and confirmation. Hence, the blocks communicate directly with each other without any third party. In general, each block contains two parts, the block header (hash list) for authentication and the block body (transaction) for data transmission [50], represented by the UAV location and the isolated region of the suggested proposal. As seen in Figure 8, the upgrade duration of the blockchain protocol is predetermined. In case the UAV detects a poor-signal zone, the UAV will change its data on its current position, and its condition will convert from a UAV to a leader-UAV. After 6.47 s, the remainder of the UAVs will confirm that they received the latest location. Then, follower-UAVs move to their expected location and aid by boosting the wireless signal in the target area. The blockchain performance analysis and storage are shown in Figure 9. The leader-UAV sends the location information as an encrypted block utilizing related and previous hashes to the decentralized database, wherein blockchain is used to communicate the location with follower-UAVs.

6.3. Blockchain Threat Modeling

The proposed scheme for the security threats is described clearly in Figure 10. The suggested security procedure includes four levels that encompass blocks initializing what security means for the whole system, eliciting threats, analyzing the treating risks, and evaluating how countermeasures lead to the achievements of security objectives.

7. Conclusions and Outlook

This research discusses the localization and assembly of UAVs during emergency scenarios utilizing SIL and blockchain theories to improve the rescue signal in remote places. If a UAV detects a low-signal region inhabited by a group of people, it communicates its position data to surrounding UAVs to collect it to aid with signal strengthening. Whereas the UAVs use the SIL theory to gather data, the geographical information of the UAVs is stored in a decentralized database that is protected from hacking and manipulation using the blockchain method. It was discovered that increasing the number of UAVs reduces execution time, redundancy, and localization inaccuracy. It was also noticed that syncing data via blockchain may save time. In the future, a different localization algorithm inspired by nature may offer using the blockchain technique to produce alternative outcomes that could be discussed in the laboratory.

Author Contributions

Conceptualization, G.A.A. and S.W.; methodology, G.A.A. and S.W.; software, G.A.A. and S.W.; validation, M.A.A.A.-q., S.A.H.M., S.A. and M.A.E.; formal analysis, G.A.A. and S.W.; investigation, G.A.A. and S.W.; resources, R.A. and E.G.; data curation, R.A., E.G. and S.W.; writing—original draft, G.A.A. and S.W.; preparation, G.A.A.; writing—review and editing, G.A.A., S.W., M.A.A.A.-q., S.A.H.M., S.A. and M.A.E.; visualization, G.A.A. and S.W.; supervision, S.W.; project administration, G.A.A.; funding, S.A.H.M. and S.A. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R197), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Qubaa, A.R.; Hamdon, A.N.; Al Jawwadi, T.A. Morphology Detection in Archaeological Ancient Sites by Using UAVs/Drones Data and GIS techniques. Iraqi J. Sci. 2021, 62, 4557–4570. [Google Scholar] [CrossRef]
  2. Zeng, Y.; Wu, Q.; Zhang, R. Accessing from the Sky: A Tutorial on UAV Communications for 5G and beyond. Proc. IEEE 2019, 107, 2327–2375. [Google Scholar] [CrossRef] [Green Version]
  3. Zhang, S.; Zhang, H.; Di, B.; Song, L. Cellular UAV-to-X Communications: Design and Optimization for Multi-UAV Networks. IEEE Trans. Wirel. Commun. 2019, 18, 1346–1359. [Google Scholar] [CrossRef] [Green Version]
  4. Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3417–3442. [Google Scholar] [CrossRef] [Green Version]
  5. Nguyen, L.D.; Nguyen, K.K.; Kortun, A.; Duong, T.Q. Real-time deployment and resource allocation for distributed UAV systems in disaster relief. In Proceedings of the 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2–5 July 2019; pp. 1–5. [Google Scholar]
  6. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.-K. UAV-Assisted Emergency Networks in Disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar] [CrossRef] [Green Version]
  7. Dormehl, L. Using Drones to Detect Coronavirus isn’t as Crazy as it Sounds. Digital Trends, 22 February 2020. Available online: https://www.digitaltrends.com/cool-tech/draganfly-drone-coronavirus/ (accessed on 5 July 2020).
  8. Perry, T. Facebook Aims to Remake Telecom with Millimeter Waves and Tether Tennis. IEEE Spectrum, 19 April 2017. [Google Scholar]
  9. Kaur, S.; Randhawa, S. Google LOON: Balloon-powered internet for everyone. AIP Conf. Proc. 2018, 2034, 020006. [Google Scholar]
  10. Alsamhi, S.H.; Shvetsov, A.V.; Kumar, S.; Hassan, J.; Alhartomi, M.A.; Shvetsova, S.V.; Sahal, R.; Hawbani, A. Computing in the Sky: A Survey on Intelligent Ubiquitous Computing for UAV-Assisted 6G Networks and Industry 4.0/5.0. Drones 2022, 6, 177. [Google Scholar] [CrossRef]
  11. Gangula, R.; Esrafilian, O.; Gesbert, D.; Roux, C.; Kaltenberger, F.; Knopp, R. Flying robots: First results on an autonomous UAV-based LTE relay using open air interface. In Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 25–28 June 2018; pp. 1–5. [Google Scholar]
  12. Liao, X.; Xu, C.; Yue, H. Enable UAVs safely flight in low-altitude: A Preliminary research of the public air route network of UAVs. In Proceedings of the 2019 International Conference on Unmanned Aircraft Systems (ICUAS), Atlanta, GA, USA, 11–14 June 2019; pp. 959–964. [Google Scholar]
  13. Lin, H. 5G Improved Cloud Service Experience and Promotes the Data Collection for Big Data Analysis. In Advances in Computer Science Research, Proceedings of the 2019 International Conference on Mathematics, Big Data Analysis and Simulation and Modelling (MBDASM 2019), Changsha, China, 30–31 August 2019; Atlantis Press: Amsterdam, The Netherlands, 2019; pp. 174–177. [Google Scholar]
  14. Xu, Y.; Pan, L.; Du, C.; Li, J.; Jing, N.; Wu, J. Vision-based UAVs aerial image localization: A survey. In Proceedings of the 2nd ACM SIGSPATIAL International Workshop on AI for Geographic Knowledge Discovery, Seattle, WA, USA, 6 November 2018; pp. 9–18. [Google Scholar]
  15. Walter, V.; Staub, N.; Saska, M.; Franchi, A. Mutual Localization of UAVs based on Blinking Ultraviolet Markers and 3D Time-Position Hough Transform. In Proceedings of the 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), Munich, Germany, 20–24 August 2018; pp. 298–303. [Google Scholar] [CrossRef] [Green Version]
  16. Walter, V.; Saska, M.; Franchi, A. Fast Mutual Relative Localization of UAVs using Ultraviolet LED Markers. In Proceedings of the 2018 International Conference on Unmanned Aircraft Systems (ICUAS), Dallas, TX, USA, 12–15 June 2018; pp. 1217–1226. [Google Scholar]
  17. Walter, V.; Staub, N.; Franchi, A.; Saska, M. Uvdar system for visual relative localization with application to leader-follower formations of multirotor UAVs. IEEE Robot. Autom. Lett. 2019, 4, 2637–2644. [Google Scholar] [CrossRef] [Green Version]
  18. Nguyen, T.-M.; Qiu, Z.; Cao, M.; Nguyen, T.H.; Xie, L. An integrated localization-navigation scheme for distance-based docking of UAVs. In Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Madrid, Spain, 1–5 October 2018; pp. 5245–5250. [Google Scholar]
  19. Qu, Y.; Zhang, F.; Wu, X.; Xiao, B. Cooperative geometric localization for a ground target based on the relative distances by multiple UAVs. Sci. China Inf. Sci. 2018, 62, 10204. [Google Scholar] [CrossRef] [Green Version]
  20. Khelifi, F.; Bradai, A.; Singh, K.; Atri, M. Localization and Energy-Efficient Data Routing for Unmanned Aerial Vehicles: Fuzzy-Logic-Based Approach. IEEE Commun. Mag. 2018, 56, 129–133. [Google Scholar] [CrossRef]
  21. Dobrev, Y.; Dobrev, Y.; Gulden, P.; Lipka, M.; Pavlenko, T.; Moormann, D.; Vossiek, M. Radar-based high-accuracy 3D localization of UAVs for landing in GNSS-denied environments. In Proceedings of the 2018 IEEE MTT-S International Conference on Microwaves for Intelligent Mobility (ICMIM), Munich, Germany, 15–17 April 2018; pp. 1–4. [Google Scholar]
  22. Guerra, A.; Sparnacci, N.; Dardari, D.; Djurić, P.M. Collaborative target-localization and information-based control in networks of UAVs. In Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 25–28 June 2018; pp. 1–5. [Google Scholar]
  23. Dardari, G.D.; Djurić, P.M. Joint indoor localization and navigation of UAVs for network formation control. In Proceedings of the 2018 52nd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 28–31 October 2018; pp. 13–19. [Google Scholar]
  24. Alsamhi, S.H.; Shvetsov, A.V.; Shvetsova, S.V.; Hawbani, A.; Guizan, M.; Alhartomi, M.A.; Ma, O. Blockchain-Empowered Security and Energy Efficiency of Drone Swarm Consensus for Environment Exploration. IEEE Trans. Green Commun. Netw. 2022, 1. [Google Scholar] [CrossRef]
  25. Islam, A.; Rahim, T.; Masuduzzaman, M.; Shin, S.Y. A Blockchain-Based Artificial Intelligence-Empowered Contagious Pandemic Situation Supervision Scheme Using Internet of Drone Things. IEEE Wirel. Commun. 2021, 28, 166–173. [Google Scholar] [CrossRef]
  26. Alsamhi, S.H.; Almalki, F.A.; Afghah, F.; Hawbani, A.; Shvetsov, A.V.; Lee, B.; Song, H. Drones’ edge intelligence over smart en-vironments in b5g: Blockchain and federated learning synergy. IEEE Trans. Green Commun. Netw. 2021, 6, 295–312. [Google Scholar] [CrossRef]
  27. Islam, A.; Al Amin, A.; Shin, S.Y. FBI: A Federated Learning-Based Blockchain-Embedded Data Accumulation Scheme Using Drones for Internet of Things. IEEE Wirel. Commun. Lett. 2022, 11, 972–976. [Google Scholar] [CrossRef]
  28. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Mobile Unmanned Aerial Vehicles (UAVs) for Energy-Efficient Internet of Things Communications. IEEE Trans. Wirel. Commun. 2017, 16, 7574–7589. [Google Scholar] [CrossRef]
  29. Saif, A.; Dimyati, K.; Noordin, K.A.; Shah, N.S.; Alsamhi, S.H.; Abdullah, Q. Energy-efficient tethered UAV deployment in B5G for smart environments and disaster recovery. In Proceedings of the 2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA), Sana’a, Yemen, 10–12 August 2021; pp. 1–5. [Google Scholar]
  30. Alsamhi, S.H.; Almalki, F.A.; Al-Dois, H.; Shvetsov, A.V.; Ansari, M.S.; Hawbani, A.; Gupta, S.K.; Lee, B. Multi-Drone Edge Intelligence and SAR Smart Wearable Devices for Emergency Communication. Wirel. Commun. Mob. Comput. 2021, 2021, 6710074. [Google Scholar] [CrossRef]
  31. Zhong, X.; Huo, Y.; Dong, X.; Liang, Z. Deep Q-network based dynamic movement strategy in a UAV-Assisted network. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; pp. 1–6. [Google Scholar]
  32. Fernández-Caramés, T.M.; Blanco-Novoa, O.; Froiz-Míguez, I.; Fraga-Lamas, P. Towards an autonomous industry 4.0 warehouse: A UAV and blockchain-based system for inventory and traceability applications in big data-driven supply chain management. Sensors 2019, 19, 2394. [Google Scholar] [CrossRef] [Green Version]
  33. Kapitonov, A.; Lonshakov, S.; Krupenkin, A.; Berman, I. Blockchain-based protocol of autonomous business activity for mul-ti-agent systems consisting of UAVs. In Proceedings of the 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS), Linköping, Sweden, 3–5 October 2017; pp. 84–89. [Google Scholar]
  34. Lv, Z.; Chen, D.; Feng, H.; Zhu, H.; Lv, H. Digital Twins in Unmanned Aerial Vehicles for Rapid Medical Resource Delivery in Epidemics. IEEE Trans. Intell. Transp. Syst. 2021, 1–9. [Google Scholar] [CrossRef]
  35. Cao, B.; Li, M.; Liu, X.; Zhao, J.; Cao, W.; Lv, Z. Many-Objective Deployment Optimization for a Drone-Assisted Camera Network. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2756–2764. [Google Scholar] [CrossRef]
  36. Mao, S.; He, S.; Wu, J. Joint UAV position optimization and resource scheduling in space-air-ground in-tegrated networks with mixed cloud-edge computing. IEEE Syst. J. 2020, 15, 3992–4002. [Google Scholar] [CrossRef]
  37. Cao, B.; Sun, Z.; Zhang, J.; Gu, Y. Resource Allocation in 5G IoV Architecture Based on SDN and Fog-Cloud Computing. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3832–3840. [Google Scholar] [CrossRef]
  38. Sun, Q.; Lin, K.; Si, C.; Xu, Y.; Li, S.; Gope, P. A Secure and Anonymous Communicate Scheme over the Internet of Things. ACM Trans. Sens. Netw. 2022, 18, 1–21. [Google Scholar] [CrossRef]
  39. Wu, X.; Zheng, W.; Chen, X.; Zhao, Y.; Yu, T.; Mu, D. Improving high-impact bug report prediction with combination of interactive machine learning and active learning. Inf. Softw. Technol. 2021, 133, 106530. [Google Scholar] [CrossRef]
  40. Hu, Y.; Qing, J.X.; Liu, Z.H.; Conrad, Z.J.; Cao, J.N.; Zhang, X.P. Hovering efficiency optimization of the ducted propeller with weight penalty taken into account. Aerosp. Sci. Technol. 2021, 117, 106937. [Google Scholar] [CrossRef]
  41. Shi, Y.; Wu, J.; Liu, L.; Lan, D.; Taherkordi, A. Energy-Aware Relay Optimization and Power Allocation in Multiple Unmanned Aerial Vehicles Aided Satellite-Aerial-Terrestrial Network. IEEE Syst. J. 2022, 1–12. [Google Scholar] [CrossRef]
  42. Zhou, G.; Bao, X.; Ye, S.; Wang, H.; Yan, H. Selection of Optimal Building Facade Texture Images From UAV-Based Multiple Oblique Image Flows. IEEE Trans. Geosci. Remote Sens. 2020, 59, 1534–1552. [Google Scholar] [CrossRef]
  43. Xu, L.; Liu, X.; Tong, D.; Liu, Z.; Yin, L.; Zheng, W. Forecasting Urban Land Use Change Based on Cellular Automata and the PLUS Model. Land 2022, 11, 652. [Google Scholar] [CrossRef]
  44. Han, Y.; Wang, B.; Guan, T.; Tian, D.; Yang, G.; Wei, W.; Tang, H.; Chuah, J.H. Research on Road Environmental Sense Method of Intelligent Vehicle Based on Tracking Check. IEEE Trans. Intell. Transp. Syst. 2022, 1–15. [Google Scholar] [CrossRef]
  45. Singh, P.; Khosla, A.; Kumar, A.; Khosla, M. Optimized localization of target nodes using single mobile anchor node in wireless sensor network. AEU—Int. J. Electron. Commun. 2018, 91, 55–65. [Google Scholar] [CrossRef]
  46. Arafat, M.Y.; Moh, S. Localization and Clustering Based on Swarm Intelligence in UAV Networks for Emergency Communications. IEEE Internet Things J. 2019, 6, 8958–8976. [Google Scholar] [CrossRef]
  47. Joshi, A.P.; Han, M.; Wang, Y. A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 2018, 1, 121–147. [Google Scholar] [CrossRef]
  48. Lin, I.-C.; Liao, T.-C. A survey of Blockchain security issues and challenges. Int. J. Netw. Secur. 2017, 19, 653–659. [Google Scholar]
  49. Explore Windows 10 OS, Computers, Apps, & More—Microsoft Windows. Available online: https://www.microsoft.com/en-us/windows (accessed on 16 July 2020).
  50. Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of Blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 July 2017; pp. 557–564. [Google Scholar]
Figure 1. Side layout of a suggested boosting transmission model for UAV movement in a weak coverage area. The leader–follower strategy used swarm and blockchain approaches.
Figure 1. Side layout of a suggested boosting transmission model for UAV movement in a weak coverage area. The leader–follower strategy used swarm and blockchain approaches.
Micromachines 13 01924 g001
Figure 3. Layer representation of a blockchain. Drone location is updated in leader–UAV block and sends the update to the follower–UAV blocks using blockchain routing. The follower–UAVs conform to leader–UAV received updates.
Figure 3. Layer representation of a blockchain. Drone location is updated in leader–UAV block and sends the update to the follower–UAV blocks using blockchain routing. The follower–UAVs conform to leader–UAV received updates.
Micromachines 13 01924 g003
Figure 5. Three-dimensional MATLAB simulation diagram showing the result of directed follower-UAVs toward the leader-UAV location. The final result was estimated after 50 iterations.
Figure 5. Three-dimensional MATLAB simulation diagram showing the result of directed follower-UAVs toward the leader-UAV location. The final result was estimated after 50 iterations.
Micromachines 13 01924 g005
Figure 6. MATLAB execution stages for localization optimization of 64 nodes of UAVs and 50 iterations. Here, Leader–UAV works as a reference point to estimate 64 follower-UAV node locations. The proposed SIL algorithm achieved less estimation location error per time.
Figure 6. MATLAB execution stages for localization optimization of 64 nodes of UAVs and 50 iterations. Here, Leader–UAV works as a reference point to estimate 64 follower-UAV node locations. The proposed SIL algorithm achieved less estimation location error per time.
Micromachines 13 01924 g006
Figure 7. Leader–UAV and follower–UAV trajectories comparison depend on position and velocity. Colored lines (green, red, blue) correspond to specific follower-UAVs and the green drone represents the leader–UAV location.
Figure 7. Leader–UAV and follower–UAV trajectories comparison depend on position and velocity. Colored lines (green, red, blue) correspond to specific follower-UAVs and the green drone represents the leader–UAV location.
Micromachines 13 01924 g007
Figure 8. Blockchain timing diagram. Leader-UAV/follower-UAV block relationship.
Figure 8. Blockchain timing diagram. Leader-UAV/follower-UAV block relationship.
Micromachines 13 01924 g008
Figure 9. Blockchain performance analysis and data storage.
Figure 9. Blockchain performance analysis and data storage.
Micromachines 13 01924 g009
Figure 10. Blockchain threat modeling and process analysis.
Figure 10. Blockchain threat modeling and process analysis.
Micromachines 13 01924 g010
Table 1. The prior studies along with their limitations.
Table 1. The prior studies along with their limitations.
ReferencesLimitation
[8,9,10,11,12]
  • High cost.
  • No creative form of optimization to identify the target node.
  • No substantial self-configuration to coordinate drones using a centralized database that may be under attack.
[13,14,15,16,17,18,19,20,21,22,23,24,25]
  • Efficiency.
  • QoS.
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValue
Network simulatorMATLAB
Network area1000 × 1000 m
UAV transmission range250–300 m
Swarm size64
Correction factor2
Inertia1
Number of leader-UAVs1
Number of follower-UAVs63
Number of blocks64
Localization algorithmSIL
Clustering protocol Blockchain
Maximum number of iterations50
S = swarm size, Xij(t) = inertia component, Vij(t) = random initial velocity, W = inertia coefficient C1, 2 = acceleration coefficient, R1, 2 = uniform distributed number U (0, 1), N = population size, K = number of iteration, Pij(t) = cognitive component, Gj(t) = social component, Vij(t + 1) = next position, next step velocity, Xij(t + 1) = next position.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Amran, G.A.; Wang, S.; Al-qaness, M.A.A.; Mohsan, S.A.H.; Abbas, R.; Ghaleb, E.; Alshathri, S.; Abd Elaziz, M. Efficient and Secure WiFi Signal Booster via Unmanned Aerial Vehicles WiFi Repeater Based on Intelligence Based Localization Swarm and Blockchain. Micromachines 2022, 13, 1924. https://0-doi-org.brum.beds.ac.uk/10.3390/mi13111924

AMA Style

Amran GA, Wang S, Al-qaness MAA, Mohsan SAH, Abbas R, Ghaleb E, Alshathri S, Abd Elaziz M. Efficient and Secure WiFi Signal Booster via Unmanned Aerial Vehicles WiFi Repeater Based on Intelligence Based Localization Swarm and Blockchain. Micromachines. 2022; 13(11):1924. https://0-doi-org.brum.beds.ac.uk/10.3390/mi13111924

Chicago/Turabian Style

Amran, Gehad Abdullah, Shuang Wang, Mohammed A. A. Al-qaness, Syed Agha Hassnain Mohsan, Rizwan Abbas, Eissa Ghaleb, Samah Alshathri, and Mohamed Abd Elaziz. 2022. "Efficient and Secure WiFi Signal Booster via Unmanned Aerial Vehicles WiFi Repeater Based on Intelligence Based Localization Swarm and Blockchain" Micromachines 13, no. 11: 1924. https://0-doi-org.brum.beds.ac.uk/10.3390/mi13111924

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop