Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism...

10
This item was submitted to Loughborough's Research Repository by the author. Items in Figshare are protected by copyright, with all rights reserved, unless otherwise indicated. Blockchain-empowered decentralized storage in air-to-ground industrial Blockchain-empowered decentralized storage in air-to-ground industrial networks networks PLEASE CITE THE PUBLISHED VERSION https://doi.org/10.1109/TII.2019.2903559 PUBLISHER © IEEE VERSION AM (Accepted Manuscript) LICENCE CC BY-NC-ND 4.0 REPOSITORY RECORD Zhu, Yongxu, Gan Zheng, and Kai-Kit Wong. 2019. “Blockchain-empowered Decentralized Storage in Air-to- ground Industrial Networks”. figshare. https://hdl.handle.net/2134/38241.

Transcript of Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism...

Page 1: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

This item was submitted to Loughborough's Research Repository by the author. Items in Figshare are protected by copyright, with all rights reserved, unless otherwise indicated.

Blockchain-empowered decentralized storage in air-to-ground industrialBlockchain-empowered decentralized storage in air-to-ground industrialnetworksnetworks

PLEASE CITE THE PUBLISHED VERSION

https://doi.org/10.1109/TII.2019.2903559

PUBLISHER

© IEEE

VERSION

AM (Accepted Manuscript)

LICENCE

CC BY-NC-ND 4.0

REPOSITORY RECORD

Zhu, Yongxu, Gan Zheng, and Kai-Kit Wong. 2019. “Blockchain-empowered Decentralized Storage in Air-to-ground Industrial Networks”. figshare. https://hdl.handle.net/2134/38241.

Page 2: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

1

Blockchain Empowered Decentralized Storage inAir-to-Ground Industrial Networks

Yongxu Zhu, Member, IEEE, Gan Zheng, Senior Member, IEEE, Kai-Kit Wong, Fellow, IEEE

Abstract—Blockchain has created a revolution in digital net-working, by using distributed storage, cryptographic algorithms,and smart contracts. Many areas are benefiting from thistechnology, including data integrity and security, as well as au-thentication and authorization. Internet of Things networks oftensuffers from such security issues, which is slowing down wide-scale adoption. In this paper, we describe employing blockchaintechnology to construct a decentralized platform for storingand trading information in the air-to-ground IoT heterogeneousnetwork. To allow both air and ground sensors to participate inthe decentralized network, we design a mutual-benefit consensusprocess to create uneven equilibrium distributions of resourcesamong the participants. We use a Cournot model to optimizethe active density factor set in the heterogeneous air networkand then employ a Nash equilibrium to balance the number ofground sensors, which is influenced by the achievable averagedownlink rate between the air sensors and the ground support-ers. Finally, we provide numerical results to demonstrate thebeneficial properties of the proposed consensus process for air-to-ground networks and show the maximum active sensors densityutilization of air networks to achieve a high quality of service.

Index Terms—Blockchain, Industrial IoT, Stochastic Geome-try, Cournot model, smart contract.

I. INTRODUCTION

In the past ten years, blockchain technology has foundextensive use in various fields beyond Bitcoin. The largestuse of blockchain platforms is still in public ledgers forcryptocurrencies. However, there are increasing uses in non-financial applications. A recent trend is the use of blockchaintechnology to strengthen the data security and model thedecentralized and consensus mechanism structures such asInternet of Things (IoT) applications using the next generationof wireless communication networking [1, 2].

Use of IoT technologies in various industries has attractedhuge attention from both academics and governments [3].Some IoT applications are developed closely with other in-dustrial applications such as agriculture, environmental mon-itoring and security surveillance. The designers of industrialapplications are, in particular, required to make an effort tofind a good, sometimes subtle, balance between expense with

Manuscript received October 15, 2018; revised December 18, 2019; ac-cepted February 12, 2019. Part of this work was supported by the U.K.Engineering and Physical Sciences Research Council (EPSRC) under GrantEP/N007840/1 and EP/N008219/1. (Corresponding author: Gan Zheng)

Y. Zhu and G. Zheng are with the Wolfson School of Mechanical, Electricaland Manufacturing Engineering, Loughborough University, Leicestershire,LE11 3TU, UK (Email: {y.zhu4, g.zheng}@lboro.ac.uk).

K.-K. Wong is with the Department of Electronic and Electrical Engi-neering, University College London, London, WC1E 6BT, UK (Email: [email protected]).

benefits. [4] To address this challenge, blockchains Peer-to-Peer (P2P) approach could play an important role in thedevelopment of IoT decentralized systems and data intensiveapplications running on billions of devices, preserving theprivacy of the users. This could apply in many circumstances,for example:• Public Health: Fake medicine and food traceability are

urgent problems in public health. For example, on a farm,a tamper-proof system to record growth data for crops andaquacultures could remove some sources of insecurity insupply chains.

• Smart Cities: Smart cities are using blockchain as thefoundation of systems to monitor city parameters such astemperature, humidity and PM 2.5 levels. The best currentexample is Dubai [5], which aims to cement its status asa global leader in the smart economy by becoming thefirst blockchain-powered government.

• Data storage management: Blockchain-based distributeddata storage clouds can be applied to health, justice, leg-islation, safety, and business systems, to protect sensitivesensor data, contracts, private data, etc.

A. Related Works

1) Blockchain Technology: Blockchain uses public-keycryptography to create a ledger for published transactionswhich is suitable for use in a Peer-to-Peer (P2P) network [6].Once a new block has been saved into the blockchain, thetransactions of that block will be confirmed [7]. To guaranteethe integrity and consistency of the consensus protocol whenupdating the blockchain, one specific mining technique in Bit-coin network called Proof-of-Work (PoW) has been proposed.[7]. According to [8], PoW requires miners to spend theircomputational power on a computationally-hard puzzle, i.e., tofind a partial preimage satisfying certain conditions of a hashmapping based on the proposed blockchain state. To solve thePoW puzzle, the author in paper [9] proposed an optimizedsolution which involved a cooperative computing offloadingdecision and content caching. The optimized result shows thatthe scheme could achieve better performance than that withdeterministic constraints, and it could solve PoW puzzles moreefficiently.

Another method uses the replaceable decentralized consen-sus protocols commonly used for Blockchain IoT networks,named Proof-of-Stake (PoS) [10]. In contrast to PoW, PoSdemands much less CPU computation, energy, hardware, etc,in the mining process, and the opportunities for a node to minethe next block are related to the miners account to balance

Page 3: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

2

of stakes. The bigger the stake owned by a miner, the moremining power it has.

2) IoT blockchain: The central concept in IoT Blockchainis smart contracts, which allows the automation of complicatedprocesses so that each participant benefits from and cantrust such processes. The principles for applying blockchaintechnology to IoT network have been demonstrated [11].The author points out that the purpose of sharing servicesand resources in decentralized IoT networks is to automatetime-consuming workflows. In [12], the author describes adecentralized blockchain-based platform for data storage andtrading in a wireless powered IoT crowd-sensing system. Thedata from RF-energy beacons are forwarded to the blockchainnetwork for distributed ledger services, which provides theanalytical condition for a range of valuable results about theequilibrium strategies in the blockchain-based network.

In paper [13], the author examined an optimization problemfor edge computing resource management to analyse theinteraction effect between the computing service provider andminers in the blockchain. A blockchain solution for the energyindustry has been studied in [14, 15]. In [15], the authordesigned a credit-based payment method to solve the problemof confirmation delays in the transaction and intermittentconnectivity of energy nodes. This blockchain solution canbe applied to various IoT scenarios, such as energy harvestingnetworks and vehicle-to-grid. A P2P electricity trading modelfor Plug-in Hybrid Electric Vehicles (PHEVs) in smart gridswas studied in paper [14]. That mechanism requires no thirdparty when trading charging and discharging of PHEVs usingthe shared ledger. The authors conclude that this auctionmechanism could enhance the security of transactions.

3) UAV-Based IoT Platforms: Providing real-time data isa significant function of UAVs, which could make images orvideos of damaged nuclear reactors or other disasters. UAVscan connected to all kinds of IoT sensors and can be used toform a comprehensive P2P platform in the air [16].

A distributed trust system in an integrated unmanned aerialsystem was described in [17], whose ecosystem is made upof multi-tier partnerships, the human-robot trust between dis-tributed entities. Paper [18] examined the secrecy performanceof randomly deployed nodes to evaluate the UAV-enabled 3Dantenna millimeter-wave based air-to-ground communicationnetworks. However, for mechanical reasons, hovering UAVssuffer from high energy consumption; using traditional low-cost kites or balloons [19] could greatly reduce energy con-sumption, supporting more antennae or sending more infor-mation.

4) Data storage management: Data storage management isone of the most popular use cases of blockchain in IoT net-works [20]. Combining blockchain and a P2P storage systemto protect the sensitive data in IoT devices, data can be safelystored in different peers, and blockchain could guarantee theirreliability and prevent tampering. A decentralized platform hasbeen studied in [21], which protects personal private data usingblockchain technology. Users of the platform can avoid theproblem of the trustworthiness of any third party. It is alsoeasy to collect and share sensitive data in legal and regulatorydecisions. Paper [22] studies a decentralized cloud file storage

platform named Sia, it uses cryptographic contracts to protectthe storage agreements between clients and hosts. The hostsubmits storage proofs to the network once a file is stored;the contracts are stored in a blockchain to provide a publicaudit.

5) Security: Blockchain depending on a distributed trustsystem could achieve high-security performance. However,blockchain technology still presents some potential securityrisks. For example, users in the system can suffer from thefamous 51% attack that, anyone can forge the transaction if51 % of the computation power is accumulated in one place.Anyone can leverage the computation power to intercept,modify and then rebroadcast the forged transaction where thesystem does not hold enough resource to validate.

The security of IoT systems is analysed in [23–25]. Theauthor discusses a specific smart home system and proposes ablockchain-based framework to guarantee security, confiden-tiality, integrity, and availability. The security for informationand energy interactions in the cloud as well as edge formed byelectric vehicle nodes have been raised in [24]. Paper [25] pro-posed a secure P2P data sharing system in vehicular computingnetworks by utilising the concept of blockchain technologiesPaper [26] investigates a Mobi-Chain which applies blockchaintechnology to a novel m-commerce application to protect thesecurity of data. It concludes that blockchain technology isvalid for future m-commerce security applications.

B. Contributions and Organization

Building on existing developments, we describe a novelmutual-benefit treaty in a blockchain-based heterogeneouscellular air-to-ground network. This model not only balancesthe interests of both heterogeneous air and ground networksbut also protects data integrity under the consensus mecha-nism. This is in contrast to [22], which described a unilateralgain system whose benefits directly accrue to users. Theadvantage of decentralized storage air-to-ground networks ishigh-security performance, and they could achieve a closerconnection link between two systems than the traditionalcentralized storage model. The main contributions of this paperare summarised as follows:• We propose an innovative blockchain-based heteroge-

neous trading network. In the air-to-ground P2P jammingnetwork, the Ground sensors (GS) allocate caching spaceto support Air sensors (AS) to secure the collected data.In return, the ASs send back certain rewards to the GS.This approach will significantly increase air data securityand the ability to resist jamming signals. We develop aQuality-of-Service (QoS) optimization of the active ASs’output by designing a Cournot game model.

• Through this trading process, we propose a novel dualuser-association strategy, the first user association aims toincrease the average achievable rate, and the secondaryuser association not only balances the supply and demandin the air-to-ground market but also achieves the maxi-mum benefit for both AS and GS networks.

• We explore two different reward allocation mechanismsin the P2P network, the numerical results demonstrate that

Page 4: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

3

the group reward scheme (GRS) always achieves higherspectral efficiency than the individual reward scheme(IRS) in blockchain-empowered decentralized storagenetworks.

The rest of this paper is organized as follows. The systemmodel is presented in Section II. The problem definition fortrading contract for both the air and ground sides are providedin Section III. Simulation and numerical results, as well asdiscussions are given in Section V, followed by concludingremarks in Section VI.

II. SYSTEM MODEL

We consider a heterogeneous air-to-ground blockchain-based decentralized network. In this system, ASs collect thedata in the sky at different altitudes, then, because of thelimited caching space and computation in the ASs, the activeASs broadcast the data to the ground network.

Fig. 1: Localized air-to-ground P2P Network. The GSs couldequipped with smart grid vehicles, server, trees or street lamp.

In Fig. 2, all the sensors work in the air-to-ground networkas trusted trading nodes with a smart contract. The GSsprovide storage space for the active ASs according to theirQoS function, then reward coins will be sent from the k-th tier ASs to the robust GSs. The locations of the GSs aremodelled using a Homogeneous Poisson point process (HPPP)ΦG with density λG. The locations of the ASs in the k-thtier (k = 1, · · · ,K) are modelled by an independent HPPPΦkA with density λkA. It is assumed that the density of GSs ismuch greater than ASs where λG >

∑Kk=1 λ

kA, which can

ensure that at least one GS could support the AS for thedata storage process at each time slot T , the rest of ASswait for the trading process in the following time slot. Inthe ASs set, the density declines with altitude, modelled byλG � λ1

A > · · · > λkA > · · · > λKA .In addition, we call the active ASs who broadcast the

collected data to the associated GSs in the present time slotin set ΦkA ∈ ΦkA, where ΦkA is the independent HPPP withdensity akλ

kA. The remaining ASs buffer their data and wait

to transmit in the next time slot, we refer to these as quietASs, which we model as having density (1 − ak)λkA in setΦk

A ∈ ΦkA, and we have ΦkA + Φk

A = ΦkA, where ak ∈ [0, 1],which means the active ASs output decision affects the QoSfor each tier of ASs.

More than that, the interpolators are not aware of whichAS is generating new data until the transmission process starts.The ASs in different tiers have different susceptibility in the airenvironment, and the update data will be generated randomlyby these sensors.

A. Consensus Process

The consensus process before transaction records forms theblockchain-based air-to-ground network as follows.

1) AS side–storage service requesting:• Each tier of ASs in ΦkA generates a series of raw data sets

from different altitudes. Then the active ASs who havegenerated data send requests to the contact centre. Weassume that each active AS will request the service at thesame time due to the massive information and informationaccuracy requirements.

• We define two types of incentive schemes. One is IRS,which means each active AS in the k-th tier will takeout bk coins for robust GS. The other scheme is GRS,in which all the GSs associated with the k-th tier UAVswill share the total reward of bIk coins.

• Based on the smart contract, each AS in a tier allocatesthe given reward ’coin’ to prove their ability to finishpayments for data storage.

• We establish a benefit function which aims for each tierof ASs to acquire maximum QoS in the trading market.Through the QoS function, the air network obtains theoptimal active ASs set self-regulation via the reward ofQoS in the market.

2) GS side–service support and coin payment:• The typical GS Go forecasts the achievable average rate

for each tier of ASs based on the current optimized activedensity.

• Then the typical GS Go does the secondary user associ-ation to decide the connection tier of AS, which aims tomaximize the reward in unit time. The compensation de-pends on the units data reward ’coin’ and the achievableaverage rate for each tier of ASs.

• The consensus protocol is implemented by authorizedGSs and a robust GS GL which connect to k-th tier ASand achieve maximum data in the given time slot witha valid PoS, note that the volume of data transferreddepends on the available instantaneous data rate.

• Once all GSs agree on the block data and robust GL getthe reward coin, GS GL is duty-bound to broadcast theblock data and the corresponding signature to other GSswho did not participate in the competition for the sametier AS, which guarantees the block data security. Notethat PoS is a protocol between a Prover and a Verifier[27] that has two phases.

• After that, the coin information is sent to GS GL. Atthe same time, the ASs update the coin information andrelease temporary storage space for the new informationstorage.

• In return, the ASs will help the coin owner GSs to collectthe required information in the air, which could help GSspredict the weather or route in the future.

Page 5: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

4

Fig. 2: Sequence diagram of the Air-to-Ground smart contract.

TABLE I: Notation and parameters.

Notation Parameter

ΦkA, Φk

A, ΦkA total AS PPP, active AS PPP and quite AS PPP

λkA, ak AS density and active density factorΦG, λG GS PPP and densityΦe, λe jamming PPP and densityT duration time

P, Pk transmit power set and k-tier transmit powerh, hk transmit power set and k-tier transmit powerαL, αN LoS and NLoS path loss exponent

g small scale fadingβ, δ2 the frequency dependent constant parameter, noise power

3) Blockchain Structure: In our blockchain-enabled air-to-ground system, blockchain technology is utilized to enhancethe IoT block data secure performance from different IoTsensors. We use the IoT security blockchain-based framework[23] in our system, and each block incorporates a block header,a policy header and a group of block data.

B. Downlink Information Transfer

In the average rate predicted phase, AS transmits in-formation signals to the serving GSs in the given dura-tion time slot T with a specific transmit power powerset P = [P1, ..., Pk, ..., PK ], and the height set is h =[h1, ..., hk, ..., hK ] where hk < hk+1. Both ASs and GSsare equipped with a single antenna. We also consider thecase of eavesdropping with jamming attacks to deteriorate theinformation transmission. The locations of eavesdroppers aremodelled following an independent HPPP Φe with λe.

For a typical GS Go associated with the AS who belongsto the given k-th tier. All channels experience independentidentically distributed (i.i.d.) quasistatic Rayleigh fading. Weassume that for any typical GS who is located at the pointof origin o that is associated with the nearest AS in the k-th tier that has support to save the instant data, the receivedsignal-to-interference-plus-noise ratio (SINR) is shown below:

SINRko =Pkgo,kβ|Ho,k|−αL

IAk + IJK + δ2, (1)

where Pk is the transmit power for the k-th tier AS, go,k is theequivalent small-scale fading channel power gain between thetypical GS Go and its nearest serving k-th tier AS. Notice whenGo is associated to K-th tier, the path loss is |Ho,k|−αL , where

Ho,k =√Xo,k

2 + h2k is the distance from the associated

AS to the typical GS, β is the frequency dependent constantparameter and αL is the line of sight (LoS) path loss exponent.Due to building blockages in the terrestrial environment, thedirect connection between GSs is weak. We consider the LoSlink and same path loss exponent αL between different tier ofASs to GSs, and the non-line-of-sight (NLoS) link betweenGSs [28]. δ2 is the noise power.

The interference IAk from the all the active ASs from k-thtier and other tiers which are given by

IAk =

K∑k′=1\k

∑l∈Φk

′A

Pk′go,k′β|Ho,k′ |−αL (2a)

+∑

j∈ΦkA\o

Pkgo,jβ|Ho,j |−αL . (2b)

(2a) and (2b) are the sum of interference from the interferingASs in the k′-tier (k′ 6= k) and the k-tier, Φk

A and ΦkA are thepoint process with density λk

A and λkA, where go,l ∼ exp(1, 1)and go,k ∼ exp(1, 1) are the small-scale fading interfering

channel gain and Ho,k′ =√Xo,k′

2 + h2k′ is the distance be-

tween a typical GS and the k′-th tier AS l ∈ Φk′

A . The channelis authenticated to prevents eavesdropper from tampering withthe messages. We assume that all the eavesdroppers transmitjamming signals to the GS, and IJ(k) is the interference fromthe jamming which is give by

IJk =∑e∈Φe

Pego,eβ|Xo,e|−αN , (3)

where Φe is the locations of the ground eavesdroppers withdensity λe, where go,e ∼ exp(1) is the small-scale fadinginterfering channel gain and Xo,e is the distance between theGo and ground eavesdropper, and αN is the none line of sight(NLoS) path loss exponent.

III. PROBLEM DEFINITION FOR TRADING CONTRACT

In this section, we present the trading process whichincludes the optimized QoS function for each tier of AS,and then we figure out the probability that a typical GS isassociated with the AS in the k-th tier based on the achievableaverage k-th tier rate.

In the trading process, each AS buffers data, which mustbe transmitted as soon as possible, due to the limited storagespace in the ASs and high demand for effective security. TheAS generates the updated data then asks GS to help store thedata and prevent the information being tampered with. EachGS will take out a certain amount of coin for reward, butonly the most robust GS named GL will get the reward. In thefuture, the robust GS GL could use the reward ’coin’ to requestservice for the air group to do the data ferry from more distantnodes.

A. The Cournot-Nash equilibrium In Air Side

For the air side, each tier of AS will compete to attract moreGSs to support the data storage. However, the more active thatASs are in the trading market, the less associated service GSsthere will be for each AS at any given time.

Page 6: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

5

We assume the exact achievable rate for each tier is un-known where each UAV has incomplete information on othertiers of UAVs parameters, such as the height set h and thetransmit power set P. The convergence to the Nash equilibriumin such a market is then analysed using the well-known bestresponse dynamics.

Based on that, we use the Cournot-Nash equilibrium tomodel the QoS function. The AS in k-th tier form a consensusgroup which expect maximized profits, and their own activedensity decisions will affect the results of their rivals (k′-tier ofAS).The profit maximization problem of the IRS is simplifiedas follows:

P1 maxa(1)

Q(1)k = a

(1)k λkA(ρI − bk), (4a)

s.t. C1 : ρI = −θ1NA + θ0, (4b)C2 : 0 ≤ ak ≤ 1, (4c)

where in (4a), Qk is the total QoS function in the k-tier, whichmeans a high value could provide more support to the k-thtier AS. We assume that all the ASs in k-th consensus tier aregiven the same QoS reward because they collect the same typeof data in the air. Each tier of AS chooses its optimal activefactor ak independently, and the whole system determines howto achieve the benefit equilibrium for every participant.

Notice that in this process, we assume that information ρkis only imperfectly known by different tier rivals, so the QoSfunction assumes ρI denotes the equilibrium service of storageby the competition among the ASs, and ρk is supposed to beequal here.

The inverse demand function in (4b), ρI = −θ1NA + θ0

is subject to dρIdNA < 0, and the equilibrium is always inverse

ratio with the number of request group NA, where NA =Au∑Kk=1 akλ

kA is the total active density in the unit area

market Au, θ0 and θ1 are the positive constant coefficients.Because λk is fixed, we adjust ak to decide how much data

an active AS broadcasts in each slot and achieve the maximumQoS function Qk, and the range for the active proportion isak ∈ [0, 1]. Notice although the QoS function Q

(1)k is based

on imperfect information, and it could not predict the practicalQoS for each tier, however, before the GS makes the finaldecision, AS could control the broadcast group to achieve theapproximate optimal QoS.

Lemma 1: The optimal active density factor set ak inproblem P1 can be expressed as follows

a(1)∗ = [a(1)1

∗, a

(1)2

∗, ..., a

(1)K

∗] (5)

where a(1)k

∗= max

[min

[1

θ1λkA

(θ0+

∑Kk=1 bk

K+1 − bk), 1], 0]

isthe active proportion for density of the k-th AS.

Proof 1: Substitute ρI = −θ1N (1)A + θ0 into Q

(1)k , it can be

expressed as:

Q(1)k = a

(1)k λkA(θ0 − θ1Au

∑K

k=1a

(1)k λkA − bk) (6)

= −θ1

(a

(1)k λkA

)2

+ a(1)k λkA(θ0 − θ1Au

∑K

k′=1\ka

(1)k′ λ

k′

A − bk),

the first derivative equation can be expressed as:

dQ(1)k

da(1)k

(7)

= −2θ1a(1)k

(λkA)2

+ λkA(θ0 − θ1Au∑K

k′=1\ka

(1)k′ λ

k′

A − bk).

From (14), Q(1)k is the continuous quadratic function of a(1)

k ,and the second derivative of Q

(1)k with the respect to a(1)

k is

d2Q(1)k

da(1)k

2 = −2θ(λkA)2< 0, (8)

then we can obtain that Q(1)k is a concave function of a(1)

k .Therefore, we can obtain the optimal output of Q

(1)k by setting

the first derivative equal (14) to zero, then obtain a(1)k as

a(1)k = − Au

2λkA

K∑k′=1\k

a(1)k′ λ

k′

A +θ0 − bk2θ1λkA

. (9)

We can figure out the total active number of UAVs at oneslot as follows:

N (1)A

∗= max

[min

[Kθ0 −

∑Kk=1 bk

θ1 (K + 1),Au

∑K

k=1λkA

], 0

],

(10)

after that, we can obtain the optimal ak with (15) and (16) asfollow

a(1)k

op=

1

θ1λkA

(θ0 +

∑Kk=1 bk

K + 1− bk

), (11)

based on a(1)k

∗= max

[min

[a

(1)k

op, 1], 0], we completes the

proof.Given that each k-th tier of UAV has been assigned with bIk

coin, then we can deduce the profit maximization of the GRSas follows

P2 maxa(2)

Q(2)k = a

(2)k λkA(ρI −

bIk

a(2)k λkA

), (12a)

s.t. C1 : ρI = −θ1N (2)A + θ0, (12b)

C2 : 0 ≤ a(2)k ≤ 1, (12c)

Lemma 2: The optimal active density factor set ak formaximum the problem P2 can be expressed as follows

a(2)∗ = [a(2)1

∗, a

(2)2

∗, ..., a

(2)K

∗], (13)

where a(2)k

∗= max

[min

[1λkA

(θ0θ1− K

K+1

), 1], 0].

Proof 2:Similar with P1, we desired the first derivative equation for

Q(2)k can be expressed as:

dQ(2)k

da(2)k

= −2θa(2)k

(λkA)2

+ λkA(θ0 −∑K

k′=1\kθ1a

(2)k′ λ

k′

A ).

(14)

Then we derive that Q(2)k is a concave continuous quadratic

function of a(2)k , due to the second derivative of d2Qk

dak2 < 0.

Page 7: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

6

Therefore, we can obtain the optimal output of dQ(2)k

da(2)k

= 0 to

obtain a(2)k as

a(2)k =

θ0 − θ1

∑Kk′=1\k a

(2)k′ λ

k′

A

2θ1λkA, (15)

Substituting the optimal value in (15), we have the totalactive number of UAVs at one slot as follows:

N (2)A

∗= max

[min

[Kθ0

θ1 (K + 1),∑K

k=1λkA

], 0

], (16)

after that, we can obtain the optimal ak with (15) and (16) asfollow

a(2)k

op=

1

λkA

{θ0

θ1− K

K + 1

}, (17)

based on a(2)k

∗= max

[min

[a

(2)k

op, 1], 0], then we com-

pletes the proof.

B. Downlink Performance Evaluation In GS side

Before broadcasting the data, the typical GS Go figures outthe achievable rate with each tier of AS with given activeproportion. Once typical GS Go selects the given kth-tier AS,it will be associated to the closest AS according to data storagerequirements, the connect probability for the k-tier is fk(x) =2πakλkxe

−x2πakλk .Lemma 3: The achievable average downlink achievable rate

between a typical GS Go and its serving the nearest AS in k-thtier is as follows:

Rk(a∗) =1

ln 2

∫ ∞0

∫ ∞0

Pcovk (x, γo)

1 + γofk (x) dxdγo (18)

where Pcovk (x, γo) is given in (19) shown at the top of the next

page. The constant χN = 2αN

, χL = αL

2 , csc(·) is the cosecant-trigonometry function. For ease of notation, we define thefollowing two functions Ok and Ok′ , which are related tothe interference from the AS s in the k-th tier and other tiers,respectively:

Ok(x, γo) =

∫ ∞√hk2+x2

1(r2+h2

k

x2+h2k

)χL

/γo + 1rdr, (20)

Ok′(x, γo) =

∫ ∞hk′

1

Pk

(r2+h2

k′x2+h2

k

)χL

/ (γoPk′) + 1rdr. (21)

Proof 3: The outage coverage probability is as follows

Pcovk (x, γo) = Pr (SINRo,i(k) > γo) , (22)

where Pcovk (x, γo) is the CCDF of the received SINR from

typical GS to the associated AS, denoted by SINRko , and is

given by

Pcovk (x, γo) = Pr

Pkgo,kβ(x2 + hk2)−αL

2

IAk + IJk + δ2> γo

= e−δ2(x2 + h2k)

αL2 γo

Pkβ

E

e−IAδ2(x2 + h2k)

αL2 γo

Pkβ

E

e−IJδ2(x2 + h2k)

αL2 γo

Pkβ

= e−δ2(x2 + h2k)

αL2 γo

Pkβ LIA (sk)LIJ (sk) ,

(23)

where sk =(x2+h2

k)αL2 γo

Pkβ, and LIA (sk) and LIJ (sk) are the

Laplace transforms of the PDFs of IA and IJ . By applyingthe stochastic geometry, we derive the Laplace transform ofthe PDF of IA:

LIA(s) = EΦAk

exp

−sk ∑i∈ΦAk

Pkho,iβHo,iαL

(24)

+ E

K∑

k′=1\{k}

exp

−sk ∑l∈ΦA

k′

Pk′ho,lβHo,lαL

= exp {−2πakλk ×∫ ∞√hk2+x2

(1− 1

1 + skPkβ(r2 + h2k)−χL

)rdr

}

×K∏

k′=1\{k}

exp {−2πak′λk′ ×

∫ ∞hk′

(1− 1

1 + skPk′β(r2 + h2k′)−χL

)rdr

}.

Using a similar approach in (24), we derive the interferencecoming from the jamming signal as follows

LIJ (sk) = EΦJ

exp

−sk ∑j∈ΦJ

Peho,eβyo,eαN

(a)= exp

[−2πλe

∫ ∞0

(1− 1

1 + skPeβre−αN

)redre

],

(25)

where (a) is obtained by using the generating functional ofPPP [29]. After that, we can obtain (24) and (25) of the SINRin (23), and this completes the proof.

Based on the predicted average achievable rate Rk(a(1)∗)which is associated to a k-th tier AS, we can build thesecondary user association scheme, which aims to maximizethe benefit for the typical GS. The serving AS for a typicalGS based on the IRS P1 is selected according to the followingcriterion:

GS : arg maxk∈1,2,...,K

Fk∗, (26)

Page 8: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

7

Pcovk (γo) (19)

= exp

−δ2γoPkβ

(x2 + h2

k

)χL − λeχNπ csc (χNπ)(x2 + h2

k

)χNχL

(γoPePk

)χN

− 2πakλkOk − 2π

K∑k′=1\{k}

ak′λk′Ok′

where

Fk∗ = Rk(a(1)∗) · bk ·Ψ(1)k , (27)

since each typical GS is only associated to one UAV, andΨ

(1)k is the success probability that the typical GS turns into

the robust GS and obtains the reward bk. Notice that eventhough only a proportion of GSs support the k-th tier ASs ateach slot, the block data will be copied to all the other GSs inthe P2P network. Then we can see this is a Nash Equilibriumproblem in which the typical GS will reward the equal benefitF from any tier of AS. Then we can formulate the secondaryuser association probability for the IRS P1 expression as:

Ψ(1)k

∗=

1

Rk(a(1)∗)bk

1∑Kk=1

1Rk(a(1)∗)bk

. (28)

Overall, for a typical GS in the heterogeneous UAV networkwith dual user association, the average achievable rate can becalculated as

R(1)HetNet =

∑K

k=1Ψ

(1)k Rk(a(1)∗). (29)

For the P2 bonus scheme, the secondary user associationfor the serving AS for a typical GS is selected according tothe following criterion:

GS : arg maxk∈1,2,...,K

Rk(a(2)∗) · bk

a(2)∗λk, (30)

where

Fk∗ = Rk(a(2)∗) · bk

a(2)∗λk·Ψ(2)

k , (31)

the secondary user association probability for bonus schemeP2 expression as:

Ψ(2)k

∗=

a(2)∗k λAk

Rk(a(2)∗)bIk

1∑Kk=1

a(2)∗k λAk

Rk(a(2)∗)bIk

. (32)

Then we can obtain the average achievable rate for atypical GS in the heterogeneous UAV network with dual userassociation as

R(2)HetNet =

∑K

k=1Ψ

(2)k Rk(a(2)∗). (33)

IV. NUMERICAL RESULTS

In this section, we present the numerical results to examinethe impact of the reward functions on both the GS andAS network. We consider an air-to-ground blockchain-basedhybrid network, with six different tiers in the air system.

All the parameters used in the simulation are carefullyselected and well referenced. The transmit power of differenttier of ASs are P = [20, 20, 23, 23, 30, 30] dBm, given themobile-to-tower output power listed in the 3GPP channel

0 0.2 0.4 0.6 0.8 1

ak

0

100

200

300

400

500

600

700

800

900

1000

Qualit

y of S

ervice

Func

tion

Q k(1)

Q1(1)

Q2(1)

Q3(1)

Q4(1)

Q5(1)

Q6(1)

1 2 3 4 5 6

k-th Tier

0

5

10

15

20

25

30

35

40

Dens

ity of

AS(10

-6 /km2 )

Active Density ak(1)*

k

Density k

(a) Individual reward scheme (IRS).

0 0.2 0.4 0.6 0.8 1

ak

0

100

200

300

400

500

600

Qualit

y of S

ervice

Func

tion

Q k(2)

GRS

Q1(2)

Q2(2)

Q3(2)

Q4(2)

Q5(2)

Q6(2)

GRS

1 2 3 4 5 6

k-th Tier

0

5

10

15

20

25

30

35

40

Dens

ity of

AS(10

-6 /km2 )

Active Density ak(2)*

k

Density k

(b) Group reward scheme (GRS).

Fig. 3: The optimal active density akλAk and total density λAkin different tier and the utility of QoS function Qk in differenttiers against active density factor ak.

model [30]. Also, considering the frequency requirement usedin aircraft, we have fc = 2.43 GHz. The path loss exponent inurban micro-cellular for LoS and NLoS are αL=2 and αN=3.1,respectively [31]. And finally, we design the heterogeneousASs system to work on an altitude lower than 27 kilometresfor information interaction and collection [32].

In the Fig. 3 we evaluate the optimal density in each tierin (5) for IRS and (13) for GRS which compare with theoriginal total density set λA = [40, 38, 36, 34, 32, 30]/km2.We have constant θ1 = 1.2 × 1011 and θ0 = 6 × 107,the unit area is Au = 1. We assume the reward ’coin’ forIRS as b = [3, 4, 5, 6, 7, 8] × 102, and the reward ’coin’for GRS as bI = [3, 4, 5, 6, 7, 8] × 101.8. Firstly, we ob-serve that an optimal active density factor exists for bothschemes to obtain the maximum QoS function Qk. Theoptimal set a∗ are a(1)∗ = [0.71, 0.75, 0.79, 0.84, 0.89, 0.95]and a(2)∗ = [0.62, 0.66, 0.69, 0.74, 0.78, 0.83] factor, markedwith red squares from tier 1 to 6, respectively. We also observethat in both of these two schemes, the optimal active densitiesgenerally have similar values. In Fig. 3(a), we observe that theoptimal Q

(1)k is almost at the same level on each tier, but the

optimal Q(2)k in Fig. 3(b) decreases from tier one to tier six.

This is because in this trading market, even the upper tier withlow density, but it keeps a higher active density to guaranteethe balance of the trading market.

Page 9: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

8

5 10 15 20 25 30 35 40

hb(m)

0.03

0.035

0.04

0.045

0.05

0.055

0.06

Het

gene

ous

Aver

age

Rat

e (b

its/H

z) RHetNet

(1) (ak(1)*)

RHetNet(2) (a

k(2)*)

Fig. 4: Average heterogeneous rate via different height

Fig. 4 shows the impact of the AS height set on the averageheterogeneous achievable rates. In order to better analyse theaverage rate performance, we assume a minimum height hband the actual height set is h = hb + [20, 22, 24, 26, 28, 30]m. The analytical curves show (29) and (33) for IRS andGRS, respectively. We observe that theR(2)

HetNet is always betterthan R(1)

HetNet, and GRS pay lower reward ’coin’ than IRS.The result shows that dynamic allocation reward resource ismore economical and achieve a higher performance for theheterogeneous decentralized network.

V. CONCLUSION

In this paper, we proposed a blockchain-based air to groundcommunication system that embraced the concepts of dis-tributed data storage and mutually beneficial transactions,to enable secure and efficient information transmission inindustrial IoT networks. While the security issues in datastorage and transmission become more and more critical inIoT networks, the decentralized network can protect dataintegrity, as well as building up an eco-system among theheterogeneous networks. The simulation results show that thetrading consensus process can be usefully adopted in the air-to-ground industrial IoT system, the optimized active densitycould maximize the QoS for AS and increase the transmissionrate for the information exchange system.

REFERENCES

[1] N. Kshetri, “Can blockchain strengthen the Internet of Things?” ITProfessional, vol. 19, no. 4, pp. 68–72, Aug. 2017.

[2] S. M. Z. C. Q. H. Y. Dai, D. Xu and Y. Zhang, “Blockchain anddeep reinforcement learning empowered intelligent 5G beyond,” IEEENetwork Mag., pp. 1–1, Jan. 2019.

[3] Y. Li, M. Hou, H. Liu, and Y. Liu, “Towards a theoretical frameworkof strategic decision, supporting capability and information sharingunder the context of internet of things,” Information Technology andManagement, vol. 13, no. 4, pp. 205–216, 2012.

[4] L. D. Xu, W. He, and S. Li, “Internet of things in industries: A survey,”IEEE Trans. Ind. Infor., vol. 10, no. 4, pp. 2233–2243, Nov. 2014.

[5] N. Lohade, “Dubai aims to be a city built on blockchain,” Wall StreetJournal, 2017.

[6] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system.”[7] M. Conoscenti, A. Vetr, and J. C. D. Martin, “Blockchain for the

Internet of Things: A systematic literature review,” in 2016 IEEE/ACS13th International Conference of Computer Systems and Applications(AICCSA), Agadir, Morocco, Nov. 2016, pp. 1–6.

[8] J. Garay, A. Kiayias, and N. Leonardos, “The bitcoin backbone protocol:Analysis and applications,” in Annual International Conference on theTheory and Applications of Cryptographic Techniques. Springer, 2015,pp. 281–310.

[9] M. Liu, F. R. Yu, Y. Teng, V. C. M. Leung, and M. Song, “Computationoffloading and content caching in wireless blockchain networks withmobile edge computing,” IEEE Trans. Veh. Technol., vol. 67, no. 11,pp. 11 008–11 021, Nov. 2018.

[10] K. Yeow, A. Gani, R. W. Ahmad, J. J. P. C. Rodrigues, and K. Ko,“Decentralized consensus for edge-centric internet of things: A review,taxonomy, and research issues,” IEEE Access, vol. 6, pp. 1513–1524,2018.

[11] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts forthe internet of things,” IEEE Access, vol. 4, pp. 2292–2303, May 2016.

[12] S. Feng, W. Wang, D. Niyato, D. I. Kim, and P. Wang, “Competitivedata trading in wireless-powered internet of things (IoT) crowdsensingsystems with blockchain,” arXiv preprint arXiv:1808.10217, 2018.

[13] Z. Xiong, S. Feng, D. Niyato, P. Wang, and Z. Han, “Optimal pricing-based edge computing resource management in mobile blockchain,” in2018 IEEE International Conference on Communications (ICC), May2018, pp. 1–6.

[14] J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, and E. Hossain,“Enabling localized peer-to-peer electricity trading among plug-in hybridelectric vehicles using consortium blockchains,” IEEE Trans. Ind. Infor.,vol. 13, no. 6, pp. 3154–3164, Dec. 2017.

[15] Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang, “Consortiumblockchain for secure energy trading in industrial internet of things,”IEEE Trans. Ind. Infor., vol. 14, no. 8, pp. 3690–3700, Aug. 2018.

[16] N. H. Motlagh, M. Bagaa, and T. Taleb, “UAV-based IoT platform: Acrowd surveillance use case,” IEEE Commun. Mag., vol. 55, no. 2, pp.128–134, Feb. 2017.

[17] K. E. Oleson, P. Hancock, D. R. Billings, and C. D. Schesser, “Trustin unmanned aerial systems: A synthetic, distributed trust model,” inGPaper presented at the 16th International Symposium on AviationPsychology, Dayton, OH, 2011.

[18] Y. Zhu, G. Zheng, and M. Fitch, “Secrecy rate analysis of UAV-enabledmmwave networks Using Matern hardcore point processes,” IEEE J. Sel.Areas Commun., vol. 36, no. 7, pp. 1397–1409, July 2018.

[19] F. Nex and F. Remondino, “UAV for 3D mapping applications: areview,” Applied geomatics, vol. 6, no. 1, pp. 1–15, Mar. 2014.

[20] M. Conoscenti, A. Vetr, and J. C. D. Martin, “Blockchain for theinternet of things: A systematic literature review,” in 2016 IEEE/ACS13th International Conference of Computer Systems and Applications(AICCSA), Nov. 2016, pp. 1–6.

[21] G. Zyskind, O. Nathan, and A. Pentland, “Decentralizing privacy: Usingblockchain to protect personal data,” in 2015 IEEE Security and PrivacyWorkshops, May 2015, pp. 180–184.

[22] D. Vorick and L. Champine, “Sia: Simple decentralized storage,” 2014.[23] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for

IoT security and privacy: The case study of a smart home,” in IEEEInternational Conference on Pervasive Computing and CommunicationsWorkshops (PerCom Workshops), Mar. 2017, pp. 618–623.

[24] H. Liu, Y. Zhang, and T. Yang, “Blockchain-enabled security in electricvehicles cloud and edge computing,” IEEE Network, vol. 32, no. 3, pp.78–83, May 2018.

[25] J. Kang, R. Yu, X. Huang, M. Wu, S. Maharjan, S. Xie, and Y. Zhang,“Blockchain for secure and efficient data sharing in vehicular edgecomputing and networks,” IEEE J. Inter. of Thi., pp. 1–1, 2019.

[26] K. Suankaewmanee, D. T. Hoang, D. Niyato, S. Sawadsitang,P. Wang, and Z. Han, “Performance analysis and application of mobileblockchain,” in 2018 International Conference on Computing, Network-ing and Communications (ICNC), Mar. 2018, pp. 642–646.

[27] S. Park, K. Pietrzak, J. Alwen, G. Fuchsbauer, and P. Gazi, “Spacecoin:A cryptocurrency based on proofs of space,” IACR Cryptology ePrintArchive, Tech. Rep., 2015.

[28] T. Riihonen, S. Werner, and R. Wichman, “Hybrid full-duplex/half-duplex relaying with transmit power adaptation,” IEEE Trans. WirelessCommun., vol. 10, no. 9, pp. 3074–3085, Sep. 2011.

[29] M. Haenggi, Stochastic Geometry for Wireless Networks. CambridgeUniversity Press, 2013.

[30] 3GPP TR 36.814, “Further advancements for E-UTRA physical layeraspects (V9.0.0)”, Mar. 2010.

[31] S. Sun, T. S. Rappaport, S. Rangan, T. A. Thomas, A. Ghosh, I. Z.Kovacs, I. Rodriguez, O. Koymen, A. Partyka, and J. Jarvelainen,“Propagation path loss models for 5g urban micro- and macro-cellularscenarios,” in Vehicular Technology Conference (VTC Spring), May2016, pp. 1–6.

[32] R. Weibel and R. J. Hansman, “Safety considerations for operation ofdifferent classes of UAVs in the nas,” in AIAA 4th Aviation Technology,Integration and Operations (ATIO) Forum, p. 6244.

Page 10: Blockchain-empowered decentralized storage in air-to ... · decentralized and consensus mechanism structures such as Internet of Things (IoT) applications using the next generation

9

Yongxu Zhu (S’16-M’19) is research associate atLoughborough University now. She received theM.S. degree from the Beijing University of Posts andTelecommunications and Dublin City University, in2012 and 2013, and the Ph.D degree in ElectricalEngineering from University College London in2017. Her research interests include UAV Commu-nications, wireless edge caching, millimeter-wavecommunications, heterogeneous cellular networksand physical-layer security.

Gan Zheng (S’05-M’09-SM’12) received the BEngand the MEng from Tianjin University, Tianjin,China, in 2002 and 2004, respectively, both inElectronic and Information Engineering, and thePhD degree in Electrical and Electronic Engineeringfrom The University of Hong Kong in 2008. He iscurrently Reader of Signal Processing for WirelessCommunications in the Wolfson School of Me-chanical, Electrical and Manufacturing Engineering,Loughborough University, UK. His research inter-ests include machine learning for communications,

UAV communications, edge caching, full-duplex radio, and wireless powertransfer. He is the first recipient for the 2013 IEEE Signal Processing LettersBest Paper Award, and he also received the 2015 GLOBECOM Best PaperAward, and the 2018 IEEE Technical Committee on Green Communications& Computing Best Paper Award. He currently serves as an Associate Editorfor IEEE Communications Letters.

Kai-Kit Wong (M’01-SM’08-F’16) received theBEng, the MPhil, and the PhD degrees, all in Electri-cal and Electronic Engineering, from the Hong KongUniversity of Science and Technology, Hong Kong,in 1996, 1998, and 2001, respectively. After gradua-tion, he took up academic and research positions atthe University of Hong Kong, Lucent Technologies,Bell-Labs, Holmdel, the Smart Antennas ResearchGroup of Stanford University, and the University ofHull, UK. He is Chair in Wireless Communicationsat the Department of Electronic and Electrical En-

gineering, University College London, UK.He is Fellow of IEEE and IET and is also on the editorial board of several

international journals. He has served as Senior Editor for IEEE WirelessCommunications Letters since 2016. He had also previously served as SeniorEditor for IEEE Communications Letters from 2012 to 2019, Associate Editorfor IEEE Signal Processing Letters from 2009 to 2012 and Editor for IEEETransactions on Wireless Communications from 2005 to 2011. He was alsoGuest Editor for IEEE JSAC SI on virtual MIMO in 2013 and Guest Editorfor IEEE JSAC SI on physical layer security for 5G in 2017.