Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks

2022-08-24 12:56IbrahimAbunadiMahaAlthobaitiFahdAlWesabiAnwerMustafaHilalMohammadMedaniManarAhmedHamzaMohammedRizwanullahandAbuSerwarZamani
Computers Materials&Continua 2022年7期

Ibrahim Abunadi, Maha M.Althobaiti, Fahd N.Al-Wesabi, Anwer Mustafa Hilal,Mohammad Medani, Manar Ahmed Hamza,*, Mohammed Rizwanullahand Abu Serwar Zamani

1Department of Information Systems, Prince Sultan University, Rafha Street, Riyadh, 11586, Saudi Arabia

2Department of Computer Science, College of Computing and Information Technology, Taif University,Taif, 21944, Saudi Arabia

3Department of Computer Science, College of Science & Art at Mahayil, King Khalid University,Muhayel Aseer, 62529, Saudi Arabia

4Faculty of Computer and IT, Sana’a University, Sana’a, 61101, Yemen

5Department of Computer and Self Development, Prince Sattam bin Abdulaziz University, Al-Kharj, 16278, Saudi Arabia

6Department of Information Systems, College of Science & Art at Mahayil, King Khalid University,Muhayel Aseer, 62529, Saudi Arabia

Abstract: The evolving“Industry 4.0”domain encompasses a collection of future industrial developments with cyber-physical systems (CPS), Internet of things (IoT), big data, cloud computing, etc.Besides, the industrial Internet of things (IIoT) directs data from systems for monitoring and controlling the physical world to the data processing system.A major novelty of the IIoT is the unmanned aerial vehicles (UAVs), which are treated as an efficient remote sensing technique to gather data from large regions.UAVs are commonly employed in the industrial sector to solve several issues and help decision making.But the strict regulations leading to data privacy possibly hinder data sharing across autonomous UAVs.Federated learning (FL) becomes a recent advancement of machine learning (ML) which aims to protect user data.In this aspect, this study designs federated learning with blockchain assisted image classification model for clustered UAV networks (FLBIC-CUAV) on IIoT environment.The proposed FLBIC-CUAV technique involves three major processes namely clustering, blockchain enabled secure communication and FL based image classification.For UAV cluster construction process,beetle swarm optimization (BSO) algorithm with three input parameters is designed to cluster the UAVs for effective communication.In addition,blockchain enabled secure data transmission process take place to transmit the data from UAVs to cloud servers.Finally, the cloud server uses an FL with Residual Network model to carry out the image classification process.A wide range of simulation analyses takes place for ensuring the betterment of the FLBIC-CUAV approach.The experimental outcomes portrayed the betterment of the FLBIC-CUAV approach over the recent state of art methods.

Keywords: UAV networks; clustering; secure communication; blockchain;federated learning; image classification

1 Introduction

The Industrial Internet of Things (IIoT) relates to the billions of physical devices (like connected instruments, sensors, etc.) globally which is currently interconnected to the internet without needing human-to-computer interaction/human-to-human [1].It is beneficial in extensive geographic coverage and low deployment cost and has determined various applications in different fields, comprising environment monitoring, transportation, pervasive healthcare, smart city, and so on.Most innovations of autonomous robots employed in industry 4.0 is the generalization of the usage of drones (unmanned aerial vehicle (UAV)) to perform data collection tasks and multitude of inspections.The study focuses on the construction companies as it is one of the sectors in which conventionally lesser state-of-theart technologies were employed and hence applicable for using novel Technology of Industry 4.0 [2].Construction industries are mainly employing UAVs to offer high definition (HD) videos and images for recognizing change and for realtime job site monitoring and preventing or solving numerous problems.Also, they are employed to the maintenance task and inspection which is dangerous, costly,or inaccessible from the ground [3].

Incorporating UAVs into the IoT characterizes interoperability challenges since each IoT system has its individual communication protocol.Furthermore, a slight delay/error over the tolerated limits can lead to a disaster for many applications, like aircraft monitoring and manufacture and UAV.Fig.1 illustrates the overview of cluster UAV networks.When the (IoT) offers Internet access to any‘thing’,UAV could be a portion of this interconnected thing and transmit its onboard data to the cloud[4].Computational abilities could be prolonged to the cloud, using the offered service, and save the energy consumption and cost of an implanted UAV scheme.There is an increasing trend toward the 3 layers IIoT architectures using fog computing, through a convergence network of distributed and interconnected intelligent gateways.

Figure 1: Overview of clustered UAV networks

Using big data, lower cost computing, analytics, mobile, and cloud technologies, IIoT devices could collect and share data with minimum human interference.The data gathered by the IIoT device could be transferred to the central cloud server for storage [5].The privacy and security problems could be simply resolved using data encryption; but, IIoT based system frequently faces privacy and security issue, particularly in analytic and data processing.Federated learning (FL) is deliberated a novel computational model which goals at training multiple local datasets/machine learning approaches in local mobile nodes without obviously interchanging data instances [6].But, DL solution yet faces several novel privacy and security problems once it is needed to encounter the mobile IIoT model.In the conventional FL method, the centric server aggregate submodels are trained locally through the shared mobile nodes.The centric trained FL method would be distributed to each mobile node in the scheme.Furthermore, the FL frameworks participator could initiate membership inference attacks for judging either certain participators are included in the scheme for model training [7].Additionally,the participators could initiate attacks on another participator past training data from the centric paradigm.In addition, few malicious participators could transmit fake submodels for damaging the centric paradigm, make the FL method fails.

In all rounds of FL, more than one user (for example organization, datacentres, mobile/IoT device) are elected for training modules locally to generate a global paradigm when the raw data is kept in client and not transferred/exchanged.Blockchains have been currently leveraged in IIoT FL for providing incentives and data integrity for attracting adequate user data and computational resources for training [8].But, there was an insufficient holistic and systematic framework model for supporting efficient developments and effective approaches for addressing the challenges of data heterogeneity in device failure detection of IIoT.Even though FL has attained various advantageous in privacy preserving learning solutions for IoT systems, also it possessesmajor problems like robustness, resource management, incentive, and security mechanism [9].Such problems will be difficult andmore significant for handling in industrial IoT (IIoT), where high levels of safety, reliability, and security are needed.For enabling FL in IIoT applications, various studies have been conducted in recent years.

This study designs federated learning with blockchain assisted image classification model for clustered UAV networks (FLBIC-CUAV) on IIoT environment.The proposed FLBIC-CUAV technique involves three major processes namely clustering, blockchain enabled secure communication and FL based image classification.For UAV cluster construction process, beetle swarm optimization (BSO) algorithm with three input parameters is designed to cluster the UAVs for effective communication.In addition, blockchain enabled secure data transmission process take place to transmit the data from UAVs to cloud servers.Finally, the cloud server uses an FL with Residual Network model to carry out the image classification process.An extensive set of experiments are carried out to guarantee the supremacy of the FLBIC-CUAV technique.

2 Related Works

Wang et al.[10] presented the Fed-SCNN detection architecture.At first, a hybrid method is determined on the user side via DNN and SCNN that distinguishes the data of in-vehicle image and upload the encrypted parameter to the cloud.Next, the cloud servers perform FL on main parameter via DNN for building a global cloud module.Lastly, the DNNs are upgraded on the user side for additionally optimizing the hybrid method.The aforementioned 3 phases are cycled for continuously iterating the local hybrid method.The FedSCNN architecture is a dynamic learning procedure which tackles the 2 main problems of privacy protection and data isolation.Salhaoui et al.[11] present a smart IIoT control and monitoring method depending on a UAV which exploits CC service and uses FC as the bridges among IIoTs layer.Its innovation lies in the UAVs are manually incorporated into an industrial control scheme via IoT gateways, whereas UAV images are instantly and systematically analyzed and computed in the cloud.Visual supervision of the plant using cloud services and drones are incorporated in realtime for controlling loops of the industrial control scheme.

In order to address the data heterogeneity problem in IIoT detection failure, Zhang et al.[12] proposed a new CDW FedAvg approach considering the distances among negative and positive classes of all user datasets.Additionally, to inspire users to take part in FL, smart contact based incentive mechanisms are developed based on the centroid distance and size of user data employed in local model training.Lim et al.[13] presented the adaption of an FL based method for enabling privacy preserving collaborative ML through a federation of independent DaaS providers for the growth of IoV application, for instance, car park occupancy management and traffic prediction.

Zhang et al.[14] considered image classification task in UAV supported exploration scenario, in which the co-ordinations of various UAVs are executed with a GFC located in a strategic, however unavailable locations, like a mountain top while refreshing the battery is uneconomic or might be impossible.On-board cameras are brought by all UAVs and next, FL is invoked to reduce the transmission costs among the GFC and UAVs, and the computation complexity enforced on theGFC.To additionally minimize the computation complexity enforced on the GFC through the UAVs, WZFTPC is employed at all UAVs depending on realistic imperfect CSI.

Kim et al.[15] proposed blockchain based FL scenarios.Blockchain could effectively induce users to take part in learning and could split all contributing users as a `node’.Furthermore, it could be pursued stability, integrity, etc.also they considered 2 kinds of weight for selecting the subsets of clients to update the global method.Firstly, deliberate the weight according to local learning precision of every user.Next, deliberate the weight according to the participation rate of every user.They select 2 essential performances indicator, standard deviation and learning speed, for comparing the efficiency of this presented method using present approach.Sharma et al.[16] proposed a dispersed computing defence architecture for sustainable society with the features of FL and blockchain technology.The presented method presents an approach for meeting the challenge of constrained training data for obtaining higher accuracy and prevent reasons specific method.

Rahman et al.[17] presented a lightweight hybrid FL architecture where blockchain smart contracts handle the authentication, edge training plan, and trust management of contributing federated nodes, the reputation of edge nodes, and their uploaded datasets/models the distributions of locally or global trained model.Also, the frameworks support the complete encryption of a model training, inferencing process, and the dataset.All federated edge nodes perform additive encryption,whereas the blockchain exploits multiplicative encryptions for aggregating the upgraded model’s parameter.Pokhrel [18] developed a new method for a constellation of LEO satellites by making a Blockchain based architecture for continuous knowledge learning and sharing collaboratively.They ablated FL effective features as a foundation for ensuring higher accuracy of learning inference at timescale applicable to the channel dynamics and primary time varying space network.

Khan et al.[19] proposed enhancing the efficiency of UAVs with a decentralized ML architecture depending on blockchain.The presented model has the significance of considerably enhancing the storage and integrity of data for making smart decisions amongst various UAVs.They presented the usage of blockchain for achieving decentralized prediction analytics and architecture which could effectively share and apply ML methods in a decentralized way.Zhang et al.[20] bridge blockchain technology and FL via developing a blockchain based smart agent framework and apply it in FL.The FL approach is a developing collaborative ML method which trains models through various servers/devices hold private data instances without interchanging their data.

3 The Proposed FLBIC-CUAV Technique

In this study, a new FLBIC-CUAV technique is derived to accomplish secure communication and classification in UAV networks.The proposed FLBIC-CUAV technique involves distinct major processes namely BSO based clustering, blockchain enabled secure communication and FL based image classification.The detailed working of these processes is provided in the succeeding sections.

3.1 Design of BSO Based Clustering Technique

Initially, the BSO algorithm is designed to select the proper set of UAV CHs and organize clusters in the network.According to the SI behaviours of beetle, the BSO approach was proposed [21].Now,all individual beetles define a potential solution to the optimization issue, and all refer to a fitness value calculated by the FF.Similar PSO approach, the beetle distributes data.But, the direction and distance of the beetles are calculated by the speed and data intensity to be recognized by the longer antenna.Arithmetically, the bettles population ofnbeetle is represented asX= (X1,X2,···,Xn) in an S dimension search area, in which theith beetles indicate S dimensional vectorXi= (xi1,xi2,···,xiS)T,illustrates the location ofith beetles in the S dimensional search area and implies the potential solution to problem.The rate ofith beetles could be determined asVi= (Vi1,Vi2,···,ViS)T.The certain limit of the beetles could be specified asPi= (Pi1,Pi2,···,PiS)T, and the group extreme value of population could be indicated asPg= (Pg1,Pg2,···,PgS)T.These behaviours could be arithmetically modelled as:

Whereass= 1,2,···,S;i= 1,2,···,n;krepresents the current iteration.Visdenote the beetled speed, and ξisdescribes the increase in beetle’s location motion.λ denotes a positive constant.Then,the speed could be defined in the following equation [22]:

Letc1&c2represents 2 positive constant variables, andr1&r2indicates 2 random functions in the range of zero and one.ω signifies the inertia weight.

In this instance, the method of decreasing inertia weights are defined in Eq.(3):

In which ωmin&ωmaxare the minimum and maximum values of ω.kandKrepresent the present and maximum iteration.Now, the extrema values of ω are set to be 0.9, and the lowest values are predetermined as 0.4, therefore the method searches the highest range at the primary phase of the evolutions and rapidly recognizes the best solution.As the value of ω gets reduced iteratively, the speed of beetles is decreased and enters the local search.The ξ function characterizes the increment function that could be defined in Eq.(4):

Let & represent the step size.The searching behaviors of left and right antenna could be determinedas follows:

The trajectory paths of the swarm of beetle in two and three dimensional areas respectively.For the depiction of the searching paths in an extremely visual manner, smaller population size is applied and showed the location modification procedure of ten rounds in three dimensional areas.Because the factors such as inertia weight coefficient and step length get reduced continually, the BSO approach doesn’t convergence to the target quickly and avoids the local optimal problems.

In BSO technique, a random set of solutions are initialized.Then, in all rounds, the searching agents would upgrade the position based on the individual searching approach and the optimal solution which occurs now.The incorporation of these 2 area speeds on the runtime also decreases the probability of trapping to local optimal.Hence, it is established to be reliable in dealing with higher dimension challenges.Hypothetically, the BSO approach consists of the capabilities of exploration and exploitation.Furthermore, the linear incorporation of speed and beetles searching procedure enhances the accuracy and rapidness of population optimization andmakes the approach highly consistent.The BSO algorithm derives a fitness function for CH selection involving the following three parameters.

3.1.1 Residual Energy in UAV

The RE of UAV (x) but interactivekbits to target UAV (y) on distanced, is determined as:

whereErefers the present energy of UAV andETimplies the energy utilized to sense information.

whereEerepresents the energy of electrons andEahas been needed amplified energy,ER(k)is the energy dissipated for receiving data, and is determined as:

The most 3 parameter for CH election is the average distance (AvgD) for neighboring UAVs.The AvgD represents the average of distance values to UAVs for their single hob adjacent UAV which is demonstrated as:

wheredist(i,nbj) stands for distance in UAV to the adjacentjthUAV their neighbornbj

3.1.3 UAV Degree

In order to time instancet, the degree of UAV represents the amount of neighboring nodes which exist from the UAV.It is determined as:

whereN(x) = {ny/dist(x,y)<transrange}xy, anddist(x,y) signifies the distance amongst 2 UAVsnxandny,transrangerefers the broadcast range of UAVs.

3.2 Blockchain Enabled Data Transmission

The BC is employed for secure data transmission among CHs and cloud servers.BC is a significantly advantageous ledger to ensure data quality.BC produces controlling operations for various decentralized industrial device.It provides authority and amenability for all independent schemes when solving security problems.In industrial sector, private BC could be applied for achieving security.It finds beneficial in various areas like supply chain, healthcare, large scale, and transportation IoT data.It aids to attain decentralization, privacy, and trust.The BC allows simple connections to various devices.The device could be supercomputer/end node that computes data.The node could broadcast the secure data to other peer nodes so that no attackers could implement attack.It can transfer data to a decentralized device/centre place connected to another device.The hash values in the BC are the private fingerprint of every data in the chain.The pair of hash values are iteratively hashed in a block for obtaining a single hash value.Fig.2 describes the basic architecture of BC.

Figure 2: Architecture of blockchain

The client/server computer could be a node that starts the transaction.The transaction is integrated to generate a block; but, these blocks get added to the chain afterward authenticating from the endorse node.The transactions get initiated by the submission of the proposal from the client.It gets started from the data transmission through the user SDK.The transaction process utilizes 2 varying types of peer i.e., committer peer and endorser peer.The last one validates the transaction result previous to writing a block of transaction to the dispersed ledger.For the initialization of novel transactions, the client applications transmit the transaction proposal to peer for updating/reading the ledger.The endorser peer gets the virtual results as a certain read and writes data.The response from endorser peers includes write and read datasets.When the validation and reply of the transactions are obtained, the user transmits it to the ordered that commands the transaction to a block and passes the block to each committer peer.It could authenticate and read the endorsement policy.When it is guaranteed, it carry out writing operations.Finally, the committer peers create an asynchronous announcement associated with the transaction state.The ordered peer notifies another node when the transactions are inefficient or not.Once the blocks save the transaction, it couldn’t have interfered.

When the children moved to a town five hours away, my husband was understandably devastated3. In order to maintain regular communication with the kids, we contacted Cyberspace4 and promptly5 set up an e-mail and chat-line service. This technology, combined with the telephone, would enable us to reach them on a daily basis by sending frequent notes and messages, and even chatting together when we were all on-line.

3.3 FL Based Classification

FL approach is a developing technique of ML that are initially developed by Google in 2016.The main concept is to secure user data at the time of processes [23].Since a dispersed ML approach, it supports model training on huge amount of dispersed data.The training procedure is for fitting the global optimum statistical method via the integration of training parameters is given as follows:

minF(w),

whereas

Letmrepresents the overall number of devices,pk≥0, and the amount ofpkis 1;Fk(.) indicates the objective function of the kth device.With the emergence of FL model, several researches depend on FL have developed, for example, personalized FL, privacy preserving ML, and multitask FL.The scene contains 2 data owners (for example enterprises A & B) for introducing the FL framework.The certain framework principles are given in Fig.3.Simultaneously, it could exploit big data to efficiently resolve the problems of Data Island that assurances that FL methods are better compared to isolated model in machine detection.Based on the distribution of user data dimension, it can be separated FL approach into 2 classes: HFL, VFL, and FTL.Fed SCNN belongs to FTL class.It is the initial type tailored for distracted driving.

Figure 3: Overview of FL

The fundamental parameters are separated to the cloud and a huge amount of user side.Basic parameters data could be transferred among the user and cloud in encrypted model.In this study,ResNet model is utilized for learning user-side and cloud methods.Consider the features of FL, this study makes substantial developments to local ResNet network, i.e., the main parameter beforehand the final hidden layer is distributed, and the parameters among the final hidden and output layers aren’t distributed.The complete reasons are described as follows.

The cloud server exploits public data and the parameter set by the user for establishing a global cloud methodfs.The objective optimization procedure in training could be given in the following equation

Whereasl(·,·) represents the loss function of training method, for example, cross entropy loss function.{xi,yi} denotes instancexi, and the respective labelsyj,n, denote the instance size of public data.Θ denotes the variable matrix which must be learned, comprising the bias and weight of the hidden layer.Afterward, the cloud models are determined, the variable Θ is shared with every user.

The user constructs a local ResNet model such as cloud module.The training procedure remains unchanged, excepting the instance data is comparatively smaller and belongs to personal privacy data[24].For each useru, the local ResNet model is stated asfu, and the objective function could be given in the following equation

Since the significant variable of local ResNet model,Θuis uploaded to the cloud in the encrypted model.The cloud trains the variable sets {Θ1,Θ2,...,Θn}, for updating the global cloud method and the variable Θ, and distribute the upgraded variable Θ to each user.Based on actual requirements,local parameters could be upgraded frequently, like regularly upgraded at night.

During this case, it can be current residual learning for beating this issue and made DL structure for classifying the image.During the residual network, stacked layer carries out residual mapping by creating shortcuts influences which perform identity mapping (x).An output is contained in the output of stacked layer residual function F(x).During this trained deep network with backpropagation (BP), the gradient of error is propagating aswell as calculating to the shallowlayers.In deep layer, these errors develop small still it finally reduces.It can be named the gradient decreasing issue of deep network.This issue is resolved by residual learning.This analysis utilizes ResNet-34 approach.The last layer of the ResNet-34 model includes a softmax layer for classification process, which allocates the data instances to k class labels.

4 Performance Validation

This section investigates the performance of the FLBIC-CUAV technique under different aspects.The FLBIC-CUAV technique is inspected against UC Merced Land Use Dataset with 21 class labels.Each class includes a total of 100 images with the size of 256 * 256 pixels.Fig.4 illustrates few sample images.The FLBIC-CUAV technique is examined under two different scenarios, namely scenario 1(comprising 25 UAV images) and scenario 2 (comprising 50 UAV images).

Figure 4: Sample images

The results analysis of the FLBIC-CUAV technique with existing techniques on scenario 1 is provided in Tab.1.On examining the results interms of ECM, the FLBIC-CUAV technique has gained enhanced outcome with the reduced ECM under distinct rounds of operation.For instance, with 1000 rounds, the FLBIC-CUAV technique has offered a lower ECM of 27 mJ whereas the T2FL-C, KHAC, MPSO-C, and T1FL-C methods have obtained a higher ECM of 32, 36, 39, and 42 mJ respectively.Moreover, with 3000 rounds, the FLBIC-CUAV technique has provided a minimum ECM of 66 mJ whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C approaches have attained a maximum ECM of 71, 81, 87, and 92 mJ respectively.Furthermore, with 5000 rounds, the FLBIC-CUAV technique has accomplished a decreased ECM of 95 mJ whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C manners have achieved an increased ECM of 102, 118, 126, and 135 mJ respectively.

Table 1: Results of existing with proposed FLBIC-CUAV method in terms of various parameters on scenario 1

On investigating the results with respect to ETED, the FLBIC-CUAV approach has attained improved results with the decreased ETED under distinct rounds of operation.For instance, with 1000 rounds, the FLBIC-CUAV approach has obtainable a lesser ETED of 1.95s whereas the T2FLC, KHA-C, MPSO-C, and T1FL-C methods have attained an increased ETED of 2.03, 2.12, 2.18, and 2.27s correspondingly.Also, with 3000 rounds, the FLBIC-CUAV manner has provided a minimal ETED of 2.52s whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C methods have attained a maximum ETED of 2.67, 3.37, 3.66, and 4.87s respectively.However, with 5000 rounds, the FLBICCUAV technique has accomplished a decreased ETED of 4.89s whereas the T2FL-C, KHA-C,MPSO-C, and T1FL-C algorithms have gained a maximum ETED of 5.06, 5.83, 6.32, and 6.45s correspondingly.

The throughput analysis showcased that the FLBIC-CUAV technique has gained effective results with the supreme throughput under all iterations, as shown in Fig.5.For instance, with 1000 iterations,the FLBIC-CUAV technique has demonstrated improved outcomes with the increased throughput of 0.97 Mbps whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C algorithms have resulted in a reduced throughputof0.96,0.94,0.92,and0.90 Mbpsrespectively.Concurrently,with3000iterations,the FLBIC-CUAV approach has showcased increased results with maximum throughput of 0.93 Mbps whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C manners have resulted in a decreased throughput of 0.87, 0.83, 0.75, and 0.71 Mbps correspondingly.Meanwhile, with 5000 iterations,the FLBIC-CUAV algorithm has exhibited higher outcomes with the superior throughput of 0.85 Mbps whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C methodologies have resulted in a lesser throughput of 0.79, 0.70, 0.63, and 0.59 Mbps correspondingly.

Figure 5: Throughput analysis of FLBIC-CUAV technique on scenario 1

The results analysis of the FLBIC-CUAV method with existing algorithms on scenario 2 is given in Tab.2.On inspecting the outcomes with respect to ECM, the FLBIC-CUAV technique has attained results with the minimum ECM under varying rounds of operation.For instance,with 1000 rounds, the FLBIC-CUAV approach has existed at least ECM of 30 mJ whereas the T2FL-C, KHA-C,MPSO-C, and T1FL-C methods have obtained a higher ECM of 36, 39, 41, and 45 mJ respectively.Besides, with 3000 rounds, the FLBIC-CUAV approach has offered a lesser ECM of 68 mJ whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C algorithms have reached a maximal ECM of 75, 84, 89, and 97 mJ correspondingly.Followed by, with 5000 rounds, the FLBIC-CUAV methodology has accomplished a reduced ECM of 98 mJ whereas the T2FL-C, KHA-C,MPSO-C, and T1FL-C manners have attained an improved ECM of 107, 123, 128, and 137 mJ correspondingly.

Table 2: Results of existing with proposed FLBIC-CUAV method in terms of various parameters on scenario 2

Then, on investigating the results interms of ETED, the FLBIC-CUAV manner has obtained improved outcomes with the least ETED under different rounds of operation.For sample, with 1000 rounds, the FLBIC-CUAV method has offered a minimal ETED of 1.97s whereas the T2FL-C,KHA-C, MPSO-C, and T1FL-C systems have gained a superior ETED of 2.08, 2.14, 2.23, and 2.32s respectively.Moreover, with 3000 rounds, the FLBIC-CUAV manner has provided a minimal ETED of 2.57s whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C algorithms have attained a maximum ETED of 2.69, 3.41, 3.72, and 4.89s respectively.Likewise, with 5000 rounds, the FLBIC-CUAV method has accomplished a minimum ETED of 4.93s whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C methodologies have achieved an increased ETED of 5.11, 5.87, 6.38, and 6.50s respectively.

The throughput analysis demonstrated that the FLBIC-CUAV manner has attained effective results with the supreme throughput under all iterations, as shown in Fig.6.For sample, with 1000 iterations, the FLBIC-CUAV approach has outperformed increased outcome with the maximal throughput of 0.98 Mbps whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C methodologies have resulted in a lesser throughput of 0.97, 0.96, 0.94, and 0.92 Mbps correspondingly.Simultaneously,with 3000 iterations, the FLBIC-CUAV algorithm has depicted improved outcomes with the higher throughput of 0.96 Mbps whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C manners have resulted in a reduced throughput of 0.92, 0.89, 0.81, and 0.76 Mbps correspondingly.In the meantime, with 5000 iterations, the FLBIC-CUAV technique has portrayed enhanced outcomes with the increased throughput of 0.94 Mbps whereas the T2FL-C, KHA-C, MPSO-C, and T1FL-C methods have resulted in a reduced throughput of 0.83, 0.75, 0.67, and 0.62 Mbps correspondingly.

Figure 6: Throughput analysis of FLBIC-CUAV technique on scenario 2

Fig.7 showcases the comparative ECM and ETE delay analysis of the FLBIC-CUAV technique with existing techniques under two different scenarios.The results showcased that the FLBIC-CUAV technique has gained effective performance with minimal ECM and ETE delay over the other existing techniques.

A comprehensive comparison study of the FLBIC-CUAV technique with existing techniques takes place interms of accuracy in Tab.3 and Fig.8 [25].

The results depicted that PlacesNet and VGG-VD19 techniques have accomplished poor outcomes with the accuracy of 91.44% and 93.15%.Followed by, all the other techniques except DLMOPSO, C-PTRN, and FLBIC-CUAV techniques have showcased moderately closer accuracy values.Simultaneously, the DL-MOPSO technique has tried to obtain reasonable performance with an accuracy of 95.32%.Concurrently, the C-PTRN technique has resulted in a near=optimal performance with an accuracy of 98.67%.However, the FLBIC-CUAV technique has gained maximum performance over the other techniques with a maximum accuracy of 99.15%.

From these result analyses, it can be concluded that the FLBIC-CUAV technique can be employed as an effective approach for secure UAV communication in IIoT environment.

Figure 7: Comparative energy consumption and ETE delay analysis (a, b) Scenario 1; (c, d) Scenario 2

Table 3: Accuracy analysis of FLBIC-CUAV with various CNN models

Table 3: Continued

Figure 8: Accuracy analysis of FLBIC-CUAV model with recent approaches

5 Conclusion

In this study, a new FLBIC-CUAV technique is derived to accomplish secure communication and classification in UAV networks.The proposed FLBIC-CUAV technique involves distinct major processes namely BSO based clustering, blockchain enabled secure communication and FL based image classification.The BSO algorithm derives a fitness function involving three input parameters related to UAV for effective choice of CHs.Besides, the use of FL based image classification technique involves the concepts of ResNet and softmax functions.An extensive set of experimentations are carried out to guarantee the supremacy of the FLBIC-CUAV technique.The simulation results demonstrated the betterment of the FLBIC-CUAV technique over the recent state of art methods.In future, the energy efficiency of the UAV network can be boosted by data aggregation and context aware route planning approaches.

Acknowledgement:We deeply acknowledge Taif University for supporting this research through Taif University Researchers Supporting Project Number (TURSP-2020/328), Taif University, Taif, Saudi Arabia.The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.

Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP.2/209/42).www.kku.edu.sa

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.