Competing Miners: A Synergetic Solution for Combining Blockchain and Edge Computing in Unmanned Aerial Vehicle Networks

Jacob Mathias Nilsen, Jun Hyun Park, Sangseok Yun, Jae Mo Kang, Heechul Jung

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

Edge computing (EC) is very useful and particularly promising for many practical unmanned aerial vehicle (UAV) applications. Integrating the blockchain to this technology strengthens privacy protection and data integrity and also prevents data from being easily leaked. However, the required operations in the blockchain are computationally heavy because a blockchain requires devices to solve a complicated proof-of-work (PoW) puzzle to add new data (i.e., a block) to the blockchain. Solving a PoW requires substantial amounts of time and energy, which are big concerns for UAVs. In this article, we suggest a synergetic solution to address this issue based on multiple competing miners in a blockchain. Specifically, we present two novel frameworks for combining the blockchain and EC to effectively overcome several critical limitations when applying the blockchain to UAV and EC tasks, respectively. The goal of both of these proposed frameworks is to reduce both the time spent on mining and the energy consumption for the EC. We first look at the fundamentals of the blockchain with competing miners. Then, our proposed frameworks are described with experimental results, through which important insights are drawn. We finally discuss application scenarios for our proposed frameworks, the related technical challenges, and future research directions.

Original languageEnglish
Article number2581
JournalApplied Sciences (Switzerland)
Volume12
Issue number5
DOIs
StatePublished - 1 Mar 2022

Keywords

  • Blockchain
  • Competing miners
  • Edge computing
  • Internet of Things
  • Proof-of-work
  • Unmanned aerial vehicle

Fingerprint

Dive into the research topics of 'Competing Miners: A Synergetic Solution for Combining Blockchain and Edge Computing in Unmanned Aerial Vehicle Networks'. Together they form a unique fingerprint.

Cite this