Blockchain-Based Data Security in Military Autonomous Systems

Advances in technology have enabled the increased use of autonomous systems such as unmanned aerial vehicles (UAVs) in military operations and other critical military communications. While the use of autonomous systems has greatly facilitated military operations, provided a global view of the operational environment and eased sensitive data collection, making possible reduced casualties, it has also created a greater cyber attack surface due to its high level of automation. The existence of adversaries targeting this attack surface can seriously damage military operations by tampering with critical message content used in autonomous systems decision making. In order to ensure the successful operation of autonomous military systems, mechanisms must be developed to strictly protect the integrity of the collected / exchanged data and messages, and an immutable record of each message must be provided. These mechanisms should also be used to control autonomous systems under critical failures or attacks occurring during or after military operations. Blockchain has recently emerged as a technology that provides a decentralized architecture to achieve an unchangeable history of interactions between parties that are part of a distributed network. While blockchain is currently used in various fields such as cryptocurrencies, supply chain management and e-voting systems, it also has the potential to provide secure communication in autonomous systems. In this study, a blockchain-based communication architecture is proposed that guarantees integrity assurance and permanent recording of messages exchanged between all parties, including UAVs and ground control stations, in a military autonomous system network. The proposed secure communication architecture has been theoretically evaluated in terms of its resistance to the types of cyber attacks frequently encountered in distributed systems, and it has been shown to provide protection against attacks that compromise data integrity as well as spoofed authentication attempts. The proposed blockchain-based architecture is promising to increase the resilience of military autonomous systems against cyberattacks that aim to hurt the success of military operations through data content manipulation.
Avrupa Bilim ve Teknoloji Dergisi


Unmanned Aerial Vehicle Domain: Areas of Research
Demir, Kadir Alpaslan; Cicibas, Halil; ARICA, NAFİZ (2015-07-01)
Unmanned aerial vehicles (UAVs) domain has seen rapid developments in recent years. As the number of UAVs increases and as the missions involving UAVs vary, new research issues surface. An overview of the existing research areas in the UAV domain has been presented including the nature of the work categorised under different groups. These research areas are divided into two main streams: Technological and operational research areas. The research areas in technology are divided into onboard and ground techno...
Self-recurrent wavelet neural network based indirect adaptive control architecture with modified adaptive learning rates for the speed control of motion platforms
Arı, Evrim Onur; Kocaoğlan, Erol; Department of Electrical and Electronics Engineering (2015)
Motion platforms are widely employed in military systems for the purpose of controlling payloads like optical sensors, antennas, guns etc. One of the most critical components of these platforms is the motion control sub-system which is responsible for controlling the speed of the platform. In this thesis, the components of the speed control are investigated in detail and finally a novel control architecture was proposed in order to improve the transient performance of the speed control without any adverse e...
Transfer Learning-Based Crack Detection by AutonomousUAVs
Küçüksubaşı, Fatih; Sorguç, Arzu (2018-07-20)
Unmanned Aerial Vehicles (UAVs) have recently shown great performance collecting visual data through autonomous exploration and mapping in building inspection. Yet, the number of studies is limited considering the post processing of the data and its integration with autonomous UAVs. These will enable huge steps onward into full automation of building inspection. In this regard, this work presents a decision making tool for revisiting tasks in visual building inspection by autonomous UAVs. The tool is an imp...
Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework
Sengul, Zafer; Acartürk, Cengiz (2021-01-01)
© 2021 IEEE.Malware propagation is capable of introducing adverse effects in military operations since today's high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer netw...
Numerical and experimental analysis of a piezoelectric flat plate in flapping motion
Harputlu, Özgür; Kurtuluş, Dilek Funda; Department of Aerospace Engineering (2014)
The technology of unmanned aerial vehicles (UAV) has a rapid improvement and their use is increasing day by day for military and civilian missions. Developments in production technology enable the fabrication of micro aerial vehicles. Flapping wing systems have an important place among UAVs. These vehicles are superior to fixed wing aircrafts with their high maneuverability and hover capabilities and they can successfully perform many missions in which the fixed aircrafts are insufficient. Developments in m...
Citation Formats
P. Angın, “Blockchain-Based Data Security in Military Autonomous Systems,” Avrupa Bilim ve Teknoloji Dergisi, pp. 362–368, 2020, Accessed: 00, 2021. [Online]. Available: