Paper
27 September 2022 Research of drone swarm warfare application based on BlockChain
Guiqiang Chen, Ying Li, Zhenqun Sang, Haiwen Li
Author Affiliations +
Proceedings Volume 12346, 2nd International Conference on Information Technology and Intelligent Control (CITIC 2022); 1234619 (2022) https://doi.org/10.1117/12.2653838
Event: 2nd International Conference on Information Technology and Intelligent Control (CITIC 2022), 2022, Kunming, China
Abstract
With the coming of intelligent warfare, drone swarm warfare will become an important combat style. At the same time, the drone swarm system will also face some security problems, such as the destruction of centralized management nodes, the data destruction of enemy invaded node, information leakage, data theft and so on. Due to the decentralized, tamperproof, traceable and other characteristics of blockchain technology, it highly meets the requirements of drone swarm warfare application, so it can effectively solve the business pain point of drone swarm. We first introduce the operational process of drone swarm and discussed the pain points in drone swarm warfare application. We then present the solution of drone swarm warfare application based on blockchain technology. The research objective is to provide design ideas for promoting the integration application of blockchain technology and drone swarm warfare.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Guiqiang Chen, Ying Li, Zhenqun Sang, and Haiwen Li "Research of drone swarm warfare application based on BlockChain", Proc. SPIE 12346, 2nd International Conference on Information Technology and Intelligent Control (CITIC 2022), 1234619 (27 September 2022); https://doi.org/10.1117/12.2653838
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data communications

Telecommunications

Computer security

Reliability

Control systems

Data storage

Information security

Back to Top