Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones

被引:8
作者
Alsumayt, Albandari [1 ]
El-Haggar, Nahla [1 ]
Amouri, Lobna [1 ]
Alfawaer, Zeyad M. M. [1 ]
Aljameel, Sumayh S. S. [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Appl Coll, Comp Sci Dept, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Saudi Aramco Cybersecur Chair, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
关键词
UAVs; IPFS; FDSS; DeepAL; PHE; SGD; IoT; IoD; MEC; blockchain; homomorphic; AI; AUTHENTICATION PROTOCOL; UAV; SCHEME; INTERNET; IDENTITY; CLASSIFICATION; COMMUNICATION; CHALLENGES; MECHANISM;
D O I
10.3390/s23115148
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Global warming and climate change are responsible for many disasters. Floods pose a serious risk and require immediate management and strategies for optimal response times. Technology can respond in place of humans in emergencies by providing information. As one of these emerging artificial intelligence (AI) technologies, drones are controlled in their amended systems by unmanned aerial vehicles (UAVs). In this study, we propose a secure method of flood detection in Saudi Arabia using a Flood Detection Secure System (FDSS) based on deep active learning (DeepAL) based classification model in federated learning to minimize communication costs and maximize global learning accuracy. We use blockchain-based federated learning and partially homomorphic encryption (PHE) for privacy protection and stochastic gradient descent (SGD) to share optimal solutions. InterPlanetary File System (IPFS) addresses issues with limited block storage and issues posed by high gradients of information transmitted in blockchains. In addition to enhancing security, FDSS can prevent malicious users from compromising or altering data. Utilizing images and IoT data, FDSS can train local models that detect and monitor floods. A homomorphic encryption technique is used to encrypt each locally trained model and gradient to achieve ciphertext-level model aggregation and model filtering, which ensures that the local models can be verified while maintaining privacy. The proposed FDSS enabled us to estimate the flooded areas and track the rapid changes in dam water levels to gauge the flood threat. The proposed methodology is straightforward, easily adaptable, and offers recommendations for Saudi Arabian decision-makers and local administrators to address the growing danger of flooding. This study concludes with a discussion of the proposed method and its challenges in managing floods in remote regions using artificial intelligence and blockchain technology.
引用
收藏
页数:30
相关论文
共 77 条
[1]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[2]   Password-based authenticated key exchange in the three-party setting [J].
Abdalla, M. ;
Fouque, P.-A. ;
Pointcheval, D. .
IEE Proceedings: Information Security, 2006, 153 (01) :27-39
[3]   Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks [J].
Abunadi, Ibrahim ;
Althobaiti, Maha M. ;
Al-Wesabi, Fahd N. ;
Hilal, Anwer Mustafa ;
Medani, Mohammad ;
Hamza, Manar Ahmed ;
Rizwanullah, Mohammed ;
Zamani, Abu Serwar .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01) :1195-1212
[4]   Active Learning Based Federated Learning for Waste and Natural Disaster Image Classification [J].
Ahmed, Lulwa ;
Ahmad, Kashif ;
Said, Naina ;
Qolomany, Basheer ;
Qadir, Junaid ;
Al-Fuqaha, Ala .
IEEE ACCESS, 2020, 8 (08) :208518-208531
[5]   Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems [J].
Alrayes, Fatma S. ;
Alotaibi, Saud S. ;
Alissa, Khalid A. ;
Maashi, Mashael ;
Alhogail, Areej ;
Alotaibi, Najm ;
Mohsen, Heba ;
Motwakel, Abdelwahed .
DRONES, 2022, 6 (09)
[6]  
Azbeg K., 2018, 2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech), P1, DOI DOI 10.1109/CLOUDTECH.2018.8713343
[7]   Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment [J].
Bera, Basudeb ;
Das, Ashok Kumar ;
Sutrala, Anil Kumar .
COMPUTER COMMUNICATIONS, 2021, 166 :91-109
[8]   CoMAD: Context-Aware Mutual Authentication Protocol for Drone Networks [J].
Cabuk, Umut Can ;
Dalkilic, Gokhan ;
Dagdeviren, Orhan .
IEEE ACCESS, 2021, 9 :78400-78414
[9]  
Calderon R., 2019, THESIS SALLE U PHILA
[10]   SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles [J].
Cho, Geumhwan ;
Cho, Junsung ;
Hyun, Sangwon ;
Kim, Hyoungshick .
APPLIED SCIENCES-BASEL, 2020, 10 (09)