Fig 1.
An example adhoc UAV network facing adversarial actors attempting to launch a man-in-the-middle attack.
Fig 2.
Security level encryption.
Fig 3.
Blockchain-based private device data.
Fig 4.
The transaction generation time of BCSF comparison to other techniques with varying number of devices.
Fig 5.
The data secrecy rate of BCSF compared to other techniques with varying number of devices.
Fig 6.
The data recovery rate of BCSF compared to other techniques with varying number of devices.
Table 1.
Comparison of effective energy efficiency (%) for data transmission.