Secure Communication of Military Reconnaissance Images Over UAV-Assisted Relay Networks

被引:33
作者
Alexan, Wassim [1 ]
Aly, Laila [1 ]
Korayem, Yousef [2 ]
Gabr, Mohamed [2 ]
El-Damak, Dina [3 ]
Fathy, Abdallah [4 ]
Mansour, Hany A. A. [5 ]
机构
[1] GUC, Fac Informat Engn & Technol, Commun Dept, New Cairo 11835, Egypt
[2] GUC, Fac Media Engn & Technol, Dept Comp Sci, New Cairo 11835, Egypt
[3] GUC, Fac Informat Engn & Technol, Elect Dept, New Cairo 11835, Egypt
[4] Elsewedy Univ Technol, Dept Elect Engn, Elect & Elect Engn Technol Program, Polytech Egypt, 10th Of Ramadan City 7060010, Sharqia, Egypt
[5] Mil Tech Coll, Elect Warfare Dept, Cairo 11211, Egypt
关键词
Encryption; Ad hoc networks; Security; Genetic algorithms; DNA; Codes; Parity check codes; Convolutional codes; DNA coding; drones; genetic algorithm; LDPC codes; relays; UAV; wireless communication; BOX;
D O I
10.1109/ACCESS.2024.3407838
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a novel 2-layer image encryption cryptosystem and transmission protocol designed for secure communication of military reconnaissance images over unmanned aerial vehicle (UAV)-assisted relaying networks. The proposed scheme aims to address the growing need for robust, secure, and efficient transmission of sensitive imagery data across wireless ad-hoc networks, often characterized by unpredictable and hostile environments. The first layer of the proposed cryptosystem employs a Genetic Algorithm (GA) utilizing a Mersenne Twister (MT) key, providing a robust framework for initial image encryption. The second layer further leverages security by employing DNA coding, that is also driven by a MT key. The encrypted images are subsequently transformed into a one-dimensional bit-stream, ready for transmission. The bit-stream is then channel coded using either a convolutional code or a low-density parity-check (LDPC) code, offering flexibility based on the specific network conditions and requirements. The coded data is then BPSK-modulated and transmitted over a multi-hop wireless relay network, with relays mounted on freely-moving UAVs. This scheme optimizes for both security and transmission efficiency, critical for the time-sensitive and mission-critical nature of military operations. Extensive performance evaluation is carried out, presenting bit error rate (BER) curves and various image encryption metrics, demonstrating the robustness, reliability, and security of the proposed scheme. This contribution is expected to significantly enhance the secure communication of military reconnaissance images, paving the way for more advanced, secure, and efficient communication systems in the military sector.
引用
收藏
页码:78589 / 78610
页数:22
相关论文
共 55 条
[1]   Design of a strong S-box based on a matrix approach [J].
Aboytes-Gonzalez, J. A. ;
Murguia, J. S. ;
Mejia-Carlos, M. ;
Gonzalez-Aguilar, H. ;
Ramirez-Torres, M. T. .
NONLINEAR DYNAMICS, 2018, 94 (03) :2003-2012
[2]  
Al Ajrawi S, 2024, SPAT INF RES, V32, P119, DOI 10.1007/s41324-023-00535-z
[3]   Color Image Cryptosystem Based on Sine Chaotic Map, 4D Chen Hyperchaotic Map of Fractional-Order and Hybrid DNA Coding [J].
Alexan, Wassim ;
Gabr, Mohamed ;
Mamdouh, Eyad ;
Elias, Rimon ;
Aboshousha, Amr .
IEEE ACCESS, 2023, 11 :54928-54956
[4]   Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs [J].
Alexan, Wassim ;
Alexan, Nader ;
Gabr, Mohamed .
FRACTAL AND FRACTIONAL, 2023, 7 (04)
[5]   RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System [J].
Alexan, Wassim ;
ElBeltagy, Mohamed ;
Aboshousha, Amr .
SYMMETRY-BASEL, 2022, 14 (03)
[6]   Weighted Reed-Solomon convolutional codes [J].
Alfarano, Gianira N. N. ;
Napp, Diego ;
Neri, Alessandro ;
Requena, Veronica .
LINEAR & MULTILINEAR ALGEBRA, 2024, 72 (05) :841-874
[7]  
Alkotb Mohannad, 2023, 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), P130, DOI 10.23919/SPA59660.2023.10274462
[8]   Intelligent route discovery towards rushing attacks in ad hoc wireless networks [J].
Allimuthu, Udayakumar ;
Mahalakshmi, K. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (02) :921-960
[9]   UAV-Assisted Cooperative Downlink NOMA: Deployment and Resource Allocation [J].
Amhaz, Ali ;
Elhattab, Mohamed ;
Sharafeddine, Sanaa ;
Assi, Chadi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) :13651-13664
[10]  
An J., 2024, IEEE Netw