Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain

被引:83
作者
Garcia-Magarino, Ivan [1 ,2 ]
Lacuest, Raquel [1 ,2 ]
Rajarajan, Muttukrishnan [3 ]
Lloret, Jaime [4 ]
机构
[1] Univ Zaragoza, Dept Comp Sci & Engn Syst, Escuela Univ Politecn Teruel, C Atarazana 2, Teruel 44003, Spain
[2] Univ Zaragoza, Inst Invest Sanitaria Aragon, Zaragoza, Spain
[3] City Univ London, Sch Math Comp Sci & Engn, London, ON EC1V 0HB, Canada
[4] Univ Politecn Valencia, Integrated Management Coastal Res Inst, E-46022 Valencia 46022, Spain
关键词
Agent-based simulator; Blockchain; Multi-agent system; Security; Surveillance; Unmanned aerial vehicle;
D O I
10.1016/j.adhoc.2018.11.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructure. However, UAV networks raise security challenges because of its dynamic topology. This paper proposes a technique for maintaining security in UAV networks in the context of surveillance, by corroborating information about events from different sources. In this way, UAV networks can conform peer-to-peer information inspired by the principles of blockchain, and detect compromised UAVs based on trust policies. The proposed technique uses a secure asymmetric encryption with a pre-shared list of official UAVs. Using this technique, the wrong information can be detected when an official UAV is physically hijacked. The novel agent based simulator ABS-SecurityUAV is used to validate the proposed approach. In our experiments, around 90% of UAVs were able to corroborate information about a person walking in a controlled area, while none of the UAVs corroborated fake information coming from a hijacked UAV. (C) 2018 Published by Elsevier B.V.
引用
收藏
页码:72 / 82
页数:11
相关论文
共 26 条
[1]   Evolving Large Scale UAV Communication System [J].
Agogino, Adrian ;
HolmesParker, Chris ;
Tumer, Kagan .
PROCEEDINGS OF THE FOURTEENTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2012, :1023-1030
[2]  
[Anonymous], 2010, P 2010 ACM S APPL CO, DOI DOI 10.1145/1774088.1774278
[3]  
Babis M, 2012, JT IFIP WIREL MOB, P122, DOI 10.1109/WMNC.2012.6416163
[4]   A blockchain future for internet of things security: a position paper [J].
Banerjee, Mandrita ;
Lee, Junghee ;
Choo, Kim-Kwang Raymond .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (03) :149-160
[5]   A fault-tolerant self-organizing flocking approach for UAV aerial survey [J].
De Benedetti, M. ;
D'Urso, F. ;
Fortino, G. ;
Messina, F. ;
Pappalardo, G. ;
Santoro, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 96 :14-30
[6]   UAVs that fly forever: Uninterrupted structural inspection through automatic UAV replacement [J].
Erdelj, Milan ;
Saif, Osamah ;
Natalizio, Enrico ;
Fantoni, Isabelle .
AD HOC NETWORKS, 2019, 94
[7]   Effect of non-cooperative vehicles on path connectivity in vehicular networks: A theoretical analysis and UAV-based remedy [J].
Fawaz, Wissam .
VEHICULAR COMMUNICATIONS, 2018, 11 :12-19
[8]   ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks [J].
Garcia-Magarino, Ivan ;
Lacuesta, Raquel .
SECURITY AND COMMUNICATION NETWORKS, 2017,
[9]   TABSAOND: A technique for developing agent-based simulation apps and online tools with nondeterministic decisions [J].
Garcia-Magarino, Ivan ;
Palacios-Navarro, Guillermo ;
Lacuesta, Raquel .
SIMULATION MODELLING PRACTICE AND THEORY, 2017, 77 :84-107
[10]   PEABS: A Process for developing Efficient Agent-Based Simulators [J].
Garcia-Magarino, Ivan ;
Gomez-Rodriguez, Alma ;
Gonzalez-Moreno, Juan C. ;
Palacios-Navarro, Guillermo .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2015, 46 :104-112