Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things

被引:55
作者
Li, Ting [1 ]
Liu, Wei [2 ]
Wang, Tian [3 ]
Ming, Zhao [1 ]
Li, Xiong [4 ]
Ma, Ming [5 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha, Peoples R China
[2] Hunan Univ Chinese Med, Sch Informat, Changsha, Peoples R China
[3] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen, Peoples R China
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
[5] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
基金
中国国家自然科学基金;
关键词
CODE DISSEMINATION; DUTY CYCLE; ENERGY; AUTHENTICATION; EFFICIENCY; MECHANISM; NETWORKS; SCHEME; DELAY;
D O I
10.1002/ett.3956
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Due to their mobile character, ground vehicles and unmanned aerial vehicles (UAVs) are currently being considered as sensing devices that can collect data in the Internet of Things (IoT). Building and enhancing trust and security environments in data collection processes are fundamental and essential requirements. Here, we proposed a novel scheme named "Trust Data Collections via Vehicles joint with UAVs in the Smart Internet of Things" (T-SIoTs scheme), which targets to establish a trust-based environment for data collections by utilizing both trust vehicles and UAVs. First, to optimize security aspect, data center (DC) selected trust-based vehicles as mobile data collectors via analyzing and digging historical datasets. To promise coverage regions of data collections, several static stations are established, which can be utilized as static data collectors. Second, UAVs are arranged by the DC to collect data stored by both trust-based vehicles and static data collectors. In the T-SIoTs scheme, trajectories of UAVs are designed according to shortest-distance-first routing scheme. Comprehensive theoretical analyses and experiments have been provided to evaluate and support the T-SIoTs scheme. Compared with the previous studies, the T-SIoTs scheme can improve the security ratio by 46.133% to 54.60% approximately. And with the routing scheme, the energy consumptions of UAVs can be reduced by 46.93% approximately.
引用
收藏
页数:24
相关论文
共 50 条
[41]   Reliable Data Collection for Wireless Sensor Networks Using Unmanned Aerial Vehicles [J].
Vladuta, Alexandru-Valentin ;
Bica, Ion ;
Patriciu, Victor-Valeriu ;
Pop, Florin .
GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 :323-337
[42]   Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges [J].
Nyangaresi, Vincent Omollo ;
Ibrahim, Ayad ;
Abduljabbar, Zaid Ameen ;
Hussain, Mohammed Abdulridha ;
Al Sibahee, Mustafa A. ;
Hussien, Zaid Alaa ;
Ghrabat, Mudhafar Jalil Jassim .
INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, :278-283
[43]   Intelligent Trust-Based Utility and Reusability Model: Enhanced Security Using Unmanned Aerial Vehicles on Sensor Nodes [J].
Sahoo, Santosh Kumar ;
Mudligiriyappa, Niranjanamurthy ;
Algethami, Abdullah A. ;
Manoharan, Poongodi ;
Hamdi, Mounir ;
Raahemifar, Kaamran .
APPLIED SCIENCES-BASEL, 2022, 12 (03)
[44]   Routing for unmanned aerial vehicles: Touring dimensional sets [J].
Puerto, Justo ;
Valverde, Carlos .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2022, 298 (01) :118-136
[45]   Threats from and Countermeasures for Unmanned Aerial and Underwater Vehicles [J].
Khawaja, Wahab ;
Semkin, Vasilii ;
Ratyal, Naeem Iqbal ;
Yaqoob, Qasim ;
Gul, Jibran ;
Guvenc, Ismail .
SENSORS, 2022, 22 (10)
[46]   Unmanned aerial vehicles: Applications, techniques, and challenges as aerial base stations [J].
Rolly, Rinju Mariam ;
Malarvezhi, Pandy ;
Lagkas, Thomas D. .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (09)
[47]   Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles [J].
Faraji-Biregani, Maryam ;
Fotohi, Reza .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (05) :5076-5103
[48]   Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles [J].
Shafique, Arslan ;
Mehmood, Abid ;
Elhadef, Mourad .
IEEE ACCESS, 2021, 9 :46927-46948
[49]   On Provision of Resilient Connectivity in Cognitive Unmanned Aerial Vehicles [J].
Ul Hasan, Najam ;
Zghaibeh, Manaf ;
Ejaz, Waleed ;
Shahid, Adnan ;
Anpalagan, Alagan .
2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
[50]   Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles [J].
Nyangaresi, Vincent Omollo .
HIGH-CONFIDENCE COMPUTING, 2023, 3 (04)