Secure Ground Control Station-based Routing Protocol for UAV Networks

被引:13
作者
Agron, Danielle Jaye Segui [1 ]
Ramli, Muhammad Rusyadi [1 ]
Lee, Jae-Min [1 ]
Kim, Dong-Seong [1 ]
机构
[1] Kumoh Natl Inst Technol, Dept IT Convergence Engn, Gumi, South Korea
来源
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE | 2019年
关键词
Unmanned aerial vehicle; flying adhoc network; secure routing protocol; hybrid authentication scheme; ATTACKS;
D O I
10.1109/ictc46691.2019.8939885
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a secured routing protocol between ground control station and an unmanned aerial vehicles network that utilizes the Flying Ad Hoc Network (FANET) technology. It uses a hybrid authentication scheme to ensure the integrity between the communication link that is a combination of the symmetric scheme which encrypts the routing messages with digital signatures and the asymmetric mechanism create a secure connection between aerial vehicles(UAV) and ground control station (GCS), as well as between the UAVs itself. The UAV should register first to join the network. In the registration process, the key distribution center is used to provide the public and private keys to each node that wants to join the network. Furthermore, the TWINE algorithm is used to secure the important message related to routing. The proposed routing protocol uses packet leash mechanism to prevent from wormhole attack. The simulation results show the proposed routing protocol can maintain the network performance in terms of packet delivery ratio and network overhead even when there is an attacker appeared during the communication.
引用
收藏
页码:794 / 798
页数:5
相关论文
共 13 条
[1]  
Butcher N., 2014, Securing the MAVLink Com- munication Protocol for Unmanned Aircraft Systems
[2]   Survey of Important Issues in UAV Communication Networks [J].
Gupta, Lav ;
Jain, Raj ;
Vaszkun, Gabor .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1123-1152
[3]  
Hu YC, 2003, IEEE INFOCOM SER, P1976
[4]   A survey of routing attacks in mobile Ad Hoc networks [J].
Kannhavong, Bounpadith ;
Nakayama, Hidehisa ;
Nemoto, Yoshiaki ;
Kato, Nei ;
Jamalipour, Abbas .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :85-91
[5]  
Lee JCK, 2016, PROF LEARN DEV SCH H, P1, DOI 10.1007/978-3-319-24139-5_1
[6]   Weather noise leading to El Nino diversity in an ocean general circulation model [J].
Lee, Jong-Won ;
Yeh, Sang-Wook ;
Jo, Hyun-Su .
CLIMATE DYNAMICS, 2019, 52 (12) :7235-7247
[7]   A survey on position-based routing protocols for Flying Ad hoc Networks (FANETs) [J].
Oubbati, Omar Sami ;
Lakas, Abderrahmane ;
Zhou, Fen ;
Guenes, Mesut ;
Yagoubi, Mohamed Bachir .
VEHICULAR COMMUNICATIONS, 2017, 10 :29-56
[8]   Positioning of UAVs for Throughput Maximization in Software-Defined Disaster Area UAV Communication Networks [J].
Rahman, Shams Ur ;
Kim, Geon-Hwan ;
Cho, You-Ze ;
Khan, Ajmal .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2018, 20 (05) :452-463
[9]  
Ramadhan M. T., 2019, 2019 KICS WINT C JAN, P1426
[10]   Hybrid MAC Protocol for UAV-Assisted Data Gathering in a Wireless Sensor Network [J].
Ramli, Muhammad Rusyadi ;
Lee, Jae-Min ;
Kim, Dong-Seong .
INTERNET OF THINGS, 2021, 14