Privacy-Preserving Verification and Root-Cause Tracing towards UAV Social Networks

被引:0
作者
Li, Teng [1 ]
Ma, Jianfeng [1 ]
Pei, Qingqi [2 ]
Ma, Chengyan [1 ]
Wei, Dawei [1 ]
Sun, Cong [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[2] Xidian Univ, Shaanxi Key Lab BlockChain & Secur Computuing, Xian, Shaanxi, Peoples R China
来源
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2019年
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Network Security; Privacy; Verification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned Aerial Vehicles (UAV) have rapidly developed and been widely applied to military and civilian applications in recent years. Anomaly Detections and finding out the root causes are critically important for UAV social network security. In the UAV social networks, the drone can communicate with one another directly in a form of leading flights with followers during a far away mission. The ground controller cannot get their information directly. Besides, none of the works consider the privacy protection and anomaly root cause tracing during the distributed detection. This paper presents a self-verification approach among UAV flights which can check whether the flights have honestly obeyed the orders or suffered the anomalies. Besides, we do the verification without looking through the plain-text records or data of the drones. Finally, to instruct the drones to solve the problems, we trace the fundamental root causes leading to the anomalies by learning the fault tree. We apply our approach on raw UAV social network data and align our experiment with two former works as baselines for comparison. Our approach can reduce the time cost of verification from exponential growth to linear growth and improve the tracing accuracy rate around 43% higher than the former work.
引用
收藏
页数:6
相关论文
共 16 条
[1]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy, Riham ;
Youssef, Amr M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[2]  
[Anonymous], P 10 ACM WORKSH HOT
[3]   Ontology-Based Data Access: A Study through Disjunctive Datalog, CSP, and MMSNP [J].
Bienvenu, Meghyn ;
ten Cate, Balder ;
Lutz, Carsten ;
Wolter, Frank .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 2014, 39 (04)
[4]   Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation [J].
Birnbaum, Zachary ;
Dolgikh, Andrey ;
Skormin, Victor ;
O'Brien, Edward ;
Muller, Daniel ;
Stracquodaine, Christina .
JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS, 2016, 84 (1-4) :107-120
[5]   Integrated method for the UAV navigation sensor anomaly detection [J].
Bu, Jian ;
Sun, Rui ;
Bai, Hongyang ;
Xu, Rui ;
Xie, Fei ;
Zhang, Yucheng ;
Ochieng, Washington Yotto .
IET RADAR SONAR AND NAVIGATION, 2017, 11 (05) :847-853
[6]   Cross-Kernel Control-Flow-Graph Analysis for Event-Driven Real-Time Systems [J].
Dietrich, Christian ;
Hoffmann, Martin ;
Lohmann, Daniel .
ACM SIGPLAN NOTICES, 2015, 50 (05)
[7]   Model-Based and Data-Driven Fault Detection Performance for a Small UAV [J].
Freeman, Paul ;
Pandita, Rohit ;
Srivastava, Nisheeth ;
Balas, Gary J. .
IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2013, 18 (04) :1300-1309
[8]  
Jardine PT, 2015, MED C CONTR AUTOMAT, P740, DOI 10.1109/MED.2015.7158834
[9]  
Khalastchi Eliahu., 2011, The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, AAMAS'11, V1, P115
[10]  
Li T., 2017, WIREL NETW, P1