Efficient and Secured Swarm Pattern Multi-UAV Communication

被引:47
作者
Raja, Gunasekaran [1 ]
Anbalagan, Sudha [2 ]
Ganapathisubramaniyan, Aishwarya [3 ]
Selvakumar, Madhumitha Sri [1 ]
Bashir, Ali Kashif [4 ]
Mumtaz, Shahid [5 ]
机构
[1] Anna Univ, Dept Comp Technol, NGNLab, Chennai 600025, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai 632014, Tamil Nadu, India
[3] Citicorp Serv India Private Ltd, Foreign Exchange & Local Markets Grp, Chennai 600113, Tamil Nadu, India
[4] Math Manchester Metropolitan Univ, Dept Comp, Manchester MH15 6BH, Lancs, England
[5] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
关键词
Drones; Global Positioning System; Security; Mathematical model; Encryption; Authentication; Vehicle dynamics; Unmanned Aerial Vehicle; Swarm Optimization; Wireless Mesh Networks; A* Search; Blowfish; Advanced Encryption Standard; KEY AGREEMENT SCHEME; USER AUTHENTICATION; NETWORKS; INTERNET;
D O I
10.1109/TVT.2021.3082308
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned Aerial Vehicle (UAV) or drone, is an evolving technology in today's market with an enormous number of applications. Mini UAVs are developed in order to compensate the performance constraints imposed by larger UAVs during emergency situations. Multiple mini autonomous UAVs require communication and coordination for ubiquitous coverage and relaying during deployment. Multi-UAV coordination or swarm optimization is required for reliable connectivity among UAVs, due to its high mobility and dynamic topology. In this paper, a Secured UAV (S-UAV) model is proposed which takes the location of the UAVs as inputs to form a Wireless Mesh Network (WMN) among multiple drones with the help of a centralized controller. After WMN formation, efficient communication takes place using A* search, an intelligent algorithm that finds the shortest communication path among UAVs. Further, the S-UAV model utilizes cryptographic techniques such as Advanced Encryption Standard (AES) and Blowfish to overcome the security attacks efficiently. Simulation results show that the S-UAV model offers higher throughput, reduced power consumption and guaranteed message transmission with reduced encryption and decryption time.
引用
收藏
页码:7050 / 7058
页数:9
相关论文
共 30 条
[1]   Generalized PVO-based dynamic block reversible data hiding for secure transmission using firefly algorithm [J].
Abbasi, Rashid ;
Qureshi, Nawab Muhammad Faseeh ;
Hassan, Haseeb ;
Saba, Tanzila ;
Rehman, Amjad ;
Luo, Bin ;
Bashir, Ali Kashif .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[2]  
[Anonymous], 2018, 2018 INT C ADV BIG D
[3]   A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE [J].
Arul, Rajakumar ;
Raja, Gunasekaran ;
Bashir, Ali Kashif ;
Chaudry, Junaid ;
Ali, Amjad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2677-2689
[4]   QoS-Aware Frequency-Based 4G+Relative Authentication Model for Next Generation LTE and Its Dependent Public Safety Networks [J].
Baskaran, Sheeba Backia Mary ;
Raja, Gunasekaran ;
Bashir, Ali Kashif ;
Murata, Masayuki .
IEEE ACCESS, 2017, 5 :21977-21991
[5]  
Boychev I.Z., 2018, 2018 IEEE 27 INT SCI, P1
[6]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[7]   Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption [J].
Cheon, Jung Hee ;
Han, Kyoohyung ;
Hong, Seong-Min ;
Kim, Hyoun Jin ;
Kim, Junsoo ;
Kim, Suseong ;
Seo, Hosung ;
Shim, Hyungbo ;
Song, Yongsoo .
IEEE ACCESS, 2018, 6 :24325-24339
[8]  
Cui QN, 2017, PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON UNMANNED SYSTEMS (ICUS), P463, DOI 10.1109/ICUS.2017.8278390
[9]  
Diamantoulakis P.D., 2017, P GLOBECOM 2017 IEEE, P1
[10]   Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint [J].
Hayat, Samira ;
Yanmaz, Evsen ;
Muzaffar, Raheeb .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (04) :2624-2661