Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
- PDF / 1,752,888 Bytes
- 28 Pages / 439.37 x 666.142 pts Page_size
- 87 Downloads / 227 Views
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles Maryam Faraji‑Biregani1 · Reza Fotohi2 Accepted: 14 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Unmanned aerial vehicles (UAVs) can be deployed to monitor very large areas without the need for network infrastructure. UAVs communicate with each other during flight and exchange information with each other. However, such communication poses security challenges due to its dynamic topology. To solve these challenges, the proposed method uses two phases to counter malicious UAV attacks. In the first phase, we applied a number of rules and principles to detect malicious UAVs. In this phase, we try to identify and remove malicious UAVs according to the behavior of UAVs in the network in order to prevent sending fake information to the investigating UAVs. In the second phase, a mobile agent based on a three-step negotiation process is used to eliminate malicious UAVs. In this way, we use mobile agents to inform our normal neighbor UAVs so that they do not listen to the data generated by the malicious UAVs. Therefore, the mobile agent of each UAV uses reliable neighbors through a three-step negotiation process so that they do not listen to the traffic generated by the malicious UAVs. The NS-3 simulator was used to demonstrate the efficiency of the SAUAV method. The proposed method is more efficient than CSTUAS, CS-AVN, HVCR, and BSUM-based methods in detection rate, false positive rate, false negative rate, packet delivery rate, and residual energy. Keywords Unmanned aerial vehicles (UAVs) · Malicious UAVs · Routing security · Three-step negotiation process
* Maryam Faraji‑Biregani [email protected] * Reza Fotohi [email protected]; [email protected] 1
Department of Computer Engineering, Faculty of Engineering, Shahid Ashrafi Esfahani University, Isfahan, Iran
2
Faculty of Computer Science and Engineering, Shahid Beheshti University, G. C. Evin, Tehran 1983969411, Iran
13
Vol.:(0123456789)
M. Faraji‑Biregani, R. Fotohi
1 Introduction Today, UAVs have made significant progress in military and defense areas such as reconnaissance, surveillance, and security missions as well as in civilian areas such as urban planning, search, law enforcement, traffic monitoring, accident management, agricultural assessment, and entertainment. Environmental monitoring photography, infrastructure monitoring, and rescue operations are growing rapidly [1–4]. Because UAVs have security vulnerabilities, hackers exploit this security vulnerability. A UAV that is infiltrated will have a negative performance because it will be controlled by intruders. Also, UAVs, despite their many advantages, have been less studied to solve the security problem, so they can be easily penetrated by enemies. Therefore, with UAV hacking, consequences such as loss of top secret information, damage to infrastructure, and loss of essential missions become apparent. Most intrusions and threats are usually
Data Loading...