Edge Intelligence Enabled Soft Decentralized Authentication in UAV Swarm

Huanchi Wang, He Fang, Xianbin Wang
{"title":"Edge Intelligence Enabled Soft Decentralized Authentication in UAV Swarm","authors":"Huanchi Wang, He Fang, Xianbin Wang","doi":"10.1109/iccc52777.2021.9580225","DOIUrl":null,"url":null,"abstract":"With the increased deployment of the Unmanned Aerial Vehicles (UAVs) in both military and civilian fields, the authentication of the UAV surveillance and controlling data becomes critical due to the severe consequences of any forged data. With the highly dynamic operation environment, a flying UAV network may not be supported by the infrastructure network on the ground for security provision. Hence, it is vital to improving network security by utilizing on-site resources within a flying UAV swarm. In this paper, we utilize the physical-layer fingerprints to increase the difficulty for the attackers to impersonate the legitimate UAVs. A decentralized authentication scheme is proposed to avoid the single-point failure at the cluster head (CH) caused by the imperfect estimations. To mitigate the high computational cost of the decentralized authentication and to further improving the authentication accuracy, a situational-aware authentication customization algorithm is proposed at each UAV to compute the reliability of different attributes. Only the UAV with reliable attributes observations will contribute to the decentralized authentication process. Moreover, a soft authentication decision algorithm, which is compatible with customized regression models at each UAV, is proposed to further improve the system robustness. Hence, the proposed authentication algorithm can be customized at the system level and node level to maximize the overall authentication accuracy under a minimal extra computational cost based on the decentralized process. The simulation results demonstrate that our proposed scheme significantly increased the accuracy by comparing to the other state-of-the-art machine learning-aided physical-layer authentication schemes.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccc52777.2021.9580225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

With the increased deployment of the Unmanned Aerial Vehicles (UAVs) in both military and civilian fields, the authentication of the UAV surveillance and controlling data becomes critical due to the severe consequences of any forged data. With the highly dynamic operation environment, a flying UAV network may not be supported by the infrastructure network on the ground for security provision. Hence, it is vital to improving network security by utilizing on-site resources within a flying UAV swarm. In this paper, we utilize the physical-layer fingerprints to increase the difficulty for the attackers to impersonate the legitimate UAVs. A decentralized authentication scheme is proposed to avoid the single-point failure at the cluster head (CH) caused by the imperfect estimations. To mitigate the high computational cost of the decentralized authentication and to further improving the authentication accuracy, a situational-aware authentication customization algorithm is proposed at each UAV to compute the reliability of different attributes. Only the UAV with reliable attributes observations will contribute to the decentralized authentication process. Moreover, a soft authentication decision algorithm, which is compatible with customized regression models at each UAV, is proposed to further improve the system robustness. Hence, the proposed authentication algorithm can be customized at the system level and node level to maximize the overall authentication accuracy under a minimal extra computational cost based on the decentralized process. The simulation results demonstrate that our proposed scheme significantly increased the accuracy by comparing to the other state-of-the-art machine learning-aided physical-layer authentication schemes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于边缘智能的无人机群软去中心化认证
随着无人机在军事和民用领域的日益普及,无人机监控数据的认证变得至关重要,因为任何伪造数据都会造成严重的后果。在高度动态的作战环境下,地面基础设施网络可能不支持飞行中的无人机网络提供安全保障。因此,利用飞行中的无人机群内的现场资源来提高网络安全性至关重要。在本文中,我们利用物理层指纹来增加攻击者假冒合法无人机的难度。为了避免不完全估计导致的簇头单点故障,提出了一种分散的认证方案。为了缓解分散认证计算成本高的问题,进一步提高认证精度,提出了一种态势感知认证自定义算法,在每架无人机上计算不同属性的可靠性。只有具有可靠属性观测值的无人机才有助于分散认证过程。为了进一步提高系统的鲁棒性,提出了一种兼容各无人机自定义回归模型的软认证决策算法。因此,所提出的认证算法可以在系统级和节点级进行定制,在基于去中心化过程的最小额外计算成本下最大化整体认证精度。仿真结果表明,与其他最先进的机器学习辅助物理层认证方案相比,我们提出的方案显着提高了准确性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Group-oriented Handover Authentication Scheme in MEC-Enabled 5G Networks Joint Task Secure Offloading and Resource Allocation for Multi-MEC Server to Improve User QoE Dueling-DDQN Based Virtual Machine Placement Algorithm for Cloud Computing Systems Predictive Beam Tracking with Cooperative Sensing for Vehicle-to-Infrastructure Communications Age-aware Communication Strategy in Federated Learning with Energy Harvesting Devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1