ASMTP:基于匿名安全信息令牌的协议,辅助无人机群的数据安全

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS International Journal of Network Management Pub Date : 2024-05-10 DOI:10.1002/nem.2271
Kayalvizhi Manikandan, Ramamoorthy Sriramulu
{"title":"ASMTP:基于匿名安全信息令牌的协议,辅助无人机群的数据安全","authors":"Kayalvizhi Manikandan,&nbsp;Ramamoorthy Sriramulu","doi":"10.1002/nem.2271","DOIUrl":null,"url":null,"abstract":"<p>Swarm of Unmanned Aerial Vehicles (UAVs) broaden the field of application in various fields like military surveillance, crop monitoring in agriculture, combat operations, etc. Unfortunately, they are becoming increasingly susceptible to security attacks, such as jamming, information leakage and spoofing, as they become more common and in more demand. So, there is a wider need for UAVs, which requires the design of strong security procedures to fend off such attacks and security dangers. Even though several studies focused on security aspects, many questions remain unanswered, particularly in the areas of secure UAV-to-UAV communication, support for perfect forward secrecy and non-repudiation. In a battle situation, it is extremely important to close these gaps. The security requirements for the UAV communication protocol in a military setting were the focus of this study. In this paper, we present the issues faced by the UAV swarm, especially during military surveillance operations. To secure the communication link in UAV, a new protocol for UAV Swarm communication is proposed with anonymous secure messaging token-based protocol (ASMTP). The proposed protocol secures UAV-to-base station communication and safeguards the metadata of the sender and receiver nodes. The proposed model maintains the confidentiality, integrity and availability of data in the UAV Swarm and achieves robustness. In addition, it provides a different strategy for the cybersecurity gaps in the swarm of UAVs during military surveillance and combat operations.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ASMTP: Anonymous secure messaging token-based protocol assisted data security in swarm of unmanned aerial vehicles\",\"authors\":\"Kayalvizhi Manikandan,&nbsp;Ramamoorthy Sriramulu\",\"doi\":\"10.1002/nem.2271\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Swarm of Unmanned Aerial Vehicles (UAVs) broaden the field of application in various fields like military surveillance, crop monitoring in agriculture, combat operations, etc. Unfortunately, they are becoming increasingly susceptible to security attacks, such as jamming, information leakage and spoofing, as they become more common and in more demand. So, there is a wider need for UAVs, which requires the design of strong security procedures to fend off such attacks and security dangers. Even though several studies focused on security aspects, many questions remain unanswered, particularly in the areas of secure UAV-to-UAV communication, support for perfect forward secrecy and non-repudiation. In a battle situation, it is extremely important to close these gaps. The security requirements for the UAV communication protocol in a military setting were the focus of this study. In this paper, we present the issues faced by the UAV swarm, especially during military surveillance operations. To secure the communication link in UAV, a new protocol for UAV Swarm communication is proposed with anonymous secure messaging token-based protocol (ASMTP). The proposed protocol secures UAV-to-base station communication and safeguards the metadata of the sender and receiver nodes. The proposed model maintains the confidentiality, integrity and availability of data in the UAV Swarm and achieves robustness. In addition, it provides a different strategy for the cybersecurity gaps in the swarm of UAVs during military surveillance and combat operations.</p>\",\"PeriodicalId\":14154,\"journal\":{\"name\":\"International Journal of Network Management\",\"volume\":\"34 6\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2024-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Network Management\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/nem.2271\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.2271","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

成群的无人驾驶飞行器(UAVs)拓宽了军事侦察、农业作物监测、作战行动等各个领域的应用范围。遗憾的是,随着无人飞行器的普及和需求的增加,它们越来越容易受到干扰、信息泄露和欺骗等安全攻击。因此,对无人机的需求更加广泛,这就需要设计强大的安全程序来抵御此类攻击和安全危险。尽管有多项研究侧重于安全方面,但许多问题仍未得到解答,特别是在无人机与无人机之间的安全通信、支持完美的前向保密和不可抵赖性方面。在战斗情况下,弥补这些差距极为重要。军事环境下无人机通信协议的安全要求是本研究的重点。在本文中,我们介绍了无人机群面临的问题,特别是在军事侦察行动中。为了确保无人机通信链路的安全,我们提出了一种基于匿名安全信息令牌协议(ASMTP)的无人机群通信新协议。该协议可确保无人机与基站之间的通信安全,并保护发送方和接收方节点的元数据。所提出的模型可保持无人机群中数据的机密性、完整性和可用性,并实现稳健性。此外,它还为军事侦察和作战行动中无人机群的网络安全缺口提供了一种不同的策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ASMTP: Anonymous secure messaging token-based protocol assisted data security in swarm of unmanned aerial vehicles

Swarm of Unmanned Aerial Vehicles (UAVs) broaden the field of application in various fields like military surveillance, crop monitoring in agriculture, combat operations, etc. Unfortunately, they are becoming increasingly susceptible to security attacks, such as jamming, information leakage and spoofing, as they become more common and in more demand. So, there is a wider need for UAVs, which requires the design of strong security procedures to fend off such attacks and security dangers. Even though several studies focused on security aspects, many questions remain unanswered, particularly in the areas of secure UAV-to-UAV communication, support for perfect forward secrecy and non-repudiation. In a battle situation, it is extremely important to close these gaps. The security requirements for the UAV communication protocol in a military setting were the focus of this study. In this paper, we present the issues faced by the UAV swarm, especially during military surveillance operations. To secure the communication link in UAV, a new protocol for UAV Swarm communication is proposed with anonymous secure messaging token-based protocol (ASMTP). The proposed protocol secures UAV-to-base station communication and safeguards the metadata of the sender and receiver nodes. The proposed model maintains the confidentiality, integrity and availability of data in the UAV Swarm and achieves robustness. In addition, it provides a different strategy for the cybersecurity gaps in the swarm of UAVs during military surveillance and combat operations.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Network Management
International Journal of Network Management COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
5.10
自引率
6.70%
发文量
25
审稿时长
>12 weeks
期刊介绍: Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.
期刊最新文献
Issue Information Security, Privacy, and Trust Management on Decentralized Systems and Networks A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV Construction of Metaphorical Maps of Cyberspace Resources Based on Point-Cluster Feature Generalization Risk-Aware SDN Defense Framework Against Anti-Honeypot Attacks Using Safe Reinforcement Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1