CLC number: TN92
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2018-03-15
Cited: 0
Clicked: 7213
Xin Yuan, Zhi-yong Feng, Wen-jun Xu, Zhi-qing Wei, Ren-ping Liu. Secure connectivity analysis in unmanned aerial vehicle networks[J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19(3): 409-422.
@article{title="Secure connectivity analysis in unmanned aerial vehicle networks",
author="Xin Yuan, Zhi-yong Feng, Wen-jun Xu, Zhi-qing Wei, Ren-ping Liu",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="19",
number="3",
pages="409-422",
year="2018",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1700032"
}
%0 Journal Article
%T Secure connectivity analysis in unmanned aerial vehicle networks
%A Xin Yuan
%A Zhi-yong Feng
%A Wen-jun Xu
%A Zhi-qing Wei
%A Ren-ping Liu
%J Frontiers of Information Technology & Electronic Engineering
%V 19
%N 3
%P 409-422
%@ 2095-9184
%D 2018
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1700032
TY - JOUR
T1 - Secure connectivity analysis in unmanned aerial vehicle networks
A1 - Xin Yuan
A1 - Zhi-yong Feng
A1 - Wen-jun Xu
A1 - Zhi-qing Wei
A1 - Ren-ping Liu
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 19
IS - 3
SP - 409
EP - 422
%@ 2095-9184
Y1 - 2018
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1700032
Abstract: The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and threats. In this study, we propose a novel trust model for UAVNs that is based on the behavior and mobility pattern of UAV nodes and the characteristics of inter-UAV channels. The proposed trust model consists of four parts:direct trust section, indirect trust section, integrated trust section, and trust update section. Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when there is both a physical link and a trust link between two UAVs. Moreover, the metrics of both the physical connectivity probability and the secure connectivity probability between two UAVs are adopted to analyze the connectivity of UAVNs. We derive accurate and analytical expressions of both the physical connectivity probability and the secure connectivity probability
using stochastic geometry with or without doppler shift. Extensive simulations show that compared with the physical connection probability with or without malicious attacks, the proposed trust model can guarantee secure communication and reliable connectivity between UAVs and enhance network performance when UAVNs face malicious attacks and other security risks.
[1]Andre T, Hummel K, Schoellig A, et al., 2014. Application-driven design of aerial communication networks. IEEE Commun Mag, 52(5):129-137.
[2]Bekmezci I, Sahingoz OK, Temel S, 2013. Flying ad-hoc networks (FANETs):a survey. Ad Hoc Netw, 11(3):1254-1270.
[3]Elnahrawy E, Nath B, 2003. Cleaning and querying noisy sensors. Proc 2nd ACM Int Conf on Wireless Sensor Networks and Applications, p.78-87.
[4]Govindan K, Mohapatra P, 2012. Trust computations and trust dynamics in mobile ad hoc networks:a survey. IEEE Commun Surv Tutor, 14(2):279-298.
[5]Gradshteyn IS, Ryzhik IM, 2000. Tables of Integrals, Series, and Products. Academic Press, USA.
[6]Gupta L, Jain R, Vaszkun G, 2015. Survey of important issues in UAV communication networks. IEEE Commun Surv Tutor, 18(2):1123-1152.
[7]Han GJ, Jiang JF, Shu L, et al., 2014. Managements and applications of trust in wireless sensor networks:a survey. J Comput Syst Sci, 80(3):602-617.
[8]Han GJ, Jiang JF, Shu L, et al., 2015. An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans Mob Comput, 14(12):2447-2459.
[9]Hayat S, Yanmaz E, Muzaffar R, 2016. Survey on unmanned aerial vehicle networks for civil applications:a communications viewpoint. IEEE Commun Surv Tutor, 18(4):2624-2661.
[10]Janaswamy R, 2002. Angle of arrival statistics for a 3-D spheroid model. IEEE Trans Veh Technol, 51(5):1242-1247.
[11]Jiang JF, Han GJ, Wang F, et al., 2015. An efficient distributed trust model for wireless sensor networks. IEEE Trans Parall Distr Syst, 26(5):1228-1237.
[12]Jøsang A, 1999. An algebra for assessing trust in certification chains. Proc Network and Distributed Systems Security Symposium, p.1-10.
[13]Kandeepan S, Gomez K, Reynaud L, et al., 2014. Aerial-terrestrial communications:terrestrial cooperation and energy-efficient transmissions to aerial base stations. IEEE Trans Aerosp Electron Syst, 50(4):2715-2735.
[14]Li H, Yang B, Chen CL, et al., 2010. Connectivity of aeronautical ad hoc networks. IEEE GLOBECOM Workshops, p.1788-1792.
[15]Lim HS, Moon YS, Bertino E, 2010. Provenance based trustworthiness assessment in sensor networks. Proc 7th Int Workshop on Data Management for Sensor Networks, p.2-7.
[16]Movahedi Z, Hosseini Z, Bayan F, et al., 2016. Trust-distortion resistant trust management frameworks on mobile ad hoc networks:a survey. IEEE Commun Surv Tutor, 18(2):1287-1309.
[17]Salmanian M, Mason PC, Treurniet J, et al., 2010. A modular security architecture for managing security associations in MANETs. IEEE 7th Int Conf on Mobile Ad-hoc and Sensor Systems, p.525-530.
[18]Simon MK, Alouini MS, 2000. Digital Communication over Fading Channels. John Wiley& Sons, New York, USA.
[19]Vazifehdan J, Prasad RV, Niemegeers I, 2014. Energy-efficient reliable routing considering residual energy in wireless ad hoc networks. IEEE Trans Mob Comput, 13(2):434-447.
[20]Wan Y, Namuduri K, Zhou Y, et al., 2013. A smooth-turn mobility model for airborne networks. IEEE Trans Veh Technol, 62(7):3359-3370.
[21]Wang K, Wu M, 2007. A trust approach for node cooperation in MANET. Proc 3rd Int Conf on Mobile Ad-hoc and Sensor Networks, p.481-491.
[22]Wei ZX, Tang H, Yu FR, et al., 2014. Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans Veh Technol, 63(9):4647-4658.
[23]Xia H, Jia ZP, Sha EHM, 2014. Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inform Secur, 8(2):88-103.
[24]Xie JF, Wan Y, Kim JH, et al., 2014. A survey and analysis of mobility models for airborne networks. IEEE Commun Surv Tutor, 16(3):1221-1238.
Open peer comments: Debate/Discuss/Question/Opinion
<1>