Unmanned aerial vehicle access control method based on attribute authentication

An access control and drone technology, applied in the field of information security, can solve problems such as the inability of access control methods to adapt, and achieve the effects of flexible and fine-grained access control, ensuring communication security, and realizing anonymous access.

Inactive Publication Date: 2016-04-13
XIDIAN UNIV +1
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the main body of the communication system has many different types, its communication methods, data formats, security requirements, etc. are not the same, a large number of differen...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unmanned aerial vehicle access control method based on attribute authentication
  • Unmanned aerial vehicle access control method based on attribute authentication
  • Unmanned aerial vehicle access control method based on attribute authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention is described in detail below in conjunction with accompanying drawing:

[0039] refer to figure 1, the UAV communication system used in the present invention consists of four parts: UAV, early warning aircraft, satellite and ground station, wherein the UAV is the subject of access control, and uses its own attributes as the basis for accessing satellite data, and its attributes refer to The characteristics that can distinguish drones; the early warning aircraft is the center of the drone fleet, providing attribute authentication functions for drones in its monitoring area, and performing monitoring tasks for satellites; satellites provide data services for drones, The detected data is the object of access control; the ground station is the basis of the entire UAV communication network, providing overall monitoring and control. The relationship between the subjects is as follows: UAVs can communicate through satellites or early warning aircraft; ea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an access control method based on attribute authentication in a multi-UAV scene and mainly solves the problem that the unmanned aerial vehicle (UAV) communication system in a complicated environment cannot be controlled in the existing technology. The technical scheme of the present invention is as follows: firstly, a UAV communication network consisting of four parts: a satellite, an Airborne Early Warning Aircraft (AEW), a UAV and a ground station is initialized; secondly, when the UAV enters a certain aircraft group, the UAV sends registration information and attribute certificates to the AEW in the current aircraft group to complete the attribute authentication; and thirdly, the UAV sends a data access request to a satellite main body in the range of the current aircraft group to complete the authorized access to satellite data. The UAV of the present invention uses its own attributes as the basis for aircraft group join and data access so as to realize the flexible fine-grained access control. When the UAV accesses the satellite data, the UAV only needs to show attribute sets to realize the anonymous access to the satellite data and ensure the communication safety for the UAV system. The method provided by the invention can be used for authentication and access in the multi-UAV scene.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a UAV access control method, which can be used for authentication access in a multi-UAV communication scenario. Background technique [0002] UAVs with autonomous flight capabilities can be used to perform tasks such as aerial photography, surveying, autonomous reconnaissance, and automatic attack. They have a wide range of applications and scientific research value, which also makes them a research hotspot for scientific research institutions in many countries around the world. In the entire UAV autonomous system, the communication system is an important part of the flight control system, which is responsible for the collection and transmission of various flight status information and mission load data, so that the ground monitoring system can monitor the flight status of the UAV. , Complete the flight mission safely and reliably. [0003] On the basis ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04B7/185
CPCH04L63/0442H04B7/18593H04L63/0823
Inventor 马建峰张亚棣孙聪孙召昌李鹏吴奇烜
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products