Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method to enhance the security of UAV manet network

A drone and security technology, which is applied to the public key of secure communication, secure communication device, and key distribution, can solve the problem of high computational complexity, unsuitable for distributed, self-organizing and autonomous drone MANET networks, etc. question

Active Publication Date: 2020-05-12
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Certificateless public key cryptography avoids the shortcomings of key escrow by improving the generation process of user private keys, but because most of the current certificateless key management schemes use bilinear pairing operations, the computational complexity is too large
Therefore, neither the existing certificate-based security schemes and identity-based schemes nor the existing certificate-based schemes are not suitable for distributed, self-organizing and autonomous UAV MANET networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method to enhance the security of UAV manet network
  • A method to enhance the security of UAV manet network
  • A method to enhance the security of UAV manet network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0055] see Figure 1-5 , the present invention provides a kind of technical scheme: a kind of method for enhancing the security of unmanned aerial vehicle MANET network, the specific steps of the method for this kind of enhanced unmanned aerial vehicle MANET network security are as follows:

[0056] S1: Two-way identity authentication between drone nodes: the unique identity of the drone node is ID, (y, b) is the private key of the drone node, where y=r+xH 1 (ID, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of enhancing UVA (Unmanned Aerial Vehicle) MANET network security in the field of wireless communication technology. The method of enhancing UVA MANET network securitycomprises the specific steps as follows: S1, performing bidirectional identity authentication between UVA nodes, to be specific, S1.1, sending an identity authentication request to a UVA node A by aUVA node B, S1.2, responding to the identity authentication request of the UVA node A by the UVA node B, and S1.3, sending the identity authentication request to the UVA node A by the UVA B, and S1.4,responding to the identity authentication request of the UVA node B by the UVA node A; S2, negotiating symmetric master keys; S3, generating a session key; and S4, generating a digital signature, tobe specific, signing a message M and then sending the message signature sigma and the message M to the UVA node B by the UVA node A, and verifying the correctness of the signature by the node B. By adoption of a form of double keys, a key trusteeship problem and possibility of revealing a system private key due to inverse derivation of a malicious node can be well overcome through a negligible calculated amount.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method for enhancing the security of an unmanned aerial vehicle MANET network. Background technique [0002] In recent years, the method of cooperative operation between UAVs through networking has received widespread attention. Its fields of application include: [0003] Wireless networking: One application of drone networking is to access the Internet. In February 2016, Internet giant Google (Google) planned to launch the UAV aerial networking project - SkyBender. The project aims to use solar drone networking as an Internet access platform. FACEBOOK acquired Ascenta Aerospace, using the company's drones to provide Internet access to developing countries through aerial networking. [0004] Joint search and rescue: Search and rescue are all time-sensitive tasks that need to cover a wide target area in a short period of time. The efficiency of a single drone ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08H04B7/185
CPCH04B7/18506H04L9/0838H04L9/0861H04L9/3066H04L9/3247H04L63/08
Inventor 程志强马建峰杨超刘晨光
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products