Distributed unmanned aerial vehicle cluster network security communication implementation method

A technology of secure communication and cluster network, which is applied in the field of realizing secure communication of distributed drone cluster network, can solve problems such as drone intrusion and interference, inaccurate information transmission, and inability to complete operational tasks, etc., to achieve high mobility , small information flow, prevent the effect of change

Active Publication Date: 2020-11-03
CHONGQING JIAOTONG UNIVERSITY
View PDF11 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In a distributed UAV swarm, in order to ensure the effective execution of operational tasks, it is necessary for the UAV swarm to maintain consistency; however, some UAVs are often vulnerable to hacker intrusion and Interference, inaccurate information transmission, resulting in inability to complete operational tasks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed unmanned aerial vehicle cluster network security communication implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0019] see figure 1 , a method for implementing secure communication in a distributed UAV cluster network. The UAV cluster includes multiple cooperative UAVs that use their own sensors to perceive environmental information and make autonomous decisions. The ground base station sends target tasks to the UAV cluster.

[0020] Each collaborative UAV is equipped with an authentication server, and the authentication server has a built-in user name database of all UAVs in the UAV cluster, which is used to issue identity authentication to the other party’s authentication server during the information transfer process between two UAVs request; the specific authentication mechanism includes the following steps:

[0021] B1. Before the UAV N needs to send information to the UAV M, the UAV N sends an authentication request to the UAV M for identity authentication, and the authentication server of the UAV M queries the UAV N from the user name database. Whether the user is a legal user, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of unmanned aerial vehicle cluster communication, and discloses a distributed unmanned aerial vehicle cluster network security communication implementationmethod, which is small in information flux and high in maneuverability through autonomous decision making of cooperative unmanned aerial vehicles in a dis The cooperative UAVs establish communicationwith other cooperative UAVs after being authenticated by an authentication mechanism, send action tasks or formation aggregation requests to other cooperative UAVs, obtain replies of half or more accepted tasks, approve the action requests, and take the cooperative UAVs which do not participate in decision making and do not accept the action requests as learners, And learning from any cooperativeunmanned aerial vehicle receiving the action request to achieve a consistent task request or formation aggregation request, so that all cooperative unmanned aerial vehicles in the unmanned aerial vehicle cluster perform a target task in a formation manner, the consistency of the unmanned aerial vehicle cluster is ensured, and meanwhile, the secure communication among the unmanned aerial vehiclescan be ensured. Hackers are effectively prevented from invading the unmanned aerial vehicle cluster to change the target task of the unmanned aerial vehicle cluster.

Description

technical field [0001] The invention relates to the technical field of unmanned aerial vehicle cluster communication, in particular to a method for realizing secure communication of a distributed unmanned aerial vehicle cluster network. Background technique [0002] Multi-UAV swarms play an increasingly important role in the civilian field and military strategy, and can complete a variety of tasks including fire monitoring, search and rescue, detection and tracking, and execution of annihilation. Under the condition of informationization, the multi-UAV cluster flight environment presents the characteristics of high dynamics and deep uncertainty. In order to complete the mission goal, it is sometimes necessary to re-form the formation and carry out mission planning. [0003] Each UAV in a distributed UAV cluster has a certain level of autonomy and intelligence, and has independent computing, analysis and decision-making capabilities, and through data sharing, it can enable mu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3236H04L9/3273Y02D30/70
Inventor 董永武邓涛吴瑞徐雨蕾丁茂杰卢月林
Owner CHONGQING JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products