Unlock instant, AI-driven research and patent intelligence for your innovation.

Unmanned system swarm credibility certification method based on edge calculation

An edge computing and trusted technology, which is applied in the field of network security, can solve the problems of unmanned equipment accurate traceability, inconvenient maintenance and processing, high delay, etc., and achieve fast and efficient remote trusted certification, improved remote certification efficiency, and powerful computing capabilities Effect

Active Publication Date: 2021-07-02
XIDIAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to address the deficiencies in the above-mentioned prior art, and propose an unmanned system bee swarm trustworthy certification method based on edge computing, which is used to solve the problem of existing remote trusted certification methods in signature transmission and verification. The problems of high delay and poor efficiency, and the inability of existing methods to accurately trace the source of damaged unmanned equipment lead to the inconvenience of subsequent maintenance and handling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unmanned system swarm credibility certification method based on edge calculation
  • Unmanned system swarm credibility certification method based on edge calculation
  • Unmanned system swarm credibility certification method based on edge calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to further illustrate the technical means and functions adopted by the present invention to achieve the intended purpose of the invention, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] Refer to attached figure 1 , an unmanned system bee colony trustworthy certification method based on edge computing proposed by the present invention, specifically implemented according to the following steps:

[0039] Step 1, build a UAV system bee colony trusted proof architecture:

[0040] Build a UAV system bee colony trusted proof architecture based on a three-layer hybrid structure, in which the first layer is the UAV networking layer, the second layer is the edge layer, and the third layer is the cloud; the trusted proof architecture includes four The participants are: the drone group (Prover) in the first layer of drone networking layer, the topology controller (Controller) and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unmanned system swarm credibility certification method based on edge calculation, and mainly solves the technical problems that the existing method is high in delay, poor in efficiency and incapable of accurately tracing. The method comprises the following steps that 1) an unmanned aerial vehicle system swarm credible certification architecture is constructed, and meanwhile, a tree network is generated by an unmanned aerial vehicle swarm; 2) the unmanned aerial vehicle swarm creates an aggregation signature and sends the aggregation signature to an aggregation verifier; 3) the aggregation verifier verifies the aggregation signature, and requests the cloud verifier to perform traceability authentication on the signature which does not pass the verification; 4) the cloud verifier responds to the tracing request, traces by adopting a dichotomy and sends an obtained damaged equipment list to a topology controller; and 5) the topology controller makes a response according to the traceability result. According to the method, the unmanned aerial vehicle system swarm credible certification architecture based on edge computing is constructed, the integrity verification is performed on the network system by using the remote credible certification equipment, whether the unmanned equipment is viciously attacked or not can be detected, and the safety and reliability of the unmanned system are effectively ensured.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an unmanned system bee colony trustworthy certification method based on edge computing. It can be used for unmanned system safety verification and software integrity verification. Background technique [0002] In recent years, due to the advantages of small size, flexibility, and easy deployment, UAVs have gradually been applied in search, rescue, investigation, and military fields. Compared with the application of a single UAV, the UAV fleet can provide more overall load, and through technologies such as cloud resource virtualization, the cluster can integrate group resources and have higher computing power, thus completing more complex and diverse tasks. Therefore, the application of UAV swarms is an important direction for the future development of UAVs. [0003] UAV groups communicate with each other and complete the construction of resource pools through self-orga...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04B7/185H04L9/32H04W4/08H04W12/06
CPCH04B7/18502H04L9/3247H04W4/08
Inventor 孙聪陈娟颖马建峰高玉堃柴金伟王梓宇
Owner XIDIAN UNIV