Unlock instant, AI-driven research and patent intelligence for your innovation.

Trustworthy Proof Method for Unmanned System Bee Colony Based on Edge Computing

An edge computing and trusted technology, applied in the field of network security, can solve problems such as high delay, inability to accurately trace the source of unmanned equipment, and inconvenient maintenance and processing, and achieve powerful computing capabilities, fast and efficient remote trusted certification, and remote certification efficiency Enhanced effect

Active Publication Date: 2022-03-04
XIDIAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to address the deficiencies in the above-mentioned prior art, and propose an unmanned system bee swarm trustworthy certification method based on edge computing, which is used to solve the problem of existing remote trusted certification methods in signature transmission and verification. The problems of high delay and poor efficiency, and the inability of existing methods to accurately trace the source of damaged unmanned equipment lead to the inconvenience of subsequent maintenance and handling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trustworthy Proof Method for Unmanned System Bee Colony Based on Edge Computing
  • Trustworthy Proof Method for Unmanned System Bee Colony Based on Edge Computing
  • Trustworthy Proof Method for Unmanned System Bee Colony Based on Edge Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to further illustrate the technical means and functions adopted by the present invention to achieve the intended purpose of the invention, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] Refer to attached figure 1 , an unmanned system bee colony trustworthy certification method based on edge computing proposed by the present invention, specifically implemented according to the following steps:

[0039] Step 1, build a UAV system bee colony trusted proof architecture:

[0040] Build a UAV system bee colony trusted proof architecture based on a three-layer hybrid structure, in which the first layer is the UAV networking layer, the second layer is the edge layer, and the third layer is the cloud; the trusted proof architecture includes four The participants are: the drone group (Prover) in the first layer of drone networking layer, the topology controller (Controller) and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unmanned system bee colony trustworthy certification method based on edge computing, which mainly solves the technical problems of high delay, poor efficiency and inability to accurately trace the source of the existing method. Including: 1) Construct the UAV system bee swarm trusted proof architecture, and at the same time the UAV swarm generates a tree network; 2) The UAV swarm creates an aggregate signature and sends it to the aggregate verifier; 3) The aggregate verifier verifies the aggregate signature, and verifies 4) The cloud verifier responds to the traceability request, uses the dichotomy method to trace the source and sends the obtained list of damaged devices to the topology controller; 5) The topology controller makes a decision based on the traceability result response. The present invention builds a credible certification framework for unmanned aerial vehicle systems based on edge computing, uses remote trusted authentication devices to verify the integrity of the network system, and can detect whether the unmanned equipment has been maliciously attacked, effectively ensuring that unmanned System security and reliability.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an unmanned system bee colony trustworthy certification method based on edge computing. It can be used for unmanned system safety verification and software integrity verification. Background technique [0002] In recent years, due to the advantages of small size, flexibility, and easy deployment, UAVs have gradually been applied in search, rescue, investigation, and military fields. Compared with the application of a single UAV, the UAV fleet can provide more overall load, and through technologies such as cloud resource virtualization, the cluster can integrate group resources and have higher computing power, thus completing more complex and diverse tasks. Therefore, the application of UAV swarms is an important direction for the future development of UAVs. [0003] UAV groups communicate with each other and complete the construction of resource pools through self-orga...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/185H04L9/32H04W4/08H04W12/06
CPCH04B7/18502H04L9/3247H04W4/08
Inventor 孙聪陈娟颖马建峰高玉堃柴金伟王梓宇
Owner XIDIAN UNIV