Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method for unmanned aerial vehicle group and unmanned aerial vehicle group

A security certification and drone technology, applied in the field of drone swarms, can solve security issues and other issues, and achieve the effect of ensuring security

Active Publication Date: 2021-07-09
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of this application is to provide a security authentication method for drone swarms and drone swarms to solve security problems in the prior art during the execution of tasks by drone swarms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method for unmanned aerial vehicle group and unmanned aerial vehicle group
  • Security authentication method for unmanned aerial vehicle group and unmanned aerial vehicle group
  • Security authentication method for unmanned aerial vehicle group and unmanned aerial vehicle group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be described in detail below in conjunction with various embodiments shown in the drawings. However, these embodiments do not limit the present invention, and structural, method, or functional changes made by those skilled in the art according to these embodiments are included in the protection scope of the present invention.

[0046] Before introducing the security authentication method of the UAV swarm in this application, the system model of the UAV swarm to which this method can be applied is firstly introduced.

[0047] After the UAV group takes off from the ground station, it may be disconnected from the ground station. At this time, the UAV is divided into several small mission units, and each mission unit has a UAV that will be used as the leader. The aircraft collects information sent by the following member aircraft, distributes new information, conducts command and information collection, and acts as a mobile ground station. The ci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method for an unmanned aerial vehicle group and the unmanned aerial vehicle group, which are used for solving the security problem when unmanned aerial vehicles execute tasks. The security authentication method comprises the following steps that a leader machine encrypts a determination label and distributes an encrypted data packet to a relay node machine; the relay node machine decrypts the encrypted data packet, generates a first random tag based on the obtained determination tag, and transmits the first random tag back to the leader machine according to a first set period for security authentication; and the member machine decrypts the encrypted data packet forwarded by the relay node machine, generates a second random tag based on the obtained determination tag, and transmits the second random tag back to the relay node machine according to a second set period for security authentication.

Description

technical field [0001] The invention belongs to the technical field of network communication, and in particular relates to a safety authentication method for an unmanned aerial vehicle swarm and an unmanned aerial vehicle swarm applying the safety authentication method. Background technique [0002] The use of UAV swarms in the military field has become more and more extensive, and the demand is becoming more and more urgent. However, in this information age, the safety of UAVs in the process of performing missions is still a problem that needs to be solved. , not only the database security of drones needs to be protected, but also the security of data during wireless transmission needs to be protected. Contents of the invention [0003] The purpose of the present application is to provide a safety authentication method for a UAV swarm and the UAV swarm, so as to solve the security problem in the prior art during the mission execution of the UAV swarm. [0004] According ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/03H04W12/06H04L9/18
CPCH04W12/06H04L9/065
Inventor 胡峰陈兵钱红燕刘亮君
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS