Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for safe transmission of UAV data

A transmission method and data security technology, applied in the field of digital security transmission, can solve problems such as attacks, difficulties in securing sensitive data, sensor attacks, etc., and achieve the effect of ensuring security and realizing rationality

Active Publication Date: 2022-03-04
北京中超伟业信息安全技术股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to (1) the limited computing power of UAVs is difficult to effectively run the privacy protection method; (2) the data collected by UAVs contains huge value, which attracts criminals to swarm, bringing such as GPS Attacks, communication link attacks and sensor attacks, etc., which pose serious hidden dangers to the privacy and security of UAVs
In addition, since the current data collection mode used by the drone network is mainly three levels: drone-central anonymous server or trusted third party (referred to as server)-data processing platform (referred to as platform), the server and platform, and even communication Whether the link is secure or not will become the bottleneck of UAV network security
However, the communication security guarantee protocol of the 5G network used in UAV data transmission has safety defects such as the transmission of important control signaling in plain text and the parallel operation of multiple protocol instances. In the implementation, there are implicit trust, GUTI (Globally Unique Temporary UE Identity, the world's only temporary UE identity) reuse, authentication results can be identified and other security flaws or vulnerabilities
However, under the limited computing power of drones, it is difficult to ensure that sensitive data, such as data source identity, data attributes, data content, and data structure relationships, will not be intercepted by third parties.
Therefore, it is urgent to solve the problem of safe transmission of UAV data when the communication party and the communication link are untrustworthy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for safe transmission of UAV data
  • A method for safe transmission of UAV data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] The purpose of the present invention is to provide a method for secure transmission of man-machine data, which improves the security of data transmission.

[0050] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0051] figure 1 It is a schematic flow chart of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for safe data transmission of unmanned aerial vehicles, comprising: constructing a UAV network terminal data leakage risk index system; the UAV network terminal data leakage risk index system includes a plurality of first-level risk factors, each first-level risk factor Including multiple second-level risk factors; establish a judgment level for the degree of loss of the perception task; judge the loss of each second-level risk factor through users with different weights according to the judgment level; determine the occurrence probability of a single risk factor for each first-level risk factor ; Determine the risk value of data leakage to the task; preprocess the original data set collected by each UAV to obtain the centralized data set of each UAV; set the differential privacy budget according to the risk value of data leakage to the task; Centralized Datasets and Differential Privacy Budgets for Drones, Determining Desensitized Datasets for Drone Networks. The invention improves the security of data transmission.

Description

technical field [0001] The invention relates to the technical field of digital safe transmission, in particular to a method for safe data transmission of an unmanned aerial vehicle. Background technique [0002] With the popularization of edge computing devices, the rapid development of communication technology and the maturity of satellite positioning systems, the drone industry has entered a stage of rapid development, which brings new ideas to the problem of data collection in complex environments. Due to the advantages of low cost, strong mobility and fast and flexible deployment of UAVs, UAVs have gradually deepened in industrial applications, such as film and television shooting, power inspection, meteorological monitoring, forest fire detection, agricultural monitoring and Drones can be found in fields such as traffic control. However, due to (1) the limited computing power of UAVs is difficult to effectively run privacy protection methods; (2) the data collected by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/142H04L67/12G06F17/16G06F17/18G06K9/62
CPCH04L63/1408H04L63/1416H04L63/20H04L41/142G06F17/16G06F17/18G06F18/2135
Inventor 罗远哲刘瑞景刘志明王军亮薛瑞亭郭振廷荆全振任德旺于猛猛
Owner 北京中超伟业信息安全技术股份有限公司