Font Size: a A A

Research On Communication Security Of UAV Network Based On Key Management

Posted on:2020-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:J Y ShiFull Text:PDF
GTID:2392330572484006Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Unmanned aerial vehicles(UAVs)are widely used in civil rescue,aerial photography,surveying and mapping,as they have the advantages of low cost,high mobility,adaptability to special environment,strong survivability,convenient operation and no risk of casualties.UAVs will play an important role in the future war,and there will be a lot of information exchange and cooperation between UAVs.Once the communication network of UAVs is destroyed by the opponents,the consequences will be unimaginable.Therefore,the research on communication security of UAV network has great significance and value.The communication of UAVs depends on wireless network,so it is very easy to receive eavesdropping and network attack.Traditional network security mechanism is not suitable for UAV network because of its complexity,network structure,computational overhead,security and other reasons.From many aspects,Key management is an ideal choice.This paper studies several key distribution schemes and secret key agreement protocols,analyzes their advantages and disadvantages.The main work of this paper are as follows:(1)This paper summarizes the common key distribution schemes in wireless networks,introduces the basic situation of the common schemes,points out their advantages and disadvantages,applicable scenarios and typical applications,compares the performance of the existing schemes in detail,makes a comparative analysis of the existing key distribution schemes and protocols,and describes and analyses the relevant theories and schemes from a mathematical point of view.The concepts of computational security and information theory security are introduced,and the advantages of the scheme based on information theory security are analyzed.(2)In order to study the communication security protocol of nodes,the key management scheme based on threshold security is deeply studied.On the basis of Blom’s scheme,a key pre-distribution scheme for UAV network based on grouping idea is proposed.This scheme improves the key distribution rate and reduces the communication overhead of the network.In this paper,the security and feasibility of the scheme are proved,and the simulation results are given.(3)According to the network topology characteristics of UAVs,the group key management scheme is studied.In order to reduce the re-sending requests of messages,the self-healing group key management schemes are mainly studied.This paper introduces the work foundation of predecessors in detail,points out the shortcomings of some of the researches in security,and presents an improved key management scheme to meet the security requirements.The performance analysis of the scheme is carried out,and the security proof of the scheme is given in the end.Compared with other schemes about storage overhead and computing overhead are also proposed.(4)Considering the development of science and technology,we further studies on the key agreement protocols based on information theory security.The key agreement theory of disturbing channel is mainly studied.The algorithms of common information coordination protocols are introduced.This paper also analyzes the advantages and disadvantages.This paper focuses on the Winnow algorithm,and based on the previous work,an improved Winnow protocol with adaptive block size is proposed.This paper also proves the new protocol can effectively improve the correction efficiency by the simulation experiments and performance analysis in the end.
Keywords/Search Tags:UAV network, Key management, Threshold security, Self-Healing, In formation coordination protocol
PDF Full Text Request
Related items