| With the rapid development of frontier technologies such as artificial intelligence and unmanned aerial vehicle remote sensing,as well as the increasing demand for collaborative operations of multiple unmanned aerial vehicles in special scenarios,the concept of unmanned aerial vehicle cluster network has been introduced.In the traditional unmanned aerial vehicle communication mode,each unmanned aerial vehicle needs to use the ground control station to communicate,while in the cluster networking communication mode,each unmanned aerial vehicle node can be independently organized and managed,and can be formed into a dynamic network.Therefore,the cluster networking communication mode of unmanned aerial vehicle cluster network has the advantages of autonomy,dynamics and flexibility.Unmanned aerial vehicle cluster network confronts such problems as easy forgery of entity identity and information,poor key management and computing efficiency.In a specific scenario,the control center needs to send requests to multiple unmanned aerial vehicles in real time,and multiple unmanned aerial vehicles in the formation also need to feed back real-time information to the control center.In addition,malicious entities may pose an immeasurable threat to the viability of the fleet through attacks such as forging requests.Therefore,strict entity identity authentication mechanism should be adopted in unmanned aerial vehicle cluster network,while reducing the communication overhead and computing cost among the aircraft clusters.In order to ensure the safe interaction in unmanned aerial vehicle cluster network,the main work of this paper is as follows:(1)Aiming at the authenticity of the control center,reconnaissance unmanned aerial vehicle and the aggregator,this paper proposes an identity-based aggregate authentication scheme(AAS).The control center needs to perform mutual authentication with unmanned aerial vehicles in the cluster,the authentication request sent by the control center can be verified by the aggregator,and then the aggregator broadcasts the authentication request to the reconnaissance unmanned aerial vehicles in the same cluster,the responses from the reconnaissance unmanned aerial vehicles can be verified in batch and aggregated by the aggregator before being sent to the control center.Security analysis shows that the proposed scheme can ensure the unforgeability of information transmitted between all entities and meet the security requirements in unmanned aerial vehicle cluster network.The performance analysis shows that the scheme has good practicability.(2)Aiming at the problems that malicious key generation center may launch impersonate attacks,and key management and resource constraints in unmanned aerial vehicle cluster network,this paper proposes a certificateless aggregate authentication scheme(CLAS).The proposed scheme adopts certificateless signature technology to realize the function of mutual authentication between the control center and unmanned aerial vehicles.Security analysis shows that the proposed scheme can not only ensure that the authentication request sent by the control center,the request forwarded by the aggregator,the response of the reconnaissance unmanned aerial vehicles and the aggregate response generated by the aggregator can not be forged,but also can resist the malicious key generation center.The performance analysis shows that the scheme has good practicability. |