DOI QR코드

DOI QR Code

Centralized Group Key Management Scheme for Tactical Swarming Drone Networks

전술 군집 드론 네트워크를 위한 중앙집권식 그룹키 관리 기법

  • Lee, Jong-Kwan (Cyber Warfare Research Center, Korea Military Academy) ;
  • Shin, Kyuyong (Cyber Warfare Research Center, Korea Military Academy) ;
  • Kim, Kyung-Min (Cyber Warfare Research Center, Korea Military Academy)
  • 이종관 (육군사관학교 사이버전 연구센터) ;
  • 신규용 (육군사관학교 사이버전 연구센터) ;
  • 김경민 (육군사관학교 사이버전 연구센터)
  • Received : 2018.05.23
  • Accepted : 2018.10.05
  • Published : 2018.12.05

Abstract

Recently, drones have been used in various field to overcome time and space limitations. However, single drone still has a lot of restriction on transportation wight and travel time. Therefore many studies have been conducted to increase the utilization by swarm of drones. Many things should be additionally considered in order to operate swarming drones securely. Especially the group key management is a challenging research topic in tactical domain due to existence of adversary that has anti-drone skill. In this paper, we proposed an efficient group key management scheme for tactical swarming drone networks where an adversary equipped with anti-drone skills exists. The group key can be updated with a small number of message exchange compared to other convenience schemes. The numerical and simulation results demonstrate that the proposed scheme manages the group key efficiently and securely.

Keywords

GSGGBW_2018_v21n6_817_f0001.png 이미지

Fig. 1. Procedure of group key management for a newly arrived node

GSGGBW_2018_v21n6_817_f0002.png 이미지

Fig. 2. Procedure of group key management for a leaving node

GSGGBW_2018_v21n6_817_f0003.png 이미지

Fig. 3. Average number of message exchanges per frame with different λ1 and λ2

GSGGBW_2018_v21n6_817_f0004.png 이미지

Fig. 4. Average number of message exchanges per frame with different TH

Table 1. Notation

GSGGBW_2018_v21n6_817_t0001.png 이미지

Table 2. Number of message exchange

GSGGBW_2018_v21n6_817_t0002.png 이미지

References

  1. Q. Cui, P. Liu, J. Wang and J. Yu, "Brief Analysis of Drone Swarms Communication," 2017 IEEE International Conference on Unmanned Systems(ICUS), Beijing, pp. 463-466, 2017.
  2. X. Shi, C. Yang, W. Xie, C. Liang, Z. Shi and J. Chen, "Anti-Drone System with Multiple Surveillance Technologies: Architecture, Implementation, and Challenges," in IEEE Communications Magazine, Vol. 56, No. 4, pp. 68-74, APRIL 2018.
  3. N. Renugadevi, G. Swaminathan and A. S. Kumar, "Key Management Schemes for Secure Group Communication in Wireless Networks - A Survey," 2014 International Conference on Contemporary Computing and Informatics(IC3I), Mysore, pp. 446- 450, 2014.
  4. B. Jiang and X. Hu, "A Survey of Group Key Management," 2008 International Conference on Computer Science and Software Engineering, Wuhan, Hubei, pp. 994-1002, 2008.
  5. Zheng, X. L., Huang, C. T., Matthews, M., "Chinese Remainder Theorem based Group Key Management," Association for Computing Machinery Proc. 45th Annual Southeast Regional Conf.(ACMSE-07), Winston-Salem, North Carolina, USA, pp. 266-271, 2007.
  6. Zhou, J., Ou, Y.-H., “Key Tree and Chinese Remainder Theorem based Group Key Distribution Scheme,” J. Chin. Inst. Eng., Vol. 32, No. 7, pp. 967-974, 2009. https://doi.org/10.1080/02533839.2009.9671584
  7. C. Li, Y. Li, Z. Tian, S. L. Weekes and K. Pahlavan, "Design and Performance Evaluation of a Localization System to Locate Unwanted Drones by using Wireless Signals," 2018 IEEE International Conference on Consumer Electronics(ICCE), Las Vegas, NV, pp. 1-6, 2018.
  8. Y. Zhang, N. Meratnia and P. Havinga, “Outlier Detection Techniques for Wireless Sensor Networks: A Survey,” in IEEE Communications Surveys & Tutorials, Vol. 12, No. 2, pp. 159-170, Second Quarter 2010. https://doi.org/10.1109/SURV.2010.021510.00088