Browse > Article
http://dx.doi.org/10.9766/KIMST.2018.21.6.817

Centralized Group Key Management Scheme for Tactical Swarming Drone Networks  

Lee, Jong-Kwan (Cyber Warfare Research Center, Korea Military Academy)
Shin, Kyuyong (Cyber Warfare Research Center, Korea Military Academy)
Kim, Kyung-Min (Cyber Warfare Research Center, Korea Military Academy)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.21, no.6, 2018 , pp. 817-825 More about this Journal
Abstract
Recently, drones have been used in various field to overcome time and space limitations. However, single drone still has a lot of restriction on transportation wight and travel time. Therefore many studies have been conducted to increase the utilization by swarm of drones. Many things should be additionally considered in order to operate swarming drones securely. Especially the group key management is a challenging research topic in tactical domain due to existence of adversary that has anti-drone skill. In this paper, we proposed an efficient group key management scheme for tactical swarming drone networks where an adversary equipped with anti-drone skills exists. The group key can be updated with a small number of message exchange compared to other convenience schemes. The numerical and simulation results demonstrate that the proposed scheme manages the group key efficiently and securely.
Keywords
Tactical Swarming Drone; Group Key Management; Centralized Scheme; Dynamic Networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Q. Cui, P. Liu, J. Wang and J. Yu, "Brief Analysis of Drone Swarms Communication," 2017 IEEE International Conference on Unmanned Systems(ICUS), Beijing, pp. 463-466, 2017.
2 X. Shi, C. Yang, W. Xie, C. Liang, Z. Shi and J. Chen, "Anti-Drone System with Multiple Surveillance Technologies: Architecture, Implementation, and Challenges," in IEEE Communications Magazine, Vol. 56, No. 4, pp. 68-74, APRIL 2018.
3 N. Renugadevi, G. Swaminathan and A. S. Kumar, "Key Management Schemes for Secure Group Communication in Wireless Networks - A Survey," 2014 International Conference on Contemporary Computing and Informatics(IC3I), Mysore, pp. 446- 450, 2014.
4 B. Jiang and X. Hu, "A Survey of Group Key Management," 2008 International Conference on Computer Science and Software Engineering, Wuhan, Hubei, pp. 994-1002, 2008.
5 Zheng, X. L., Huang, C. T., Matthews, M., "Chinese Remainder Theorem based Group Key Management," Association for Computing Machinery Proc. 45th Annual Southeast Regional Conf.(ACMSE-07), Winston-Salem, North Carolina, USA, pp. 266-271, 2007.
6 Y. Zhang, N. Meratnia and P. Havinga, “Outlier Detection Techniques for Wireless Sensor Networks: A Survey,” in IEEE Communications Surveys & Tutorials, Vol. 12, No. 2, pp. 159-170, Second Quarter 2010.   DOI
7 Zhou, J., Ou, Y.-H., “Key Tree and Chinese Remainder Theorem based Group Key Distribution Scheme,” J. Chin. Inst. Eng., Vol. 32, No. 7, pp. 967-974, 2009.   DOI
8 C. Li, Y. Li, Z. Tian, S. L. Weekes and K. Pahlavan, "Design and Performance Evaluation of a Localization System to Locate Unwanted Drones by using Wireless Signals," 2018 IEEE International Conference on Consumer Electronics(ICCE), Las Vegas, NV, pp. 1-6, 2018.