|
- 2018
适用于集群无人机的自组网安全分簇算法
|
Abstract:
摘要: 集群无人机自组网的节点数量多、移动速度快,适合采用分簇的网络拓扑结构,而安全的分簇算法是簇结构自组网安全性的重要基础。分析了集群无人机自组网的特点和其对安全分簇算法的需求,提出了一种适用于集群无人机自组网的安全分簇算法,该算法结合使用密码机制和信任机制来保证网络分簇过程中的信息安全并且选出可信度较高的簇首,分析证明了其具有较高的安全性和可行性。
Abstract: Colony UAVs Ad Hoc network has a large number of high speed nodes, and clustered network topology is suitable for use; a secure clustering algorithm is the base of the security of cluster structure Ad Hoc network. The characteristics and requirements for secure clustering algorithm of colony UAVs Ad Hoc network are analyzed. A secure clustering algorithm for colony UAVs Ad Hoc network is proposed. The algorithm combined cryptography and trust mechanisms to guarantee the information safety in the process of network clustering and select a cluster head with higher credibility, it is proved that it has high security and feasibility by analysis
[1] | 刘昕. 军用无人机自组网技术研究[D]. 南京:南京理工大学,2014. LIU Xin. Study of MANET for military UAVs[D]. Nanjing: Nanjing University of Science and Technology, 2014. |
[2] | SINGHAL S, DANIEL A K. Cluster head selection protocol under node degree, competence level and goodness factor for mobile Ad Hoc network usingai technique[C] // International Conference on Advanced Computing & Communication Technologies. IEEE, 2014:415-420. |
[3] | SCHNEIER B. Applied cryptography, secondedition: protocols, algorithms, and source code in C[J]. Government Information Quarterly, 1997, 13(3):336. |
[4] | SIVAGURUNATHAN S, PRATHAPCHANDRAN K. Trust and cluster based authentication schemes in mobile Ad Hoc networks—A review[C] // International Conference on Power Signals Control and Computations. IEEE, 2014:1-5. |
[5] | ZGHURSKYI O, BUNIN S. A survey of clustering protocols for MANET with weighted metric for cluster head selection[C] // Problems of Infocommunications Science and Technology, 2014 First International Scientific-Practical Conference. IEEE, 2014:54-56. |
[6] | BENTALEB A, HAROUS S, BOUBETRA A. A weight based clustering scheme for mobile Ad hoc networks[C] //MoMM '13 Proceedings of International Conference on Advances in Mobile Computing & Multimedia. 2013:161-166. |
[7] | 王东,张广政,穆武第.多无人机协同作战通信自组网技术[J].飞行导弹,2012,22(1):59-63. WANG Dong, ZHANG Guangzheng, MU Wudi. Ad Hoc technology of Multi-UAV collaborative communication [J].Winged Missiles Journal, 2012, 22(1):59-63. |
[8] | 钱权.无线Ad Hoc网络安全[M]. 清华大学出版社,2009:14-20. QIAN Quan. Security of wireless Ad Hoc network[M]. Beijing: Tsinghua University Press, 2009:14-20. |
[9] | KAPUR R K, KHATRI S K. Secure data transfer in MANET using symmetric and asymmetric cryptography[C] // International Conference on Reliability, INFOCOM Technologies and Optimization. IEEE, 2015:1-5. |
[10] | ROY M, CHOWDHURY C, NEOGY S. Developing secured MANET using trust[C] // Fourth International Conference on Advances in Computing and Communications. IEEE, 2014:183-186. |
[11] | 李荣森. 无线Ad Hoc网络安全关键技术研究[D].长沙:国防科学技术大学,2013. LI Rongsen. Reasearch on key technology of wireless Ad Hoc network security[D].Changsha:Nationl University of Defense Technology, 2013. |
[12] | GUILLEMINAULT C, SUZUKI M. Secure routing with an integrated localized key management protocol in MANETs[C] // IEEE, International Conference on Advanced Information NETWORKING and Applications. IEEE Computer Society, 2014:605-612. |