A Secure Group Communication Architecture for a Swarm of Autonomous Unmanned Aerial Vehicles

Abstract : This thesis investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MatLab. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the swarm size, swarm mobility, multicast group join and departure rates are varied. The metrics include the total keys distributed over the simulation period, the average number of times an individual UAV must rekey, the average bandwidth used to rekey the swarm, and the average percentage of battery consumed by a UAV to rekey over the simulation period. The proposed security architecture can successfully be applied to a swarm of autonomous UAVs using current technology. The proposed architecture is more efficient and scalable than the other tested and commonly-used architectures. Over all the tested configurations, the proposed architecture distributes 55.2 - 94.8% fewer keys, rekeys 59.0 - 94.9% less often per UAV, uses 55.2 - 87.9% less bandwidth to rekey, and reduces the battery consumption by 16.9 - 85.4%.

[1]  Bobby Bhattacharjee,et al.  Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[2]  Gustav Julio Jordt Evaluation of Energy Costs and Error Performance of Range-Aware, Anchor-Free Localization Algorithms for Wireless Sensor Networks , 2012 .

[3]  Michael A. Brown,et al.  Evaluation of autonomy in recent ground vehicles using the autonomy levels for unmanned systems (ALFUS) framework , 2007, PerMIS.

[4]  Andrew Adams,et al.  Protocol Independent Multicast - Dense Mode (PIM-DM): Protocol Specification (Revised) , 2005, RFC.

[5]  Michael A. Temple,et al.  Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[6]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[7]  Robert F. Mills,et al.  Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements , 2006, IEEE Communications Magazine.

[8]  Danilo Bruschi,et al.  Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues , 2002, Mob. Networks Appl..

[9]  Robert Nesbit,et al.  Defense Science Board Study on Unmanned Aerial Vehicles and Uninhabited Combat Aerial Vehicles , 2004 .

[10]  Vaduvur Bharghavan,et al.  MCEDAR: multicast core-extraction distributed ad hoc routing , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[11]  Keith W. Ross,et al.  Computer networking - a top-down approach featuring the internet , 2000 .

[12]  Robert F. Mills,et al.  Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements , 2007, IEEE Network.

[13]  Daniel Thalmann,et al.  Autonomy , 2005, SIGGRAPH Courses.

[14]  Richard E. Hayes,et al.  Power to the Edge: Command, Control in the Information Age , 2003 .

[15]  Peter S. Kruus,et al.  A Survey of Multicast Security Issues and Architectures , 1998 .

[16]  Mohammad Umar Siddiqi,et al.  Key Management for Secure Multicast over IPv6 Wireless Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[17]  M.A. Temple,et al.  Adaptation, modeling, and analysis of PIM-DM in a LEO satellite network environment , 2006, 2006 IEEE Aerospace Conference.

[18]  N. F. Mir A survey of data multicast techniques, architectures, and algorithms , 2001 .

[19]  Y. C. Tay,et al.  Ad hoc Multicast Routing protocol utilizing Increasing id-numberS (AMRIS) Functional Specification , 1999 .

[20]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[21]  Office Of The Secretary Of Defense (OSD) , 2022 .

[22]  Lusheng Ji,et al.  Differential destination multicast-a MANET multicast routing protocol for small groups , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[23]  Mostafa H. Ammar,et al.  Gothic: a group access control architecture for secure multicast and anycast , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[24]  Radha Poovendran,et al.  Power proximity based key management for secure multicast in ad hoc networks , 2007, Wirel. Networks.

[25]  Dharma P. Agrawal,et al.  Multicast over wireless mobile ad hoc networks: present and future directions , 2003, IEEE Netw..

[26]  Anthony McAuley,et al.  AMRoute: Adhoc Multicast Routing Protocol , 1999 .

[27]  Robert E. Levin,et al.  The Global Information Grid and Challenges Facing Its Implementation , 2004 .

[28]  Naonobu Okazaki,et al.  A proposal and its evaluations of a re-keying system for dynamic secure group communications , 2006 .

[29]  Sung-Ju Lee,et al.  On-Demand Multicast Routing Protocol (ODMRP) for Ad-Hoc Networks , 2002 .

[30]  Biswanath Mukherjee,et al.  Multicast routing algorithms and protocols: a tutorial , 2000, IEEE Netw..

[31]  J. J. Garcia-Luna-Aceves,et al.  The core-assisted mesh protocol , 1999, IEEE J. Sel. Areas Commun..

[32]  John Moy,et al.  Multicast Extensions to OSPF , 1994, RFC.

[33]  Upkar Varshney,et al.  Multicast over wireless networks , 2002, CACM.

[34]  Charles E. Perkins,et al.  Multicast Ad hoc On-Demand Distance Vector (MAODV) Routing , 2000 .

[35]  Haitham S. Cruickshank,et al.  Networking issues in IP multicast over satellite , 2003, Int. J. Satell. Commun. Netw..

[36]  Mostafa Ammar,et al.  Security issues and solutions in multicast content distribution: a survey , 2003 .

[37]  U. S. Air Force The U.S. Air Force Remotely Piloted Aircraft and Unmanned Aerial Vehicle Strategic Vision , 2005 .

[38]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[39]  David A. Kearney,et al.  Managing power amongst a group of networked embedded fpgas using dynamic reconfiguration and task migration , 2006, Dynamically Reconfigurable Architectures.

[40]  Haitham S. Cruickshank,et al.  Dynamics of key management in secure satellite multicast , 2004, IEEE Journal on Selected Areas in Communications.

[41]  S. N. Balakrishnan,et al.  Communication Control in Multiple UAV applications , 2006 .