A secure group communication architecture for autonomous unmanned aerial vehicles

This paper investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MATLAB. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the swarm size, swarm mobility, multicast group join and departure rates are varied. The metrics include the total keys distributed over the simulation period, the average number of times an individual UAV must rekey, the average bandwidth used to rekey the swarm, and the average percentage of battery consumed by a UAV to rekey over the simulation period. The proposed security architecture can successfully be applied to a swarm of autonomous UAVs using current technology. The proposed architecture is more efficient and scalable than the other tested and commonly used architectures. Over all the tested configurations, the proposed architecture distributes 55.2–94.8% fewer keys, rekeys 59.0–94.9% less often per UAV, uses 55.2–87.9% less bandwidth to rekey, and reduces the battery consumption by 16.9–85.4%. Published in 2008 by John Wiley & Sons, Ltd.

[1]  Danilo Bruschi,et al.  Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues , 2002, Mob. Networks Appl..

[2]  Michael A. Temple,et al.  Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[3]  Haitham S. Cruickshank,et al.  Networking issues in IP multicast over satellite , 2003, Int. J. Satell. Commun. Netw..

[4]  Haitham S. Cruickshank,et al.  Dynamics of key management in secure satellite multicast , 2004, IEEE Journal on Selected Areas in Communications.

[5]  S. N. Balakrishnan,et al.  Communication Control in Multiple UAV applications , 2006 .

[6]  Radha Poovendran,et al.  Power proximity based key management for secure multicast in ad hoc networks , 2007, Wirel. Networks.

[7]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[8]  Kostas Berberidis,et al.  Low Complexity Turbo Equalization for High Data Rate Wireless Communications , 2006, EURASIP J. Wirel. Commun. Netw..

[9]  David A. Kearney,et al.  Managing power amongst a group of networked embedded fpgas using dynamic reconfiguration and task migration , 2006, Dynamically Reconfigurable Architectures.

[10]  Bobby Bhattacharjee,et al.  Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[11]  Mohammad Umar Siddiqi,et al.  Key Management for Secure Multicast over IPv6 Wireless Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[12]  Dharma P. Agrawal,et al.  Multicast over wireless mobile ad hoc networks: present and future directions , 2003, IEEE Netw..

[13]  Robert F. Mills,et al.  Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements , 2007, IEEE Network.

[14]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[15]  Christopher J. Augeri,et al.  Harvest: A Framework and Co-Simulation Environment for Analyzing Unmanned Aerial Vehicle Swarms , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[16]  Mostafa H. Ammar,et al.  Gothic: a group access control architecture for secure multicast and anycast , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.