Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles

Unmanned aerial vehicles (UAVs) can be deployed to monitor very large areas without the need for network infrastructure. UAVs communicate with each other during flight and exchange information with each other. However, such communication poses security challenges due to its dynamic topology. To solve these challenges, the proposed method uses two phases to counter malicious UAV attacks. In the first phase, we applied a number of rules and principles to detect malicious UAVs. In this phase, we try to identify and remove malicious UAVs according to the behavior of UAVs in the network in order to prevent sending fake information to the investigating UAVs. In the second phase, a mobile agent based on a three-step negotiation process is used to eliminate malicious UAVs. In this way, we use mobile agents to inform our normal neighbor UAVs so that they do not listen to the data generated by the malicious UAVs. Therefore, the mobile agent of each UAV uses reliable neighbors through a three-step negotiation process so that they do not listen to the traffic generated by the malicious UAVs. The NS-3 simulator was used to demonstrate the efficiency of the SAUAV method. The proposed method is more efficient than CST-UAS, CS-AVN, HVCR, and BSUM-based methods in detection rate, false positive rate, false negative rate, packet delivery rate, and residual energy.

[1]  Yueming Cai,et al.  Secure Communication in NOMA-Assisted Millimeter-Wave SWIPT UAV Networks , 2020, IEEE Internet of Things Journal.

[2]  Bin Zheng,et al.  A robust distance-based relay selection for message dissemination in vehicular network , 2018, Wireless Networks.

[3]  Reza Fotohi,et al.  A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms , 2020, The Journal of Supercomputing.

[4]  Reza Fotohi,et al.  SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism , 2020, Wirel. Pers. Commun..

[5]  Reza Fotohi,et al.  Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..

[6]  Jin Wang,et al.  ARNS: Adaptive Relay-Node Selection Method for Message Broadcasting in the Internet of Vehicles , 2020, Sensors.

[7]  Wei Chen,et al.  Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network , 2019 .

[8]  Gaige Wang,et al.  A Bat Algorithm with Mutation for UCAV Path Planning , 2012, TheScientificWorldJournal.

[9]  Chang Zhou,et al.  Optimal Coverage Multi-Path Scheduling Scheme with Multiple Mobile Sinks for WSNs , 2020 .

[10]  NZ Jhanjhi,et al.  UAV’s Applications, Architecture, Security Issues and Attack Scenarios: A Survey , 2020, Intelligent Computing and Innovation on Data Science.

[11]  Hong Duan,et al.  Path Planning for Uninhabited Combat Aerial Vehicle Using Hybrid Meta-Heuristic DE/BBO Algorithm , 2012 .

[12]  Fereidoon Shams Aliee,et al.  An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks , 2020, Veh. Commun..

[13]  Gaige Wang,et al.  A Hybrid Metaheuristic DE/CS Algorithm for UCAV Three-Dimension Path Planning , 2012, TheScientificWorldJournal.

[14]  A. F. Adams,et al.  The Survey , 2021, Dyslexia in Higher Education.

[15]  Inkyu Lee,et al.  UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.

[16]  Jie Xu,et al.  Secure UAV Communication With Cooperative Jamming and Trajectory Control , 2018, IEEE Communications Letters.

[17]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[18]  Chao Li,et al.  Protecting Secure Communication Under UAV Smart Attack With Imperfect Channel Estimation , 2018, IEEE Access.

[19]  Reza Fotohi,et al.  An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks , 2020, Veh. Commun..

[20]  Xiaofan He,et al.  Secure UAV Communication Networks via Friendly Jamming and Bandwidth Allocation , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[21]  Gai-Ge Wang,et al.  A modified firefly algorithm for UCAV path planning , 2012 .

[22]  Jianyu Zhao,et al.  Abnormal Behavior Detection Scheme of UAV Using Recurrent Neural Networks , 2019, IEEE Access.

[23]  Reza Fotohi,et al.  Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication , 2020, The Journal of Supercomputing.

[24]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[25]  Suk-Hwan Lee,et al.  The Secure UAV Communication Link Based on OTP Encryption Technique , 2019, 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN).

[26]  E. Karthikeyan,et al.  An intelligent energy efficient cooperative MIMO-AF multi-hop and relay based communications for Unmanned Aerial Vehicular networks , 2020, Comput. Commun..

[27]  Sumeet Gupta,et al.  Secure Communication in UAV Assisted HetNets: A Proposed Model , 2019, SpaCCS.

[28]  Andrey V. Savkin,et al.  Energy-Efficient 3D Navigation of a Solar-Powered UAV for Secure Communication in the Presence of Eavesdroppers and No-Fly Zones , 2020, Energies.

[29]  Arjan Durresi,et al.  A survey: Control plane scalability issues and approaches in Software-Defined Networking (SDN) , 2017, Comput. Networks.

[30]  Reza Fotohi,et al.  NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things , 2020, The Journal of Supercomputing.

[31]  Luo Liu,et al.  A hybrid meta-heuristic DE/CS Algorithm for UCAV path planning , 2012 .