1 / 1

Secure Mobile UAV-MBN Network

Secure Mobile UAV-MBN Network. Challenges. Current centralized solutions are incompatible with ad-hoc networks due to mobility, node failure and denial-of-service attack

elom
Télécharger la présentation

Secure Mobile UAV-MBN Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Mobile UAV-MBN Network Challenges • Current centralized solutions are incompatible with ad-hoc networks due to mobility, node failure and denial-of-service attack • Provide a scalable and robust security solution for a potentially huge ad-hoc network with volatile members and heterogeneous mobile nodes Neighborhood broadcast Responding unicast Fully Distributed Security Service • Security services in mobile networks are supported at anywhere and anytime with a threshold based secret sharing mechanism • Simple execution plan with one round-trip communication delay in each locality • No single point of privilege and failure • Works in very large mobile networks Battle Ready Security for Multi-level UAV-MBN Mobile Networks • Applicable to multi-level UAV-MBN network via damage control zone partitioning • Capable of enemy identification • Intra-zone and inter-zone security design • Recursive SK-aggregation along the hierarchy • Cascaded certification by routing gateways • Secure zone composition in case of heavy battle loss Implementation and Simulation • Prototype implementation includes public key cryptosystem, Lagrange polynomial threshold secret sharing, and all novel algorithms doing fully distributed certificate renewal, self initialization, and proactive secret share update • GloMoSim simulation on UAV-MBN network proves the solution is effective, scalable, and insensitive to mobility Certification overall overhead Lifetime certification persistence ratio Certification overall delay Jiejun Kong, Kaixin Xu, Haiyun Luo, Daniel Lihui Gu, Mario Gerla, Songwu Lu Supported by ONR’s MINUTEMAN project and NSF

More Related