Secured dynamic path planning and multi-obstacle avoidance model for UAV networks

  • Authors

    • K Prathyusha
    • A S. C. S. Sastry
    2017-12-21
    https://doi.org/10.14419/ijet.v7i1.1.9855
  • CP-ABE, KP-ABE, UAV, Path Planning, Obstacle Avoidance.
  • As the number of the obstacles are increasing along with the navigation paths, the security of the communication data also increasing exponentially in the dynamic UAV networks. A large number of path planning and obstacle avoidance models have been proposed on the static and dynamic UAV networks for data communication. Most of the traditional obstacle avoidance models are independent of security for communication data or path planning procedures. Since the UAV sensitive data are stored in each sensor along with the path planning information; there exists an unauthorized access or malicious access to the sensitive data from third party applications or users. Also, traditional standard cryptographic algorithms (both symmetric and asymmetric) are not efficient to provide complete security to vast amount of UAV data dynamically due to its high computational memory and time.In this paper, a novel trust based Ant Colony optimization model was proposed to secure the sensitive UAV data against unauthorized access. In this model, a novel cipher text policy based encryption and decryption procedure is used as an extension to KP-ABE for UAV path security. Experimental results proved that the proposed trust based optimization model is better than the traditional UAV security models in terms of computational time and memory.

  • References

    1. [1] Podhradsky, M., Coopmans, C. and Hoffer, N. (2017). “Improving communication security of open source UAVs: Encrypting radio control linkâ€, International Conference on Unmanned Aircraft Systems (ICUAS), (2017). https://doi.org/10.1109/ICUAS.2017.7991460.

      [2] P.M. Dames, M. Schwager, D. Rus, V. Kumar, “Active magnetic anomaly detection using multiple micro aerial vehiclesâ€, IEEE Robot. Autom. Lett. 1 (1) (2016), pp.153–160, https://doi.org/10.1109/LRA.2015.2511444.

      [3] J.V. Carroll, “Vulnerability assessment of the US transportation infrastructure that relies on the global positioning systemâ€, J. Navig. Vol.56, no.2, (2003), pp.185–193, https://doi.org/10.1017/S0373463303002273.

      [4] K.Prathyusha, A.S.C.S.Sastry, K. Sreenivasa Ravi, “UAV Shortest Path Planning& Collision-Free Path: A Reviewâ€, Journal of Advanced Research in Dynamical and Control Systems, Special Issue – 2,(2017), pp.72-83.

      [5] Q. Huang, Y. Yang and M. Shenc, “Secure and efficient data collaboration with hierarchical attribute based encryption in cloud computing “, Future Generation Computer Systems, (2016), pp.1-28, https://doi.org/10.1016/j.future.2016.09.021.

      [6] X. Liu, Q. Liu, T. Peng and J. Wu, “Dynamic Access Policy in Cloud- Based Personal Health Record (PHR) Systemsâ€, Preprin submitted to Information Sciences, (2016), pp. 1-39, https://doi.org/10.1016/j.ins.2016.06.035.

      [7] V. Odelu, A. K. Das, Y. S. Rao, S. Kumari, M. K. Khan, K. R. Choo, “Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environmentâ€, Preprint submitted to Elsevier, (2016), pp.1-10,

      [8] D. McCallie, J. Butts, R. Mills, “Security analysis of the ADS-B implementation in the next generation air transportation systemâ€, Int. J. Crit. Infrastruct. Prot, Vol. 4, no.2, (2011),pp: 78–87, https://doi.org/10.1016/j.ijcip.2011.06.001.

      [9] Kumar, P., Vijay, S. and Devaraj, D. “A hybrid colony fuzzy system for analyzing diabetes microarray dataâ€. IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), Singapore, (April 2013), https://doi.org/10.1109/CIBCB.2013.6595395.

      [10] Y. Kuwata, M.T. Wolf, D. Zarzhitsky, T.L. Huntsberger, “Safe maritime navigation with COLREGS using velocity obstacles, in: Intelligent Robots and Systems (IROS)â€, IEEE/RSJ International Conference, (2011), pp. 4728–4734, https://doi.org/10.1109/IROS.2011.6094677.

      [11] K.Prathyusha, A.S.C.S.Sastry, M.Chaitanya Suman, “Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehiclesâ€, International Journal of Pure and Applied Mathematics, Vol. 116, No. 24, (2017), pp: 315-329.

      [12] K.Prathyusha, A.S.C.S.Sastry, M.Chaitanya Suman, “Dynamic Constraint Based Multi-Route Planning And Multi-Obstacle Avoidance Model For Unmanned Aerial Vehiclesâ€, Journal of Advanced Research in Dynamical and Control Systems Vol. 9, no. 1, (2017),pp: 348-361.

      [13] Parmar Vipul Kumar J , RajaniKanthAluvalu “Key Policy Attribute Based Encryption (KP-ABE): A Reviewâ€, International Journal of Innovative and Emerging Research in Engineering, Vol. 2, no. 2, (2015),pp:49-52.

      [14] Dorigo, M., Maniezzo, V., &Colorni, A. “Ant system: Optimization by a colony of cooperating agentsâ€. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), Vol. 26,no.1, (1996), pp: 29-41, https://doi.org/10.1109/3477.484436.

  • Downloads

  • How to Cite

    Prathyusha, K., & S. C. S. Sastry, A. (2017). Secured dynamic path planning and multi-obstacle avoidance model for UAV networks. International Journal of Engineering & Technology, 7(1.1), 371-376. https://doi.org/10.14419/ijet.v7i1.1.9855