Secured dynamic path planning and multi-obstacle avoidance model for UAV networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    As the number of the obstacles are increasing along with the navigation paths, the security of the communication data also increasing exponentially in the dynamic UAV networks. A large number of path planning and obstacle avoidance models have been proposed on the static and dynamic UAV networks for data communication. Most of the traditional obstacle avoidance models are independent of security for communication data or path planning procedures. Since the UAV sensitive data are stored in each sensor along with the path planning information; there exists an unauthorized access or malicious access to the sensitive data from third party applications or users. Also, traditional standard cryptographic algorithms (both symmetric and asymmetric) are not efficient to provide complete security to vast amount of UAV data dynamically due to its high computational memory and time.In this paper, a novel trust based Ant Colony optimization model was proposed to secure the sensitive UAV data against unauthorized access. In this model, a novel cipher text policy based encryption and decryption procedure is used as an extension to KP-ABE for UAV path security. Experimental results proved that the proposed trust based optimization model is better than the traditional UAV security models in terms of computational time and memory.


  • Keywords


    CP-ABE; KP-ABE; UAV; Path Planning; Obstacle Avoidance.

  • References


      [1] Podhradsky, M., Coopmans, C. and Hoffer, N. (2017). “Improving communication security of open source UAVs: Encrypting radio control link”, International Conference on Unmanned Aircraft Systems (ICUAS), (2017). https://doi.org/10.1109/ICUAS.2017.7991460.

      [2] P.M. Dames, M. Schwager, D. Rus, V. Kumar, “Active magnetic anomaly detection using multiple micro aerial vehicles”, IEEE Robot. Autom. Lett. 1 (1) (2016), pp.153–160, https://doi.org/10.1109/LRA.2015.2511444.

      [3] J.V. Carroll, “Vulnerability assessment of the US transportation infrastructure that relies on the global positioning system”, J. Navig. Vol.56, no.2, (2003), pp.185–193, https://doi.org/10.1017/S0373463303002273.

      [4] K.Prathyusha, A.S.C.S.Sastry, K. Sreenivasa Ravi, “UAV Shortest Path Planning& Collision-Free Path: A Review”, Journal of Advanced Research in Dynamical and Control Systems, Special Issue – 2,(2017), pp.72-83.

      [5] Q. Huang, Y. Yang and M. Shenc, “Secure and efficient data collaboration with hierarchical attribute based encryption in cloud computing “, Future Generation Computer Systems, (2016), pp.1-28, https://doi.org/10.1016/j.future.2016.09.021.

      [6] X. Liu, Q. Liu, T. Peng and J. Wu, “Dynamic Access Policy in Cloud- Based Personal Health Record (PHR) Systems”, Preprin submitted to Information Sciences, (2016), pp. 1-39, https://doi.org/10.1016/j.ins.2016.06.035.

      [7] V. Odelu, A. K. Das, Y. S. Rao, S. Kumari, M. K. Khan, K. R. Choo, “Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment”, Preprint submitted to Elsevier, (2016), pp.1-10,

      [8] D. McCallie, J. Butts, R. Mills, “Security analysis of the ADS-B implementation in the next generation air transportation system”, Int. J. Crit. Infrastruct. Prot, Vol. 4, no.2, (2011),pp: 78–87, https://doi.org/10.1016/j.ijcip.2011.06.001.

      [9] Kumar, P., Vijay, S. and Devaraj, D. “A hybrid colony fuzzy system for analyzing diabetes microarray data”. IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), Singapore, (April 2013), https://doi.org/10.1109/CIBCB.2013.6595395.

      [10] Y. Kuwata, M.T. Wolf, D. Zarzhitsky, T.L. Huntsberger, “Safe maritime navigation with COLREGS using velocity obstacles, in: Intelligent Robots and Systems (IROS)”, IEEE/RSJ International Conference, (2011), pp. 4728–4734, https://doi.org/10.1109/IROS.2011.6094677.

      [11] K.Prathyusha, A.S.C.S.Sastry, M.Chaitanya Suman, “Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles”, International Journal of Pure and Applied Mathematics, Vol. 116, No. 24, (2017), pp: 315-329.

      [12] K.Prathyusha, A.S.C.S.Sastry, M.Chaitanya Suman, “Dynamic Constraint Based Multi-Route Planning And Multi-Obstacle Avoidance Model For Unmanned Aerial Vehicles”, Journal of Advanced Research in Dynamical and Control Systems Vol. 9, no. 1, (2017),pp: 348-361.

      [13] Parmar Vipul Kumar J , RajaniKanthAluvalu “Key Policy Attribute Based Encryption (KP-ABE): A Review”, International Journal of Innovative and Emerging Research in Engineering, Vol. 2, no. 2, (2015),pp:49-52.

      [14] Dorigo, M., Maniezzo, V., &Colorni, A. “Ant system: Optimization by a colony of cooperating agents”. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), Vol. 26,no.1, (1996), pp: 29-41, https://doi.org/10.1109/3477.484436.


 

View

Download

Article ID: 9855
 
DOI: 10.14419/ijet.v7i1.1.9855




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.