Efficient and Secured Swarm Pattern Multi-UAV Communication

نویسندگان

چکیده

Unmanned Aerial Vehicle (UAV) or drone, is an evolving technology in today's market with enormous number of applications. Mini UAVs are developed order to compensate the performance constraints imposed by larger during emergency situations. Multiple mini autonomous require communication and coordination for ubiquitous coverage relaying deployment. Multi-UAV swarm optimization required reliable connectivity among UAVs, due its high mobility dynamic topology. In this paper, a Secured UAV (S-UAV) model proposed which takes location as inputs form Wireless Mesh Network (WMN) multiple drones help centralized controller. After WMN formation, efficient place using A* search, intelligent algorithm that finds shortest path UAVs. Further, S-UAV utilizes cryptographic techniques such Advanced Encryption Standard (AES) Blowfish overcome security attacks efficiently. Simulation results show offers higher throughput, reduced power consumption guaranteed message transmission encryption decryption time.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secured Trust Communication in Multi-agent Systems

Nowadays security and privacy issues take a major role in multi-agent system. Mostly multiagent systems are open and dynamic in nature. This nature surely introduces a problem by providing secured communication. Message-Digest5 is presented to some security problems in multi agent systems based on distributed trust and the delegation of permissions and credibility. In particular, an agent will ...

متن کامل

Secured Transmission through Multi Layer Perceptron in Wireless Communication (stmlp)

In this paper, a multilayer perceptron guided encryption/decryption (STMLP) in wireless communication has been proposed for exchange of data/information. Multilayer perceptron transmitting systems at both ends generate an identical output bit and the network are trained based on the output which is used to synchronize the network at both ends and thus forms a secret-key at end of synchronizatio...

متن کامل

Optimizing Communication and Computation for Multi-UAV Information Gathering Applications

Mobile agent networks, such as multi-UAV systems, are constrained by limited resources. In particular, limited energy affects system performance directly, such as system lifetime. It has been demonstrated in the wireless sensor network literature that the communication energy consumption dominates the computational and the sensing energy consumption. Hence, the lifetime of the multi-UAV systems...

متن کامل

Secured Wireless Data Communication

Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic sub...

متن کامل

Establishment of Secured Communication

The main objective of this project is handling the large numbers of faults in F.P.G.A. configurable logic blocks. A key novel feature is the reuse of defective logic blocks to increase the number of effective spares and extend the mission life. To increase fault tolerance, we not only use nonfaulty parts of defective or partially faulty logic blocks, but we also use faulty parts of defective lo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Vehicular Technology

سال: 2021

ISSN: ['0018-9545', '1939-9359']

DOI: https://doi.org/10.1109/tvt.2021.3082308