JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (7): 51-59.doi: 10.6040/j.issn.1671-9352.2.2017.258

Previous Articles     Next Articles

A secure clustering algorithm of Ad Hoc network for colony UAVs

CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin   

  1. Beijing Research Institute of Telemetry, Beijing 100094, China
  • Received:2017-08-28 Online:2018-07-20 Published:2018-07-03

Abstract: Colony UAVs Ad Hoc network has a large number of high speed nodes, and clustered network topology is suitable for use; a secure clustering algorithm is the base of the security of cluster structure Ad Hoc network. The characteristics and requirements for secure clustering algorithm of colony UAVs Ad Hoc network are analyzed. A secure clustering algorithm for colony UAVs Ad Hoc network is proposed. The algorithm combined cryptography and trust mechanisms to guarantee the information safety in the process of network clustering and select a cluster head with higher credibility, it is proved that it has high security and feasibility by analysis.

Key words: colony UAVs, clustering algorithm, wireless network security, trust, Ad Hoc network, cryptography

CLC Number: 

  • TP309
[1] 刘昕. 军用无人机自组网技术研究[D]. 南京:南京理工大学,2014. LIU Xin. Study of MANET for military UAVs[D]. Nanjing: Nanjing University of Science and Technology, 2014.
[2] 王东,张广政,穆武第.多无人机协同作战通信自组网技术[J].飞行导弹,2012,22(1):59-63. WANG Dong, ZHANG Guangzheng, MU Wudi. Ad Hoc technology of Multi-UAV collaborative communication [J].Winged Missiles Journal, 2012, 22(1):59-63.
[3] 钱权.无线Ad Hoc网络安全[M]. 清华大学出版社,2009:14-20. QIAN Quan. Security of wireless Ad Hoc network[M]. Beijing: Tsinghua University Press, 2009:14-20.
[4] SIVAGURUNATHAN S, PRATHAPCHANDRAN K. Trust and cluster based authentication schemes in mobile Ad Hoc networks—A review[C] // International Conference on Power Signals Control and Computations. IEEE, 2014:1-5.
[5] ZGHURSKYI O, BUNIN S. A survey of clustering protocols for MANET with weighted metric for cluster head selection[C] // Problems of Infocommunications Science and Technology, 2014 First International Scientific-Practical Conference. IEEE, 2014:54-56.
[6] BENTALEB A, HAROUS S, BOUBETRA A. A weight based clustering scheme for mobile Ad hoc networks[C] //MoMM '13 Proceedings of International Conference on Advances in Mobile Computing & Multimedia. 2013:161-166.
[7] KAPUR R K, KHATRI S K. Secure data transfer in MANET using symmetric and asymmetric cryptography[C] // International Conference on Reliability, INFOCOM Technologies and Optimization. IEEE, 2015:1-5.
[8] SINGHAL S, DANIEL A K. Cluster head selection protocol under node degree, competence level and goodness factor for mobile Ad Hoc network usingai technique[C] // International Conference on Advanced Computing & Communication Technologies. IEEE, 2014:415-420.
[9] 李荣森. 无线Ad Hoc网络安全关键技术研究[D].长沙:国防科学技术大学,2013. LI Rongsen. Reasearch on key technology of wireless Ad Hoc network security[D].Changsha:Nationl University of Defense Technology, 2013.
[10] GUILLEMINAULT C, SUZUKI M. Secure routing with an integrated localized key management protocol in MANETs[C] // IEEE, International Conference on Advanced Information NETWORKING and Applications. IEEE Computer Society, 2014:605-612.
[11] SCHNEIER B. Applied cryptography, secondedition: protocols, algorithms, and source code in C[J]. Government Information Quarterly, 1997, 13(3):336.
[12] ROY M, CHOWDHURY C, NEOGY S. Developing secured MANET using trust[C] // Fourth International Conference on Advances in Computing and Communications. IEEE, 2014:183-186.
[1] ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50.
[2] SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94.
[3] SU Yang. Reconfigurable design of Galois field multiplication in symmetric cryptography [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 76-83.
[4] CUI Xiao-yu, ZHAO Bo, FAN Pei-ru, XIAO Yu. A key management mechanism basedon TrustZone architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 92-98.
[5] LIU Long-fei, YANG Xiao-yuan. On the linear complexity of a new generalized cyclotomic sequence with length p3 over GF(l) [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 24-31.
[6] LI Xiao-ce, PAN Xiao-zhong, MAI Tao-tao. Multi-component property based remote attestation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 53-58.
[7] XU Sheng-wei. A new quantum secret sharing scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 36-40.
[8] . Cryptanalysis and improvement of two kind of certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 107-114.
[9] ZHAI Peng, LI Deng-dao. The fuzzy clustering algorithm based on inclusion index of Gausian membership function [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 102-105.
[10] ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90.
[11] LIU Da-fu, SU Yang. Research on evidence-based software trustworthiness metrics model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 58-65.
[12] GAO Xiao-bo, FANG Xian-mei, LI Shi-jun. Trust-aware product recommendation based on factorization machine [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(1): 89-94.
[13] FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48.
[14] ZHU Rui. E-commerce community clustering model based on trust [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(05): 18-22.
[15] JIANG Wei-jin, XU Yu-hui, GUO Hong, XU Yu-sheng. A multi-dimensional evidence dynamic trust computing model based on multi-agent [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(01): 1-11.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!