计算机科学 ›› 2021, Vol. 48 ›› Issue (11A): 528-532.doi: 10.11896/jsjkx.201100199

• 信息安全 • 上一篇    下一篇

基于区块链的无人机集群安全协作

王宇晨, 齐文慧, 徐立臻   

  1. 东南大学计算机科学与工程学院 南京211189
  • 出版日期:2021-11-10 发布日期:2021-11-12
  • 通讯作者: 徐立臻(lzxu@seu.edu.cn)
  • 作者简介:wycforever@163.com

Security Cooperation of UAV Swarm Based on Blockchain

WANG Yu-chen, QI Wen-hui, XU Li-zhen   

  1. School of Computer Science and Engineering,Southeast University,Nanjing 211189,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:WANG Yu-chen,born in 1997,postgraduate.Her main research interests include blockchain and recommendation system.
    XU Li-zhen,born in 1963,professor.His main research interests include database technology,software engineering and enterprise information.

摘要: 无人机集群拓展了无人机的应用领域,也带来了更为复杂的安全性挑战。无人机收集的情报与无人机本身都易于成为黑客攻击的目标,一旦黑客截获通信信息或劫持无人机,都将对集群的作战环境产生影响,甚至造成泄露国家机密、扰乱社会秩序等严重后果。文中介绍了无人机集群所面临的安全问题与联盟链Hyperledger Fabric的工作原理,并基于Hyperledger Fabric构建了对等网络模型UAV-Swarm Net,利用区块链账本与智能合约实现无人机的数据共享与协同决策,为无人机集群的安全协作奠定了基础。UAV-Swarm Net网络模型具备分布式、多副本、加密通道传输与责任可追溯的特性,能有效保障数据的机密性、完整性与可用性,增强系统的鲁棒性与可扩展性,为未来无人机体系化作战环境下,无人机协同作战面临的信息安全问题提供了新的解决方案。

关键词: Hyperledger Fabric, 区块链, 网络安全, 无人机集群, 协同作战

Abstract: Unmanned aircraft vehicle swarm not only broadens the application fields of unmanned aircraft vehicles (UAVs),but also brings more complex security issues.Both the intelligence collected by UAVs and UAV itself are vulnerable to hacker attacks.Once hackers intercept communication information or hijack UAVs,it will have an adverse effect on the combat environment,and even cause serious consequences such as leaking state secrets and disrupting social order.This article introduces the security issues faced by UAV swarm and the principle of the consortium blockchain-Hyperledger Fabric.Then it designs a peer-to-peer network model named “UAV-Swarm Net” based on Hyperledger Fabric,using distributed ledgers and smart contracts to implement the safe cooperative combat of UAV swarm.The UAV-Swarm Net model has the characteristics of distribution,multiple copies,encrypted channel transmission and responsibility traceability,which can effectively guarantee the confidentiality,integrity and availability of data,enhance the robustness and scalability of UAV system.It provides a new solution to the information security problems faced by UAV swarm in the future UAV systemized combat environment.

Key words: Blockchain, Cooperative combat, Hyperledger Fabric, Network security, UAV swarm

中图分类号: 

  • TP319
[1]LIU H F,SU J M,FU Y J.Summary of Research on Unmanned System Cluster and Its Countermeasure Technology[J].Flying Missile,2018(11):35-40,91.
[2]GHAMRY K A,KAMEL M A,ZHANG Y.Multiple UAVs in forest fire fighting mission using particle swarm optimization[C]//2017 International Conference on Unmanned Aircraft Systems (ICUAS).IEEE,2017:1404-1409.
[3]CHEN S J,ZHANG K,HE Y.High dynamic self-organizingdrone network architecture design and model research[J].Computer Science,2015,42(2):50-54.
[4]JAVAID A Y,SUN W,DEVABHAKTUNI V K,et al.Cyber security threat analysis and modeling of an unmanned aerial vehicle system[C]//2012 IEEE Conference on Technologies for Homeland Security (HST).IEEE,2012:585-590.
[5]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference.2018:1-15.
[6]DUAN H B,SHEN Y K,WANG Y,et al.Hot reviews in the field of drones in 2018[J].Science & Technology Review,2019,37(3):82-90.
[7]DUAN H B,QIU H X,CHEN L,et al.Research Prospects of UAV Autonomous Cluster Technology[J].Science & Techno-logy Review,2018,36(21):90-98.
[8]JENSEN I J,SELVARAJ D F,RANGANATHAN P.Block-chain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)[C]//2019 IEEE 20th International Symposium on A World of Wireless,Mobile and Multimedia Networks(WoWMoM).IEEE,2019:1-7.
[9]RODDAY N M,SCHMIDT R O,PRAS A.Exploring security vulnerabilities of unmanned aerial vehicles[C]//NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium.IEEE,2016:993-994.
[10]SEDJELMACI H,SENOUCI S M,ANSARI N.Intrusiondetection Andean framework againstlethaltacksin UAV-aided Networks:A Bayesiangame-theoretic metrology[J].IEEE Transformaton International Transportation Transportation Systems,2016(99):1-11.
[11]YOON K,PARK D,YIM Y,et al.Security authentication system using encrypted channel on uav network[C]//2017 First IEEE International Conference on Robotic Computing (IRC).IEEE,2017:393-398.
[12]GORENFLO C,LEE S,GOLAB L,et al.Fastfabric:Scaling hyperledger fabric to 20 000 transactions per second[C]//2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).IEEE,2019:455-463.
[13]H CHAO,MAHESHWARI A,SUDARSANAN V,et al.UAV traffic information exchange network[OL].http://dx.doi.org/10.252018:14/6.2018-3347.
[14]DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops.PerComWorkshops,2017:618-623.
[15]LIANG X,ZHAO J,SHETTY S,et al.Towards data assurance and resilience in IoT using blockchain[C]//MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM).IEEE,2017:261-266.
[16]BOZIC N,PUJOLLE G,SECCI S,A tutorial on blockchain and applications to secure network control-planes[C]//2016 3rd Smart Cloud Networks Systems.SCNS,2016:1-8.
[17]VADLAMANI S,EKSIOGLU B,NANDI H M,et al.Jamming attacks on wireless networks:A taxonomic survey[J].Int.J.Prod.Econ.,2016(172):76-94.
[18]ZHOU Y.Summary of UAV Ground Station Development[J].Aviation Electronics Technology,2010,41(1):1-6.
[19]CAMPION M,RANGANATHAN P,FARUQUE S.UAVswarm communication and control architectures:a review[J].Journal of Unmanned Vehicle Systems,2018,7(2):93-106.
[20]MCGOVERN S.Blockchain for Unmanned Aircraft Systems[R].John A.Volpe National Transportation Systems Center (US),2020.
[21]JENSEN I J,SELVARAJ D F,RANGANATHAN P.Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)[C]//2019 IEEE 20th International Sympo-sium on A World of Wireless,Mobile and Multimedia Networks(WoWMoM).IEEE,2019:1-7.
[1] 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠.
基于战术关联的网络安全风险评估框架
Network Security Risk Assessment Framework Based on Tactical Correlation
计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171
[2] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[3] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[4] 赵冬梅, 吴亚星, 张红斌.
基于IPSO-BiLSTM的网络安全态势预测
Network Security Situation Prediction Based on IPSO-BiLSTM
计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103
[5] 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓.
一种可快速迁移的领域知识图谱构建方法
Fast and Transmissible Domain Knowledge Graph Construction Method
计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018
[6] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[7] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[8] 陶礼靖, 邱菡, 朱俊虎, 李航天.
面向网络安全训练评估的受训者行为描述模型
Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment
计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048
[9] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[10] 杜鸿毅, 杨华, 刘艳红, 杨鸿鹏.
基于网络媒体的非线性动力学信息传播模型
Nonlinear Dynamics Information Dissemination Model Based on Network Media
计算机科学, 2022, 49(6A): 280-284. https://doi.org/10.11896/jsjkx.210500043
[11] 吕鹏鹏, 王少影, 周文芳, 连阳阳, 高丽芳.
基于进化神经网络的电力信息网安全态势量化方法
Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network
计算机科学, 2022, 49(6A): 588-593. https://doi.org/10.11896/jsjkx.210200151
[12] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[13] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[14] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[15] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!