Research on Optimization of UAV Communication Network Security Protection Strategy Based on Advanced Encryption Technology
DOI:
https://doi.org/10.13052/jcsm2245-1439.1367Keywords:
UAV, Network security, Spectrum energy efficiency optimization, Encryption technology, Communication security optimizationAbstract
With the wide application of UAVs in various applications, the security, spectrum, and energy efficiency of their communication networks have become increasingly prominent. This paper proposes a joint optimization strategy based on deep reinforcement learning for drone swarm communication networks. First, a model is constructed that takes into account security threats, spectrum sharing, and energy consumption. Intelligent agents are then trained through deep reinforcement learning to dynamically select the best spectrum allocation and energy strategy to improve spectrum and energy efficiency while maintaining network security. Based on encryption technology, this paper studies resource optimization strategies for UAV security communication in different scenarios. Aiming at the incomplete certainty of multiple eavesdropping positions and the problem of the no-fly zone during UAV flight, a joint optimization algorithm is proposed to optimize UAV trajectory, interference power, and transmission power of ground base stations so as to maximize the minimum average security capacity of the system in the worst case. To solve the problem of the LoS link of UAV being quickly blocked in the city and secondary users easily causing excessive interference to primary users, intelligent reflectors are introduced to assist the UAV in secure communication. IRS can be used to reconfigure channel parameters to control the propagation direction of UAV communication links, enhance the channel quality of the primary link, and weaken the channel quality of eavesdropping links and interference links. Simulation results show that the optimization scheme improves the channel quality of UAV in crowded scenarios, inhibits the eavesdropping effect of eavesdroppers on secondary security users, and reduces the spectrum multiplexing interference of primary users, thus significantly enhancing the security capacity of the system. When the interference power of UAVs is increased, the value and growth rate of the security capacity of security users are significantly increased. The increase is 20%. Through a large number of simulation experiments, it has been proved that this method has excellent performance in improving communication security, spectrum utilization, and energy efficiency and has obvious advantages over the traditional baseline and average allocation DQN-wrap method.
Downloads
References
Emad H. Abualsauod, “A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network,” Computers and Electrical Engineering, vol. 99, pp. 107847, 2022.
Amrin Maria Khan Adawadkar and Nilima Kulkarni, “Cyber-security and reinforcement learning – A brief survey,” Engineering Applications of Artificial Intelligence, vol. 114, pp. 105116, 2022.
Wasyihun Sema Admass, Yirga Yayeh Munaye, and Abebe Abeshu Diro, “Cyber security: State of the art, challenges and future directions,” Cyber Security and Applications, vol. 2, pp. 100031, 2024.
Aamina Akbar, Sobia Jangsher, and Farrukh A. Bhatti, “NOMA and 5G emerging technologies: A survey on issues and solution techniques,” Computer Networks, vol. 190, pp. 107950, 2021.
Ghada Alsuhli, Ahmed Fahim, and Yasser Gadallah, “A survey on the role of UAVs in the communication process: A technological perspective,” Computer Communications, vol. 194, pp. 86–123, 2022.
Sakshi Anand and Avinash Sharma, “Comprehensive analysis of services towards enhancing security in IoT-based agriculture,” Measurement: Sensors, vol. 24, pp. 100599, 2022.
Afia Anjum, Paul Agbaje, Arkajyoti Mitra, Emmanuel Oseghale, Ebelechukwu Nwafor, and Habeeb Olufowobi, “Towards named data networking technology: Emerging applications, use cases, and challenges for secure data communication,” Future Generation Computer Systems, vol. 151, pp. 12–31, 2024.
R. M. Bhavadharini and B. Surendiran, “Secured osprey-based energy efficient routing and congestion control in WSN,” Sustainable Computing: Informatics and Systems, vol. 44, pp. 101026, 2024.
Khan Maaz Bin Hasan, Mohammad Sajid, Maria A. Lapina, Mohammad Shahid, and Ketan Kotecha, “Blockchain technology meets 6 G wireless networks: A systematic survey,” Alexandria Engineering Journal, vol. 92, pp. 199–220, 2024.
Alessio Botta, Sayna Rotbei, Stefania Zinno, and Giorgio Ventre, “Cyber security of robots: A comprehensive survey,” Intelligent Systems with Applications, vol. 18, pp. 200237, 2023.
Yue Cao et al., “Towards cyber security for low-carbon transportation: Overview, challenges and future directions,” Renewable and Sustainable Energy Reviews, vol. 183, pp. 113401, 2023.
Niccolò Cecchinato, Andrea Toma, Carlo Drioli, Giuseppe Oliva, Gianluigi Sechi, and Gian Luca Foresti, “A Secure Real-time Multimedia Streaming through Robust and Lightweight AES Encryption in UAV Networks for Operational Scenarios in Military Domain,” Procedia Computer Science, vol. 205, pp. 50–57, 2022.
Runqi Chai, Yunlong Guo, Zongyu Zuo, Kaiyuan Chen, Hyo-Sang Shin, and Antonios Tsourdos, “Cooperative motion planning and control for aerial-ground autonomous systems: Methods and applications,” Progress in Aerospace Sciences, vol. 146, pp. 101005, 2024.
Indu Chandran and Kizheppatt Vipin, “Multi-UAV networks for disaster monitoring: challenges and opportunities from a network perspective,” Drone Systems and Applications, vol. 12, pp. 1–28, 2024.
Liquan Chen, Yaqing Zhu, Suhui Liu, Hongtao Yu, and Bing Zhang, “PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication,” Computer Communications, vol. 218, pp. 31–43, 2024.
Runfeng Duan, An He, Guangwei Wu, Guangrong Yang, and Jinhuan Zhang, “A trustworthy data collection scheme based on active spot-checking in UAV-Assisted WSNs,” Ad Hoc Networks, vol. 158, pp. 103477, 2024.
Massimo Ficco, Daniele Granata, Francesco Palmieri, and Massimiliano Rak, “A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles,” Internet of Things, vol. 26, pp. 101180, 2024.
Chunpeng Ge, Xinshu Ma, and Zhe Liu, “A semi-autonomous distributed blockchain-based framework for UAVs system,” Journal of Systems Architecture, vol. 107, pp. 101728, 2020.
Hassan Jalil Hadi, Yue Cao, Sifan Li, Lexi Xu, Yulin Hu, and Mingxin Li, “Real-time fusion multi-tier DNN-based collaborative IDPS with complementary features for secure UAV-enabled 6G networks,” Expert Systems with Applications, vol. 252, pp. 124215, 2024.
Khalid Haseeb, Amjad Rehman, Tanzila Saba, Saeed Ali Bahaj, Huihui Wang, and Houbing Song, “Efficient and trusted autonomous vehicle routing protocol for 6G networks with computational intelligence,” ISA Transactions, vol. 132, pp. 61–68, 2023.
Diana Hawashin et al., “Blockchain applications in UAV industry: Review, opportunities, and challenges,” Journal of Network and Computer Applications, vol. 230, pp. 103932, 2024.
Atefeh Hemmati, Mani Zarei, and Alireza Souri, “UAV-based Internet of Vehicles: A systematic literature review,” Intelligent Systems with Applications, vol. 18, pp. 200226, 2023.
Aicha Idriss Hentati and Lamia Chaari Fourati, “Comprehensive survey of UAVs communication networks,” Computer Standards & Interfaces, vol. 72, pp. 103451, 2020.
Abeer Iftikhar, Kashif Naseer Qureshi, Muhammad Shiraz, and Saleh Albahli, “Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review,” Journal of King Saud University – Computer and Information Sciences, vol. 35, no. 9, pp. 101788, 2023.
Fauzia Irram, Mudassar Ali, Muhammad Naeem, and Shahid Mumtaz, “Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions,” Journal of Network and Computer Applications, vol. 206, pp. 103431, 2022.
Preksha Jain, Akhil Gupta, and Neeraj Kumar, “A vision towards integrated 6G communication networks: Promising technologies, architecture, and use-cases,” Physical Communication, vol. 55, pp. 101917, 2022.
R. Lakshmana Kumar, Quoc-Viet Pham, Firoz Khan, Md Jalil Piran, and Kapal Dev, “Blockchain for securing aerial communications: Potentials, solutions, and research directions,” Physical Communication, vol. 47, pp. 101390, 2021.
Asif Ali Laghari, Awais Khan Jumani, Rashid Ali Laghari, Hang Li, Shahid Karim, and Abudllah Ayub Khan, “Unmanned aerial vehicles advances in object detection and communication security review,” Cognitive Robotics, vol. 4, pp. 128–141, 2024.
Debashisha Mishra and Enrico Natalizio, “A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements,” Computer Networks, vol. 182, pp. 107451, 2020.
Ahmed Burhan Mohammed, Lamia Chaari Fourati, and Ahmed M. Fakhrudeen, “Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security,” Computer Networks, vol. 239, pp. 110140, 2024.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.