{"title":"一种基于社区划分的无人机集群恶意节点检测方案","authors":"Runhui Zhao, Sijing Wang, Hong Wen","doi":"10.1109/ICNISC57059.2022.00053","DOIUrl":null,"url":null,"abstract":"With the wide use of UAV clusters, malicious attacks against UAV nodes are becoming more and more frequent. Aiming at the problem of malicious node detection in large-scale UAV clusters, this paper proposes a malicious node detection scheme based on community division. Firstly, the Leiden community discovery algorithm divides the flight cluster into multiple communities. Then, this paper presents a combined node importance evaluation algorithm using UAV Communication topology and control topology to evaluate the importance of cluster nodes. Finally, this paper proposes a method to select community leader nodes by using the importance, trust degree and residual power of UAV community nodes.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Scheme for Detecting Malicious Nodes in UAV Clusters Based on Community Division\",\"authors\":\"Runhui Zhao, Sijing Wang, Hong Wen\",\"doi\":\"10.1109/ICNISC57059.2022.00053\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the wide use of UAV clusters, malicious attacks against UAV nodes are becoming more and more frequent. Aiming at the problem of malicious node detection in large-scale UAV clusters, this paper proposes a malicious node detection scheme based on community division. Firstly, the Leiden community discovery algorithm divides the flight cluster into multiple communities. Then, this paper presents a combined node importance evaluation algorithm using UAV Communication topology and control topology to evaluate the importance of cluster nodes. Finally, this paper proposes a method to select community leader nodes by using the importance, trust degree and residual power of UAV community nodes.\",\"PeriodicalId\":286467,\"journal\":{\"name\":\"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNISC57059.2022.00053\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNISC57059.2022.00053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Scheme for Detecting Malicious Nodes in UAV Clusters Based on Community Division
With the wide use of UAV clusters, malicious attacks against UAV nodes are becoming more and more frequent. Aiming at the problem of malicious node detection in large-scale UAV clusters, this paper proposes a malicious node detection scheme based on community division. Firstly, the Leiden community discovery algorithm divides the flight cluster into multiple communities. Then, this paper presents a combined node importance evaluation algorithm using UAV Communication topology and control topology to evaluate the importance of cluster nodes. Finally, this paper proposes a method to select community leader nodes by using the importance, trust degree and residual power of UAV community nodes.