{"title":"资源受限的无人机集群自主无线通信安全方案","authors":"Zhen Wang, Bo Jiang, Hong-xun Xu","doi":"10.1109/ICCSN52437.2021.9463621","DOIUrl":null,"url":null,"abstract":"UAVs are gradually playing an important role in many civilian or military applications. With the rise of its important status, the accompanying security issues have been paid more and more attention. In this paper, we summarize the problems of small UAV cluster communication networks, and introduce the implementation of secure communication scheme in detail. By expanding the communication protocol could achieve cluster autonomous communication. Not only ensuring the security of the protocol, but also greatly saves the consumption of computing resources, energy, and significantly improves the efficiency of communication because the UAV is Resource-Constrained.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Resource-Constrained Unmanned Aerial Vehicle Cluster Autonomous Wireless Communication Security Scheme\",\"authors\":\"Zhen Wang, Bo Jiang, Hong-xun Xu\",\"doi\":\"10.1109/ICCSN52437.2021.9463621\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"UAVs are gradually playing an important role in many civilian or military applications. With the rise of its important status, the accompanying security issues have been paid more and more attention. In this paper, we summarize the problems of small UAV cluster communication networks, and introduce the implementation of secure communication scheme in detail. By expanding the communication protocol could achieve cluster autonomous communication. Not only ensuring the security of the protocol, but also greatly saves the consumption of computing resources, energy, and significantly improves the efficiency of communication because the UAV is Resource-Constrained.\",\"PeriodicalId\":263568,\"journal\":{\"name\":\"2021 13th International Conference on Communication Software and Networks (ICCSN)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 13th International Conference on Communication Software and Networks (ICCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN52437.2021.9463621\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 13th International Conference on Communication Software and Networks (ICCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN52437.2021.9463621","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Resource-Constrained Unmanned Aerial Vehicle Cluster Autonomous Wireless Communication Security Scheme
UAVs are gradually playing an important role in many civilian or military applications. With the rise of its important status, the accompanying security issues have been paid more and more attention. In this paper, we summarize the problems of small UAV cluster communication networks, and introduce the implementation of secure communication scheme in detail. By expanding the communication protocol could achieve cluster autonomous communication. Not only ensuring the security of the protocol, but also greatly saves the consumption of computing resources, energy, and significantly improves the efficiency of communication because the UAV is Resource-Constrained.