计算机科学 ›› 2021, Vol. 48 ›› Issue (11A): 528-532.doi: 10.11896/jsjkx.201100199
王宇晨, 齐文慧, 徐立臻
WANG Yu-chen, QI Wen-hui, XU Li-zhen
摘要: 无人机集群拓展了无人机的应用领域,也带来了更为复杂的安全性挑战。无人机收集的情报与无人机本身都易于成为黑客攻击的目标,一旦黑客截获通信信息或劫持无人机,都将对集群的作战环境产生影响,甚至造成泄露国家机密、扰乱社会秩序等严重后果。文中介绍了无人机集群所面临的安全问题与联盟链Hyperledger Fabric的工作原理,并基于Hyperledger Fabric构建了对等网络模型UAV-Swarm Net,利用区块链账本与智能合约实现无人机的数据共享与协同决策,为无人机集群的安全协作奠定了基础。UAV-Swarm Net网络模型具备分布式、多副本、加密通道传输与责任可追溯的特性,能有效保障数据的机密性、完整性与可用性,增强系统的鲁棒性与可扩展性,为未来无人机体系化作战环境下,无人机协同作战面临的信息安全问题提供了新的解决方案。
中图分类号:
[1]LIU H F,SU J M,FU Y J.Summary of Research on Unmanned System Cluster and Its Countermeasure Technology[J].Flying Missile,2018(11):35-40,91. [2]GHAMRY K A,KAMEL M A,ZHANG Y.Multiple UAVs in forest fire fighting mission using particle swarm optimization[C]//2017 International Conference on Unmanned Aircraft Systems (ICUAS).IEEE,2017:1404-1409. [3]CHEN S J,ZHANG K,HE Y.High dynamic self-organizingdrone network architecture design and model research[J].Computer Science,2015,42(2):50-54. [4]JAVAID A Y,SUN W,DEVABHAKTUNI V K,et al.Cyber security threat analysis and modeling of an unmanned aerial vehicle system[C]//2012 IEEE Conference on Technologies for Homeland Security (HST).IEEE,2012:585-590. [5]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference.2018:1-15. [6]DUAN H B,SHEN Y K,WANG Y,et al.Hot reviews in the field of drones in 2018[J].Science & Technology Review,2019,37(3):82-90. [7]DUAN H B,QIU H X,CHEN L,et al.Research Prospects of UAV Autonomous Cluster Technology[J].Science & Techno-logy Review,2018,36(21):90-98. [8]JENSEN I J,SELVARAJ D F,RANGANATHAN P.Block-chain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)[C]//2019 IEEE 20th International Symposium on A World of Wireless,Mobile and Multimedia Networks(WoWMoM).IEEE,2019:1-7. [9]RODDAY N M,SCHMIDT R O,PRAS A.Exploring security vulnerabilities of unmanned aerial vehicles[C]//NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium.IEEE,2016:993-994. [10]SEDJELMACI H,SENOUCI S M,ANSARI N.Intrusiondetection Andean framework againstlethaltacksin UAV-aided Networks:A Bayesiangame-theoretic metrology[J].IEEE Transformaton International Transportation Transportation Systems,2016(99):1-11. [11]YOON K,PARK D,YIM Y,et al.Security authentication system using encrypted channel on uav network[C]//2017 First IEEE International Conference on Robotic Computing (IRC).IEEE,2017:393-398. [12]GORENFLO C,LEE S,GOLAB L,et al.Fastfabric:Scaling hyperledger fabric to 20 000 transactions per second[C]//2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).IEEE,2019:455-463. [13]H CHAO,MAHESHWARI A,SUDARSANAN V,et al.UAV traffic information exchange network[OL].http://dx.doi.org/10.252018:14/6.2018-3347. [14]DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops.PerComWorkshops,2017:618-623. [15]LIANG X,ZHAO J,SHETTY S,et al.Towards data assurance and resilience in IoT using blockchain[C]//MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM).IEEE,2017:261-266. [16]BOZIC N,PUJOLLE G,SECCI S,A tutorial on blockchain and applications to secure network control-planes[C]//2016 3rd Smart Cloud Networks Systems.SCNS,2016:1-8. [17]VADLAMANI S,EKSIOGLU B,NANDI H M,et al.Jamming attacks on wireless networks:A taxonomic survey[J].Int.J.Prod.Econ.,2016(172):76-94. [18]ZHOU Y.Summary of UAV Ground Station Development[J].Aviation Electronics Technology,2010,41(1):1-6. [19]CAMPION M,RANGANATHAN P,FARUQUE S.UAVswarm communication and control architectures:a review[J].Journal of Unmanned Vehicle Systems,2018,7(2):93-106. [20]MCGOVERN S.Blockchain for Unmanned Aircraft Systems[R].John A.Volpe National Transportation Systems Center (US),2020. [21]JENSEN I J,SELVARAJ D F,RANGANATHAN P.Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)[C]//2019 IEEE 20th International Sympo-sium on A World of Wireless,Mobile and Multimedia Networks(WoWMoM).IEEE,2019:1-7. |
[1] | 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠. 基于战术关联的网络安全风险评估框架 Network Security Risk Assessment Framework Based on Tactical Correlation 计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171 |
[2] | 王子凯, 朱健, 张伯钧, 胡凯. 区块链与智能合约并行方法研究与实现 Research and Implementation of Parallel Method in Blockchain and Smart Contract 计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102 |
[3] | 王磊, 李晓宇. 基于随机洋葱路由的LBS移动隐私保护方案 LBS Mobile Privacy Protection Scheme Based on Random Onion Routing 计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077 |
[4] | 赵冬梅, 吴亚星, 张红斌. 基于IPSO-BiLSTM的网络安全态势预测 Network Security Situation Prediction Based on IPSO-BiLSTM 计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103 |
[5] | 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓. 一种可快速迁移的领域知识图谱构建方法 Fast and Transmissible Domain Knowledge Graph Construction Method 计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018 |
[6] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[7] | 高健博, 张家硕, 李青山, 陈钟. RegLang:一种面向监管的智能合约编程语言 RegLang:A Smart Contract Programming Language for Regulation 计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016 |
[8] | 陶礼靖, 邱菡, 朱俊虎, 李航天. 面向网络安全训练评估的受训者行为描述模型 Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment 计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048 |
[9] | 毛典辉, 黄晖煜, 赵爽. 符合监管合规性的自动合成新闻检测方法研究 Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance 计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083 |
[10] | 杜鸿毅, 杨华, 刘艳红, 杨鸿鹏. 基于网络媒体的非线性动力学信息传播模型 Nonlinear Dynamics Information Dissemination Model Based on Network Media 计算机科学, 2022, 49(6A): 280-284. https://doi.org/10.11896/jsjkx.210500043 |
[11] | 吕鹏鹏, 王少影, 周文芳, 连阳阳, 高丽芳. 基于进化神经网络的电力信息网安全态势量化方法 Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network 计算机科学, 2022, 49(6A): 588-593. https://doi.org/10.11896/jsjkx.210200151 |
[12] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[13] | 周航, 姜河, 赵琰, 解相朋. 适用于各单元共识交易的电力区块链系统优化调度研究 Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit 计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241 |
[14] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[15] | 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇. 区块链跨链技术发展及应用 Development and Application of Blockchain Cross-chain Technology 计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132 |
|