CN111884817B - Method for realizing distributed unmanned aerial vehicle cluster network secure communication - Google Patents

Method for realizing distributed unmanned aerial vehicle cluster network secure communication Download PDF

Info

Publication number
CN111884817B
CN111884817B CN202010831944.9A CN202010831944A CN111884817B CN 111884817 B CN111884817 B CN 111884817B CN 202010831944 A CN202010831944 A CN 202010831944A CN 111884817 B CN111884817 B CN 111884817B
Authority
CN
China
Prior art keywords
unmanned aerial
aerial vehicle
cooperative
request
cluster
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010831944.9A
Other languages
Chinese (zh)
Other versions
CN111884817A (en
Inventor
董永武
邓涛
吴瑞
徐雨蕾
丁茂杰
卢月林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Jiaotong University
Original Assignee
Chongqing Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Jiaotong University filed Critical Chongqing Jiaotong University
Priority to CN202010831944.9A priority Critical patent/CN111884817B/en
Publication of CN111884817A publication Critical patent/CN111884817A/en
Application granted granted Critical
Publication of CN111884817B publication Critical patent/CN111884817B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to the technical field of unmanned aerial vehicle cluster communication, and discloses a method for realizing distributed unmanned aerial vehicle cluster network safety communication, which is characterized in that each cooperative unmanned aerial vehicle in a distributed unmanned aerial vehicle cluster makes a decision autonomously, the information flux is small, the maneuverability is high, each cooperative unmanned aerial vehicle establishes communication with other cooperative unmanned aerial vehicles after being authenticated by an authentication mechanism, other cooperative unmanned aerial vehicles send action tasks or formation aggregation requests, if half or more than half of received tasks are replied, the action requests are approved, the cooperative unmanned aerial vehicles which do not participate in the decision making and do not receive the action requests are used as learners, the unified task requests or formation aggregation requests are learned from any cooperative unmanned aerial vehicle which receives the action requests, all cooperative unmanned aerial vehicles in the unmanned aerial vehicle cluster execute target tasks, the consistency of the unmanned aerial vehicle cluster is ensured, and the safety communication among the unmanned aerial vehicles can be ensured at the same time, effectively preventing hackers from invading the unmanned aerial vehicle cluster to change the target task of the unmanned aerial vehicle cluster.

Description

Method for realizing distributed unmanned aerial vehicle cluster network secure communication
Technical Field
The invention relates to the technical field of unmanned aerial vehicle cluster communication, in particular to a method for realizing distributed unmanned aerial vehicle cluster network secure communication.
Background
The unmanned aerial vehicle cluster plays more and more important roles in the civil field and military strategy, and can complete various tasks including fire monitoring, search and rescue, investigation and tracking, execution and extinguishment and the like. The multi-unmanned aerial vehicle cluster flight environment under the informatization condition has the characteristics of high dynamic property, uncertainty of depth and the like, and in order to complete the target of a task, the formation needs to be formed again sometimes to carry out task planning.
Each unmanned aerial vehicle in the distributed unmanned aerial vehicle cluster has certain autonomous ability and intelligence level, has independent calculation, analysis and decision-making ability, and can enable the multiple unmanned aerial vehicles to cooperate in task and give full play to the advantages of the multiple unmanned aerial vehicles through data sharing, and the distributed control decision-making mode of the unmanned aerial vehicle cluster is more beneficial to exchange and share mass decision-making information in an uncertain environment. The distributed unmanned aerial vehicle cluster is a decentralized, globally identical, layered and locally centralized structure of all collaborators, the structure improves coordination efficiency, and real-time performance, dynamic performance and fault tolerance of the unmanned aerial vehicle cluster are not affected.
In a distributed unmanned aerial vehicle cluster, in order to ensure effective execution of action tasks, the unmanned aerial vehicle cluster is required to maintain consistency; however, in the process of executing tasks by the unmanned aerial vehicle cluster, some unmanned aerial vehicles are often easily invaded and interfered by hackers, and information transmission is inaccurate, so that action tasks cannot be completed.
Disclosure of Invention
Based on the above problems, the invention provides a method for realizing network security communication of a distributed unmanned aerial vehicle cluster, which is characterized in that each cooperative unmanned aerial vehicle in the distributed unmanned aerial vehicle cluster makes a decision autonomously, the information flux is small, the maneuverability is high, each cooperative unmanned aerial vehicle establishes communication with other cooperative unmanned aerial vehicles after being authenticated by an authentication mechanism, other cooperative unmanned aerial vehicles send action tasks or formation aggregation requests, the action requests are approved when half or more responses of received tasks are obtained, cooperative unmanned aerial vehicles which do not participate in the decision and do not receive the action requests are used as learners, the task requests or formation aggregation requests which are consistent are learned from the cooperative unmanned aerial vehicles which receive the action requests, all cooperative unmanned aerial vehicles in the unmanned aerial vehicle cluster execute target tasks, the consistency of the unmanned aerial vehicle cluster is ensured, and meanwhile, the security communication among the unmanned aerial vehicles can be ensured, effectively preventing hackers from invading the unmanned aerial vehicle cluster to change the target task of the unmanned aerial vehicle cluster.
In order to solve the technical problems, the invention adopts the technical scheme that:
a distributed unmanned aerial vehicle cluster network security communication implementation method, unmanned aerial vehicle cluster include utilize sensor perception environmental information of oneself and cooperative unmanned aerial vehicle of decision-making independently, the ground base station sends the target task to the unmanned aerial vehicle cluster, after single unmanned aerial vehicle N finds the task target, send action request or formation and gather the request to other cooperative unmanned aerial vehicles in the cluster, other cooperative unmanned aerial vehicle decide to connect the request independently, the concrete process includes the following steps:
a1, the unmanned aerial vehicle N sends an action request or a formation aggregation request, and other cooperative unmanned aerial vehicles participate in decision making after receiving the request and respond to the request of the unmanned aerial vehicle N;
a2, unmanned aerial vehicle N receives reply information of other cooperative unmanned aerial vehicles, if half or more replies of accepting tasks are obtained, the request is approved, at the moment, cooperative unmanned aerial vehicles which do not participate in decision making and do not accept action requests are used as learners, any cooperative unmanned aerial vehicle accepting the action requests learns to reach a consistent task request or a formation aggregation request, and all cooperative unmanned aerial vehicles in the unmanned aerial vehicle cluster form and execute a target task; otherwise, action or formation aggregation is cancelled, and each cooperative unmanned aerial vehicle autonomously flies according to the target task of the ground station;
each cooperative unmanned aerial vehicle is provided with an authentication server, a user name database of all unmanned aerial vehicles in the unmanned aerial vehicle cluster is built in the authentication server, and the authentication server is used for sending an identity authentication request to an authentication server of the other unmanned aerial vehicle in the information transfer process between the two unmanned aerial vehicles; the specific authentication mechanism comprises the following steps:
b1, before the unmanned aerial vehicle N needs to send information to the unmanned aerial vehicle M, the unmanned aerial vehicle N sends an authentication request to the unmanned aerial vehicle M to request identity authentication, an authentication server of the unmanned aerial vehicle M inquires whether a user of the unmanned aerial vehicle N is a legal user from a user name database, and if not, no processing is performed; if so, generating a random number inside the authentication server, and sending the random number to the unmanned aerial vehicle N;
b2, unmanned aerial vehicle N combines the user name and the random number, and generates a byte string as a response by using a one-way Hash function; the authentication server of the unmanned aerial vehicle M compares the response string with the result calculated by the Hash function, if the response string is the same as the result calculated by the Hash function, the unmanned aerial vehicle N establishes communication connection with the unmanned aerial vehicle M through one-time authentication; otherwise, the authentication fails; after the communication connection is established, the unmanned aerial vehicle N sends communication information to the unmanned aerial vehicle M.
Further, the authentication server of the cooperative drone is also internally provided with a user name database of the ground base station, and before the ground base station establishes a communication connection with the cooperative drone, identity authentication needs to be performed according to the authentication mechanisms in steps B1 and B2.
Furthermore, each cooperative unmanned aerial vehicle is also provided with a state monitor, and the state detectors are used for monitoring the flight attitude of the unmanned aerial vehicle, including speed, position and acceleration; in the flight process of the unmanned aerial vehicle cluster, the state monitor of a single unmanned aerial vehicle transmits monitoring data to a ground base station for establishing communication connection in real time, and the ground base station records signals transmitted by the state detector and corrects task target information of the unmanned aerial vehicle cluster in real time, so that the unmanned aerial vehicle cluster can accurately complete action tasks.
Compared with the prior art, the invention has the beneficial effects that: according to the unmanned aerial vehicle cluster autonomous decision-making method, each cooperative unmanned aerial vehicle in the distributed unmanned aerial vehicle cluster autonomously decides, the information flux is small, the maneuverability is high, communication is established between each cooperative unmanned aerial vehicle and other cooperative unmanned aerial vehicles after authentication is carried out through an authentication mechanism, action tasks or formation aggregation requests are sent to other cooperative unmanned aerial vehicles, if half or more of responses of receiving tasks are obtained, the action requests are approved, cooperative unmanned aerial vehicles which do not participate in decision-making and do not receive the action requests serve as learners, the cooperative unmanned aerial vehicles which receive the action requests learn to reach a consistent task request or formation aggregation request, all cooperative unmanned aerial vehicles in the unmanned aerial vehicle cluster execute target tasks in a formation mode, the consistency of the unmanned aerial vehicle cluster is guaranteed, meanwhile, the safety communication between the unmanned aerial vehicles can be guaranteed, and hacker unmanned aerial vehicles are effectively prevented from invading the unmanned aerial vehicle cluster to change the target tasks of the unmanned aerial vehicle cluster.
Drawings
Fig. 1 is a flowchart of an implementation method of secure communication in a distributed unmanned aerial vehicle cluster network in an embodiment;
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
Example (b):
referring to fig. 1, a method for implementing network security communication of a distributed unmanned aerial vehicle cluster, the unmanned aerial vehicle cluster comprises a plurality of cooperative unmanned aerial vehicles which sense environmental information by using self sensors and make autonomous decisions, a ground base station sends a target task to the unmanned aerial vehicle cluster,
each cooperative unmanned aerial vehicle is provided with an authentication server, a user name database of all unmanned aerial vehicles in the unmanned aerial vehicle cluster is built in the authentication server, and the authentication server is used for sending an identity authentication request to an authentication server of the other unmanned aerial vehicle in the information transfer process between the two unmanned aerial vehicles; the specific authentication mechanism comprises the following steps:
b1, before the unmanned aerial vehicle N needs to send information to the unmanned aerial vehicle M, the unmanned aerial vehicle N sends an authentication request to the unmanned aerial vehicle M to request identity authentication, an authentication server of the unmanned aerial vehicle M inquires whether a user of the unmanned aerial vehicle N is a legal user from a user name database, and if not, no processing is performed; if so, generating a random number inside the authentication server, and sending the random number to the unmanned aerial vehicle N;
b2, unmanned aerial vehicle N combines the user name and the random number, and generates a byte string as a response by using a one-way Hash function; the authentication server of the unmanned aerial vehicle M compares the response string with the result calculated by the Hash function, if the response string is the same as the result calculated by the Hash function, the unmanned aerial vehicle N establishes communication connection with the unmanned aerial vehicle M through one-time authentication; otherwise, the authentication fails; after the communication connection is established, the unmanned aerial vehicle N sends communication information to the unmanned aerial vehicle M;
after a single unmanned aerial vehicle N finds a task target, the single unmanned aerial vehicle N carries out identity authentication with each other cooperative unmanned aerial vehicle through an authentication mechanism and establishes communication connection, then an action request or a formation aggregation request is sent to other cooperative unmanned aerial vehicles in a cluster, and the other cooperative unmanned aerial vehicles autonomously decide whether to receive the request, wherein the specific process comprises the following steps:
a1, the unmanned aerial vehicle N sends an action request or a formation aggregation request, and other cooperative unmanned aerial vehicles participate in decision making after receiving the request and respond to the request of the unmanned aerial vehicle N;
a2, unmanned aerial vehicle N receives reply information of other cooperative unmanned aerial vehicles, if half or more replies of accepting tasks are obtained, the request is approved, at this moment, cooperative unmanned aerial vehicles which do not participate in decision making and do not accept action requests are used as learners, task requests or formation aggregation requests which are consistent are learned from any cooperative unmanned aerial vehicle accepting action requests, and all cooperative unmanned aerial vehicles in the unmanned aerial vehicle cluster form target tasks; otherwise, the action or formation aggregation is cancelled, and each cooperative unmanned aerial vehicle autonomously flies according to the target task of the ground station and waits for the next action request or formation request. In this embodiment, when the unmanned aerial vehicle as the learner learns the task target information or the formation information of other cooperative unmanned aerial vehicles, the identity authentication is performed through the authentication mechanisms of steps B1 and B2, so as to prevent the learning unmanned aerial vehicle from being invaded and stealing the task target information.
In this embodiment, the drone that finds the target automatically becomes the piloting drone, establishes communication with other cooperative drones after being authenticated by the authentication mechanism, sends an action task or formation aggregation request to other cooperative drones, obtains a reply of receiving a task of half or more, and then the action request is approved, and the cooperative drones that do not participate in the decision making and do not receive the action request are used as learners, learn to reach a consistent task request or formation aggregation request from any cooperative drone that receives the action request, and all cooperative drones in the drone cluster form the target task, so as to ensure the consistency of the drone cluster, and simultaneously ensure the secure communication between the individual drones, thereby effectively preventing hackers from invading the drone cluster to change the target task of the drone cluster.
The authentication server of the cooperative unmanned aerial vehicle is also internally provided with a user name database of the ground base station, and before the ground base station establishes communication connection with the cooperative unmanned aerial vehicle, identity authentication is required to be carried out according to an authentication mechanism: before the ground base station needs to send information to the unmanned aerial vehicle cluster, the ground base station sends an authentication request to each cooperative unmanned aerial vehicle to require identity authentication, an authentication server of each cooperative unmanned aerial vehicle inquires whether a ground base station user is a legal user from a user name database, and if not, no processing is performed; if yes, a random number is generated inside the authentication server and sent to the ground base station; the ground base station combines the user name and the random number, and generates a byte string as a response by using a one-way Hash function; the authentication server of each cooperative unmanned aerial vehicle compares the response string with the result calculated by the Hash function, if the response string is the same as the result calculated by the Hash function, the ground base station establishes communication connection with each cooperative unmanned aerial vehicle respectively through one-time authentication; otherwise, authentication fails; and after the communication connection is established, the ground base station sends task target information to each cooperative unmanned aerial vehicle. Prevent that pseudo-ground basic station from controlling unmanned aerial vehicle.
Each cooperative unmanned aerial vehicle is also provided with a state monitor, and the state monitors are used for monitoring the flight attitude of the unmanned aerial vehicle and comprise speed, position and acceleration; in the flight process of the unmanned aerial vehicle cluster, the state monitor of a single unmanned aerial vehicle transmits monitoring data to a ground base station for establishing communication connection in real time, and the ground base station records signals transmitted by the state detector and corrects task target information of the unmanned aerial vehicle cluster in real time, so that the unmanned aerial vehicle cluster can accurately complete action tasks. In this implementation, after a single unmanned aerial vehicle finds the target and becomes the piloting unmanned aerial vehicle, the ground base station only needs to establish communication with the piloting unmanned aerial vehicle through the authentication mechanism, directly revises the target task information of the piloting unmanned aerial vehicle, can control the whole action of the unmanned aerial vehicle cluster, reduces the information transmission quantity, and reduces the unmanned aerial vehicle cluster information processing quantity.
The above is an embodiment of the present invention. The embodiments and specific parameters in the embodiments are only for the purpose of clearly illustrating the verification process of the invention and are not intended to limit the scope of the invention, which is defined by the claims, and all equivalent structural changes made by using the contents of the specification and the drawings of the present invention should be covered by the scope of the present invention.

Claims (3)

1. A distributed unmanned aerial vehicle cluster network security communication implementation method, the unmanned aerial vehicle cluster includes a plurality of collaborative unmanned aerial vehicles which utilize self sensors to sense environmental information and make decisions independently, the ground base station sends target tasks to the unmanned aerial vehicle cluster, characterized in that, after a single unmanned aerial vehicle N finds a task target, it sends an action request or a formation aggregation request to other collaborative unmanned aerial vehicles in the cluster, and other collaborative unmanned aerial vehicles make decisions independently whether to receive the request, the specific process includes the following steps:
a1, the unmanned aerial vehicle N sends an action request or a formation aggregation request, and other cooperative unmanned aerial vehicles participate in decision making after receiving the request and respond to the request of the unmanned aerial vehicle N;
a2, unmanned aerial vehicle N receives reply information of other cooperative unmanned aerial vehicles, if half or more replies of accepting tasks are obtained, the request is approved, at this moment, cooperative unmanned aerial vehicles which do not participate in decision making and do not accept action requests are used as learners, task requests or formation aggregation requests which are consistent are learned from any cooperative unmanned aerial vehicle accepting action requests, and all cooperative unmanned aerial vehicles in the unmanned aerial vehicle cluster form target tasks; otherwise, action or formation aggregation is cancelled, and each cooperative unmanned aerial vehicle autonomously flies according to the target task of the ground station;
each cooperative unmanned aerial vehicle is provided with an authentication server, the authentication server is internally provided with a user name database of all unmanned aerial vehicles in the unmanned aerial vehicle cluster and is used for sending an identity authentication request to an authentication server of the opposite side in the process of information transmission between the two unmanned aerial vehicles; the specific authentication mechanism comprises the following steps:
b1, before the unmanned aerial vehicle N needs to send information to the unmanned aerial vehicle M, the unmanned aerial vehicle N sends an authentication request to the unmanned aerial vehicle M to request identity authentication, an authentication server of the unmanned aerial vehicle M inquires whether a user of the unmanned aerial vehicle N is a legal user from a user name database, and if not, no processing is performed; if yes, a random number is generated inside the authentication server and sent to the unmanned aerial vehicle N;
b2, unmanned aerial vehicle N combines the user name and the random number, and generates a byte string as a response by using a one-way Hash function; the authentication server of the unmanned aerial vehicle M compares the response string with the result calculated by the Hash function, if the response string is the same as the result calculated by the Hash function, the unmanned aerial vehicle N establishes communication connection with the unmanned aerial vehicle M through one-time authentication; otherwise, authentication fails; after the communication connection is established, the unmanned aerial vehicle N sends communication information to the unmanned aerial vehicle M.
2. The method of claim 1, wherein the method comprises: the authentication server of the cooperative unmanned aerial vehicle is also internally provided with a user name database of the ground base station, and before the ground base station establishes communication connection with the cooperative unmanned aerial vehicle, identity authentication is required to be performed according to the authentication mechanisms in the steps B1 and B2.
3. The method of claim 2, wherein the method comprises: each cooperative unmanned aerial vehicle is also provided with a state monitor, and the state monitors are used for monitoring the flight attitude of the unmanned aerial vehicle and comprise speed, position and acceleration; in the flight process of the unmanned aerial vehicle cluster, the state monitor of a single unmanned aerial vehicle transmits monitoring data to a ground base station for establishing communication connection in real time, and the ground base station records signals transmitted by the state detector and corrects task target information of the unmanned aerial vehicle cluster in real time, so that the unmanned aerial vehicle cluster can accurately complete action tasks.
CN202010831944.9A 2020-08-18 2020-08-18 Method for realizing distributed unmanned aerial vehicle cluster network secure communication Active CN111884817B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010831944.9A CN111884817B (en) 2020-08-18 2020-08-18 Method for realizing distributed unmanned aerial vehicle cluster network secure communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010831944.9A CN111884817B (en) 2020-08-18 2020-08-18 Method for realizing distributed unmanned aerial vehicle cluster network secure communication

Publications (2)

Publication Number Publication Date
CN111884817A CN111884817A (en) 2020-11-03
CN111884817B true CN111884817B (en) 2022-08-09

Family

ID=73203422

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010831944.9A Active CN111884817B (en) 2020-08-18 2020-08-18 Method for realizing distributed unmanned aerial vehicle cluster network secure communication

Country Status (1)

Country Link
CN (1) CN111884817B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113485434B (en) * 2021-07-28 2023-03-14 成都飞机工业(集团)有限责任公司 Unmanned aerial vehicle formation aggregation control method
CN115225322B (en) * 2022-06-14 2024-02-02 西安电子科技大学 Unmanned intelligent device safety constraint method based on environment side channel information verification
CN115421505B (en) * 2022-11-04 2023-03-17 北京卓翼智能科技有限公司 Unmanned aerial vehicle cluster system and unmanned aerial vehicle
CN116437372B (en) * 2023-06-13 2023-08-29 四川腾盾科技有限公司 Group topology control method for unconstrained random recombination of arbitrary task configuration

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102393747A (en) * 2011-08-17 2012-03-28 清华大学 Collaborative interaction method for unmanned plane cluster and visual navigation system of unmanned plane
CN104836640A (en) * 2015-04-07 2015-08-12 西安电子科技大学 Unmanned plane formation distributed cooperative communication method
CN107092270A (en) * 2016-08-06 2017-08-25 广州亿航智能技术有限公司 Realize method, the apparatus and system of formation flight
CN107329492A (en) * 2017-08-18 2017-11-07 上海顺砾智能科技有限公司 A kind of formation control method of unmanned plane cluster
CN109121139A (en) * 2018-09-14 2019-01-01 北京领云时代科技有限公司 A kind of method of unmanned plane group system anti-intrusion
CN110276945A (en) * 2019-07-19 2019-09-24 东北大学 A kind of automatic driving vehicle grouping method
CN110597905A (en) * 2019-08-20 2019-12-20 天津理工大学 Decentralized cluster control system based on block chain and working method
US10593109B1 (en) * 2017-06-27 2020-03-17 State Farm Mutual Automobile Insurance Company Systems and methods for controlling a fleet of drones for data collection
CN110971289A (en) * 2018-09-29 2020-04-07 比亚迪股份有限公司 Unmanned aerial vehicle control method and device, storage medium and electronic equipment
CN111199360A (en) * 2020-01-13 2020-05-26 西安电子科技大学 Unmanned aerial vehicle task allocation planning method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102164187B1 (en) * 2019-08-20 2020-10-13 엘지전자 주식회사 Method for controlling platooning and autonomous vehicle based on blockcahin

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102393747A (en) * 2011-08-17 2012-03-28 清华大学 Collaborative interaction method for unmanned plane cluster and visual navigation system of unmanned plane
CN104836640A (en) * 2015-04-07 2015-08-12 西安电子科技大学 Unmanned plane formation distributed cooperative communication method
CN107092270A (en) * 2016-08-06 2017-08-25 广州亿航智能技术有限公司 Realize method, the apparatus and system of formation flight
US10593109B1 (en) * 2017-06-27 2020-03-17 State Farm Mutual Automobile Insurance Company Systems and methods for controlling a fleet of drones for data collection
CN107329492A (en) * 2017-08-18 2017-11-07 上海顺砾智能科技有限公司 A kind of formation control method of unmanned plane cluster
CN109121139A (en) * 2018-09-14 2019-01-01 北京领云时代科技有限公司 A kind of method of unmanned plane group system anti-intrusion
CN110971289A (en) * 2018-09-29 2020-04-07 比亚迪股份有限公司 Unmanned aerial vehicle control method and device, storage medium and electronic equipment
CN110276945A (en) * 2019-07-19 2019-09-24 东北大学 A kind of automatic driving vehicle grouping method
CN110597905A (en) * 2019-08-20 2019-12-20 天津理工大学 Decentralized cluster control system based on block chain and working method
CN111199360A (en) * 2020-01-13 2020-05-26 西安电子科技大学 Unmanned aerial vehicle task allocation planning method

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
"Blockchain: a distributed solution to automotive security and privacy";Ali Dorri et al;《IEEE Communications Magazine》;20171213;第55卷(第12期);119-125 *
"Reliability in Internet of Things: Current Status and Future Perspectives";Liudong Xing;《IEEE Internet of Things Journal》;20200507;第7卷(第8期);6704-6721 *
"Securing ICN-Based UAV Ad Hoc Networks with Blockchain";Kai Lei et al;《IEEE Communications Magazine》;20190618;第57卷(第6期);26-32 *
"一种无人机群网络安全通信实现及验证方法";施君宇 等;《通信技术》;20181010;第51卷(第10期);2470-2475 *
"军事区块链研究";赵国宏;《指挥与控制学报》;20191215;第5卷(第4期);259-268 *
"区块链增强无人机蜂群系统安全性分析";冯泽冰 等;《信息通信技术与政策》;20200215(第2期);14-18 *
"区块链的无人机集群控制应用研究";秦望龙 等;《科技创新与应用》;20200713(第21期);181-182 *

Also Published As

Publication number Publication date
CN111884817A (en) 2020-11-03

Similar Documents

Publication Publication Date Title
CN111884817B (en) Method for realizing distributed unmanned aerial vehicle cluster network secure communication
Koubâa et al. Dronemap Planner: A service-oriented cloud-based management system for the Internet-of-Drones
Koubâa et al. Dronetrack: Cloud-based real-time object tracking using unmanned aerial vehicles over the internet
Gupta et al. Blockchain‐assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges
Krichen et al. Security challenges for drone communications: Possible threats, attacks and countermeasures
CN108845590B (en) Multi-unmanned aerial vehicle cooperative formation control method in time delay environment
US20060184292A1 (en) Mission planning system for vehicles with varying levels of autonomy
CN112180967B (en) Multi-unmanned aerial vehicle cooperative countermeasure decision-making method based on evaluation-execution architecture
Muñoz et al. Adaptive consensus algorithms for real‐time operation of multi‐agent systems affected by switching network events
De Benedetti et al. A fault-tolerant self-organizing flocking approach for UAV aerial survey
Kang et al. Securing data sharing from the sky: Integrating blockchains into drones in 5G and beyond
CN110162065A (en) It is a kind of based on the oriented adaptive multiple agent formation control method followed
Rong-Xiao et al. Cyber-physical attack threats analysis for UAVs from CPS perspective
Fabra et al. Automatic system supporting multicopter swarms with manual guidance
Pantoja et al. An Architecture for the Development of Ambient Intelligence Systems Managed by Embedded Agents.
Hu et al. Multi-UAV coverage path planning: a distributed online cooperation method
Chen et al. A fast coordination approach for large-scale drone swarm
Kan et al. Balanced containment control and cooperative timing of a multiagent system over random communication graphs
Hunjet et al. Survivable communications and autonomous delivery service a generic swarming framework enabling communications in contested environments
Rosalie et al. UAV multilevel swarms for situation management
Wubben et al. Providing resilience to UAV swarms following planned missions
CN110673645A (en) Automatic flight control method, system and storage medium for unmanned aerial vehicle group
Shivkumar et al. Surveillance Algorithm for a Swarm of Self-Organized Aerial Unmanned Vehicle
Jadav et al. Blockchain-based secure and intelligent data dissemination framework for uavs in battlefield applications
Luo et al. A Fast and Robust Solution for Common Knowledge Formation in Decentralized Swarm Robots

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant