A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system

Kumar, A. and Yadav, A.S. and Gill, S.S. and Pervaiz, H. and Ni, Q. and Buyya, R. (2022) A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system. Simulation Modelling Practice and Theory, 120. ISSN 1569-190X

[img]
Text (SIMPAT R3 - Final)
SIMPAT_R3_Final.pdf - Accepted Version
Restricted to Repository staff only until 8 July 2024.
Available under License Creative Commons Attribution-NonCommercial-NoDerivs.

Download (2MB)

Abstract

This paper proposes a novel lightweight security-enabled distributed software-defined drone network (SDDN) for traffic monitoring. Security of drone/Unmanned Aerial Vehicles (UAV) communication and data exchange is ensured through lightweight key generation and encryption/decryption algorithm. A hybrid (static and dynamic) OpenMP/MPI-based distributed processing is used to compute the security primitives for drone-to-drone communication. The proposed approach is more reliable, scalable and interoperable compared to other centralized logical control and incorporating network programming methods. Additionally, the use of cryptographic primitives and protocols make it more secure against attacks. A comparative analysis of proposed lightweight key generation and encryption/decryption algorithms with state-of-the-art algorithms shows that both proposed algorithms require fewer Gate Equivalents (GEs), and it varies from 18.4k to 29.6k. In terms of performance, both algorithms’ computational delay varies from 1.5 to 2 s. Jitter lies between 0.7 msec and 2 msec. The proposed algorithms are found to have communicational costs varying with 0.4 and 0.7 times of input in bytes with a base value of 1.4 and 1.25. Further, energy consumption is varying with 0.4 and 0.7 times of input in bytes with a base value of 0.3 and 0.25. Security interruption probability variation analysis show that the proposed security algorithms are better compared to state-of-the-art approaches. Further, security analysis of both algorithms (using a statistical and formal model) shows that the proposed system is protected against various attacks.

Item Type:
Journal Article
Journal or Publication Title:
Simulation Modelling Practice and Theory
Additional Information:
This is the author’s version of a work that was accepted for publication in Simulation Modelling Practice and Theory. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Simulation Modelling Practice and Theory, 120, 2022 DOI: 10.1016/j.simpat.2022/102621
Uncontrolled Keywords:
/dk/atira/pure/subjectarea/asjc/2600/2611
Subjects:
ID Code:
174070
Deposited By:
Deposited On:
04 Aug 2022 15:35
Refereed?:
Yes
Published?:
Published
Last Modified:
04 Aug 2022 15:35