1
Secure Broadcast Protocol for Unmanned Aerial Vehicle Swarms
Hongpeng Guo*, Tianyuan Liu*, King-Shan Lui† , Claudiu Danilov‡ , Klara Nahrstedt*
*
†
‡
2
Background
leader
leader
3
Problem of Existing Solutions
leader
4
Problem of Existing Solutions
leader
5
Challenges & Our Solution
6
System Overview
leader
7
Method Overview: Diffie Hellman Chain
Generate a shared secret among a group of identities.
Diffie Hellman Chain
Leader
Follower
8
Leader Key Generation
Blind keys generated by followers
Intermediate keys
9
Follower Key Generation: Overview
Blind keys generated by leader
Intermediate keys
Blind keys generated by followers
10
11
Swarm Membership Changes
12
Analysis & Unreliable Network Handling
shared group key, peer-to-peer based key updates;
Peer-to-peer encrypted links.
13
Evaluations & Experiments
Leader overhead
follower overhead
message overhead
14
Benchmark Evaluation
Leader overhead
follower overhead
message overhead
15
Benchmark Evaluation
16
Scenario Evaluation
17
Conclusion
18
Q & A