Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Conclusion

In this study, we introduce a novel framework for cooperative anomaly detection in UAV swarms. The scheme integrates an anomaly detection model, consensus algorithm, and lightweight communication authentication algorithm. Tailored to address external eavesdroppers and malicious Byzantine nodes, it effectively manages and mitigates Byzantine behavior while safeguarding internal communication. Simultaneously, the framework incorporates a lightweight authentication scheme designed to verify node legitimacy and enhance swarm scalability. Compared with existing schemes, it demonstrates competitiveness in communication, computing costs, and consensus algorithm efficiency. Consequently, we assert that the proposed framework is effective and feasible for swarm anomaly detection. However, in more intricate scenarios, there is room for further refinement. Therefore, delineating attack dictionaries and formulating defense strategies emerge as noteworthy future directions for this work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Li T, Zhang J, Obaidat M S, et al. Energy-efficient and secure communication toward UAV networks. IEEE Internet Things J, 2022, 9: 10061–10076

    Article  Google Scholar 

  2. Zhang S, Ray S, Lu R, et al. Towards efficient and privacy-preserving interval skyline queries over time series data. IEEE Trans Dependable Secure Comput, 2023, 20: 1348–1363

    Article  Google Scholar 

  3. Khalid H, Hashim S J, Hashim F, et al. HOOPOE: high performance and efficient anonymous handover authentication protocol for flying out of zone UAVs. IEEE Trans Veh Technol, 2023, 72: 10906–10920

    Article  Google Scholar 

  4. Kim S, Kim B J. On the Byzantine-fault-tolerant consensus in blockchain built on Internet of vehicles. In: Proceedings of International Conference on Electronics, Information, and Communication (ICEIC), 2022. 1–4

  5. Wang H, Fan K, Yu C, et al. LSPSS: constructing lightweight and secure scheme for private data storage and sharing in aerial computing. IEEE Trans Serv Comput, 2024. doi: https://doi.org/10.1109/TSC.2023.3333347

Download references

Acknowledgements

This work was funded by National Key Research and Development Program of China (Grant No. 2023YFB2904000), National Natural Science Foundation of China (Grant Nos. 62272370, U21A20464), Fundamental Research Funds for the Central Universities (Grant No. QTZX23071), Young Elite Scientists Sponsorship Program by CAST (Grant No. 2022QNRC001), China 111 Project (Grant No. B16037), and Qinchuangyuan Scientist + Engineer Team Program of Shaanxi (Grant No. 2024QCY-KXJ-149).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Teng Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, T., Lin, W., Ma, R. et al. CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci. China Inf. Sci. 67, 159103 (2024). https://doi.org/10.1007/s11432-023-3984-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-023-3984-7