Unmanned aerial vehicle systems: key management and intrusion response techniques

Reshma C. Sonawane, A. Muthukrishnan

Abstract


Protecting information is crucial for unmanned aerial vehicle (UAV) network communications, particularly during delicate tasks such as surveillance and reconnaissance. While encryption safeguards data privacy, managing and distributing keys in UAV settings poses significant challenges due to the vehicles' mobility and limited processing power. This research proposes an efficient key management scheme utilizing elliptic curve cryptography (ECC) and bilinear pairings, complemented by a lightweight intrusion detection system (IDS). The method employs behavior-based anomaly detection, using cluster-based watchdogs and trust assessment to identify and isolate harmful nodes. Additionally, applying compression techniques before encryption helps to reduce transmission load. Simulation in NS2 demonstrates performance improvements of 6-10% in throughput, 4-6% in packet delivery ratio (PDR), and a 13-17% reduction in delay compared to elliptic curve cryptography Diffie–Hellman (ECCDH) and pairwise encryption methods.

Keywords


Elliptic curve encryption; Energy consumption; Intrusion detection system; Malicious nodes; Pairwise key generation; Secure communication; Unmanned aerial vehicles

Full Text:

PDF


DOI: http://doi.org/10.11591/ijai.v15.i1.pp972-986

Refbacks

  • There are currently no refbacks.


Copyright (c) 2026 Reshma C. Sonawane, A. Muthukrishnan

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN/e-ISSN 2089-4872/2252-8938 
This journal is published by the Institute of Advanced Engineering and Science (IAES).

View IJAI Stats