With the wide application of Unmanned Aerial Vehicle (UAV) cluster in military and civil applications, the security of network communication of UAV cluster has been paid more attention and become a key research field. Key management technology is the critical factor in ensuring the security of the cluster network. This paper analyzes the security of UAV cluster communication based on key management technology. Firstly, this paper classifies UAV according to its use and designs the UAV cluster network communication model. Then, this paper discusses the security threat of UAV cluster network communication. Finally, this paper refined the key management process of UAV cluster, designed the logical architecture of UAV cluster key management, and analyzed the key management technology, to facilitate the subsequent design of specific UAV cluster key management scheme and ensure its communications security.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.