Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs
Date
2012-03-01
Author
Bhargava, Bharat K.
Angın, Pelin
Ranchal, Rohit
Sivakumar, Ranjitkumar
Linderman, Mark
Sinclair, Asher
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
220
views
0
downloads
Cite This
Mobile peer-to-peer networks of aerial vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the designated mission of the network. In this paper, we propose an approach for secure data dissemination in a mobile peer-to-peer network, where the data disclosed to a particular node in the network depends on the trustworthiness of that node as well as the matching of policies of the data source and destination. We demonstrate the use of active bundles for protecting sensitive data as they are sent from one node to another, on the simulation we developed for data dissemination in a mobile peer-to-peer network of AVs. We also discuss filtering techniques for dissemination of sensitive data in such networks.
Subject Keywords
Aerial vehicle
,
Trust
,
Security
,
Data dissemination
,
Active bundles
,
Data filtering
URI
https://hdl.handle.net/11511/54471
Journal
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING
Collections
Department of Computer Engineering, Article
Suggestions
OpenMETU
Core
An analytical approach for modelling unmanned aerial vehicles and base station interaction for disaster recovery scenarios
Owilla, Eugene; Ever, Enver; Computer Engineering (2022-8)
Unmanned Aerial Vehicles (UAVs) are an emerging technology with the potential to be used in various sectors for a wide array of applications and services. In wireless networking, UAVs are a vital part of supplementary infrastructure aimed at improv- ing coverage principally during public safety crises. Due to their relatively low cost and scalability of use, there has been a mushrooming focus into the roles that UAVs can play in ameliorating service provided to stranded ground devices. Following a public sa...
Solving the area coverage problem with UAVs: A vehicle routing with time windows variation
Semiz, Fatih; Polat, Faruk (Elsevier BV, 2020-4)
In real life, providing security for a set of large areas by covering the area with Unmanned Aerial Vehicles (UAVs) is a difficult problem that consist of multiple objectives. These difficulties are even greater if the area coverage must continue throughout a specific time window. We address this by considering a Vehicle Routing Problem with Time Windows (VRPTW) variation in which capacity of agents is one and each customer (target area) must be supplied with more than one vehicles simultaneously without v...
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks
Lilien, Leszek T.; BEN OTHMANE, Lotfi; Angın, Pelin; DECARLO, Andrew; Salih, Raed M.; BHARGAVA, Bharat (Elsevier BV, 2014-02-01)
Specialized ad hoc networks of unmanned aerial vehicles (UAVs) have been playing increasingly important roles in applications for homeland defense and security. Common resource virtualization techniques are mainly designed for stable networks; they fall short in providing optimal performance in more dynamic networks such as mobile ad hoc networks (MANETs)-due to their highly dynamic and unstable nature. We propose application of Opportunistic Resource Utilization Networks (Oppnets), a novel type of MANETs, ...
Prioritized Mobile Robot Exploration Based on Percolation Enhanced Entropy Based Fast SLAM
Karahan, Murat; Erkmen, Aydan Müşerref; Erkmen, İsmet (2014-09-01)
The major aim in search and rescue using mobile robots is to detect and reach trapped survivors and to support rescue operations through disaster environments. Our motivation is based on the fact that a search and rescue (SAR) robot can navigate within and penetrate a disaster area only if the area in question possesses connected voids. Traversability or penetrability of a disaster area is a primary factor that guides the navigation of a search and rescue (SAR) robot, since it is highly desirable that the r...
Integrating navigation surveillance of unmanned air vehicles into the civilian national airspaces by using ADS-B applications
Pahsa, Alper; Kaya, Pınar; Alat, Gökçen; Baykal, Buyurman (null; 2011-05-12)
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
B. K. Bhargava, P. Angın, R. Ranchal, R. Sivakumar, M. Linderman, and A. Sinclair, “A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs,”
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING
, pp. 1–12, 2012, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/54471.