Skip to main content
Log in

Modified hunter prey optimization to enable secure communication for UAV

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Unmanned aerial vehicles (UAVs) are rapidly developing communication networks with a wide range of uses. Due to its changing topology, the network communication raises security concerns. This work presents a novel routing and secure communication approach for UAV networks. In this process, the UAV is initially simulated, and the data transmission paths between the nodes are determined. Therefore, an optimal routing technique known as modified hunter prey optimization is developed for secure routing. Furthermore, the routing is established based on a multi-objective function such as distance, delay, and trust. Moreover, the data communication is carried out with the support of an evaluation and monitoring agent. Additionally, malicious identification is performed utilizing the deep maxout network, which considers signal strength, round trip time, packet size, packet delivery, and the number of incoming packets as input attributes. If any attack is detected, it is mitigated by a defensive agent. Moreover, metrics like packet delivery rate, delay, energy, and detection rate are employed to evaluate the performance of the model, in which the corresponding values 0.558 J, 0.775, 0.946 and 0.739 are achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were analyzed in this study.

References

  1. Sangeetha Francelin VF, Daniel J, Velliangiri S (2022) Intelligent agent and optimization-based deep residual network to secure communication in UAV network. Int J Intell Syst 37(9):5508–5529

    Article  Google Scholar 

  2. Park C, Lee S, Joo H, Kim H (2023) Empowering adaptive geolocation-based routing for UAV networks with reinforcement learning. Drones 7(6):387

    Article  Google Scholar 

  3. Katila CJ, Okolo B, Buratti C, Verdone R, Caire G (2018) UAV-to-ground multi-hop communication using backpressure and FlashLinQ-based algorithms. In: 2018 IEEE 29th annual international symposium on personal, indoor and mobile radio communications (PIMRC). IEEE, pp 1179–1184

  4. Mozaffari M, Saad W, Bennis M, Nam YH, Debbah M (2019) A tutorial on UAVs for wireless networks: applications, challenges, and open problems. IEEE Commun Surv Tutor 21(3):2334–2360

    Article  Google Scholar 

  5. Luo H, Wu Y, Sun G, Yu H, Xu S, Guizani M (2023) ESCM: an efficient and secure communication mechanism for UAV networks. arXiv preprint arXiv:2304.13244

  6. Huang H, Savkin AV (2020) Autonomous navigation of a solar-powered UAV for secure communication in urban environments with eavesdropping avoidance. Future Internet 12(10):170

    Article  Google Scholar 

  7. Faraji-Biregani M, Fotohi R (2021) Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles. J Supercomput 77(5):5076–5103

    Article  Google Scholar 

  8. Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36–42

    Article  Google Scholar 

  9. Song H, Liu L, Pudlewski SM, Bentley ES (2020) Random network coding enabled routing protocol in unmanned aerial vehicle networks. IEEE Trans Wirel Commun 19(12):8382–8395

    Article  Google Scholar 

  10. Nawaz H, Ali HM (2020) Implementation of cross layer design for efficient power and routing in UAV communication networks. Stud Informat Control 29(1):111–120

    Article  Google Scholar 

  11. Ebrahimi D, Sharafeddine S, Ho PH, Assi C (2018) UAV-aided projection-based compressive data gathering in wireless sensor networks. IEEE Internet Things J 6(2):1893–1905

    Article  Google Scholar 

  12. Zhuo R, Song S, Xu Y (2022) UAV communication network modeling and energy consumption optimization based on routing algorithm. Comput Math Methods Med 2022:1–10

    Article  Google Scholar 

  13. Fotohi R, Nazemi E, Aliee FS (2020) An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks. Veh Commun 26:100267

    Google Scholar 

  14. Gupta L, Jain R, Vaszkun G (2015) Survey of important issues in UAV communication networks. IEEE Commun Surv Tutor 18(2):1123–1152

    Article  Google Scholar 

  15. Chafle PV, Neha G (2023) Wader hunt optimization based UNET model for change detection in satellite image. Int J Inf Technol 15(3):1611–1623

    Google Scholar 

  16. Arunkumar M, Kumar KA (2023) GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment. Int J Inf Technol 15(3):1653–1660

    Google Scholar 

  17. Rath S, Dutta D (2023) A hybrid swarm optimization with trapezoidal and pentagonal fuzzy numbers using benchmark functions. Int J Inf Technol 15(5):2747–2758

    Google Scholar 

  18. Revanna JKC, Al-Nakash NYB (2023) Metaheuristic link prediction (MLP) using AI based ACO-GA optimization model for solving vehicle routing problem. Int J Inf Technol 15(7):3425–3439

    Google Scholar 

  19. Singh D, Singh BK, Behera AK (2023) A hybrid bioinspired model for improving the efficiency of correlative auscultation analysis. Int J Inf Technol 15(7):3605–3611

    Google Scholar 

  20. Miao Y, Metze F, Rawat S (2013) Deep maxout networks for low-resource speech recognition. In: Proceedings of 2013 IEEE workshop on automatic speech recognition and understanding. IEEE, pp 398–403

  21. Naruei I, Keynia F, Sabbagh MA (2022) Hunter–prey optimization: algorithm and applications. Soft Comput 26(3):1279–1314

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Velliangiri Sarveshwaran.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yuvaraj, R., Sarveshwaran, V. Modified hunter prey optimization to enable secure communication for UAV. Int. j. inf. tecnol. 16, 1569–1579 (2024). https://doi.org/10.1007/s41870-023-01690-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01690-0

Keywords

Navigation