Abstract
Unmanned aerial vehicles (UAVs) are rapidly developing communication networks with a wide range of uses. Due to its changing topology, the network communication raises security concerns. This work presents a novel routing and secure communication approach for UAV networks. In this process, the UAV is initially simulated, and the data transmission paths between the nodes are determined. Therefore, an optimal routing technique known as modified hunter prey optimization is developed for secure routing. Furthermore, the routing is established based on a multi-objective function such as distance, delay, and trust. Moreover, the data communication is carried out with the support of an evaluation and monitoring agent. Additionally, malicious identification is performed utilizing the deep maxout network, which considers signal strength, round trip time, packet size, packet delivery, and the number of incoming packets as input attributes. If any attack is detected, it is mitigated by a defensive agent. Moreover, metrics like packet delivery rate, delay, energy, and detection rate are employed to evaluate the performance of the model, in which the corresponding values 0.558 J, 0.775, 0.946 and 0.739 are achieved.
Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no new data were analyzed in this study.
References
Sangeetha Francelin VF, Daniel J, Velliangiri S (2022) Intelligent agent and optimization-based deep residual network to secure communication in UAV network. Int J Intell Syst 37(9):5508–5529
Park C, Lee S, Joo H, Kim H (2023) Empowering adaptive geolocation-based routing for UAV networks with reinforcement learning. Drones 7(6):387
Katila CJ, Okolo B, Buratti C, Verdone R, Caire G (2018) UAV-to-ground multi-hop communication using backpressure and FlashLinQ-based algorithms. In: 2018 IEEE 29th annual international symposium on personal, indoor and mobile radio communications (PIMRC). IEEE, pp 1179–1184
Mozaffari M, Saad W, Bennis M, Nam YH, Debbah M (2019) A tutorial on UAVs for wireless networks: applications, challenges, and open problems. IEEE Commun Surv Tutor 21(3):2334–2360
Luo H, Wu Y, Sun G, Yu H, Xu S, Guizani M (2023) ESCM: an efficient and secure communication mechanism for UAV networks. arXiv preprint arXiv:2304.13244
Huang H, Savkin AV (2020) Autonomous navigation of a solar-powered UAV for secure communication in urban environments with eavesdropping avoidance. Future Internet 12(10):170
Faraji-Biregani M, Fotohi R (2021) Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles. J Supercomput 77(5):5076–5103
Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36–42
Song H, Liu L, Pudlewski SM, Bentley ES (2020) Random network coding enabled routing protocol in unmanned aerial vehicle networks. IEEE Trans Wirel Commun 19(12):8382–8395
Nawaz H, Ali HM (2020) Implementation of cross layer design for efficient power and routing in UAV communication networks. Stud Informat Control 29(1):111–120
Ebrahimi D, Sharafeddine S, Ho PH, Assi C (2018) UAV-aided projection-based compressive data gathering in wireless sensor networks. IEEE Internet Things J 6(2):1893–1905
Zhuo R, Song S, Xu Y (2022) UAV communication network modeling and energy consumption optimization based on routing algorithm. Comput Math Methods Med 2022:1–10
Fotohi R, Nazemi E, Aliee FS (2020) An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks. Veh Commun 26:100267
Gupta L, Jain R, Vaszkun G (2015) Survey of important issues in UAV communication networks. IEEE Commun Surv Tutor 18(2):1123–1152
Chafle PV, Neha G (2023) Wader hunt optimization based UNET model for change detection in satellite image. Int J Inf Technol 15(3):1611–1623
Arunkumar M, Kumar KA (2023) GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment. Int J Inf Technol 15(3):1653–1660
Rath S, Dutta D (2023) A hybrid swarm optimization with trapezoidal and pentagonal fuzzy numbers using benchmark functions. Int J Inf Technol 15(5):2747–2758
Revanna JKC, Al-Nakash NYB (2023) Metaheuristic link prediction (MLP) using AI based ACO-GA optimization model for solving vehicle routing problem. Int J Inf Technol 15(7):3425–3439
Singh D, Singh BK, Behera AK (2023) A hybrid bioinspired model for improving the efficiency of correlative auscultation analysis. Int J Inf Technol 15(7):3605–3611
Miao Y, Metze F, Rawat S (2013) Deep maxout networks for low-resource speech recognition. In: Proceedings of 2013 IEEE workshop on automatic speech recognition and understanding. IEEE, pp 398–403
Naruei I, Keynia F, Sabbagh MA (2022) Hunter–prey optimization: algorithm and applications. Soft Comput 26(3):1279–1314
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yuvaraj, R., Sarveshwaran, V. Modified hunter prey optimization to enable secure communication for UAV. Int. j. inf. tecnol. 16, 1569–1579 (2024). https://doi.org/10.1007/s41870-023-01690-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-023-01690-0