13.08.2018 Views

[Studies in Computational Intelligence 481] Artur Babiarz, Robert Bieda, Karol Jędrasiak, Aleksander Nawrat (auth.), Aleksander Nawrat, Zygmunt Kuś (eds.) - Vision Based Systemsfor UAV Applications (2013, Sprin

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Dedicated Wireless Communication Device for Group of Unmanned Vehicles 249<br />

case of the connection failure there is no possibility for cooperation therefore such<br />

model is usually only used for monitor<strong>in</strong>g of the vehicles parameters. In the fig1.b<br />

a model allow<strong>in</strong>g vehicles cooperation is presented. Each of the vehicles is communicat<strong>in</strong>g<br />

via each other us<strong>in</strong>g universal radio modem and PC class computer<br />

responsible for data encryption and implementation of the secure communication<br />

protocol. Such approach does not require central computer therefore its maximum<br />

range of operation is not limited as long as the cooperat<strong>in</strong>g objects are with<strong>in</strong><br />

reach of its own radio modems.<br />

Fig. 1. The idea of communication <strong>in</strong> the groups of unmanned vehicles. A) communication<br />

with the use of central ground base station. B) communication with use of local computers<br />

responsible for communication.<br />

The ma<strong>in</strong> disadvantage of such solution is the obligation of carry<strong>in</strong>g the relatively<br />

heavy PC class computer only for communication purposes. It is well<br />

known that the PC computers are not as reliable as dedicated solutions therefore it<br />

was decided to design a communication device that allows unmanned vehicles<br />

transparent communication without the need for <strong>in</strong>stall<strong>in</strong>g PC. A schema of such<br />

model is presented <strong>in</strong> the fig. 2.<br />

Dur<strong>in</strong>g design phase of the dedicated secure radio communication device presented<br />

<strong>in</strong> the article some assumptions about the application scenarios were made.<br />

First assumption is that a pair of devices that are will<strong>in</strong>g to communicate with<br />

each other are required to have a common symmetric key used dur<strong>in</strong>g <strong>auth</strong>orization<br />

and attempt<strong>in</strong>g connection processes. It is allowed that more devices, <strong>in</strong> some<br />

cases even the whole group are us<strong>in</strong>g the same symmetric key dur<strong>in</strong>g the process<br />

of <strong>auth</strong>orization. S<strong>in</strong>gle communication device can store multiple keys. However<br />

only one key per remote connection l<strong>in</strong>k is stored. The limitation’s orig<strong>in</strong> is the<br />

fact that before application the communication devices are configured us<strong>in</strong>g cable<br />

connection. Dur<strong>in</strong>g configuration an <strong>auth</strong>orization key is <strong>in</strong>stalled along with <strong>in</strong>formation<br />

about the devices that belong to the group and common group <strong>auth</strong>orization<br />

key.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!