spot_img
HomeResearch & DevelopmentDrones Secure Remote IoT Devices While Optimizing Data Flow

Drones Secure Remote IoT Devices While Optimizing Data Flow

TLDR: A new research paper introduces a system where Unmanned Aerial Vehicles (UAVs) are used to verify the integrity of remote IoT devices in multi-hop networks. The system, supported by a solar-powered charging station, uses a Deep Reinforcement Learning (DRL) algorithm (PD3QN) to optimize the UAV’s trajectory and charging schedule. This approach significantly reduces the ‘Age of Trust’ (time since last verification) by 88% and minimizes throughput loss due to attestation by 30%, effectively balancing device security with network performance.

The Internet of Things (IoT) has revolutionized many sectors, from agriculture to infrastructure management, by deploying devices across vast areas. However, these devices are often unattended and resource-limited, making them highly vulnerable to cyberattacks. Ensuring the integrity of these devices – verifying they haven’t been compromised by malware or malicious actors – is a critical challenge.

Traditional security methods, such as hardware-based attestation, are often too costly or impractical for existing IoT devices. Software-based attestation, while more flexible, typically requires direct, single-hop connections and can be vulnerable to attacks like man-in-the-middle. Furthermore, these methods often struggle with timing constraints and the multi-hop nature of many IoT networks.

A recent research paper, “Optimizing Age of Trust and Throughput in Multi-Hop UAV-Aided IoT Networks”, proposes an innovative solution: using Unmanned Aerial Vehicles (UAVs), or drones, as mobile verifiers. This approach bypasses the need for expensive hardware modules and establishes secure, wired connections (like USB) by landing directly on devices. This ensures reliable, low-latency verification, avoiding common wireless issues such as eavesdropping or interference.

The system envisions a UAV operating from a solar-powered charging station. This introduces unique challenges: the UAV has limited battery life, devices go offline during attestation (impacting data flow), and the solar energy supply is time-varying. The core problem is to optimize the UAV’s flight path and charging schedule to frequently check devices while minimizing the disruption to network data throughput.

To tackle this, the researchers introduced the concept of “Age of Trust” (AoT), which measures the time elapsed since a device was last verified. The goal is to keep this AoT low, ensuring devices are checked frequently. Simultaneously, they aim to maximize network throughput, which is the amount of data successfully delivered through the network.

The solution employs a Deep Reinforcement Learning (DRL) algorithm called Prioritized Dueling Double Deep Q-network (PD3QN). This advanced AI technique allows the UAV to learn the optimal strategy for deciding which device to visit next or when to return to the charging station, considering its battery level, the energy available at the base, and the AoT of all devices. The algorithm learns to balance the trade-off between maintaining device trustworthiness and ensuring continuous data flow.

Simulation results demonstrated significant improvements. After training, the PD3QN solution reduced the average Age of Trust by an impressive 88%, dropping from approximately 50 to 6. This means devices were verified much more frequently, enhancing network security. Crucially, it also increased network throughput, reducing data loss due to attestation by 30%. The system achieved a throughput of around 41.0 Kbps, close to the maximum possible 50 Kbps when no attestation occurs.

The study also showed that the system can adapt to varying priorities. By adjusting a weighting factor, operators can choose to prioritize either lower AoT (more frequent checks) or higher network throughput, depending on the specific needs of their IoT application. Compared to simpler strategies like randomly selecting devices or always checking the device with the highest AoT, the PD3QN approach consistently delivered a superior balance of security and performance across different network sizes.

Also Read:

This research marks a significant step towards building more secure and resilient multi-hop IoT networks, especially in remote or expansive environments where traditional security measures are impractical. Future work aims to scale this solution to larger networks with multiple UAVs and charging stations, potentially using state aggregation and multi-agent reinforcement learning to manage increased complexity.

Nikhil Patel
Nikhil Patelhttps://blogs.edgentiq.com
Nikhil Patel is a tech analyst and AI news reporter who brings a practitioner's perspective to every article. With prior experience working at an AI startup, he decodes the business mechanics behind product innovations, funding trends, and partnerships in the GenAI space. Nikhil's insights are sharp, forward-looking, and trusted by insiders and newcomers alike. You can reach him out at: [email protected]

- Advertisement -

spot_img

Gen AI News and Updates

spot_img

- Advertisement -