1,398 research outputs found

    Towards Reliable Multi-Path Routing : An Integrated Cooperation Model for Drones

    Get PDF
    Ad-hoc networks have evolved into a vital wireless communication component by offering an adaptable infrastructure suitable for various scenarios in our increasingly interconnected and mobile world. However, this adaptability also exposes these networks to security challenges, given their dynamic nature, where nodes frequently join and leave. This dynamism is advantageous but presents resource constraints and vulnerability to malicious nodes, impacting data transmission reliability and security. In this context, this article explores the development of a secure routing protocol for Ad-hoc networks based on a cooperation reinforcement model to reduce the degradation of routing performance. We leverage the reputation of nodes as an additional security layer to monitor their behavior and evaluate their level of reliability. To exemplify our solution, we focus on drone fleets (UAVs) as a pertinent case study. Drones frequently operate in dynamic, challenging environments, relying on Ad-hoc networks for communication. They serve as an apt illustration, highlighting the complexities of the issue and the efficacy of our proposed remedy. The simulation results show the effectiveness of our proposed solution compared to stae-of-the-artsolutions

    Authentication and Encryption of Aerial Robotics Communication

    Get PDF
    As designed to accept custom modules, autonomous aircrafts has developed into a fast-paced industry. The remote-control system of aerial robotics is typically based on wireless communications methods, such as 2.4 GHz, 5.8 GHz, or Wi-Fi. Because the services vary with the communication method, users face different kinds of cybersecurity challenges. This thesis provides an innovative solution for the authentication and security methods in proposed aerial robotics communication network. The thesis begins with an introduction to RF drone communications. After a discussion of the MAV Link communication protocol, the thesis will focus on the differences between the existing one-to-one network and the proposed one-to-many network. This thesis will then address the application of the transport layer security (TLS) layer, in connection with communication protocols, encryption, decryption, key distribution and authentication. The thesis concludes with a discussion of the future of Wi-Fi based aerial robotics networks

    Drone-Assisted Wireless Communications

    Get PDF
    In order to address the increased demand for any-time/any-where wireless connectivity, both academic and industrial researchers are actively engaged in the design of the fifth generation (5G) wireless communication networks. In contrast to the traditional bottom-up or horizontal design approaches, 5G wireless networks are being co-created with various stakeholders to address connectivity requirements across various verticals (i.e., employing a top-to-bottom approach). From a communication networks perspective, this requires obliviousness under various failures. In the context of cellular networks, base station (BS) failures can be caused either due to a natural or synthetic phenomenon. Natural phenomena such as earthquake or flooding can result in either destruction of communication hardware or disruption of energy supply to BSs. In such cases, there is a dire need for a mechanism through which capacity short-fall can be met in a rapid manner. Drone empowered small cellular networks, or so-called \quotes{flying cellular networks}, present an attractive solution as they can be swiftly deployed for provisioning public safety (PS) networks. While drone empowered self-organising networks (SONs) and drone small cell networks (DSCNs) have received some attention in the recent past, the design space of such networks has not been extensively traversed. So, the purpose of this thesis is to study the optimal deployment of drone empowered networks in different scenarios and for different applications (i.e., in cellular post-disaster scenarios and briefly in assisting backscatter internet of things (IoT)). To this end, we borrow the well-known tools from stochastic geometry to study the performance of multiple network deployments, as stochastic geometry provides a very powerful theoretical framework that accommodates network scalability and different spatial distributions. We will then investigate the design space of flying wireless networks and we will also explore the co-existence properties of an overlaid DSCN with the operational part of the existing networks. We define and study the design parameters such as optimal altitude and number of drone BSs, etc., as a function of destroyed BSs, propagation conditions, etc. Next, due to capacity and back-hauling limitations on drone small cells (DSCs), we assume that each coverage hole requires a multitude of DSCs to meet the shortfall coverage at a desired quality-of-service (QoS). Hence, we consider the clustered deployment of DSCs around the site of the destroyed BS. Accordingly, joint consideration of partially operating BSs and deployed DSCs yields a unique topology for such PS networks. Hence, we propose a clustering mechanism that extends the traditional Mat\'{e}rn and Thomas cluster processes to a more general case where cluster size is dependent upon the size of the coverage hole. As a result, it is demonstrated that by intelligently selecting operational network parameters such as drone altitude, density, number, transmit power and the spatial distribution of the deployment, ground user coverage can be significantly enhanced. As another contribution of this thesis, we also present a detailed analysis of the coverage and spectral efficiency of a downlink cellular network. Rather than relying on the first-order statistics of received signal-to-interference-ratio (SIR) such as coverage probability, we focus on characterizing its meta-distribution. As a result, our new design framework reveals that the traditional results which advocate lowering of BS heights or even optimal selection of BS height do not yield consistent service experience across users. Finally, for drone-assisted IoT sensor networks, we develop a comprehensive framework to characterize the performance of a drone-assisted backscatter communication-based IoT sensor network. A statistical framework is developed to quantify the coverage probability that explicitly accommodates a dyadic backscatter channel which experiences deeper fades than that of the one-way Rayleigh channel. We practically implement the proposed system using software defined radio (SDR) and a custom-designed sensor node (SN) tag. The measurements of parameters such as noise figure, tag reflection coefficient etc., are used to parametrize the developed framework

    Would Current Ad Hoc Routing Protocols be Adequate for the Internet of Vehicles? A Comparative Study

    Get PDF
    In recent years we have seen a great proliferation of smart vehicles, ranging from cars to little drones (both terrestrial and aerial), all endowed with sensors and communication capabilities. It is hence easy to foresee a future with even more smart and connected vehicles moving around, occupying space and creating an Internet of Vehicles (IoV). In this IoV, a multitude of nodes (both static and mobile) will generate a continuous multihop flow of local information to support local smart environment applications. Therefore, one interesting environment for the IoV would be in the form of 3-D mobile ad-hoc networks (MANETs). Unfortunately, MANET routing protocols have generally been designed and analyzed keeping in mind a 2-D scenario; there is no guarantee on how they would support a 3-D topology of the IoV. To this end, we have considered routing protocols deemed as the state-of-the-art for classic MANETs and tested them over 3-D topologies to evaluate their assets and technical challenges
    corecore