1,596 research outputs found
Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives
The development of the Internet of Drones (IoD) becomes vital because of a
proliferation of drone-based civilian or military applications. The IoD based
technological revolution upgrades the current Internet environment into a more
pervasive and ubiquitous world. IoD is capable of enhancing the
state-of-the-art for drones while leveraging services from the existing
cellular networks. Irrespective to a vast domain and range of applications, IoD
is vulnerable to malicious attacks over open-air radio space. Due to increasing
threats and attacks, there has been a lot of attention on deploying security
measures for IoD networks. In this paper, critical threats and vulnerabilities
of IoD are presented. Moreover, taxonomy is created to classify attacks based
on the threats and vulnerabilities associated with the networking of drone and
their incorporation in the existing cellular setups. In addition, this article
summarizes the challenges and research directions to be followed for the
security of IoD.Comment: 13 pages, 3 Figures, 1 Table, The 3rd International Symposium on
Mobile Internet Security (MobiSec'18), Auguest 29-September 1, 2018, Cebu,
Philippines, Article No. 37, pp. 1-1
A Survey on Cellular-connected UAVs: Design Challenges, Enabling 5G/B5G Innovations, and Experimental Advancements
As an emerging field of aerial robotics, Unmanned Aerial Vehicles (UAVs) have
gained significant research interest within the wireless networking research
community. As soon as national legislations allow UAVs to fly autonomously, we
will see swarms of UAV populating the sky of our smart cities to accomplish
different missions: parcel delivery, infrastructure monitoring, event filming,
surveillance, tracking, etc. The UAV ecosystem can benefit from existing 5G/B5G
cellular networks, which can be exploited in different ways to enhance UAV
communications. Because of the inherent characteristics of UAV pertaining to
flexible mobility in 3D space, autonomous operation and intelligent placement,
these smart devices cater to wide range of wireless applications and use cases.
This work aims at presenting an in-depth exploration of integration synergies
between 5G/B5G cellular systems and UAV technology, where the UAV is integrated
as a new aerial User Equipment (UE) to existing cellular networks. In this
integration, the UAVs perform the role of flying users within cellular
coverage, thus they are termed as cellular-connected UAVs (a.k.a. UAV-UE,
drone-UE, 5G-connected drone, or aerial user). The main focus of this work is
to present an extensive study of integration challenges along with key 5G/B5G
technological innovations and ongoing efforts in design prototyping and field
trials corroborating cellular-connected UAVs. This study highlights recent
progress updates with respect to 3GPP standardization and emphasizes
socio-economic concerns that must be accounted before successful adoption of
this promising technology. Various open problems paving the path to future
research opportunities are also discussed.Comment: 30 pages, 18 figures, 9 tables, 102 references, journal submissio
IEEE Access special section editorial: Mission critical public-safety communications: architectures, enabling technologies, and future applications
Disaster management organizations such as fire brigades, rescue teams, and emergency medical service providers have a high priority demand to communicate with each other and with the victims by using mission-critical voice and data communications [item 1) in the Appendix]. In recent years, public safety agencies and organizations have started planning to evolve their existing land mobile radio system (LMRS) with long-term evolution (LTE)-based public safety solutions which provides broadband, ubiquitous, and mission-critical voice and data services. LTE provides high bandwidth and low latency services to the customers using internet protocol-based LTE network. Since mission critical communication services have different demands and priorities for dynamically varying situations for disaster-hit areas, the architecture and the communication technologies of the existing LTE networks need to be upgraded with a system that has the capability to respond efficiently and in a timely manner during critical situations
Machine Learning for Unmanned Aerial System (UAS) Networking
Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex missions simultaneously. However, the limitations of the conventional approaches are still a big challenge to make a trade-off between the massive management and efficient networking on a large scale.
With 5G NR and machine learning, in this dissertation, my contributions can be summarized as the following: I proposed a novel Optimized Ad-hoc On-demand Distance Vector (OAODV) routing protocol to improve the throughput of Intra UAS networking. The novel routing protocol can reduce the system overhead and be efficient. To improve the security, I proposed a blockchain scheme to mitigate the malicious basestations for cellular connected UAS networking and a proof-of-traffic (PoT) to improve the efficiency of blockchain for UAS networking on a large scale. Inspired by the biological cell paradigm, I proposed the cell wall routing protocols for heterogeneous UAS networking. With 5G NR, the inter connections between UAS networking can strengthen the throughput and elasticity of UAS networking. With machine learning, the routing schedulings for intra- and inter- UAS networking can enhance the throughput of UAS networking on a large scale. The inter UAS networking can achieve the max-min throughput globally edge coloring. I leveraged the upper and lower bound to accelerate the optimization of edge coloring.
This dissertation paves a way regarding UAS networking in the integration of CPS and machine learning. The UAS networking can achieve outstanding performance in a decentralized architecture. Concurrently, this dissertation gives insights into UAS networking on a large scale. These are fundamental to integrating UAS and National Aerial System (NAS), critical to aviation in the operated and unmanned fields. The dissertation provides novel approaches for the promotion of UAS networking on a large scale. The proposed approaches extend the state-of-the-art of UAS networking in a decentralized architecture. All the alterations can contribute to the establishment of UAS networking with CPS
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements
International audienc
Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobil Ad Hoc Networks
This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of reasons, not necessarily intentional), it earns a negative reputation. Each member of the MANET has its own unique and subjective set of Reputation Indexes (RI) that enumerates the perceived reputation of the other MANET nodes. Nodes that desire to send data will eliminate relay nodes they perceive to have a negative reputation during the formulation of a route. A 50-node MANET is simulated with streaming multimedia and varying levels of misbehavior to determine the impact of the framework on network performance. Results of this research were very favorable. Analysis of the simulation data shows the number of routing errors sent in a MANET is reduced by an average of 52% when using RIPSec. The network load is also reduced, decreasing the overall traffic introduced into the MANET and permitting individual nodes to perform more work without overtaxing their limited resources. Finally, throughput is decreased due to larger packet sizes and longer round trips for packets to traverse the MANET, but is still sufficient to pass traffic with high bandwidth requirements (i.e., video and imagery) that is of interest in military networks
European Reference Network for Critical Infrastructure Protection: ERNCIP Handbook 2018 edition
The ERNCIP network has been established to improve the protection of critical infrastructures in the EU. The European Reference Network for Critical Infrastructure Protection (ERNCIP) therefore works in close cooperation with all types of CIP stakeholders, focusing particularly on the technical protective security solutions.
This handbook aims to assist the dissemination of the activities and results of ERNCIP.
It is intended that the document will be updated and issued by the ERNCIP Office in spring each year. The information provided will be up to date as of the end of the previous calendar year, i.e. in this case as at 31 December 2017.
The report summarises the achievements of all the ERNCIP Thematic Groups, providing a convenient way to access information on any specific theme of interest covered by ERNCIP.
The report also describes current thematic group activities, to allow subject-matter experts and critical infrastructure operators to identify ongoing areas of research they might be interested in assisting.
This report is publicly available via the ERNCIP web site, and is distributed to all ERNCIP Group of EU CIP Experts for onward dissemination within their Member States.JRC.E.2-Technology Innovation in Securit
U.S. Unmanned Aerial Vehicles (UAVS) and Network Centric Warfare (NCW) impacts on combat aviation tactics from Gulf War I through 2007 Iraq
Unmanned, aerial vehicles (UAVs) are an increasingly important element of many modern militaries. Their success on battlefields in Afghanistan, Iraq, and around the globe has driven demand for a variety of types of unmanned vehicles. Their proven value consists in low risk and low cost, and their capabilities include persistent surveillance, tactical and combat reconnaissance, resilience, and dynamic re-tasking. This research evaluates past, current, and possible future operating environments for several UAV platforms to survey the changing dynamics of combat-aviation tactics and make recommendations regarding UAV employment scenarios to the Turkish military. While UAVs have already established their importance in military operations, ongoing evaluations of UAV operating environments, capabilities, technologies, concepts, and organizational issues inform the development of future systems. To what extent will UAV capabilities increasingly define tomorrow's missions, requirements, and results in surveillance and combat tactics? Integrating UAVs and concepts of operations (CONOPS) on future battlefields is an emergent science. Managing a transition from manned- to unmanned and remotely piloted aviation platforms involves new technological complexity and new aviation personnel roles, especially for combat pilots. Managing a UAV military transformation involves cultural change, which can be measured in decades.http://archive.org/details/usunmannedaerial109454211Turkish Air Force authors.Approved for public release; distribution is unlimited
- …