697 research outputs found

    Towards Reliable Multi-Path Routing : An Integrated Cooperation Model for Drones

    Get PDF
    Ad-hoc networks have evolved into a vital wireless communication component by offering an adaptable infrastructure suitable for various scenarios in our increasingly interconnected and mobile world. However, this adaptability also exposes these networks to security challenges, given their dynamic nature, where nodes frequently join and leave. This dynamism is advantageous but presents resource constraints and vulnerability to malicious nodes, impacting data transmission reliability and security. In this context, this article explores the development of a secure routing protocol for Ad-hoc networks based on a cooperation reinforcement model to reduce the degradation of routing performance. We leverage the reputation of nodes as an additional security layer to monitor their behavior and evaluate their level of reliability. To exemplify our solution, we focus on drone fleets (UAVs) as a pertinent case study. Drones frequently operate in dynamic, challenging environments, relying on Ad-hoc networks for communication. They serve as an apt illustration, highlighting the complexities of the issue and the efficacy of our proposed remedy. The simulation results show the effectiveness of our proposed solution compared to stae-of-the-artsolutions

    Would Current Ad Hoc Routing Protocols be Adequate for the Internet of Vehicles? A Comparative Study

    Get PDF
    In recent years we have seen a great proliferation of smart vehicles, ranging from cars to little drones (both terrestrial and aerial), all endowed with sensors and communication capabilities. It is hence easy to foresee a future with even more smart and connected vehicles moving around, occupying space and creating an Internet of Vehicles (IoV). In this IoV, a multitude of nodes (both static and mobile) will generate a continuous multihop flow of local information to support local smart environment applications. Therefore, one interesting environment for the IoV would be in the form of 3-D mobile ad-hoc networks (MANETs). Unfortunately, MANET routing protocols have generally been designed and analyzed keeping in mind a 2-D scenario; there is no guarantee on how they would support a 3-D topology of the IoV. To this end, we have considered routing protocols deemed as the state-of-the-art for classic MANETs and tested them over 3-D topologies to evaluate their assets and technical challenges

    Routing schemes in FANETs: a survey

    Get PDF
    Flying ad hoc network (FANET) is a self-organizing wireless network that enables inexpensive, flexible, and easy-to-deploy flying nodes, such as unmanned aerial vehicles (UAVs), to communicate among themselves in the absence of fixed network infrastructure. FANET is one of the emerging networks that has an extensive range of next-generation applications. Hence, FANET plays a significant role in achieving application-based goals. Routing enables the flying nodes to collaborate and coordinate among themselves and to establish routes to radio access infrastructure, particularly FANET base station (BS). With a longer route lifetime, the effects of link disconnections and network partitions reduce. Routing must cater to two main characteristics of FANETs that reduce the route lifetime. Firstly, the collaboration nature requires the flying nodes to exchange messages and to coordinate among themselves, causing high energy consumption. Secondly, the mobility pattern of the flying nodes is highly dynamic in a three-dimensional space and they may be spaced far apart, causing link disconnection. In this paper, we present a comprehensive survey of the limited research work of routing schemes in FANETs. Different aspects, including objectives, challenges, routing metrics, characteristics, and performance measures, are covered. Furthermore, we present open issues

    Deployment of drone-based small cells for public safety communication system

    Get PDF
    In the event of a natural disaster, communications infrastructure plays an important role in organizing effective rescue services. However, the infrastructure-based communications are often affected during severe disaster events such as earthquakes, landslides, floods, and storm surges. Addressing this issue, the article proposes a novel drone-based cellular infrastructure to revive necessary communications for out-of-coverage user equipment (UE) which is in the disaster area. In particular, a matching game algorithm is proposed using one-to-many approach wherein several drone small cells (DSCs) are deployed to match different UEs to reach a stable connection with optimal throughput. In addition, a medium access control framework is then developed to optimize emergency and high priority communications initiated from the rescue workers and vulnerable individuals. The simulation results show that the throughput for the out-of-coverage UEs are significantly improved when the DSCs are deployed in public safety network while the channel access delay is also notably reduced for emergency communications within the affected areas

    Architecture design for disaster resilient management network using D2D technology

    Get PDF
    Huge damages from natural disasters, such as earthquakes, floods, landslide, tsunamis, have been reported in recent years, claiming many lives, rendering millions homeless and causing huge financial losses worldwide. The lack of effective communication between the public rescue/safety agencies, rescue teams, first responders and trapped survivors/victims makes the situation even worse. Factors like dysfunctional communication networks, limited communications capacity, limited resources/services, data transformation and effective evaluation, energy, and power deficiency cause unnecessary hindrance in rescue and recovery services during a disaster. The new wireless communication technologies are needed to enhance life-saving capabilities and rescue services. In general, in order to improve societal resilience towards natural catastrophes and develop effective communication infrastructure, innovative approaches need to be initiated to provide improved quality, better connectivity in the events of natural and human disasters. In this thesis, a disaster resilient network architecture is proposed and analysed using multi-hop communications, clustering, energy harvesting, throughput optimization, reliability enhancement, adaptive selection, and low latency communications. It also examines the importance of mode selection, power management, frequency and time resource allocation to realize the promises of Long-term Evolution (LTE) Device to Device (D2D) communication. In particular, to support resilient and energy efficient communication in disaster-affected areas. This research is examined by thorough and vigorous simulations and validated through mathematical modelling. Overall, the impact of this research is twofold: i) it provides new technologies for effective inter- and intra-agency coordination system during a disaster event by establishing a stronger and resilient communication; and ii) It offers a potential solution for stakeholders such as governments, rescue teams, and general public with new informed information on how to establish effective policies to cope with challenges before, during and after the disaster events

    A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

    Full text link
    Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. In this survey, we aimed to present a comprehensive detailed approach to security by classifying possible attacks against UAVs and flying ad hoc networks (FANETs). We classified the security threats into four major categories that make up the basic structure of UAVs; hardware attacks, software attacks, sensor attacks, and communication attacks. In addition, countermeasures against these attacks are presented in separate groups as prevention and detection. In particular, we focus on the security of FANETs, which face significant security challenges due to their characteristics and are also vulnerable to insider attacks. Therefore, this survey presents a review of the security fundamentals for FANETs, and also four different routing attacks against FANETs are simulated with realistic parameters and then analyzed. Finally, limitations and open issues are also discussed to direct future wor
    corecore