58 research outputs found

    Full-duplex UAV relay positioning for vehicular networks

    Get PDF
    Abstract. The unmanned aerial vehicles (UAVs) can be deployed as aerial base stations or wireless relays to enhance the coverage and guarantee the quality of service (QoS) of wireless networks. In this thesis, the positioning of a full-duplex (FD) UAV as a relay to provide coverage for an FD vehicular network is investigated. This problem is solved using two different methods. In both of the methods, the problem is formulated using a predefined set of locations for the UAV. Then this problem is solved for different configurations of the ground users and an optimal location is selected for the UAV to operate at. In the first approach, given the position of the vehicular users on the ground, a novel algorithm is proposed to find a location for the UAV to satisfy the QoS requirements of the vehicles in the network. The positioning problem is formulated as an l0\mathcal{l}_0 minimization which is non-combinatorial and NP-hard, and finding a globally optimal solution for this problem has exponential complexity. Therefore, the l0\mathcal{l}_0-norm is approximated by the l1\mathcal{l}_1-norm. Simulation results show that by locating the UAV using the proposed algorithm the overall performance of the network increases. In the second approach, the UAV positioning problem is solved using an MAB framework. In this case, a simple scenario where only one source node is communicating with the relay to transmit its message to the base station is considered. Given the location of the source node and the predefined locations of the UAV, the MAB algorithm can successfully identify the optimal location for the UAV so the system achieves the maximum possible sum rate. The Greedy, ϵ-Greedy, and upper confidence bound (UCB) algorithms are used to solve the problem. The comparison of these algorithms based on their regret values reveals that the UCB algorithm outperforms the performance of the other algorithms. Simulation results show that the UCB algorithm can successfully identify the optimal location for the UAV to maximize the sum rate of the communication links

    A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

    Full text link
    Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. In this survey, we aimed to present a comprehensive detailed approach to security by classifying possible attacks against UAVs and flying ad hoc networks (FANETs). We classified the security threats into four major categories that make up the basic structure of UAVs; hardware attacks, software attacks, sensor attacks, and communication attacks. In addition, countermeasures against these attacks are presented in separate groups as prevention and detection. In particular, we focus on the security of FANETs, which face significant security challenges due to their characteristics and are also vulnerable to insider attacks. Therefore, this survey presents a review of the security fundamentals for FANETs, and also four different routing attacks against FANETs are simulated with realistic parameters and then analyzed. Finally, limitations and open issues are also discussed to direct future wor
    • …
    corecore