3 research outputs found
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions
Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs)
are able to complete a number of tasks in cooperation with each other without
need for human intervention. In recent years, UAVs, which are widely utilized
in military missions, have begun to be deployed in civilian applications and
mostly for commercial purposes. With their growing numbers and range of
applications, UAVs are becoming more and more popular; on the other hand, they
are also the target of various threats which can exploit various
vulnerabilities of UAV systems in order to cause destructive effects. It is
therefore critical that security is ensured for UAVs and the networks that
provide communication between UAVs. In this survey, we aimed to present a
comprehensive detailed approach to security by classifying possible attacks
against UAVs and flying ad hoc networks (FANETs). We classified the security
threats into four major categories that make up the basic structure of UAVs;
hardware attacks, software attacks, sensor attacks, and communication attacks.
In addition, countermeasures against these attacks are presented in separate
groups as prevention and detection. In particular, we focus on the security of
FANETs, which face significant security challenges due to their characteristics
and are also vulnerable to insider attacks. Therefore, this survey presents a
review of the security fundamentals for FANETs, and also four different routing
attacks against FANETs are simulated with realistic parameters and then
analyzed. Finally, limitations and open issues are also discussed to direct
future wor
Recommended from our members
Intelligent based Packet Scheduling Scheme using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Technology for 5G. Design and Investigation of Bandwidth Management Technique for Service-Aware Traffic Engineering using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) for 5G
Multi-Protocol Label Switching (MPLS) makes use of traffic engineering (TE)
techniques and a variety of protocols to establish pre-determined highly
efficient routes in Wide Area Network (WAN). Unlike IP networks in which
routing decision has to be made through header analysis on a hop-by-hop
basis, MPLS makes use of a short bit sequence that indicates the forwarding
equivalence class (FEC) of a packet and utilises a predefined routing table to
handle packets of a specific FEC type. Thus header analysis of packets is not
required, resulting in lower latency. In addition, packets of similar
characteristics can be routed in a consistent manner. For example, packets
carrying real-time information can be routed to low latency paths across the
networks. Thus the key success to MPLS is to efficiently control and distribute
the bandwidth available between applications across the networks.
A lot of research effort on bandwidth management in MPLS networks has
already been devoted in the past. However, with the imminent roll out of 5G,
MPLS is seen as a key technology for mobile backhaul. To cope with the 5G
demands of rich, context aware and multimedia-based user applications, more
efficient bandwidth management solutions need to be derived.
This thesis focuses on the design of bandwidth management algorithms, more
specifically QoS scheduling, in MPLS network for 5G mobile backhaul. The
aim is to ensure the reliability and the speed of packet transfer across the
network. As 5G is expected to greatly improve the user experience with
innovative and high quality services, usersâ perceived quality of service (QoS)
needs to be taken into account when deriving such bandwidth management
solutions. QoS expectation from users are often subjective and vague. Thus
this thesis proposes the use of fuzzy logic based solution to provide service aware and user-centric bandwidth management in order to satisfy
requirements imposed by the network and users.
Unfortunately, the disadvantage of fuzzy logic is scalability since dependable
fuzzy rules and membership functions increase when the complexity of being
modelled increases. To resolve this issue, this thesis proposes the use of neuro-fuzzy to solicit interpretable IF-THEN rules.The algorithms are
implemented and tested through NS2 and Matlab simulations. The
performance of the algorithms are evaluated and compared with other
conventional algorithms in terms of average throughput, delay, reliability, cost,
packet loss ratio, and utilization rate.
Simulation results show that the neuro-fuzzy based algorithm perform better
than fuzzy and other conventional packet scheduling algorithms using IP and
IP over MPLS technologies.Tertiary Education Trust Fund (TETFUND