A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions (2306.14281v4)
Abstract: Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and Flying Ad Hoc Networks (FANETs). Our approach incorporates attack surface analysis and aligns it with the identification of potential threats. Additionally, we discuss countermeasures proposed in the existing literature in two categories: preventive and detection strategies. Our primary focus centers on the security challenges inherent to FANETs, acknowledging their susceptibility to insider threats due to their decentralized and dynamic nature. To provide a deeper understanding of these challenges, we simulate and analyze four distinct routing attacks on FANETs, using realistic parameters to evaluate their impact. Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations. Finally, we rigorously examine open issues, and propose research directions to guide future endeavors in this field.
- “Unmanned aircraft systems (uas) - icao,” [Accessed 17-July-2022]. [Online]. Available: https://www.icao.int/Meetings/UAS/Documents/Circular\%20328\_en.pdf
- “Commercial drone market size, share &; covid-19 impact analysis, by weight,” [Accessed 17-July-2022]. [Online]. Available: https://www.fortunebusinessinsights.com/commercial-drone-market-102171
- L. Goasduff, “Why flying drones could disrupt mobility and transportation beyond covid-19,” Smarter with Gartner, May, vol. 19, 2020.
- D. Orfanus, E. P. De Freitas, and F. Eliassen, “Self-organization as a supporting paradigm for military uav relay networks,” IEEE Communications letters, vol. 20, no. 4, pp. 804–807, 2016.
- D. Erdos, A. Erdos, and S. E. Watkins, “An experimental uav system for search and rescue challenge,” IEEE Aerospace and Electronic Systems Magazine, vol. 28, no. 5, pp. 32–37, 2013.
- J. Scherer, S. Yahyanejad, S. Hayat, E. Yanmaz, T. Andre, A. Khan, V. Vukadinovic, C. Bettstetter, H. Hellwagner, and B. Rinner, “An autonomous multi-uav system for search and rescue,” ser. DroNet ’15. New York, NY, USA: Association for Computing Machinery, 2015, p. 33–38. [Online]. Available: https://doi.org/10.1145/2750675.2750683
- B. Li and Y. Wu, “Path planning for uav ground target tracking via deep reinforcement learning,” IEEE Access, vol. 8, pp. 29 064–29 074, 2020.
- I. Bor-Yaliniz, S. S. Szyszkowicz, and H. Yanikomeroglu, “Environment-aware drone-base-station placements in modern metropolitans,” IEEE Wireless Communications Letters, vol. 7, no. 3, pp. 372–375, 2018.
- P. Radoglou-Grammatikis, P. Sarigiannidis, T. Lagkas, and I. Moscholios, “A compilation of uav applications for precision agriculture,” Computer Networks, vol. 172, p. 107148, 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S138912862030116X
- A. Press, “Computer virus infects drone plane command centre in us,” https://www.theguardian.com/technology/2011/oct/09/virus-infects-drone-plane-command, [Accessed 06-Jul-2022].
- J. Keller, “Iran–us rq-170 incident has defense industry saying ‘never again’to unmanned vehicle hacking,” Military & Aerospace Electronics, vol. 3, 2016.
- I. Mahmud and Y. Z. Cho, “Adaptive Hello Interval in FANET Routing Protocols for Green UAVs,” IEEE Access, vol. 7, pp. 63 004–63 015, 2019.
- J. George, P. B. Sujit, and J. B. Sousa, “Search strategies for multiple UAV search and destroy missions,” in J. Intell. Robot. Syst. Theory Appl., 2011.
- F. Al Fayez, M. Hammoudeh, B. Adebisi, and K. N. Abdul Sattar, “Assessing the effectiveness of flying ad hoc networks for international border surveillance,” Int. J. Distrib. Sens. Networks, vol. 15, no. 7, 2019.
- V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A survey on iot security: Application areas, security threats, and solution architectures,” IEEE Access, vol. 7, pp. 82 721–82 743, 2019.
- C. Barrado, R. Meseguer, J. López, E. Pastor, E. Santamaria, and P. Royo, “Wildfire monitoring using a mixed air-ground mobile network,” IEEE Pervasive Comput., vol. 9, no. 4, pp. 24–32, 2010.
- H. Xiang and L. Tian, “Development of a low-cost agricultural remote sensing system based on an autonomous unmanned aerial vehicle (UAV),” Biosyst. Eng., 2011.
- I. Bekmezci, E. Senturk, and T. Turker, “Security Issues in Flying Ad-Hoc Networks (FANETs),” J. Aeronaut. Sp. Technol., vol. 9, no. October, pp. 13–21, 2015.
- J.-A. Maxa, M.-S. B. Mahmoud, and N. Larrieu, “Survey on uaanet routing protocols and network security challenges,” Ad Hoc & Sensor Wireless Networks, 2017.
- G. K. Pandey, D. S. Gurjar, H. H. Nguyen, and S. Yadav, “Security threats and mitigation techniques in uav communications: A comprehensive survey,” IEEE Access, 2022.
- A. Chriki, H. Touati, H. Snoussi, and F. Kamoun, “Fanet: Communication, mobility models and security issues,” Computer Networks, vol. 163, p. 106877, 2019.
- F. Tlili, L. C. Fourati, S. Ayed, and B. Ouni, “Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures,” Ad Hoc Networks, vol. 129, no. January, 2022.
- Y. Zhi, Z. Fu, X. Sun, and J. Yu, “Security and Privacy Issues of UAV: A Survey,” Mob. Networks Appl., vol. 25, no. 1, pp. 95–101, 2020.
- M. Yahuza, M. Y. I. Idris, I. B. Ahmedy, A. W. A. Wahab, T. Nandy, N. M. Noor, and A. Bala, “Internet of drones security and privacy issues: Taxonomy and open challenges,” IEEE Access, vol. 9, pp. 57 243–57 270, 2021.
- V. Hassija, V. Chamola, A. Agrawal, A. Goyal, N. C. Luong, D. Niyato, F. R. Yu, and M. Guizani, “Fast, reliable, and secure drone communication: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2802–2832, 2021.
- J. P. Yaacoub, H. Noura, O. Salman, and A. Chehab, “Security analysis of drones systems: Attacks, limitations, and recommendations,” Internet of Things (Netherlands), vol. 11, p. 100218, 2020. [Online]. Available: https://doi.org/10.1016/j.iot.2020.100218
- R. Altawy and A. M. Youssef, “Security, privacy, and safety aspects of civilian drones: A survey,” ACM Transactions on Cyber-Physical Systems, vol. 1, no. 2, pp. 1–25, 2016.
- A. Rugo, C. A. Ardagna, and N. E. Ioini, “A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis,” ACM Comput. Surv., vol. 55, no. 1, pp. 1–35, 2023.
- Y. Mekdad, A. Aris, L. Babun, A. El Fergougui, M. Conti, R. Lazzeretti, and A. S. Uluagac, “A survey on security and privacy issues of uavs,” Computer Networks, vol. 224, p. 109626, 2023.
- I. A. Sumra, P. Sellappan, A. Abdullah, and A. Ali, “Security issues and Challenges in MANET-VANET-FANET: A Survey,” EAI Endorsed Trans. Energy Web, vol. 5, no. 17, 2018.
- S. Goumiri, M. A. Riahla, and M. Hamadouche, “Security issues in self-organized ad-hoc networks (manet, vanet, and fanet): A survey,” in Artificial Intelligence and Its Applications: Proceeding of the 2nd International Conference on Artificial Intelligence and Its Applications (2021). Springer, 2022, pp. 312–324.
- K.-Y. Tsao, T. Girdler, and V. G. Vassilakis, “A survey of cyber security threats and solutions for uav communications and flying ad-hoc networks,” Ad Hoc Networks, vol. 133, p. 102894, 2022.
- M. Abdelhafidh, N. Charef, A. B. Mnaouer, and L. C. Fourati, “Software-defined networking for flying ad-hoc network security: A survey,” in 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH). IEEE, 2022, pp. 232–237.
- O. Ceviz, P. Sadioglu, and S. Sen, “Analysis of routing attacks in fanets,” in Ad Hoc Networks and Tools for IT, W. Bao, X. Yuan, L. Gao, T. H. Luan, and D. B. J. Choi, Eds. Cham: Springer International Publishing, 2022, pp. 3–17.
- O. S. Oubbati, M. Atiquzzaman, P. Lorenz, M. H. Tareque, and M. S. Hossain, “Routing in flying Ad Hoc networks: Survey, constraints, and future challenge perspectives,” IEEE Access, 2019.
- F. Joseph, “How fast can drones fly?” 2018. [Online]. Available: https://3dinsider.com/drone-speed/
- K. Savio, “Fastest military drones in the world,” 2022. [Online]. Available: https://owlcation.com/misc/Fastest-Military-Drones-in-the-World
- L. Gupta, R. Jain, and G. Vaszkun, “Survey of Important Issues in UAV Communication Networks,” IEEE Commun. Surv. Tutorials, vol. 18, no. 2, pp. 1123–1152, 2016.
- A. Purohit, F. Mokaya, and P. Zhang, “Collaborative indoor sensing with the SensorFly aerial sensor network,” IPSN’12 - Proc. 11th Int. Conf. Inf. Process. Sens. Networks, pp. 145–146, 2012.
- T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wirel. Commun. Mob. Comput., vol. 2, no. 5, pp. 483–502, 2002.
- M. B. Yassein and . A. Damer, “Flying ad-hoc networks: Routing protocols, mobility models, issues,” International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, 2016. [Online]. Available: http://dx.doi.org/10.14569/IJACSA.2016.070621
- B. Van Der Bergh, A. Chiumento, and S. Pollin, “LTE in the sky: Trading off propagation benefits with interference costs for aerial nodes,” IEEE Commun. Mag., vol. 54, no. 5, pp. 44–50, 2016.
- S. Şen and J. A. Clark, “Intrusion detection in mobile ad hoc networks,” in Guide to wireless ad hoc networks. Springer, 2009, pp. 427–454.
- H. Ullah, M. Abu-Tair, S. McClean, P. Nixon, G. Parr, and C. Luo, “An unmanned aerial vehicle based wireless network for bridging communication,” in Proc. - 14th Int. Symp. Pervasive Syst. Algorithms Networks, I-SPAN 2017, 11th Int. Conf. Front. Comput. Sci. Technol. FCST 2017 3rd Int. Symp. Creat. Comput. ISCC 2017, 2017.
- R. M. Fouda, “Security vulnerabilities of cyberphysical unmanned aircraft systems,” IEEE Aerospace and Electronic Systems Magazine, vol. 33, no. 9, pp. 4–17, 2018.
- I. Bekmezci, O. K. Sahingoz, and . Temel, “Flying Ad-Hoc Networks (FANETs): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013.
- M. Y. Arafat and S. Moh, “Location-Aided Delay Tolerant Routing Protocol in UAV Networks for Post-Disaster Operation,” IEEE Access, 2018.
- D. Jung and P. Tsiotras, “Inertial attitude and position reference system development for a small UAV,” in Collect. Tech. Pap. - 2007 AIAA InfoTech Aerosp. Conf., 2007.
- Z. M. Fadlullah, D. Takaishi, H. Nishiyama, N. Kato, and R. Miura, “A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks,” IEEE Netw., 2016.
- A. Al-Hourani, S. Kandeepan, and S. Lardner, “Optimal LAP altitude for maximum coverage,” IEEE Wirel. Commun. Lett., 2014.
- M. Bacco, P. Cassará, M. Colucci, A. Gotta, M. Marchese, and F. Patrone, “A survey on network architectures and applications for nanosat and uav swarms,” in Wireless and Satellite Systems: 9th International Conference, WiSATS 2017, Oxford, UK, September 14-15, 2017, Proceedings 9. Springer, 2018, pp. 75–85.
- E. W. Frew and T. X. Brown, “Networking issues for small unmanned aircraft systems,” J. Intell. Robot. Syst. Theory Appl., vol. 54, no. 1-3 SPEC. ISS., pp. 21–37, 2009.
- N. Vanitha and G. Padmavathi, “A Comparative Study on Communication Architecture of Unmanned Aerial Vehicles and Security Analysis of False Data Dissemination Attacks,” Proc. 2018 Int. Conf. Curr. Trends Towar. Converging Technol. ICCTCT 2018, pp. 1–8, 2018.
- M. Aloqaily, O. Bouachir, A. Boukerche, and I. A. Ridhawi, “Design guidelines for blockchain-assisted 5g-uav networks,” IEEE Network, vol. 35, no. 1, pp. 64–71, 2021.
- K. Khullar, Y. Malhotra, and A. Kumar, “Decentralized and secure communication architecture for fanets using blockchain,” Procedia Computer Science, vol. 173, pp. 158–170, 01 2020.
- E. Ghribi, T. T. Khoei, H. T. Gorji, P. Ranganathan, and N. Kaabouch, “A secure blockchain-based communication approach for uav networks,” in 2020 IEEE International Conference on Electro Information Technology (EIT), 2020, pp. 411–415.
- W. Zheng, Z. Zheng, X. Chen, K. Dai, P. Li, and R. Chen, “Nutbaas: A blockchain-as-a-service platform,” IEEE Access, vol. 7, pp. 134 422–134 433, 2019.
- M. Kuzlu, M. Pipattanasomporn, L. Gurses, and S. Rahman, “Performance analysis of a hyperledger fabric blockchain framework: Throughput, latency and scalability,” in 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp. 536–540.
- C. Li, L. Zheng, W. Xie, and P. Yang, “Ad Hoc Network Routing Protocol Based on Location and Neighbor Sensing,” 2018 IEEE Int. Conf. Comput. Commun. Eng. Technol. CCET 2018, pp. 1–5, 2018.
- D. Cerri and A. Ghioni, “Securing AODV: The A-SAODV Secure Routing Prototype,” IEEE Commun. Mag., vol. 46, no. 2, pp. 120–125, 2008.
- M. A. Khan, A. Safi, I. M. Qureshi, and I. U. Khan, “Flying ad-hoc networks (fanets): A review of communication architectures, and routing protocols,” in 2017 First international conference on latest trends in electrical engineering and computing technologies (INTELLECT). IEEE, 2017, pp. 1–9.
- D. Shumeye Lakew, U. Sa’Ad, N. N. Dao, W. Na, and S. Cho, “Routing in Flying Ad Hoc Networks: A Comprehensive Survey,” IEEE Commun. Surv. Tutorials, vol. 22, no. 2, pp. 1071–1120, 2020.
- C. G. Leela Krishna and R. Murphy, “A review on cybersecurity vulnerabilities for unmanned aerial vehicles,” Auvsi Xponential 2018, pp. 0–5, 2018.
- G. Cornelius, P. Caire, N. Hochgeschwender, M. Völp, P. Verissimo, and H. Voos, “A Perspective of Security for Mobile Service Robots,” pp. 1–12.
- J. Marcus, “Belarus-made armed drone shot down in ukraine.” [Online]. Available: https://defence-blog.com/belarus-made-armed-drone-shot-down-in-ukraine/
- “Russian electronic warfare drone shot down in ukraine: Report.” [Online]. Available: https://www.thedefensepost.com/2022/06/21/russia-electronic-warfare-drone-ukraine/
- “Saudi oil attacks: Who’s using drones in the middle east?” [Online]. Available: https://www.bbc.com/news/world-middle-east-49718828
- R. Spreitzer, V. Moonsamy, T. Korak, and S. Mangard, “Systematic classification of side-channel attacks: A case study for mobile devices,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 465–488, 2017.
- F.-X. Standaert, “Introduction to side-channel attacks,” in Secure integrated circuits and systems. Springer, 2010, pp. 27–42.
- F. Koeune and F.-X. Standaert, “A tutorial on physical security and side-channel attacks,” Foundations of Security Analysis and Design III, pp. 78–108, 2005.
- Y. Park, O. C. Onar, and B. Ozpineci, “Potential Cybersecurity Issues of Fast Charging Stations with Quantitative Severity Analysis,” 2019 IEEE CyberPELS, CyberPELS 2019, pp. 1–7, 2019.
- V. Desnitsky and I. Kotenko, “Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures,” Simul. Model. Pract. Theory, vol. 107, no. December 2020, p. 102244, 2021. [Online]. Available: https://doi.org/10.1016/j.simpat.2020.102244
- V. Shakhov and I. Koo, “Depletion-of-battery attack: Specificity, modelling and analysis,” Sensors (Switzerland), vol. 18, no. 6, 2018.
- A. B. Lopez, K. Vatanparvar, A. P. Deb Nath, S. Yang, S. Bhunia, and M. A. Al Faruque, “A Security Perspective on Battery Systems of the Internet of Things,” J. Hardw. Syst. Secur., vol. 1, no. 2, pp. 188–199, 2017.
- S. Belikovetsky, M. Yampolskiy, J. Toh, J. Gatlin, and Y. Elovici, “Dr0wned – Cyber-physical attack with additive manufacturing,” 11th USENIX Work. Offensive Technol. WOOT 2017, co-located with USENIX Secur. 2017, 2017.
- U. Guin, K. Huang, D. Dimase, J. M. Carulli, M. Tehranipoor, and Y. Makris, “Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain,” Proc. IEEE, vol. 102, no. 8, pp. 1207–1228, 2014.
- Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim, “Rocking drones with intentional sound noise on gyroscopic sensors,” Proc. 24th USENIX Secur. Symp., pp. 881–896, 2015.
- V. Lisa, “Drone hijacked by hackers from texas college with $1,000 spoofer,” 2012. [Online]. Available: https://nakedsecurity.sophos.com/2012/07/02/drone-hackedwith-1000-spoofer/
- Z. Feng, N. Guan, M. Lv, W. Liu, Q. Deng, X. Liu, and W. Yi, “Efficient drone hijacking detection using two-step GA-XGBoost,” J. Syst. Archit., vol. 103, no. December 2019, 2020.
- N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Čapkun, “On the requirements for successful GPS spoofing attacks,” Proc. ACM Conf. Comput. Commun. Secur., pp. 75–85, 2011.
- M. Pasternak, N. Kahani, M. Bagherzadeh, J. Dingel, and J. R. Cordy, “Simgen: A tool for generating simulations and visualizations of embedded systems on the unity game engine,” in Proceedings of the 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 2018, pp. 42–46.
- J. A. Saputro, E. E. Hartadi, and M. Syahral, “Implementation of gps attacks on dji phantom 3 standard drone as a security vulnerability test,” in 2020 1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering (ICITAMEE). IEEE, 2020, pp. 95–100.
- K. Mansfield, T. Eveleigh, D. Sc, T. H. H. D. Sc, S. Sarkani, and D. Sc, “Unmanned Aerial Vehicle Smart Device Ground Control Station Cyber Security Threat Model,” pp. 722–728, 2013.
- J. Crook, “Infamous hacker creates skyjack to hunt, hack, and control other drones,” TechCrunch, 2013.
- N. Shachtman, “Computer virus hits US drone fleet,” CNN. com, Oct., 2011. [Online]. Available: http://www.cs.clemson.edu/course/cpsc420/material/Papers/ComputerVirusHitsUSDroneFleet.pdf
- S. Rahul, “Maldrone the first backdoor for drones,” 2015. [Online]. Available: http://http://garage4hackers.com/entry.php?b=3105
- C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, “Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 184–208, 2016.
- H. Shin, K. Choi, Y. Park, J. Choi, and Y. Kim, “Security analysis of fhss-type drone controller,” in Information Security Applications: 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papers 16. Springer, 2016, pp. 240–253.
- B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey of attacks and countermeasures in mobile ad hoc networks,” Wireless network security, pp. 103–135, 2007.
- A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming attacks and countermeasures in wsns,” IEEE Communications Surveys & Tutorials, vol. 11, no. 4, pp. 42–56, 2009.
- “Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution,” J. Supercomput., vol. 74, no. 10, pp. 4928–4944, 2018. [Online]. Available: https://doi.org/10.1007/s11227-018-2287-8
- A. K. Rai, R. R. Tewari, and S. K. Upadhyay, “Different types of attacks on integrated manet-internet communication,” International Journal of Computer Science and Security, vol. 4, no. 3, pp. 265–274, 2010.
- A. Daniel, “A Survey on Detection of Sinkhole Attack in Wireless Sensor Networks,” vol. 91, no. 7, pp. 48–52, 2014.
- J. A. Maxa, M. S. Ben Mahmoud, and N. Larrieu, “Performance evaluation of a new secure routing protocol for UAV Ad hoc Network,” AIAA/IEEE Digit. Avion. Syst. Conf. - Proc., vol. 2019-September, 2019.
- Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” in IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), vol. 3. IEEE, 2003, pp. 1976–1986.
- J.-A. Maxa, M. S. B. Mahmoud, and N. Larrieu, “Joint model-driven design and real experiment-based validation for a secure uav ad hoc network routing protocol,” in 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE, 2016, pp. 1E2–1.
- Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks and defense in wireless ad hoc network routing protocols,” in Proceedings of the 2nd ACM workshop on Wireless security, 2003, pp. 30–40.
- C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv) routing,” Tech. Rep., 2003.
- Y.-C. Hu, D. A. Maltz, and D. B. Johnson, “The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4,” RFC 4728, Feb. 2007. [Online]. Available: https://www.rfc-editor.org/info/rfc4728
- M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3, pp. 106–107, 2002.
- G. Montenegro and C. Castelluccia, “Statistically unique and cryptographically verifiable (sucv) identifiers and addresses,” in In Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS. Citeseer, 2002.
- S. Sen, J. A. Clark, and J. E. Tapiador, “Security threats in mobile ad hoc networks,” Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publications, pp. 127–147, 2010.
- G. Vasconcelos, G. Carrijo, R. Miani, J. Souza, and V. Guizilini, “The impact of dos attacks on the ar. drone 2.0,” in 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS/SBR). IEEE, 2016, pp. 127–132.
- “hping3(8) - Linux man page — linux.die.net,” https://linux.die.net/man/8/hping3, [Accessed 16-Jun-2023].
- “GitHub - NewEraCracker/LOIC: Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox’s LOIC project. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. — github.com,” https://github.com/NewEraCracker/LOIC, [Accessed 16-Jun-2023].
- “netwox(1) - Linux man page — linux.die.net,” https://linux.die.net/man/1/netwox, [Accessed 16-Jun-2023].
- J.-A. Maxa, M. S. B. Mahmoud, and N. Larrieu, “Extended verification of secure uaanet routing protocol,” in 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). IEEE, 2016, pp. 1–16.
- K. Edemacu, M. Euku, and R. Ssekibuule, “Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review,” Int. J. Netw. Secur. Its Appl., vol. 6, no. 5, pp. 75–86, 2014.
- C. Ge, X. Ma, and Z. Liu, “A semi-autonomous distributed blockchain-based framework for UAVs system,” J. Syst. Archit., vol. 107, no. December 2019, p. 101728, 2020. [Online]. Available: https://doi.org/10.1016/j.sysarc.2020.101728
- X. Tan, Z. Zuo, S. Su, X. Guo, and X. Sun, “Research of Security Routing Protocol for UAV Communication Network Based on AODV,” 2020.
- V. Tolety and T. Camp, “Load reduction in ad hoc networks using mobile servers,” Math. Comput. Sci., vol. Master, 1999.
- D. Broyles, A. Jabbar, and J. P. Sterbenz, “Design and analysis of a 3-D gauss-markov mobility model for highly dynamic airborne networks,” Proc. Int. Telemetering Conf., vol. 46, no. Itc 2010, 2010.
- “The ns-3 network simulator,” http://www.nsnam.org/.
- J. P. Rohrer, E. K. Cetinkaya, H. Narra, D. Broyles, K. Peters, and J. P. Sterbenz, “Aerorp performance in highly-dynamic airborne networks using 3d gauss-markov mobility model,” in 2011-MILCOM 2011 Military Communications Conference. IEEE, 2011, pp. 834–841.
- Y. Li and C. Pu, “Lightweight digital signature solution to defend micro aerial vehicles against man-in-the-middle attack,” in 2020 IEEE 23rd International Conference on Computational Science and Engineering (CSE), 2020, pp. 92–97.
- C. Pu and Y. Li, “Lightweight authentication protocol for unmanned aerial vehicles using physical unclonable function and chaotic system,” in 2020 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN, 2020, pp. 1–6.
- A. Varga, “Omnet++,” in Modeling and tools for network simulation. Springer, 2010, pp. 35–59.
- D. M’Raïhi, S. Machani, M. Pei, and J. Rydell, “TOTP: time-based one-time password algorithm,” RFC, vol. 6238, pp. 1–16, 2011. [Online]. Available: https://doi.org/10.17487/RFC6238
- S. A. Chaudhry, K. Yahya, M. Karuppiah, R. Kharel, A. K. Bashir, and Y. B. Zikria, “Gcacs-iod: A certificate based generic access control scheme for internet of drones,” Computer Networks, vol. 191, p. 107999, 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1389128621001195
- T. Wu, X. Guo, Y. Chen, S. Kumari, and C. Chen, “Amassing the security: An enhanced authentication protocol for drone communications over 5g networks,” Drones, vol. 6, no. 1, 2022. [Online]. Available: https://www.mdpi.com/2504-446X/6/1/10
- S. Hussain, K. Mahmood, M. K. Khan, C.-M. Chen, B. A. Alzahrani, and S. A. Chaudhry, “Designing secure and lightweight user access to drone for smart city surveillance,” Computer Standards & Interfaces, vol. 80, p. 103566, 2022.
- D. Davidson, H. Wu, R. Jellinek, V. Singh, and T. Ristenpart, “Controlling {{\{{UAVs}}\}} with sensor input spoofing attacks,” in 10th USENIX workshop on offensive technologies (WOOT 16), 2016.
- M. Hooper, Y. Tian, R. Zhou, B. Cao, A. P. Lauf, L. Watkins, W. H. Robinson, and W. Alexis, “Securing commercial WiFi-based UAVs from common security attacks,” Proc. - IEEE Mil. Commun. Conf. MILCOM, pp. 1213–1218, 2016.
- L. Mendiboure, M. Chalouf, and F. Krief, “Survey on blockchain-based applications in internet of vehicles,” Computers & Electrical Engineering, vol. 84, p. 106646, 06 2020.
- B. Mikavica and A. Kostić-Ljubisavljević, “Blockchain-based solutions for security, privacy, and trust management in vehicular networks: a survey,” The Journal of Supercomputing, vol. 77, no. 9, pp. 9520–9575, Sep 2021. [Online]. Available: https://doi.org/10.1007/s11227-021-03659-x
- D. Saraswat, A. Verma, P. Bhattacharya, S. Tanwar, G. Sharma, P. N. Bokoro, and R. Sharma, “Blockchain-based federated learning in uavs beyond 5g networks: A solution taxonomy and future directions,” IEEE Access, vol. 10, pp. 33 154–33 182, 2022.
- X. Liang, J. Zhao, S. Shetty, and D. Li, “Towards data assurance and resilience in iot using blockchain,” in MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), 2017, pp. 261–266.
- T. Rana, A. Shankar, M. K. Sultan, R. Patan, and B. Balusamy, “An intelligent approach for uav and drone privacy security using blockchain methodology,” in 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2019, pp. 162–167.
- F. Sakiz and S. Sen, “A survey of attacks and detection mechanisms on intelligent transportation systems: Vanets and iov,” Ad Hoc Networks, vol. 61, pp. 33–50, 2017.
- S. Ouiazzane, F. Barramou, and M. Addou, “Towards a Multi-Agent based Network Intrusion Detection System for a Fleet of Drones,” Int. J. Adv. Comput. Sci. Appl., vol. 11, no. 10, pp. 351–362, 2020.
- I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization.” ICISSp, vol. 1, pp. 108–116, 2018.
- R. Fotohi, M. Abdan, and S. Ghasemi, “A self-adaptive intrusion detection system for securing uav-to-uav communications based on the human immune system in uav networks,” Journal of Grid Computing, vol. 20, no. 3, pp. 1–26, 2022.
- R. Shrestha, A. Omidkar, S. A. Roudi, R. Abbas, and S. Kim, “Machine-learning-enabled intrusion detection system for cellular connected uav networks,” Electronics, vol. 10, no. 13, p. 1549, 2021.
- C. Rani, H. Modares, R. Sriram, D. Mikulski, and F. L. Lewis, “Security of unmanned aerial vehicle systems against cyber-physical attacks,” The Journal of Defense Modeling and Simulation, vol. 13, no. 3, pp. 331–342, 2016.
- K. Singh and A. K. Verma, “Tbcs: A trust based clustering scheme for secure communication in flying ad-hoc networks,” Wireless Personal Communications, vol. 114, pp. 3173–3196, 2020.
- M. P. Arthur, “Detecting signal spoofing and jamming attacks in uav networks using a lightweight ids,” in 2019 international conference on computer, information and telecommunication systems (CITS). IEEE, 2019, pp. 1–5.
- R. A. Ramadan, A. H. Emara, M. Al-Sarem, and M. Elhamahmy, “Internet of drones intrusion detection using deep learning,” Electron., vol. 10, no. 21, 2021.
- M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in 2009 IEEE symposium on computational intelligence for security and defense applications. Ieee, 2009, pp. 1–6.
- “Nsl-kdd dataset,” http://nsl.cs.unb.ca/nsl-kdd/.
- N. Moustafa and J. Slay, “Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set),” in 2015 military communications and information systems conference (MilCIS). IEEE, 2015, pp. 1–6.
- “Kyoto,” http://www.takakura.com/Kyoto_data/.
- N. Moustafa, “A new distributed architecture for evaluating ai-based security systems at the edge: Network ton_iot datasets,” Sustainable Cities and Society, vol. 72, p. 102994, 2021.
- O. Bouhamed, O. Bouachir, M. Aloqaily, and I. Al Ridhawi, “Lightweight ids for uav networks: A periodic deep reinforcement learning-based approach,” in 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 2021, pp. 1032–1037.
- J. Whelan, T. Sangarapillai, O. Minawi, A. Almehmadi, and K. El-Khatib, “Novelty-based intrusion detection of sensor attacks on unmanned aerial vehicles,” in Proceedings of the 16th ACM symposium on QoS and security for wireless and mobile networks, 2020, pp. 23–28.
- C. Pu and P. Zhu, “Defending against flooding attacks in the internet of drones environment,” in 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, 2021, pp. 1–6.
- J. P. Condomines, R. Zhang, and N. Larrieu, “Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation,” Ad Hoc Networks, vol. 90, p. 101759, 2019. [Online]. Available: https://doi.org/10.1016/j.adhoc.2018.09.004
- H. Sedjelmaci, S. M. Senouci, and N. Ansari, “A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks,” IEEE Trans. Syst. Man, Cybern. Syst., vol. 48, no. 9, pp. 1594–1606, 2018.
- H. Sedjelmaci, S. M. Senouci, and M. A. Messous, “How to detect cyber-attacks in unmanned aerial vehicles network?” 2016 IEEE Glob. Commun. Conf. GLOBECOM 2016 - Proc., 2016.
- L. Zomlot, S. C. Sundaramurthy, K. Luo, X. Ou, and S. R. Rajagopalan, “Prioritizing intrusion analysis using dempster-shafer theory,” in Proceedings of the 4th ACM workshop on Security and artificial intelligence, 2011, pp. 59–70.
- N. I. Mowla, N. H. Tran, I. Doh, and K. Chae, “Federated learning-based cognitive detection of jamming attack in flying ad-hoc network,” IEEE Access, vol. 8, pp. 4338–4350, 2019.
- ——, “Afrl: Adaptive federated reinforcement learning for intelligent jamming defense in fanet,” Journal of Communications and Networks, vol. 22, no. 3, pp. 244–258, 2020.
- M. Burrows, M. Abadi, and R. M. Needham, “A logic of authentication,” Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, vol. 426, no. 1871, pp. 233–271, 1989. [Online]. Available: https://royalsocietypublishing.org/doi/abs/10.1098/rspa.1989.0125
- R. Canetti, O. Goldreich, and S. Halevi, “The random oracle methodology, revisited,” J. ACM, vol. 51, no. 4, p. 557–594, jul 2004. [Online]. Available: https://doi.org/10.1145/1008731.1008734
- X. Tan, Z. Zuo, S. Su, X. Guo, and X. Sun, “Research of security routing protocol for UAV communication network based on AODV,” Electron., vol. 9, no. 8, pp. 1–18, 2020.
- A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications surveys & tutorials, vol. 18, no. 2, pp. 1153–1176, 2015.
- S. Rowe and C. R. Wagner, “An introduction to the joint architecture for unmanned systems (jaus),” Ann Arbor, vol. 1001, p. 48108, 2008.
- EUROCONTROL, “Proving operations of drones with initial uas traffic management,” https://www.eurocontrol.int/project/proving-operations-drones-initial-uas-traffic-management.
- A. N. S. I. (ANSI), “Unmanned aircraft systems standardization collaborative (uaccs),” https://www.ansi.org/standards-coordination/collaboratives-activities/unmanned-aircraft-systems-collaborative.
- Ozlem Ceviz (3 papers)
- Pinar Sadioglu (3 papers)
- Sevil Sen (8 papers)