As the number of user equipment (UE) in any heterogeneous network (HetNet) assisted by unmanned aerial vehicles (UAV) continues to grow, so does the number of intruder nodes. The intruder/malicious nodes are able to interfere with the ongoing data transmission in the network and carry out different kinds of active and passive attacks such as spoofing, masquerading, impersonating, and so on in the network thus requiring an optimized security technique for the network. This article implements the novel functional encryption (FE) technique in the proposed UAV assisted HetNet model for the dense urban area to secure data against such intrusions. In this network model, UAV acts as a relay node for those UE which are in nonline‐of‐sight communication with macro based station (MBS). For securing the data transmission among UAV, UE, and MBS, FE technique is implemented in the network in two phases: the first phase between UE and MBS and the second phase between MBS and UE through UAV. During implementation, the Dolev‐Yao attack model is considered in which intruders are able to intercept or modify the UE data. The main objective of the FE technique implementation is to provide security from such intrusion attacks. The proposed methodology is validated using automated validation of Internet security protocols and applications (AVISPA) tool. The results of the AVISPA tool clearly indicate that the proposed technique is safe to implement in the UAV assisted HetNet, even in the presence of intruder nodes.
Due to suppression of central administration in WMN, network functioning like network controls, management, routing, switching, packet forwarding etc. are distributed among nodes, either collectively or individually. So, cooperation among nodes is highly solicited. However, there may exist node's malicious activities because of its open characteristics and limited available battery power. The nodes may misbehave by refusing to provide service or dropping down the packets because of its selfishness and malicious activity. The identification of misbehaving nodes and prevention from them can be one of the biggest challenges. Hence, the prime target of the chapter is to provide an overview of existing intrusion detection and prevention approaches, and secure routing or framework that can recognize and prevent from the malicious activities. The digital signature-based IDS to offer secure acknowledgment and an authentication mechanism has also been discussed. The expectation is the digital signature-based IDS will overcome the weakness of existing IDS.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.