As the number of user equipment (UE) in any heterogeneous network (HetNet) assisted by unmanned aerial vehicles (UAV) continues to grow, so does the number of intruder nodes. The intruder/malicious nodes are able to interfere with the ongoing data transmission in the network and carry out different kinds of active and passive attacks such as spoofing, masquerading, impersonating, and so on in the network thus requiring an optimized security technique for the network. This article implements the novel functional encryption (FE) technique in the proposed UAV assisted HetNet model for the dense urban area to secure data against such intrusions. In this network model, UAV acts as a relay node for those UE which are in nonline‐of‐sight communication with macro based station (MBS). For securing the data transmission among UAV, UE, and MBS, FE technique is implemented in the network in two phases: the first phase between UE and MBS and the second phase between MBS and UE through UAV. During implementation, the Dolev‐Yao attack model is considered in which intruders are able to intercept or modify the UE data. The main objective of the FE technique implementation is to provide security from such intrusion attacks. The proposed methodology is validated using automated validation of Internet security protocols and applications (AVISPA) tool. The results of the AVISPA tool clearly indicate that the proposed technique is safe to implement in the UAV assisted HetNet, even in the presence of intruder nodes.
In recent years, Unmanned Aerial Vehicles (UAVs) have gained significant interest in research groups due to the wide range of applications, such as disaster surveillance and monitoring, rescue operations, military, civil, and so forth. UAVs are most often used to fulfill both user's services and requirements such as wireless communication facilities to end-users, as a relay node to extend the coverage of the core network, and so forth. UAVs are versatile in design and can cover larger areas, contrary to the Tethered Balloon and Loon Balloon systems. Generally in any natural or humanmade disaster, there is a high potential risk of damage to buildings, transport systems, communication systems, and basic services. During heavy disasters like landslides, forest fires, floods, earthquakes, and so forth, the conventional terrestrial communication system gets destroyed, and people face many problems. In this case, UAVs prove to offer a better solution to provide fast, cost-effective, easy to deploy, and secure wireless communication to the victims. But there are some issues like interference between UAVs and other base stations, coordination between UAVs, Quality of Service requirements, Size, Weight, and Power limitation, delay, coverage, positioning of UAVs, and so forth. This study article mainly highlighted these issues and try to present the recent developments of the state-of-the-art to overcome these issues. In UAV communications, with an increasing emphasis on how UAVs can be integrated with different technologies, such as the Internet of Things, Wireless Sensor Network, Heterogeneous Network, and Cloud computing. The primary aim of this article is to examine how UAVs can assist survivors in floods, earthquakes, tsunamis, or in any natural or human-made disaster situations, either in the present or soon. Also, it focused on various applications of UAVs in disaster management (DM). It underlines the significance of UAVs in DM and their advantages. It also focuses on the various issues and challenges faced by the UAV-based infrastructure and security issues and gives future directions.
Unmanned aerial vehicle (UAV) has become a priority in the industrial and academic research community for the last few years. With the fast development of wireless networking technologies, it is widely used in many applications such as surveillance, search and rescue (SAR) operation, disaster management, remote monitoring, and so forth. Emergency communication for victims and first responders is one of the critical requirements during natural and human-made disasters. Airborne Base Stations (BS) or UAV-mounted BS has been used to provide high-speed internet services and rescue responses in natural disasters and emergencies in recent years. Most of the previous research on UAV-mounted BS (UAVmBS) only considers outdoor users. It assumes their coordinate position in a two-dimensional (2D) plane, taking only Euclidean pathloss-based distance into account.Though, in man-made or urban natural disaster situations such as floods, cyclones, building fires, and so forth, users are stuck in single or multistory high-rise buildings situated in a three-dimensional (3D) plane. In such cases, it is possible to interact and rescue reliably if pathloss features are known a priori, both for UAVmBS to users (downlink) and vice versa (uplink). As pathloss in the above situations is a mixture of outdoor and indoor elements, adopting a compatible model can be challenging for communications. This article proposes a layered architecture and studies the path loss models best suited for the disaster management system (DMS), which considers both indoor and outdoor parameters. Further, the main goal is to effectively implement a layered architecture employing UAVmBS in urban disasters for better capacity and coverage improvement. Simulation outputs display the progress in transmission delays, throughput, and effective packet delivery for disaster management.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.