2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC) 2019
DOI: 10.1109/dasc43569.2019.9081613
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of a new secure routing protocol for UAV Ad hoc Network

Abstract: UAANET (UAV Ad hoc Network) is defined as an autonomous system made of swarm of UAVs (Unmanned Aerial Vehicle) and GCS (Ground Control Station). Compared to other types of MANET (Mobile Ad hoc network), UAANET have some unique features and bring several challenges. One of them is the design of routing protocol. It must be efficient for creating routes between nodes and dynamically adjusting to the rapidly changing topology. It must also be secure to protect the integrity of the network against malicious attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…UAVs in FANETs use multiple hops to forward data and information in order to efficiently and collaboratively complete their missions, which increases the risk of malicious attacks on the network [34]. Moreover, FANET networks are often used in mission-critical applications such as security for large events, making the security of the network particularly important.…”
Section: Security-basedmentioning
confidence: 99%
“…UAVs in FANETs use multiple hops to forward data and information in order to efficiently and collaboratively complete their missions, which increases the risk of malicious attacks on the network [34]. Moreover, FANET networks are often used in mission-critical applications such as security for large events, making the security of the network particularly important.…”
Section: Security-basedmentioning
confidence: 99%
“…Moreover, wormhole attacks in a UAV Ad Hoc Network (UAANET), made of a swarm of UAVs and a ground control station, are a high-level risk, and special attention needs to be paid to this multi-node attack. Even without the knowledge of any the cryptographic keys or hash-functions, the attacker is able to affect the integrity of the network by transferring control packets, and further, captures the data traffic [48].…”
Section: A Security Issues In Dronesmentioning
confidence: 99%
“…The confidentiality of the system is not protected if an attacker can obtain all that information by eavesdropping. Most of the routing protocols have this vulnerability [117]- [119].…”
Section: ) Analysis Of Security Issues In Routing Protocolsmentioning
confidence: 99%