2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC) 2015
DOI: 10.1109/dasc.2015.7311415
|View full text |Cite
|
Sign up to set email alerts
|

Secure routing protocol design for UAV Ad hoc NETworks

Abstract: UAV Ad hoc NETworks (UAANET) are a new form of ad hoc networks in which nodes are Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS). Although this field generated a certain interest in the scientific community, it has only received a modest contribution. Compared to Mobile Ad hoc NETworks (MANET), this new network paradigm has some unique features and brings specific challenges such as node mobility degree, network connectivity patterns, delay-sensitive applications and network security. Indeed,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
21
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(22 citation statements)
references
References 44 publications
1
21
0
Order By: Relevance
“…Our mobility pattern and emulation system certainly affected the measures, but we found similar results to those exposed in [15]. Accordingly, in [6], we introduce the model design of SUAP (Secure Uav Ad hoc routing Protocol). Also, a first preliminary outdoor experiments have been carried out in [16] to evaluate its network requirements and performances.…”
Section: B Routing Protocol For Uaanetsupporting
confidence: 62%
See 3 more Smart Citations
“…Our mobility pattern and emulation system certainly affected the measures, but we found similar results to those exposed in [15]. Accordingly, in [6], we introduce the model design of SUAP (Secure Uav Ad hoc routing Protocol). Also, a first preliminary outdoor experiments have been carried out in [16] to evaluate its network requirements and performances.…”
Section: B Routing Protocol For Uaanetsupporting
confidence: 62%
“…Figure 4 represents the model driven development workflow and schematizes the integration process. It is composed of the seven different steps as explained in [6].…”
Section: E Security Block Design Architecture and Model Checkingmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, in [7], MANET reactive protocols have been validated using MDD approach. Similarly, in [8] [9], secure FANET routing protocols is designed with MDD approach while taking into account the FANET safety requirements. The authors use a general network architecture and perform unit testing and code verification through formal verification tools for safety validation purposes.…”
Section: Related Workmentioning
confidence: 99%