2022
DOI: 10.1007/978-3-030-97113-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats in Flying Ad Hoc Network (FANET)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Signals are identified by measuring the carrier-to-noise ratio and absolute power. A conviction model that limits misleading bits of hearsay and coordinates various sources is executed utilizing beta and Weibull disseminations 24,25 . As indicated by reproduction results, GPS parody signs can be identified and dropped with almost 100% high exactness and low correspondence cost.…”
Section: Secure Aware Routing Algorithm For Fanetmentioning
confidence: 99%
“…Signals are identified by measuring the carrier-to-noise ratio and absolute power. A conviction model that limits misleading bits of hearsay and coordinates various sources is executed utilizing beta and Weibull disseminations 24,25 . As indicated by reproduction results, GPS parody signs can be identified and dropped with almost 100% high exactness and low correspondence cost.…”
Section: Secure Aware Routing Algorithm For Fanetmentioning
confidence: 99%
“…e) Replay attacks: In a replay attack, an intruder eavesdrops on legitimate routing or control messages exchanged between nodes [107], and then retransmits these packets to UAV networks, attempting to deceive the nodes and disrupt the routing process.…”
Section: B Cyber Attacksmentioning
confidence: 99%
“…The southbound APIs link to the control plane by gathering policies, forwarding rules, and applying them to the relevant equipment [9]. , POX [11], Trema [12], Beacon [13], Ryu [14], Maestro [15], etc.…”
Section: Software-defined Network Architecturementioning
confidence: 99%
“…Since the control plane is typically a centrally controllable software program, it can handle network traffic dynamically. Several opensource SDN controller programs (NOS) are currently used to deploy the architecture; these are Floodlight[10], POX[11], Trema[12], Beacon[13], Ryu[14], Maestro[15], etc.…”
mentioning
confidence: 99%