2019 International Conference on Unmanned Aircraft Systems (ICUAS) 2019
DOI: 10.1109/icuas.2019.8797834
|View full text |Cite
|
Sign up to set email alerts
|

Software defined network based architecture to improve security in a swarm of drones

Abstract: With the trend of developing more and more applications for Unmanned Aerial Vehicles (UAV), several research projects have considered new missions where single UAVs are replaced by swarms of drones. Although today regulations do not take into account such scenarios, implementation of an efficient security policy appears mandatory before operating a swarm of drones in open spaces. Consequently, this paper introduces an architecture for providing security features through the use of software defined network (SDN… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…After describing different network architectures, [42] focuses on comparing an in-band, centralized SDN control architecture with a traditional MANET using the AODV routing protocol. As the paper puts special emphasis on cybersecurity, in the MANET configuration AODV is complemented with iptables for packet filtering, while in the SDN architecture the inherent SDN flow control plays the role of denying flows based on security considerations.…”
Section: B In-band Control Planementioning
confidence: 99%
“…After describing different network architectures, [42] focuses on comparing an in-band, centralized SDN control architecture with a traditional MANET using the AODV routing protocol. As the paper puts special emphasis on cybersecurity, in the MANET configuration AODV is complemented with iptables for packet filtering, while in the SDN architecture the inherent SDN flow control plays the role of denying flows based on security considerations.…”
Section: B In-band Control Planementioning
confidence: 99%
“…In contrast, UAVs themselves act as the data plane that acknowledges the controller's commands [195], whereas the application plane performs all decision-making and high-level operations like setting up network function virtualization. Several research works [196], [197], [198] have focused on switching and routing of UAV nodes for addressing security threats. The authors in [196] have proposed an SDN-assisted system model for providing robust relaying and data security against intentional jamming by utilizing centralized SDN-controlled UAV switches.…”
Section: Secured Uav Communications Using Sdnmentioning
confidence: 99%
“…This approach imple-ments the flow-based and path-based security policies to secure SDN architecture compare to the OpenSec framework. Later, Guerber et al in [12] proposed to handle the wormhole, DDoS, and blackhole attacks. Despite the benefits of SDN, multi-swarm UAV communication security is a big challenge, and BC technology is a feasible solution to handle the above-mentioned issues.…”
Section: Softwarization: Techniques and Conceptsmentioning
confidence: 99%