SECURITY ISSUES IN FLYING AD-HOC NETWORKS (FANETs)
Keywords:
ad-hoc networks, FANET, securityAbstract
Technological advancements in Unmanned Aerial Vehicles (UAV) encourage the use of multi-UAV systems in military and civil applications. The most important benefit of the multi-UAV system is to fulfill missions that require collaborative and cooperative behavior which depends on communication between UAVs. Flying Ad-Hoc Network (FANET) is a technique that both solves the coverage range problem between ground station and the UAVs; and supports real time data transfer without any infrastructure. FANET, which can be considered another type of ad-hoc network, holds all security issues of ad-hoc networks. Besides, it might also have new security problems, because it consists of UAVs. In this paper, FANET security limitations and challenges are surveyed. In addition, open research areas are also discussed.
Downloads
References
[2] I. Bekmezci, O. K. Sahingoz, and S¸. Temel, “Flying ad-hoc networks (fanets): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013].
[3] D. Djenouri, L. Khelladi, and N. Badache, “A survey of security issues in mobile ad hoc networks,” IEEE communications surveys, vol. 7, no. 4, pp. 2–28, 2005.
[4] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks,” Wireless communications, IEEE, vol. 14, no. 5, pp. 85–91, 2007.
[5] L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile ad hoc routing protocols,” Communications Surveys & Tutorials, IEEE, vol. 10, no. 4, pp. 78–93, 2008.
[6] P. M. Jawandhiya, M. M. Ghonge, M. Ali, and J. Deshpande, “A survey of mobile ad hoc network attacks,” International Journal of Engineering Science and Technology, vol. 2, no. 9, pp. 4063–4071, 2010.
[7] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” Network, IEEE, vol. 13, no. 6, pp. 24–30, 1999.
[8] B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey of attacks and countermeasures in mobile ad hoc networks,” in Wireless Network Security, pp. 103–135, Springer, 2007.
[9] V. Atluri and W.-k. Huang, “An authorization model for workflows,” in Computer Security-ESORICS 96, pp. 44–64, Springer, 1996.
[10] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wireless Communications, IEEE, vol. 11, no. 1, pp. 38–47, 2004.
[11] M. Raya and J.-P. Hubaux, “The security of vehicular ad hoc networks,” in Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 11–21, ACM, 2005.
[12] R. Akbani, T. Korkmaz, and G. Raju, “Mobile ad-hoc networks security,” in Recent Advances in Computer Science and Information Engineering, pp. 659–666, Springer, 2012.
[13] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255–265, ACM, 2000.
[14] Y. Zou, X. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances and future trends,” arXiv preprint arXiv:1505.07919, 2015.
[15] M. La Polla, F. Martinelli, and D. Sgandurra, “A survey on security for mobile devices,” Communications Surveys & Tutorials, IEEE, vol. 15, no. 1, pp. 446–471, 2013.
[16] A. Mukherjee, S. A. Fakoorian, J. Huang, A. L. Swindlehurst, et al., “Principles of physical layer security in multiuser wireless networks: A survey,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 3, pp. 1550–1573, 2014.
[17] P. Ning and K. Sun, “How to misuse aodv: a case study of insider attacks against mobile ad-hoc routing protocols,” Ad Hoc Networks, vol. 3, no. 6, pp. 795–819, 2005.
[18] H. L. Nguyen and U. T. Nguyen, “A study of different types of attacks on multicast in mobile ad hoc networks,” Ad Hoc Networks, vol. 6, no. 1, pp. 32–46, 2008.
[19] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 370–380, 2006.
[20] S. Shrivastava and S. Jain, “A brief introduction of different type of security attacks found in mobile ad-hoc network,” International Journal of Computer Science & Engineering Technology (IJCSET), vol. 4, no. 3, 2013.
[21] A. Dorri, S. R. Kamel, and E. Kheirkhah, “Security challenges in mobile ad hoc networks: a survey,” arXiv preprint arXiv:1503.03233, 2015.
[22] S. Temel and I. Bekmezci, “Lodmac: Location oriented directional {MAC} protocol for {FANETs},” Computer Networks, vol. 83, pp. 76 – 84, 2015.
[23] A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming attacks and countermeasures in wsns,” Communications Surveys & Tutorials, IEEE, vol. 11, no. 4, pp. 42–56, 2009.
[24] A. Liu, P. Ning, H. Dai, and Y. Liu, “Usd-fh: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure,” in Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on, pp. 41–50, IEEE, 2010.
[25] Y. Liu, P. Ning, H. Dai, and A. Liu, “Randomized differential dsss: Jamming-resistant wireless broadcast communication,” in INFOCOM, 2010 Proceedings IEEE, pp. 1–9, IEEE, 2010.
[26] X. He, H. Dai, and P. Ning, “Dynamic adaptive anti-jamming via controlled mobility,” Wireless Communications, IEEE Transactions on, vol. 13, no. 8, pp. 4374–4388, 2014.
[27] A. A. Cardenas, S. Radosavac, and J. S. Baras, “Detection and prevention of mac layer misbehavior in ad hoc networks,” in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 17–22, ACM, 2004.
[28] J. Ren, T. Li, and D. Aslam, “A power efficient link-layer security protocol (llsp) for wireless sensor networks,” in Military Communications Conference, 2005. MILCOM 2005. IEEE, pp. 1002–1007, IEEE, 2005.
[29] V. Mahajan, M. Natu, and A. Sethi, “Analysis of wormhole intrusion attacks in manets,” in Military Communications Conference, 2008. MILCOM 2008. IEEE, pp. 1–7, IEEE, 2008.
[30] S. Choi, D.-y. Kim, D.-h. Lee, and J.-i. Jung, “Wap: Wormhole attack prevention algorithm in mobile ad hoc networks,” in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC’08. IEEE International Conference on, pp. 343–348, IEEE, 2008.
[31] P. Nayak, A. Sahay, and Y. Pandey, “Detection and prevention of wormhole attacks in manets using detection packet,” International Journal of Scientific & Engineering Research, vol. 4, no. 6, pp. 1216– 1222, 2013.
[32] J. Sen, S. Koilakonda, and A. Ukil, “A mechanism for detection of cooperative black hole attack in mobile ad hoc networks,” in Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on, pp. 338–343, IEEE, 2011.
[33] L. Himral, V. Vig, and N. Chand, “Preventing aodv routing protocol from black hole attack,” Lalit Himral et al./International Journal of Engineering Science and Technology (IJEST), vol. 3, no. 5, 2011.
[34] F. Thachil and K. Shet, “A trust based approach for aodv protocol to mitigate black hole attack in manet,” in Computing Sciences (ICCS), 2012 International Conference on, pp. 281–285, IEEE, 2012.
[35] R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, “Dos attacks in mobile ad hoc networks: A survey,” in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, pp. 535–541, IEEE, 2012.
[36] K. Sahadevaiah and P. R. PVGD, “Impact of security attacks on a new security protocol for mobile ad hoc networks,” Network Protocols and Algorithms, vol. 3, no. 4, pp. 122–140, 2011.
[37] J. Goppert, W. Liu, A. Shull, V. Sciandra, I. Hwang, and H. Aldridge, “Numerical analysis of cyberattacks on unmanned aerial systems,” in AIAA Conference on Infotech@ Aerospace, 2012.
[38] A. N. Phillips, B. E. Mullins, R. A. Raines, and R. O. Baldwin, “A secure group communication architecture for autonomous unmanned aerial vehicles,” Security and Communication Networks, vol. 2, no. 1, pp. 55–69, 2009.
[39] V. P. Hubenko Jr, R. Raines, R. O. Baldwin, B. E. Mullins, R. F. Mills, M. R. Grimaila, et al., “Improving satellite multicast security scalability by reducing rekeying requirements,” Network, IEEE, vol. 21, no. 4, pp. 51–56, 2007.
[40] D. Rudinskas, Z. Goraj, and J. Stankunas, “Security analysis of uav ¯ radio communication system,” Aviation, vol. 13, no. 4, pp. 116–121, 2009.
[41] C. Constantinides and P. Parkinson, “Security challenges in uav development,” in Digital Avionics Systems Conference, 2008. DASC 2008. IEEE/AIAA 27th, pp. 1–C, IEEE, 2008.
[42] A. Kim, B. Wampler, J. Goppert, I. Hwang, and H. Aldridge, “Cyber-attack vulnerabilities analysis for unmanned aerial vehicles,” Infotech@ Aerospace, 2012.
[43] A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, “Unmanned aircraft capture and control via gps spoofing,” Journal of Field Robotics, vol. 31, no. 4, pp. 617–636, 2014.
[44] S.-W. Kim and S.-W. Seo, “Cooperative unmanned autonomous vehicle control for spatially secure group communications,” Selected Areas in Communications, IEEE Journal on, vol. 30, no. 5, pp. 870–882, 2012.
[45] S. Bhattacharya and T. Basar, “Game-theoretic analysis of an aerial jamming attack on a uav communication network,” in American Control Conference (ACC), 2010, pp. 818–823, IEEE, 2010.
[46] S. Bhattacharya and T. Bas¸ar, “Secure communication for mobile agents in an adversarial environment,” in Information Fusion (FUSION), 2011 Proceedings of the 14th International Conference on, pp. 1–8, IEEE, 2011.
[47] S. Chaumette, R. Laplace, C. Mazel, and A. Godin, “Secure cooperative ad hoc applications within uav fleets position paper,” in Military Communications Conference, 2009. MILCOM 2009. IEEE, pp. 1–7, IEEE, 2009.
[48] R. N. Akram, P.-F. Bonnefoi, S. Chaumette, K. Markantonakis, and D. Sauveron, “Improving security of autonomous uavs fleets by using new specific embedded secure elements a position paper,”
[49] R. S. Yokoyama, B. Y. L. Kimura, and E. dos Santos Moreira, “An architecture for secure positioning in a uav swarm using rssi-based distance estimation,” ACM SIGAPP Applied Computing Review, vol. 14, no. 2, pp. 36–44, 2014.
[50] A. Y. Javaid, W. Sun, and M. Alam, “Single and multiple uav cyberattack simulation and performance evaluation,” EAI Endorsed Transactions on Scalable Information Systems, vol. 15, 2 2015.
[51] Q. Wang, H.-N. Dai, and Q. Zhao, “Eavesdropping security in wireless ad hoc networks with directional antennas,” in Wireless and Optical Communication Conference (WOCC), 2013 22nd, pp. 687–692, IEEE, 2013.
[52] A. I. Alshbatat and L. Dong, “Adaptive mac protocol for uav communication networks using directional antennas,” in Networking, Sensing and Control (ICNSC), 2010 International Conference on, pp. 598–603, IEEE, 2010.
[53] S. M. Navidpour, M. Uysal, and M. Kavehrad, “Ber performance of free-space optical transmission with spatial diversity,” Wireless Communications, IEEE Transactions on, vol. 6, no. 8, pp. 2813–2819, 2007.
[54] A. Carrasco-Casado, R. Vergaz, and J. M. S. Pena, “Design and early development of a uav terminal and a ground station for laser communications,” in SPIE Security+ Defence, pp. 81840E–81840E, International Society for Optics and Photonics, 2011.
[55] M. J. Northcott, A. McClaren, J. Graves, J. Phillips, D. Driver, D. Abelson, D. W. Young, J. E. Sluz, J. C. Juarez, M. B. Airola, et al., “Long distance laser communications demonstration,” in Defense and Security Symposium, pp. 65780S–65780S, International Society for Optics and Photonics, 2007.
[56] S. A. H. Seno, R. Budiarto, and T.-C. Wan, “A secure mobile ad hoc network based on distributed certificate authority,” Arabian Journal for Science and Engineering, vol. 36, no. 2, pp. 245–257, 2011.
Downloads
Published
How to Cite
Issue
Section
License
The manuscript with title and authors is being submitted for publication in Journal of Aeronautics and Space Technologies. This article or a major portion of it was not published, not accepted and not submitted for publication elsewhere. If accepted for publication, I hereby grant the unlimited and all copyright privileges to Journal of Aeronautics and Space Technologies.
I declare that I am the responsible writer on behalf of all authors.