Skip to main content
Erschienen in:
Buchtitelbild

2022 | OriginalPaper | Buchkapitel

Analysis of Routing Attacks in FANETs

verfasst von : Ozlem Ceviz, Pinar Sadioglu, Sevil Sen

Erschienen in: Ad Hoc Networks and Tools for IT

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, Unmanned Aerial Vehicles (UAV) are widely used in a variety of fields, especially in military and industrial applications. However, the usage of a single UAV has begun to be insufficient in most missions. A single UAV may not complete its mission in cases of rapid depletion of its batteries, limited field of view, long-term performance of a task, a fall or a malfunction in the system due to an external effect. In such cases, Flying Ad Hoc Networks (FANETs) that allow more than one UAV to participate in a common network and execute complex tasks in an organized manner is recommended. However, FANETS are target of attacks due to being used in critical applications. Moreover, they are vulnerable to a variety of attacks due to their very nature and the cooperative routing protocols they use. Moreover, FANETs requires new security solutions or adaptation of existing security solutions of Mobile Ad Hoc Networks (MANETs), since it has much higher mobility than MANETs. Since mobility could affect security in different ways, at first attacks against FANETs should be analyzed. This is the main aim of this study. In this paper, various attacks against FANETs, namely dropping, blackhole, sinkhole, flooding attacks are analyzed. This is the first study that presents a comprehensive attack analysis in FANETs by simulating realistic network scenarios, where UAVs move in 3D as in real life.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat Broyles, D., Jabbar, A., Sterbenz, J.P.: Design and analysis of a 3-D gauss-markov mobility model for highly dynamic airborne networks. In: Proceedings of the International Telemetering Conference, p. 46 January 2010 Broyles, D., Jabbar, A., Sterbenz, J.P.: Design and analysis of a 3-D gauss-markov mobility model for highly dynamic airborne networks. In: Proceedings of the International Telemetering Conference, p. 46 January 2010
14.
Zurück zum Zitat Maxa, J.a., Mahmoud, M.s.B., Larrieu, N.: Extended Verification of Secure UAANET Routing Protocol To cite this version : HAL Id : hal-01365933 Extended Verification of Secure UAANET Routing Protocol (2016) Maxa, J.a., Mahmoud, M.s.B., Larrieu, N.: Extended Verification of Secure UAANET Routing Protocol To cite this version : HAL Id : hal-01365933 Extended Verification of Secure UAANET Routing Protocol (2016)
15.
Zurück zum Zitat Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6), 795–819 (2005)CrossRef Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6), 795–819 (2005)CrossRef
18.
Zurück zum Zitat Perkings, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. Ietf Rfc 3561 (2003) Perkings, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. Ietf Rfc 3561 (2003)
21.
Zurück zum Zitat Sen, J., Koilakonda, S., Ukil, A.: A mechanism for detection of cooperative black hole attack in mobile AD Hoc networks. In: Proceedings - 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2011, pp. 338–343 (2011). https://doi.org/10.1109/ISMS.2011.58 Sen, J., Koilakonda, S., Ukil, A.: A mechanism for detection of cooperative black hole attack in mobile AD Hoc networks. In: Proceedings - 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2011, pp. 338–343 (2011). https://​doi.​org/​10.​1109/​ISMS.​2011.​58
25.
Metadaten
Titel
Analysis of Routing Attacks in FANETs
verfasst von
Ozlem Ceviz
Pinar Sadioglu
Sevil Sen
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-98005-4_1