FANETs
or Flying Ad-Hoc Networks is an assembly of Air Vehicles which are unmanned that
do their function without any intervention by a human. There are many of the
problems in these types of networks: the major thing is communication among self-driving
vehicles. Numerous routing protocols presented are categorized into 3 groups,
proactive, static, reactive protocols of routing to resolve this issue.
Recently, the roles and capabilities of Unmanned Aerial Vehicles have promptly changed,
and their overall usage in civilian and military areas is particularly common
as an effect of the improvements in robotic systems technology for example sensors,
processors, networking and communications technologies. A comprehensive threat
of security examination is done that offers an advantage to the designer,
researcher, and users to recognize Unmanned Air Vehicles system vulnerabilities
to offer counter-measures. Unmanned Air Vehicles system.
Problem Statement of secure routing
protocols for flying ad hoc network FANETs
For
the ad-hoc networks, present protocols of routing involve severe issues in the security
area. Flying Ad-Hoc Networks need algorithms of routing that achieves well with
mobility’s high nodes and rapid changes in the topology. There are different
research groups that have emphasized on the FANETs security requirements. The
research targets to offer a framework of security for fans that can standardize
with quick changing topology high nodes of mobility for trust management and
secure communication. This security framework will improve the dependability on
the FANET’s serious applications.
Aim of secure routing protocols for flying
ad hoc network FANETs
The
research aims to provide a framework of security for Flying Ad-Hoc Networks that
can standardize with quick changing topology high nodes of mobility for trust
management and secure communication. This security framework will improve the
dependability on the serious applications of Flying Ad-Hoc Networks.
Objectives of Project of the secure routing
protocols for flying ad hoc network FANETs
On
basis of research gap and literature of above-mentioned work, following are
some of the major aims that have been recognized as examined under the study
entitled “Routing Protocols’ Analysis for secure protocols of routing”.
1. To
develop and design a protected structure for fans.
2. To
evaluate and compare it with other planned secure framework/protocols/schemes
3. To
analyze and study the present secure routing framework/protocols/schemes for fans
4. To
validate and verify the proposed secure protocol.
Implementation Requirements of secure
routing protocols for flying ad hoc network FANETs
The research will
be passing through the given stages for achieving objectives:
1. A detailed study
will be showed to study numerous protocols of routing and the security in Flying
Ad-Hoc Networks achieved in detailed secure routing framework learning in
FANETs.
2. The planned
framework of Flying Ad-Hoc Networks will be validated and verified depending on
simulation and mathematical foundation using artificial data. Simulators such
as MATLAB, NS2, UAVs etc.
3. A protected
framework will be projected depending on the information and knowledge gained.
The future mechanism will deal with security problems and will be appraised on factors
such as –throughput, delay, response time, etc.
4. The planned framework will be associated
with other security’s future frameworks against parameters such as delay and
efficiency among others.
Project Schedule
Work Activities
|
M1
|
M2
|
M3
|
M4
|
M5
|
M6
|
M7
|
M8
|
M9
|
M10
|
M11
|
M12
|
A
|
|
|
|
|
|
|
|
|
|
|
|
|
B
|
|
|
|
|
|
|
|
|
|
|
|
|
C
|
|
|
|
|
|
|
|
|
|
|
|
|
D
|
|
|
|
|
|
|
|
|
|
|
|
|
E
|
|
|
|
|
|
|
|
|
|
|
|
|
F
|
|
|
|
|
|
|
|
|
|
|
|
|
Activity
A. Review and study
of current security instrument of numerous protocols of routing for FANETs.
B. Investigating the planned framework of security
against diverse security parameters for example integrity, confidentiality, availability,
etc.
C. Confirmation
and Proof of proposed framework of security.
D. Development and
design of a safe framework for fans.
E. Compare the framework proposed with the present
security mechanism.
F. Thesis writing and Documentation.
G. Research work
published in journals/conferences
Literature Review of secure routing protocols
for flying ad hoc network FANETs
According
to the research conducted by Sahingoz, (2014)
it is reviewed that setting up an ad-hoc network between flying UAVs is a very
difficult issue, and requirements can vary from networks, Vehicular Ad-hoc
Networks and Mobile Ad-hoc Networks in terms of mobility node, message routing,
connectivity, application areas service quality, etc. It is analyzed that the flying Ad-Hoc Network Recognizes the
challenges by using Unmanned Air Vehicles as relay nodes in an ad-hoc manner,
presents network Unmanned Air Vehicles models, and shows open research problem
with examining future work and opportunities (Sahingoz, 2014).
In
the research conducted by Yassein & Damer, (2016)
it is analyzed that the random model of the point is used as the developed
mobility in the better part of regeneration states. The Arbitrary Way Point model is not related to the UAV and the main
reason is that UAV doesn’t change their versatility and course, speed rapidly
at once as of this aim, it is considered that more useful models, named as the Semi-Random Circular Movement Mobility Model (Yassein &
Damer, 2016).
Likewise, it is considered that there are different models of portability, Pheromone-Based
Model Mission, and PBAM or Plan-Based Mobility Model. Furthermore, Paparazzi
Mobility’s Model (Yassein & Damer, 2016).
It is analyzed by (BEKMEZCİ, et al., 2016), that technological progresses in self-driving
vehicles inspire the use of multi- Unmanned Air Vehicles systems in civil and military
applications. The important advantage of
multi - Unmanned Air Vehicles system
is to accomplish missions that need cooperative and collaborative behavior that
depending on communication among Unmanned Air Vehicles. Flying
Ad-Hoc Network is a method that resolves the problem coverage range
between Unmanned Air Vehicles
and ground station and real-time support in the data transfer without
set-up. Flying Ad-Hoc Network, can be measured another
ad-hoc network type that holds all of the ad-hoc networks security issues. Also, it might have new security issues,
because it contains Unmanned Air Vehicles (BEKMEZCİ, et
al., 2016).
Conclusion on secure routing protocols for flying ad hoc network
FANETs
Summing up the
discussion about the FANET
protocols of security, it can be said that there are different threats
regarding security for Unmanned Air Vehicles System are examined and a model of
issue of cyber-security has been projected. The overall security is much
significant to Unmanned Air Vehicles system as they carry confidential and
sensitive information. This security framework will improve the dependability
on the serious FANETs’ applications. The planned framework of FANET will be
validated and verified depending on simulation and mathematical foundation
using artificial data. The Arbitrary Way
Point model is not related to the UAV and the main reason is that UAV doesn’t
alter its versatility and course, speed rapidly at once.
References of
secure routing protocols for flying ad hoc network FANETs
BEKMEZCİ, İ., ŞENTÜRK, E. & TÜRKER,
T., 2016. SECURITY ISSUES IN FLYING AD-HOC NETWORKS (FANETs). JOURNAL OF
AERONAUTICS AND SPACE TECHNOLOGIES, Volume 9, pp. 13-21.
Sahingoz, O. K., 2014. Networking Models
in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges. J Intell Robot
Syst, p. 513–527.
Yassein, M. B. & Damer, “. A., 2016.
Flying Ad-Hoc Networks: Routing Protocols, Mobility Models, Issues. International
Journal of Advanced
Computer Science and Applications, 7(6), pp. 162-168.
Appendices: Project Proposal and Ethical Form
Title of project
|
Analysis of
secure routing protocols for flying ad hock network FANETs Analysis of secure
routing protocols for flying ad hoc network FANETs
|
Description of your artefact
|
Flying Ad-Hoc Networks (FANETs) is an assembly of
Unmanned Air Vehicles that done their function without any intervention by a human.
There are different threats regarding security for Unmanned Air Vehicles
System are examined and a model of cyber-security issue has been projected.
The overall security is much significant to Unmanned Air Vehicles system as
they carry confidential and sensitive information, the risk to Unmanned Air
Vehicles system can result in the national security problem. They have tried
to appraise risk generating by different susceptibilities to the
For ad-hoc
networks the current routing protocols involvements the severe issues in the
security area. The Flying Ad-Hoc Networks need routing algorithms that
achieve well with high nodes of mobility and rapid changes in the topology.
There are different research groups that have emphasized on the FANETs
security requirements.
On
basis of research gap and literature of above-mentioned work, following are
some of the major aims that have been recognized as examined under the study
entitled “Analysis of secure routing protocols for flying ad hoc-network
FANETs Analysis of secure routing protocols for flying ad hoc network
FANETs”.
1. To
develop and design a protected structure for Flying Ad-Hoc Networks.
2. To
evaluate and compare it with other planned secure framework/protocols/schemes
|
What methodology will you be
following to realize your artefact?
|
This study will adopt a comprehensive
secondry research analysis to get information about the routing protocols and
the security in Flying Ad-Hoc Networks. A detailed study will be showed to
study numerous routing protocols and the security in Flying Ad-Hoc Networks
achieved in detailed secure routing framework learning in FANETs.
The planned framework of Flying Ad-Hoc
Networks will be validated and verified depending on simulation and
mathematical foundation using artificial data. Simulators such as MATLAB,
NS2, UAVs etc. A protected framework will be projected depending on the
information and knowledge gained. The future mechanism will deal with
security problems and will be appraised on factors such as –throughput,
delay, response time, etc.
In a nutshell, the planned framework of Flying Ad-Hoc
Networks will be validated and verified depending on simulation and
mathematical foundation using artificial data. The Arbitrary Way Point model is not related to the UAV and the main
reason is that UAV do not change their versatility and course, speed rapidly
at once.
|
How does your project relate
to your degree course and build upon the units/ knowledge/ you have acquired?
|
This project
contributes towards my degree because the research aims to provide a
framework of security for Flying Ad-Hoc Networks that can standardize with
quick changing topology high nodes of mobility for trust management and
secure communication. This security framework will improve the dependability
on the serious applications of Flying Ad-Hoc Networks.
|
Resources
|
BEKMEZCİ, İ., ŞENTÜRK, E. & TÜRKER,
T., 2016. SECURITY ISSUES IN FLYING AD-HOC NETWORKS (FANETs). JOURNAL OF
AERONAUTICS AND SPACE TECHNOLOGIES, Volume 9, pp. 13-21.
Sahingoz, O. K., 2014. Networking Models
in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges. J Intell
Robot Syst, p. 513–527.
Yassein, M. B. & Damer, “. A., 2016.
Flying Ad-Hoc Networks: Routing Protocols, Mobility Models, Issues. International
Journal of Advanced Computer Science and Applications, 7(6), pp. 162-168.
|
Project Schedule
Work Activities
|
M1
|
M2
|
M3
|
M4
|
M5
|
M6
|
M7
|
M8
|
M9
|
M10
|
M11
|
M12
|
A
|
|
|
|
|
|
|
|
|
|
|
|
|
B
|
|
|
|
|
|
|
|
|
|
|
|
|
C
|
|
|
|
|
|
|
|
|
|
|
|
|
D
|
|
|
|
|
|
|
|
|
|
|
|
|
E
|
|
|
|
|
|
|
|
|
|
|
|
|
F
|
|
|
|
|
|
|
|
|
|
|
|
|