|

Analysis of security issues of wireless self-organizing networks based on unmanned aerial vehicles

Authors: Kulagin G.I.
Published in issue: #3(68)/2022
DOI: 10.18698/2541-8009-2022-3-779


Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security

Keywords: wireless self-organizing networks, unmanned aerial vehicles, information security, security vulnerabilities, information security threats, attack, information protection, FANET
Published: 19.04.2022

Among the promising network technologies, wireless self-organizing networks based on unmanned aerial vehicles have recently become particularly relevant, and their characteristics cause a number of issues in their practical application. One of the main problems is information security for which there are no generally accepted and standardized approaches at present. Based on the study results of the features of wireless self-organizing networks based on unmanned aerial vehicles the problems of ensuring their security, including the protection of confidentiality, integrity and accessibility of circulating information in them are analyzed.


References

[1] Bekmezci I., Sahingoz O.K., Temel S. Flying ad-hoc networks (FANETs): a survey. Ad Hoc Networks, 2013, vol. 11, no. 3, pp. 1254–1270. DOI: http://dx.doi.org/10.1016/j.adhoc.2012.12.004

[2] Krichen L., Fourati M., Fourati L.C. Communication architecture for unmanned aerial vehicle system. ADHOC-NOW. Springer, 2018, pp. 213–225. DOI: https://doi.org/10.1007/978-3-030-00247-3_20

[3] Chertova O.G., Chirov D.S. Building a core communication network which is based on small size unmanned aircraft vehicle without ground infrasrtucture. Naukoemkie tekhnologii v kosmicheskikh issledovaniyakh Zemli [High Technologies in Earth Space Research], 2019, vol. 11, no. 3, pp. 60–71 (In Russ.).

[4] Hentati A.I., Fourati L.C. Comprehensive survey of UAVs communication networks. Comput. Stand. Interfaces, 2020, vol. 72, art. 103451. DOI: https://doi.org/10.1016/j.csi.2020.103451

[5] Bujari A., Palazzi C.E., Ronzani D. FANET application scenarios and mobility models. DroNet ‘17, 2017, pp. 43–46. DOI: https://doi.org/10.1145/3086439.3086440

[6] Bel’fer R.A. Information security threat in wireless self-regulated networks. Vestn. Mosk. Gos. Tekh. Univ. im. N.E. Baumana, Priborostr. [Herald of the Bauman Moscow State Tech. Univ., Instrum. Eng.], 2011, no. S1, pp. 116–124 (In Russ.).

[7] Demidov R.A., Zegzhda P.D. Unified model of multilevel security threats in networks with dynamic topology. Intellektual’nye tekhnologii na transporte [Intellectual Technologies on Transport], 2019, no. 2, pp. 10–14 (In Russ.).

[8] Sampigethaya K., Poovendran R., Bushnell L. Security of future eEnabled aircraft ad hoc networks. AIAA Meeting Paper, 2008, no. 2008-8894. DOI: https://doi.org/10.2514/6.2008-8894

[9] Altawy R., Youssef A.M. Security, privacy and safety aspects of civilian drones: a survey. ACM Trans. Cyber-Phys. Syst., 2016, vol. 1, no. 2, pp. 1–25. DOI: https://doi.org/10.1145/3001836

[10] Dahiya S., Garg M. Unmanned aerial vehicles: vulnerability to cyber attacks. Proc. UASG 2019. Springer, 2020, pp. 201–211. DOI: https://doi.org/10.1007/978-3-030-37393-1

[11] He C., Chan S., Guizani M. Drone-assisted public safety networks: the security aspect. Commun. Mag., 2017, vol. 55, no. 8, pp. 218–223. DOI: https://doi.org/10.1109/MCOM.2017.1600799CM