The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2021
DOI: 10.1109/dcoss52077.2021.00059
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…Furthermore, unlike many other methods in other detection approaches, authentication would not be required; consequently, misidentification due to potential stolen credential would be less of a risk. Cryptography, which is a widely used technique for authentication, also consumes a lot of energy [11]. Accordingly, since UAVs operate on limited energy, for some applications, it may be desirable to cut down on their cryptographic usage.…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, unlike many other methods in other detection approaches, authentication would not be required; consequently, misidentification due to potential stolen credential would be less of a risk. Cryptography, which is a widely used technique for authentication, also consumes a lot of energy [11]. Accordingly, since UAVs operate on limited energy, for some applications, it may be desirable to cut down on their cryptographic usage.…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
“…It refers to the situation when a malicious node falsely claims to have numerous identities [8] [9]. There are several incentives for a node to act in such a way; in the context of FANETs, examples are such as to allow it to illegitimately acquire more weight in a voting system and to create an illusion of traffic congestion in a particular area [10] [11]. Countermeasures for Sybil attack include prevention, detection and mitigation.…”
Section: Introductionmentioning
confidence: 99%
“…This involves maintaining inter-UAV distances, flying formation and flying height of the UAV grid. The synchronisation and coordination is achieved through continuous flow of Message Queuing Telemetry Transport (MQTT, [46], [47]) commands and instructions between UAVs over wireless network.…”
Section: Ecms System Modelmentioning
confidence: 99%
“…These security threats have been deemed as a critical concern due to the increasing reliance on wireless services [1]. A swarm of Unmanned Aerial Vehicles (UAVs), for example, commonly employ off-the-shelf infrastructure-less wireless communication (such as 802.11s in mesh mode) which can be significantly affected by external threats [2].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, we provide an implementation of different types of jammers on a HackRF 1 . Specifically, the main contributions of this work are: i) Presenting the Bit Error Rate (BER) performance analysis for the IEEE 802.11n communication system in the presence of jammers and under the assumption of Gaussian noise and digitally modulated (QPSK) waveforms; ii) Validation of the analysis through MATLAB simulation 2 : evaluating the impact of these jamming waveforms (Gaussian noise and QPSK) on the performance of IEEE 802.11n communications; iii) The development and implementation of 'JamRF', a jamming toolkit for the HackRF SDR; and iv) Investigating the impact of the considered different jamming techniques on IEEE 802.11n communications through practical experimentation within an RF isolation chamber.…”
Section: Introductionmentioning
confidence: 99%