Ad-hoc framework for efficient network security for unmanned aerial vehicles (UAV)

5Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the emerging new applications, UAVs are incorporating to our daily lifestyle. The convenience of offering certain services via UAV using its cyber capabilities is very attractive but on the other side poses a great threat of safety and security. With the ever-growing use of commercial WiFi based UAVs, the enduring ability for cybersecurity and safety threats has become a sophisticated problem. UAV networks are susceptible to several common security risks including eavesdropping and jamming attack, denial of service (DoS) or buffer overflow attack by malicious remote attackers. Because of the unique nature of UAV networks, traditional security techniques used by conventional networks is not feasible for UAV communication. The resource constraint nature of such WiFi based UAV network is a key design problem, when implementation of security. Address security issues for UAV domain and propose to examine the practicality of using Identity Based Encryption (IBE) in resource constraint UAV network is our aim in this study. We would like to assess the practicality and performance of IBE in UAV network by measuring energy of the operations for key management and examine the feasibility of the approach and thus present an efficient security framework for resource constrained wireless UAV network.

Cite

CITATION STYLE

APA

Haque, M. S., & Chowdhury, M. U. (2019). Ad-hoc framework for efficient network security for unmanned aerial vehicles (UAV). In Communications in Computer and Information Science (Vol. 1113 CCIS, pp. 23–36). Springer. https://doi.org/10.1007/978-3-030-34353-8_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free