Skip to main content

Analysis of Routing Attacks in FANETs

  • Conference paper
  • First Online:
Ad Hoc Networks and Tools for IT (ADHOCNETS 2021, TridentCom 2021)

Abstract

Nowadays, Unmanned Aerial Vehicles (UAV) are widely used in a variety of fields, especially in military and industrial applications. However, the usage of a single UAV has begun to be insufficient in most missions. A single UAV may not complete its mission in cases of rapid depletion of its batteries, limited field of view, long-term performance of a task, a fall or a malfunction in the system due to an external effect. In such cases, Flying Ad Hoc Networks (FANETs) that allow more than one UAV to participate in a common network and execute complex tasks in an organized manner is recommended. However, FANETS are target of attacks due to being used in critical applications. Moreover, they are vulnerable to a variety of attacks due to their very nature and the cooperative routing protocols they use. Moreover, FANETs requires new security solutions or adaptation of existing security solutions of Mobile Ad Hoc Networks (MANETs), since it has much higher mobility than MANETs. Since mobility could affect security in different ways, at first attacks against FANETs should be analyzed. This is the main aim of this study. In this paper, various attacks against FANETs, namely dropping, blackhole, sinkhole, flooding attacks are analyzed. This is the first study that presents a comprehensive attack analysis in FANETs by simulating realistic network scenarios, where UAVs move in 3D as in real life.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abraham, S., Meylan, A., Nanda, S.: 802.11n MAC design and system performance. In: IEEE International Conference on Communications, vol. 5, pp. 2957–2961. IEEE (2005). https://doi.org/10.1109/icc.2005.1494932

  2. Akram, R.N., et al.: Security, privacy and safety evaluation of dynamic and static fleets of drones. In: 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), pp. 1–12 (2017). https://doi.org/10.1109/DASC.2017.8101984

  3. Altawy, R., Youssef, A.M.: Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans. Cyber-Phys. Syst. 1(2), 1–25 (2016). https://doi.org/10.1145/3001836

    Article  Google Scholar 

  4. Bekmezci, I., Sahingoz, O.K., Temel, S.: Flying AD-HOC networks (FANETS): a survey. AD Hoc Networks 11(3), 1254–1270 (2013). https://doi.org/10.1016/j.adhoc.2012.12.004

    Article  Google Scholar 

  5. Bekmezci, I., Şentürk, E., Türker, T.: Security issues in flying AD-HOC networks (FANETS). J. Aero. Space Technol. 9(2), 13–21 (2016). http://jast.hezarfen.msu.edu.tr/index.php/JAST/article/view/32

  6. Bhatia, V., Walia, E., Singla, P.: VANET and FANET under the impact of the security attack. Int. J. Innov. Technol. Explor. Eng. 8(9), 390–397 (2019). https://doi.org/10.35940/ijitee.I1062.0789S19

  7. Broyles, D., Jabbar, A., Sterbenz, J.P.: Design and analysis of a 3-D gauss-markov mobility model for highly dynamic airborne networks. In: Proceedings of the International Telemetering Conference, p. 46 January 2010

    Google Scholar 

  8. Condomines, J.P., Zhang, R., Larrieu, N.: Network intrusion detection system for UAV AD-HOC communication: from methodology design to real test validation. Ad Hoc Networks 90, 101759 (2019). https://doi.org/10.1016/j.adhoc.2018.09.004

  9. Dokurer, S., Erten, Y.M., Acar, C.E.: Performance analysis of ad-hoc networks under black hole attacks. In: Conference Proceedings of IEEE SOUTHEASTCON, pp. 148–153 (2007). https://doi.org/10.1109/SECON.2007.342872

  10. El-Semary, A.M., Diab, H.: BP-AODV: blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7, 95197–95211 (2019). https://doi.org/10.1109/ACCESS.2019.2928804

    Article  Google Scholar 

  11. Jain, A.K., Tokekar, V.: Mitigating the effects of Black hole attacks on AODV routing protocol in mobile AD Hoc networks. In: 2015 International Conference on Pervasive Computing ICPC 2015 (2015). https://doi.org/10.1109/PERVASIVE.2015.7087174

  12. Ladosz, P., Oh, H., Chen, W.H.: Optimal positioning of communication relay unmanned aerial vehicles in urban environments. In: 2016 International Conference on Unmanned Aircraft Systems (ICUAS), pp. 1140–1147 (2016). https://doi.org/10.1109/ICUAS.2016.7502562

  13. Mahmud, I., Cho, Y.Z.: Adaptive hello interval in FANET routing protocols for green UAVs. IEEE Access 7, 63004–63015 (2019). https://doi.org/10.1109/ACCESS.2019.2917075

    Article  Google Scholar 

  14. Maxa, J.a., Mahmoud, M.s.B., Larrieu, N.: Extended Verification of Secure UAANET Routing Protocol To cite this version : HAL Id : hal-01365933 Extended Verification of Secure UAANET Routing Protocol (2016)

    Google Scholar 

  15. Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6), 795–819 (2005)

    Article  Google Scholar 

  16. The ns-3 network simulator (2021). http://www.nsnam.org/

  17. Ochola, E.O., Mejaele, L.F., Eloff, M.M., Van Der Poll, J.A.: Manet reactive routing protocols node mobility variation effect in analysing the impact of black hole attack. SAIEE Africa Res. J. 108(2), 80–92 (2017). https://doi.org/10.23919/saiee.2017.8531629

  18. Perkings, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. Ietf Rfc 3561 (2003)

    Google Scholar 

  19. Praveen, K.S., Gururaj, H.L., Ramesh, B.: Comparative analysis of black hole attack in Ad Hoc network using AODV and OLSR Protocols. Proc. Comput. Sci. 85, 325–330 (2016). https://doi.org/10.1016/j.procs.2016.05.240

    Article  Google Scholar 

  20. Sahingoz, O.K.: Networking models in flying AD-HOC networks (FANETS): concepts and challenges. J. Intell. Robot. Syst. 74(1), 513–527 (2014). https://doi.org/10.1007/s10846-013-9959-7

  21. Sen, J., Koilakonda, S., Ukil, A.: A mechanism for detection of cooperative black hole attack in mobile AD Hoc networks. In: Proceedings - 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2011, pp. 338–343 (2011). https://doi.org/10.1109/ISMS.2011.58

  22. Shumeye Lakew, D., Sa’Ad, U., Dao, N.N., Na, W., Cho, S.: Routing in flying Ad Hoc networks: a comprehensive survey. IEEE Commun. Surv. Tutorials 22(2), 1071–1120 (2020). https://doi.org/10.1109/COMST.2020.2982452

    Article  Google Scholar 

  23. Tan, X., Zuo, Z., Su, S., Guo, X., Sun, X.: Research of security routing protocol for UAV communication network based on AODV. Electronics 9(8), 1–18 (2020). https://doi.org/10.3390/electronics9081185

    Article  Google Scholar 

  24. Walia, E., Bhatia, V., Kaur, G.: Detection of malicious nodes in flying Ad-HOC networks (FANET). Int. J. Electron. Commun. Eng. 5(9), 6–12 (2018). https://doi.org/10.14445/23488549/ijece-v5i9p102

  25. Xu, Z., Huo, J., Wang, Y., Yuan, J., Shan, X., Feng, Z.: Analyzing two connectivities in UAV-ground mobile AD HOC networks. In: 2011 IEEE International Conference on Computer Science and Automation Engineering, vol. 2, pp. 158–162 (2011). https://doi.org/10.1109/CSAE.2011.5952445

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ozlem Ceviz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ceviz, O., Sadioglu, P., Sen, S. (2022). Analysis of Routing Attacks in FANETs. In: Bao, W., Yuan, X., Gao, L., Luan, T.H., Choi, D.B.J. (eds) Ad Hoc Networks and Tools for IT. ADHOCNETS TridentCom 2021 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-030-98005-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98005-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98004-7

  • Online ISBN: 978-3-030-98005-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics