0% found this document useful (0 votes)
39 views19 pages

W20 Capstonephase 1 Presentation

capstone presentation

Uploaded by

varshanap57003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views19 pages

W20 Capstonephase 1 Presentation

capstone presentation

Uploaded by

varshanap57003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Real-time Threat Detection of

FANET Networks

W20

CAPSTONE PROJECT PHASE – 01


2 - CREDITS

14-02-2024 Feasibility Presentation-B tech 2021-25 1


TEAM COMPOSITION

1) Varshana PES1UG21EC325

PES1UG21EC331
2) Vedic R

PES1UG21EC336
3) Vikyath B

PES1UG21EC338
4) Vismaya

Guide: Prof. Prajeesha


14-02-2024 Feasibility Presentation-B tech 2021-25 2
OUTLINE OF PRESENTATION
• Introduction and Motivation
• Literature Survey
• Broad Objective
• Problem Statement (tentative)
• Required Hardware/Software Details
• Project Deliverables
• References
• Gantt Chart

14-02-2024 Feasibility Presentation-B tech 2021-25 3


INTRODUCTI
ON
• The Federal Aviation Administration (FAA) recently projected that the number of
commercial UAS vehicles could reach 835,000 by 2025 – a dramatic expansion compared
to current numbers.

• As the technology behind UAVs continues to advance and their popularity in commercial
and military applications increases so does the potential for malicious actors to exploit
them.

• With the emergence of new technologies, such as autonomous flight capabilities, UAVs are
vulnerable to a variety of cyberattacks.

14-02-2024 Feasibility Presentation-B tech 2021-25 4


MOTIVATION

• The vulnerability of UAVs to cyberattacks is mainly due to their reliance on wireless


communications and their tendency to operate from a distance.

• They are more susceptible to interception, spoofing, and hijacking by malicious actors.

• In addition, the data transmitted between UAVs and their operators can be intercepted and
used to gain access to sensitive information or networks.

• Our objective is to develop comprehensive cybersecurity solutions that can detect malicious
activity on their networks

14-02-2024 Feasibility Presentation-B tech 2021-25 5


LITERATURE SURVEY
• Sharma, Jatin & Mehra, Pawan. (2023). Secure communication in IOT-based UAV networks: A
systematic survey. Internet of Things. 23. 100883. 10.1016/j.iot.2023.100883.
Takeaway
:
• The research paper provides a comprehensive overview of recent drone attacks and their potential security
vulnerabilities, covering various techniques such as SkyJack, ProtoX, MalDrone, War Flying, and WiFi/Bluetooth
cracking.

• Additionally, it discusses the background of UAVs and FANETs, including their components, types, control
channels, communication methods, and features.

• Furthermore, it compares related work on secure communication in IoT-based networks, highlighting strengths
and limitations of existing approaches.

6
14-02-2024 Feasibility Presentation-B tech 2021-25
LITERATURE SURVEY

• G. K. Pandey, D. S. Gurjar, H. H. Nguyen and S. Yadav, "Security Threats and Mitigation Techniques in
UAV Communications: A Comprehensive Survey," in IEEE Access, vol. 10, pp. 112858-112897, 2022, doi:
10.1109/ACCESS.2022.3215975.
Takeaway
:

• The paper provides a comprehensive survey focusing on the security threats and mitigation techniques in UAV-
aided wireless communication systems.

• It covers various types of attacks, secrecy performance metrics, and a detailed taxonomy of threats in UAV
networks.

• Additionally, it reviews proactive security techniques merged with emerging cellular communication technologies
and discusses future research directions in the field.

7
14-02-2024 Feasibility Presentation-B tech 2021-25
LITERATURE SURVEY
• R. H. Jacobsen and A. Marandi, "Security Threats Analysis of the Unmanned Aerial Vehicle System,"
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM), San Diego, CA,
USA, 2021, pp. 316-322, doi: 10.1109/MILCOM52596.2021.9652900.

Takeaway
:
• This paper provides a comprehensive security threat analysis for multi-UAV systems used in
autonomous inspections.

• It identifies various threats such as spoofing, tampering, repudiation, information disclosure, denial
of service, and elevation of privileges. The analysis prioritizes these threats based on severity and
proposes security design recommendations including message authentication, encryption, secure
logging, and trusted computing.

• These measures are crucial for ensuring the trustworthiness and commercial viability of UAV
inspection solutions.

8
14-02-2024 Feasibility Presentation-B tech 2021-25
LITERATURE SURVEY
• J. S. Gill, M. Saeedi Velashani, J. Wolf, J. Kenney, M. R. Manesh and N. Kaabouch, "Simulation
Testbeds and Frameworks for UAV Performance Evaluation," 2021 IEEE International
Conference on Electro Information Technology (EIT), Mt. Pleasant, MI, USA, 2021, pp. 335-
341, doi: 10.1109/EIT51626.2021.9491882.

Takeaway
: paper provides an extensive overview of UAV simulation tools, focusing on network
• The
simulators, UAV physics simulators, and distributed co-simulation frameworks.

• It discusses various tools, their features, and applications in UAV research.

• Additionally, it explores the challenges faced in designing UAV missions and networks,
emphasizing the importance of simulation platforms in addressing these challenges
efficiently.

8
14-02-2024 Feasibility Presentation-B tech 2021-25
LITERATURE SURVEY
K. Singh and A. K. Verma, "Threat modeling for multi-UAV Adhoc networks," TENCON 2017 - 2017
IEEE Region 10 Conference, Penang, Malaysia, 2017, pp. 1544-1549,
doi: 10.1109/TENCON.2017.8228102.

Takeaway
:
• The paper proposes a novel threat model for Multi-UAV Adhoc networks, addressing security issues
crucial for disaster management and military operations.

• Through comprehensive analysis and risk classification, it identifies potential threats, assesses their
impact on confidentiality, integrity, and availability, offering valuable insights for securing Multi-
UAV networks in various domains.

10
14-02-2024 Feasibility Presentation-B tech 2021-25
OBJECTIVE

• To design a threat model for the FANET that can identify threats, quantify risks
involved and address them

1
14-02-2024 Feasibility Presentation-B tech 2021-25 1
PROBLEM STATEMENT

Real-time Threat Detection of FANET


Networks

12
14-02-2024 Feasibility Presentation-B tech 2021-25
SOFTWARES UNDER CONSIDERATION

FLYNET
https://www.projectguideline.com/installing-the-flynetsim-integrated-uav-network-simulator-under-chroot/

NETSIM
https://github.com/GobySoft/netsim

NS3
https://www.nsnam.org/releases/ns-3-41/

14-02-2024 Feasibility Presentation-B tech 2021-25 13


DELIVERABLES
• Simulate a FANET using network simulator, identify the threats and show the severity
level of threats are affecting the functionality of the UAVs.

14
14-02-2024 Feasibility Presentation-B tech 2021-25
REFERENCES
1.S. Priyadharshini. and P. Balamurugan, "Empirical Analysis of Packet-loss and Content Modification based detection to secure Flying
Ad-hoc Networks (FANETs)," 2023 International Conference on Networking and Communications (ICNWC), Chennai, India, 2023, pp.
1-8, doi: 10.1109/ICNWC57852.2023.10127499.

2.S. Ren, D. Li, Q. Hu, Y. Liu and J. Liu, "An Improved Security OLSR Protocol against Black Hole Attack based on FANET," 2022 13th
Asian Control Conference (ASCC), Jeju, Korea, Republic of, 2022, pp. 383-388, doi: 10.23919/ASCC56756.2022.9828257.

3.S. Benfriha, N. Labraoui, H. B. Salameh and H. Saidi, "A Survey on Trust Management in Flying Ad Hoc Networks: Challenges,
Classifications, and Analysis," 2023 Tenth International Conference on Software Defined Systems (SDS), San Antonio, TX, USA, 2023, pp.
107-114, doi: 10.1109/SDS59856.2023.10329156.

14-02-2024 Feasibility Presentation-B tech 2021-25 15


REFERENCES
4 S. V. G and S. Karthik, "A Comprehensive Study on Security Attacks and its Defense Techniques in Wireless Sensor
Networks," 2023 4th International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 2023, pp. 519-
527, doi: 10.1109/ICOSEC58147.2023.10275916. keywords: {Wireless communication;Wireless sensor networks;Machine
learning algorithms;Scalability;Authentication;Machine learning;Blockchains;IoT-Internet of
things;GPS;WSNs;FANET;MANET;VANET;IISN},

5.S. Yu, A. K. Das, Y. Park and P. Lorenz, "SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable
Functions for Internet of Drones in Smart City Environments," in IEEE Transactions on Vehicular Technology, vol. 71, no. 10, pp.
10374-10388, Oct. 2022, doi: 10.1109/TVT.2022.3188769.
keywords: {Security;Smart cities;Authentication;Drones;Protocols;Passwords;Privacy;Physical unclonable functions (PUF);internet
of drones (IoD);smart city;authentication;security protocol},

6.M. A. Khan et al., "An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks,"
in IEEE Transactions on Vehicular Technology, vol. 70, no. 5, pp. 4839-4851, May 2021, doi: 10.1109/TVT.2021.3055895.
keywords: {Drones;Security;Ad hoc networks;Authentication;Media Access Protocol;Electronic mail;Wireless communication;Flying ad-
hoc networks (FANETs);drones;security;access control;key-agreement;AVISPA},

14-02-2024 Feasibility Presentation-B tech 2021-25 16


REFERENCES
7.T. R. Beegum, M. Y. I. Idris, M. N. B. Ayub and H. A. Shehadeh, "Optimized Routing of UAVs Using Bio-Inspired Algorithm in
FANET: A Systematic Review," in IEEE Access, vol. 11, pp. 15588-15622, 2023, doi: 10.1109/ACCESS.2023.3244067.

8.Export citation file: BibTeX | EndNote | RIS MDPI and ACS Style Abro, G.E.M.; Zulkifli, S.A.B.M.; Masood, R.J.; Asirvadam,
V.S.; Laouiti, A. Comprehensive Review of UAV Detection, Security, and Communication Advancements to Prevent Threats.
Drones 2022, 6, 284.

9.A. Y. Javaid, W. Sun, V. K. Devabhaktuni and M. Alam, "Cyber security threat analysis and modeling of an unmanned aerial vehicle
system," 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 2012, pp. 585-590, doi:
10.1109/THS.2012.6459914.

17
14-02-2024 Feasibility Presentation-B tech 2021-25
PROJECT TIMELINE

14-02-2024 Feasibility Presentation-B tech 2021-25 18


THANK YOU

19
14-02-2024 Feasibility Presentation-B tech 2021-25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy