W20 Capstonephase 1 Presentation
W20 Capstonephase 1 Presentation
FANET Networks
W20
1) Varshana PES1UG21EC325
PES1UG21EC331
2) Vedic R
PES1UG21EC336
3) Vikyath B
PES1UG21EC338
4) Vismaya
• As the technology behind UAVs continues to advance and their popularity in commercial
and military applications increases so does the potential for malicious actors to exploit
them.
• With the emergence of new technologies, such as autonomous flight capabilities, UAVs are
vulnerable to a variety of cyberattacks.
• They are more susceptible to interception, spoofing, and hijacking by malicious actors.
• In addition, the data transmitted between UAVs and their operators can be intercepted and
used to gain access to sensitive information or networks.
• Our objective is to develop comprehensive cybersecurity solutions that can detect malicious
activity on their networks
• Additionally, it discusses the background of UAVs and FANETs, including their components, types, control
channels, communication methods, and features.
• Furthermore, it compares related work on secure communication in IoT-based networks, highlighting strengths
and limitations of existing approaches.
6
14-02-2024 Feasibility Presentation-B tech 2021-25
LITERATURE SURVEY
• G. K. Pandey, D. S. Gurjar, H. H. Nguyen and S. Yadav, "Security Threats and Mitigation Techniques in
UAV Communications: A Comprehensive Survey," in IEEE Access, vol. 10, pp. 112858-112897, 2022, doi:
10.1109/ACCESS.2022.3215975.
Takeaway
:
• The paper provides a comprehensive survey focusing on the security threats and mitigation techniques in UAV-
aided wireless communication systems.
• It covers various types of attacks, secrecy performance metrics, and a detailed taxonomy of threats in UAV
networks.
• Additionally, it reviews proactive security techniques merged with emerging cellular communication technologies
and discusses future research directions in the field.
7
14-02-2024 Feasibility Presentation-B tech 2021-25
LITERATURE SURVEY
• R. H. Jacobsen and A. Marandi, "Security Threats Analysis of the Unmanned Aerial Vehicle System,"
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM), San Diego, CA,
USA, 2021, pp. 316-322, doi: 10.1109/MILCOM52596.2021.9652900.
Takeaway
:
• This paper provides a comprehensive security threat analysis for multi-UAV systems used in
autonomous inspections.
• It identifies various threats such as spoofing, tampering, repudiation, information disclosure, denial
of service, and elevation of privileges. The analysis prioritizes these threats based on severity and
proposes security design recommendations including message authentication, encryption, secure
logging, and trusted computing.
• These measures are crucial for ensuring the trustworthiness and commercial viability of UAV
inspection solutions.
8
14-02-2024 Feasibility Presentation-B tech 2021-25
LITERATURE SURVEY
• J. S. Gill, M. Saeedi Velashani, J. Wolf, J. Kenney, M. R. Manesh and N. Kaabouch, "Simulation
Testbeds and Frameworks for UAV Performance Evaluation," 2021 IEEE International
Conference on Electro Information Technology (EIT), Mt. Pleasant, MI, USA, 2021, pp. 335-
341, doi: 10.1109/EIT51626.2021.9491882.
Takeaway
: paper provides an extensive overview of UAV simulation tools, focusing on network
• The
simulators, UAV physics simulators, and distributed co-simulation frameworks.
• Additionally, it explores the challenges faced in designing UAV missions and networks,
emphasizing the importance of simulation platforms in addressing these challenges
efficiently.
8
14-02-2024 Feasibility Presentation-B tech 2021-25
LITERATURE SURVEY
K. Singh and A. K. Verma, "Threat modeling for multi-UAV Adhoc networks," TENCON 2017 - 2017
IEEE Region 10 Conference, Penang, Malaysia, 2017, pp. 1544-1549,
doi: 10.1109/TENCON.2017.8228102.
Takeaway
:
• The paper proposes a novel threat model for Multi-UAV Adhoc networks, addressing security issues
crucial for disaster management and military operations.
• Through comprehensive analysis and risk classification, it identifies potential threats, assesses their
impact on confidentiality, integrity, and availability, offering valuable insights for securing Multi-
UAV networks in various domains.
10
14-02-2024 Feasibility Presentation-B tech 2021-25
OBJECTIVE
• To design a threat model for the FANET that can identify threats, quantify risks
involved and address them
1
14-02-2024 Feasibility Presentation-B tech 2021-25 1
PROBLEM STATEMENT
12
14-02-2024 Feasibility Presentation-B tech 2021-25
SOFTWARES UNDER CONSIDERATION
FLYNET
https://www.projectguideline.com/installing-the-flynetsim-integrated-uav-network-simulator-under-chroot/
NETSIM
https://github.com/GobySoft/netsim
NS3
https://www.nsnam.org/releases/ns-3-41/
14
14-02-2024 Feasibility Presentation-B tech 2021-25
REFERENCES
1.S. Priyadharshini. and P. Balamurugan, "Empirical Analysis of Packet-loss and Content Modification based detection to secure Flying
Ad-hoc Networks (FANETs)," 2023 International Conference on Networking and Communications (ICNWC), Chennai, India, 2023, pp.
1-8, doi: 10.1109/ICNWC57852.2023.10127499.
2.S. Ren, D. Li, Q. Hu, Y. Liu and J. Liu, "An Improved Security OLSR Protocol against Black Hole Attack based on FANET," 2022 13th
Asian Control Conference (ASCC), Jeju, Korea, Republic of, 2022, pp. 383-388, doi: 10.23919/ASCC56756.2022.9828257.
3.S. Benfriha, N. Labraoui, H. B. Salameh and H. Saidi, "A Survey on Trust Management in Flying Ad Hoc Networks: Challenges,
Classifications, and Analysis," 2023 Tenth International Conference on Software Defined Systems (SDS), San Antonio, TX, USA, 2023, pp.
107-114, doi: 10.1109/SDS59856.2023.10329156.
5.S. Yu, A. K. Das, Y. Park and P. Lorenz, "SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable
Functions for Internet of Drones in Smart City Environments," in IEEE Transactions on Vehicular Technology, vol. 71, no. 10, pp.
10374-10388, Oct. 2022, doi: 10.1109/TVT.2022.3188769.
keywords: {Security;Smart cities;Authentication;Drones;Protocols;Passwords;Privacy;Physical unclonable functions (PUF);internet
of drones (IoD);smart city;authentication;security protocol},
6.M. A. Khan et al., "An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks,"
in IEEE Transactions on Vehicular Technology, vol. 70, no. 5, pp. 4839-4851, May 2021, doi: 10.1109/TVT.2021.3055895.
keywords: {Drones;Security;Ad hoc networks;Authentication;Media Access Protocol;Electronic mail;Wireless communication;Flying ad-
hoc networks (FANETs);drones;security;access control;key-agreement;AVISPA},
8.Export citation file: BibTeX | EndNote | RIS MDPI and ACS Style Abro, G.E.M.; Zulkifli, S.A.B.M.; Masood, R.J.; Asirvadam,
V.S.; Laouiti, A. Comprehensive Review of UAV Detection, Security, and Communication Advancements to Prevent Threats.
Drones 2022, 6, 284.
9.A. Y. Javaid, W. Sun, V. K. Devabhaktuni and M. Alam, "Cyber security threat analysis and modeling of an unmanned aerial vehicle
system," 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 2012, pp. 585-590, doi:
10.1109/THS.2012.6459914.
17
14-02-2024 Feasibility Presentation-B tech 2021-25
PROJECT TIMELINE
19
14-02-2024 Feasibility Presentation-B tech 2021-25