Professional Documents
Culture Documents
A Proposal
For
Doctor of Philosophy
Submitted By
Kuldeep Singh
(Registration No. 901403006)
Supervisor
Dr. Anil Kumar Verma
Associate Professor, CSED, Thapar University, Patiala, Punjab
i
LIST OF FIGURES
LIST OF TABLES
ii
LIST OF ABERIVATIONS
iii
1. Introduction
Mobility: Wireless networks provide flexibility of movement to the user. They can
access information anywhere along with their desk. They don’t require having a wired
connectivity.
Reachability: With the help of wireless networks, reachability among people is
increased. With wireless network communication becomes location independent and
availability of person becomes more.
Simplicity: Initial setup cost for wireless network is more, but the facilities provided by
the network overcome this cost. Utilization of networks gets increased. Moreover
wireless networks are easy to setup as compare to wired networks. Simplicity of wireless
networks also provides ease of use to its users.
Maintainability: Maintenance is one of the considerable factors to decide the cost. Being
a wireless system, the maintenance cost is not too much.
Roaming Services: Using a wireless network system you can provide service anywhere
any time including train, busses, aeroplanes etc.
1
1.2 Classification of Wireless Network
Wireless standard 802.11 is categorized into two categories: Infrastructure based networks and
ad-hoc networks [24].
Infrastructure
Based Networks Wireless Sensors
Networks
Wireless Network
2
1.4 Infrastructure less Network
Infrastructure based networks are very useful in day to day communications that involves
telephony services, internet access, online transactions, business deals etc. But there are
numerous applications for which infrastructure networks are not economical and feasible. Such
kind of applications requires rapid network setup and temporary networks. Infrastructure less
networks are collection of mobile nodes that communicate through common radio channel [24].
3
1.6 Wireless Mesh Network
One of the emerged wireless technologies is wireless mesh networks. In these networks, nodes
are consists of mesh clients and mesh routers. Each node can act as router for forwarding packets
of other nodes. WMNs are considered to be self-organized and self-configured networks [5]. The
nodes automatically create connectivity among each other. So deployment is not very difficult.
The advantage of WMN over other networks is easy maintenance, tolerance, reliable behavior
and low up cost. WMN technology provides the always online anywhere and everywhere
provision. This technology has numerous advantages, e.g., broadband connection for home,
building automation, networking among enterprises, neighborhood network creation etc. These
features enable the integration of WMN with Wi-Fi, WiMAX and WiMedia.
4
Along with routing, following research issues are faced by mobile ad-hoc networks:
Topology Control: Due to high node mobility, the topology changes very frequently.
Control and management of topology is one of major concern in MANETs. A virtual
infrastructure is one possible alternative to physical infrastructure. This plays an
important role in routing, because responsible nodes for routing are reduced. Only the
nodes which are in virtual backbone are considered. Efficient and effective topology
control algorithms are required for MANETs.
Quality of Service: Routing in one of active area of research in MANET. This become
even more challenging when quality of service e.g. bandwidth, end to end delay, packet
loss ratio is concerned.
Mobile ad-hoc networks suffer from various attacks listed in Table 1. These attacks are
possibly occurring in FANETs as well.
5
intelligent transportation system (ITS).VANET provides two ways of communication. First
method is purely wireless infrastructure less networks. Another method of communication is
through fixed infrastructure and vehicle. Fixed infrastructure is Road Side Units (RSUs) which
are stationary nodes that communicate mobile nodes i.e. vehicles. Vehicles are equipped with on
board units (OBU) and application units (AU) [14]. Road side units are connected to internet.
6
large degree of freedom and self-organising capabilities makes mobile ad-hoc networks totally
different from any other network solution. The communication standards proposed for ad-hoc
networks are not only liable to grounded networks, rather they also have wide application in
unmanned aerial vehicle networking (UAV). Further, UAV is an aircraft with no pilot on
board. UAVs can fly autonomously based on pre-programmed flight plans or can be operated
using complex dynamic automation systems and are versatile and flexible in implementation
[22]. Hence, UAV have wide application such as disaster management, location aware services,
rescue operations, security services etc. Single UAV based monitoring system already exists and
is particularly implemented. But, when a single UAV system is considered, it has always an issue
of network scalability and flexibility due to its limited surveillance capability and single UAV
[23]. Thus, in order to increase the capability of UAV controlled network, multi-UAV system is
required. In recent research work, UAV based ad-hoc networks are also termed as “Flying ad-
hoc network”. Flying ad-hoc networks are also sub category of mobile ad-hoc networks. These
networks are designed to overcome the issues faced by mobile ad-hoc networks. Setting up an
ad-hoc network in military area, battle fields, areas affected by natural disasters like earthquake,
flooding etc. is difficult. MANETs were not applicable for such situations. Flying ad-hoc
networks are infrastructure less networks with no central control. FANET uses micro air vehicles
(MAVs) for communication. Various MAVs form swarms and arrange themselves to
communicate in large area using wireless network. UAVs communicate with each other locally,
with base station and also interact with their environment to get information.It is capable to carry
on transmission without any centralized device [30].
7
Flying ad-hoc network have various application as following:
Calamity Administration: FANET is useful when the existing communication system is
damaged due to natural disaster like floods, earthquake, firing etc.
In Sensor Networks: Different sensor devices can be used to collect data to do daily
functions like weather forecasting, terrestrial movement tracking etc.
Location Aware Services: FANETs can be used in following services [22].
Forwarding calls to any location
Can act as travel guide for passengers
To identify information regarding specific location
Military Services: FANET are very useful in military services. Setting up proper
communication system is very difficult in military areas. So FANETs are used for
information exchange among soldiers, military headquarters.
Search and Rescue Operations: FANET can be used provide a better way to do search
and rescue operations such as rescue operation of hostages [22].
Security Purpose: FANET is capable of receiving information quickly. It can be used to
collect information for the security purpose of a delegate visiting to a place where no
network infrastructure exists.
8
2. Literature Survey
In [6] M.T. Hyland et al. compared reactive, proactive and position based routing
techniques for FANET. They have taken AODV as reactive, OLSR as proactive and
GPSR as position based routing. It has been conclude the position based routing (GPSR)
out performed AODV and OLSR routing for swarm of UAV. Comparison is done on two
parameters, packet delivery ratio and end to end delay.
A unified framework is proposed by Otrok et al. in [7] for elongate the lifetime of a
cluster based IDS by balancing the resource consumption. The basic idea is to choose the
most efficient node for the detection process. The proposed framework was also able to
identify and punish misbehaving leader IDS that would deviate from intrusion detection.
A game theoretical model based on cooperative decision was proposed which can
effectively identify misbehaving leader-IDS with minimum false-positive rate. To
maximize the detection probability for leader-IDS, a zero-sum non-cooperative game was
also given. Leader-IDS play game with intruder without having the complete information
about the intruder. Results shows that proposed framework choose most efficient node
and maximize detection probability with less false-positive.
V. R. Khare et al. discussed the control model of unmanned air vehicle in [8]. A swarm
of UAVs is used to create FANET. To deal with dynamic and distributive nature of
problem, model has characteristics like self-organizing, distributive and decentralized.
Performance of routing improved because of physical propinquity of UAVs in the swarm
[8]. Khare also stated that dynamic source routing gives comparatively better
performance than proactive routing technique in highly dynamic node movement and
dynamic topology.
9
J. T. Chang et al. Proposed a security suite for MANET routing named as VESS
(versatile extensible security suite) [12]. Security suite is proposed for AODV routing
protocol and mainly cover authentication and encryption aspects of security. In proposed
security suite digital cipher chaining is used for powerful authentication and different
ciphers DES, AES and RSA is used to provide user adjustable encryption. VESS have
four different encryption options: (Open, lightweight, strong and user). All the four
modes provide different level of security as {open- no encryption, lightweight- can be
cracked by brute force with high computation power, strong – highest security in VESS,
user- can be customize their own balance of security and performance. Network security
and performance is analyzed, only by adding 10-30% delay in network, VESS can
provide the strongest security to the network.
In [13] W.Lou et al. proposed a security scheme for dynamic MANETs named as Secure
Protocol for Reliable Data Delivery (SPREAD). The idea behind SPREAD is to transmit
message into small chunks through multipath routing. The message is divided into parts
and then transmits through multipath routing and if a small number of shares are
compromised then also it does not enable whole message to be compromised. A secret
sharing algorithm is used to divide a message into several parts so that adversary must
have to compromise at least T shares to compromise the whole message, where T is a
threshold value. Simulation Results depicts that if data is transmitting through insecure
network than SPREAD provides more secure data delivery. It is also shown that a
redundant SPREAD design can provide reliability without sacrificing the security.
R. Ferdous et al. proposed a node based trust management technique for MANET in [16].
The proposed scheme uses a mobile agent system as a backbone for cluster-based
10
wireless sensor network, which introduce trust between nodes locally. They have
assumed that trust is transitive and trust values are binary rather than continuous variable.
Trust value of node j can be calculated by node i in terms of two values. First trust value
of itself for node j by monitoring it and second is weighted sum of trust values calculated
by other nodes for node j in the network. Trust values calculated by other nodes consider
few parameters like (packets dropped by nj which is sent by nj, number of total packets
dropped by node nj, packets dropped by nj due to congestion, packets dropped by node nj
due to unidentified reasons, Priority given by node nj to its own packets vs other packets,
delay in packet forwarding by node nj due to {packets misrouted by nj and packets
falsely injected by nj}. NTM architecture consist three parts Trust Monitors (TMs), Node
Initiators (NIs) and Trust Evaluators (TEs). NTM node consist four components given as:
node id, wireless sensor, Trust Info-score and Context. Node Initiator generate a TM
agents with symmetric key (Sk) and a monotonically increase number which is
distributed to each node in the network through broadcasting. In case of old SK is stolen
or break, a new TM with new SK is launched by NI to avoid security breach. TM consist
three data structure trust evaluation table, message counter and history buffer. All TM
secure TE by using common SK and node cannot access it.
A. I. Alshbatat et al. proposed a new routing protocol for FANET called Directional
Optimized Link State Routing Protocol (DOLSR) [17] which uses directional antenna.
The proposed protocol is the extension of basic Optimized Link State Routing Protocol
(OLSR). The idea behind the DOLSR is to minimize the multi-point relays (MPR) with
the help of heuristic. Proposed routing scheme minimize the end-to-end delay and also
minimize the number of overhead packets. The results also show that DOLSR
outperformed OLSR, DSR and AODV in terms of overall throughput and as well as in
terms of end to end delay.
T. Eissa et al. proposed a model for identity based RSA scheme [19]. The scheme is
proposed for fast cryptographic operations for network performance. The basic idea is
that in RSA cryptographic scheme, all of the attacks are not possible if public key is not
available in the public domain or not known to the attacker. So, shorter RSA key can be
used safely for fast encryption and decryption. Proposed scheme works as: Initially all the
11
nodes deployed with a identity which is known to the other nodes by using the friendship
concept for trusted nodes, then all nodes publish their public parameter in the network
and then node(A) encrypt its own public key by using given formula in [19] . After it A
sends its encrypted public key and RSA modulus. Receiver (B) decrypt public key of
node (A) by using given formula in [19]. Finally B can securely send a message to node
A by using its public key. They proved that proposed scheme is secure against IND-
CSPKA and RSA cryptanalysis attacks. The proposed scheme is compared with RSA-TC
and ECC-TC and shows better network performance.
In [20] S. Mutly, and G. Yilmaz proposed trust relationship based a cooperative intrusion
detection framework for MANETs. All the nodes observe their neighbor nodes for
suspicious activities. If a node detects unusual behavior of a neighbor node then it
broadcasts alert messages in the network. Trust management is depends upon
rebroadcasting of alert messages by the neighboring nodes. A reputation of alert
messages is used to calculate the trust level of a node. Framework is basically based on
direct neighbor observation, but indirect observations are also used. Framework also
provide robustness against false trust information transmit in the network by malicious
nodes. However, the performance of the trust management service is not analyzed, and
the framework does not present the classes of attacks that are possible to be detected.
A spatial secure group communication (SSGC) problem is introduced and for deeply
investigates an analytical framework for multiple UAVs and SSGC is presented by S.W.
12
Kim, and S.W. Seoin [25]. A distributed method is proposed to solve the problem, which
analyze spatial group size, upper bound of group member and stability. Especially
communication range and relative position also investigated to form closed group.
Feasibility of proposal is demonstrated with application scenario.
Different security threats for UAVs System are analyzed and a cyber-security threat
model has been proposed by A.Y. Javaid, et al. In [26]. A detailed security threat analysis
is done which provide an edge to the researcher, designer and users to identify
vulnerabilities in the UAVs system to find the counter-measures from them. Security is
very much important to UAVs system because the carry sensitive and confidential
information, threat to UAVs system can leads to national security issue. They have also
tried to evaluate risk generating by different vulnerabilities to the UAVs system.
In FANET, UAVs communication suffers data packets lost because of high movements
of nodes and very frequent changes in topology. So, there is a need of routing protocol
which can overcome from the packet loss. Lin et al. proposed Geographic Position
Mobility Oriented Routing (GPMOR) [27]. GPMOR uses Gauss-Markov mobility model
to predict the mobility pattern of UAVs to eliminate effect of high node movement. For
accurate decision in mobility pattern GPMOR uses Euclidean distance.
13
E. A. Panaousiset al. proposed a security model in [29] for MANETs for real-time
communication like emergency, rescue etc. proposed model consists intrusion detection
provision, secure routing protocol and security extension for communication with peer-
to-peer overlays. In model main emphasized on P2PSIP overlays. They have presented
and analyzed two extensions of the IETF drafts in terms of security. For real-time
emergency communications secure P2P overlays with IDS can provide a full and robust
solution. They have also discussed the use of IPSec in adaptive routing protocol and also
with its security extension. The results were compared with SAODV routing and been
measured more efficient in terms security and performance.
In the paper [32] M.S. Faughnan, S. Michelle, et al. aim to achieve two objectives. First,
try to identify risk regarding cyber security attacks on a UAV and second, to develop a
scheme through which security breach is informed to the UAV operator. Established risk
assessment methods are used to achieve the first objective. To achieve second objective a
methodology is developed that measures velocity of UAV with the help of two on-board
systems and if any considerable variation occurs then it indicates a probable security
breach. To simulation of UAV flight is done through car movement to perform analysis
of experiment results.
K. Mansfield, et al. developed a threat model in [33] to observe and analyze cyber
security vulnerabilities in hardware, software, GCS networking hub, smart devices and
communication networks. It will help the users to secure communication. They have
focused physical connection, application software and operating system malware because
14
these are the main target of attacker to get control over UAV or to steal the information
from the communication network.
M. Liu et al. developed an approach based on cognitive map building in which, cluster
heads are elected during routing phase that allows logical partitioning for better mobility
management of nodes [34].
Z. Birnbaum, et al. proposed a prototype system for UAV monitoring which provide
estimation of airframes and controller parameter and also capture flight data [38].
Captured data and estimated parameter compared with the already known standard
parameters. If there is any significant variation is observer between standard and capture
data, alert signal is send to ground control station and accordingly action taken. For
estimating the UAV parameters, Recursive Least Squares method is used. State space
15
model and equation parameter are used in conjunction with proposed estimator. State of
the art flight simulator is used to test the system.
S. Amin et al. designed a secure framework for ADS-B surveillance system which is
dependent on digital communication between ground station and aircraft [39]. Three
different alternative techniques hashing, symmetric encryption and asymmetric
encryption are used to avoid spoofing attack on ADS-B surveillance system. Analysis of
all implications and collision risks is done by simulations which model the attack on
airspace.
In [40] A. Y. Javaid, et al. analyze the performance of simulation test-bed for security
aspect of wireless communication by performing DDoS and Jamming attacks on single
and multiple UAVs. Simulation is done on the UAVSim simulator proposed in [26].
In [42] V. Sharma and R. Kumar present an opportunistic network formation using cross
layer design for FANET. Service layer security of FANET is used in the presented
network model to provide parameterized input to neural setup. The proposed design
offers effective utilization of resource, high data delivery ratio and efficient service
coordination with lower delay to secure service.
16
3. Research Gaps
17
is taking more time.
v. Scalability: Single UAV system can perform limited tasks. To perform more number to
tasks, collection of UAVs is required. This motivated the concept of multi-UAV based
system. This improves performance, reduces delay and optimizes the task [43]. FANET
algorithms should be so designed that they can accommodate any number of UAVs.
vi. Reliable and secure data transfer: FANET applications transfer sensitive information.
So the reliability of the network should be very high. Reliability and security should be
defined with the criticality of data. So different level of security need to be defined.
18
4. Problem Statement
4.3 Methodology
To achieve the objectives the research work will pass through the following phases:
19
3. Proposed framework will be verified and validated based upon mathematical foundation
and simulation using synthetic data. Simulators like NS2, MATLAB, UAVSim etc.
4. The proposed framework will be compared with other proposed security frameworks
against parameters like efficiency, delay etc.
Activity
A. Study and review of existing security mechanism of various routing protocols for
FANETs.
B. Analyzing the proposed security framework against different security parameters such as
confidentiality, integrity, availability etc.
C. Design and development of a secure framework for FANETs.
D. Verification and Validation of the proposed security framework.
E. Compare the proposed framework few of the existing security mechanism.
F. Documentation and Thesis writing.
G. Publication of research work in conferences / journals.
20
References
[1] D. Bertsekas and R. Gallager, “Data Networks”, Prentice Hall, pp. 297-333, 1987.
[2] L. Zhou, andZ. J. Haas, “Securing ad hoc networks”, in: Network, IEEE,Vol.13, Issue 6,
24-30, 1999.
[3] D.Shukla, and Sridhar Iyer. "Mobility models in ad hoc networks."KReSIT, IIT
Bombay ,2001.
[4] J. Hoebeke, I. Moerman, B. Dhoedt and P. Demeester, “An Overview mobile ad-hoc
Network: Application and Challenges”, in 43rd European Telecommunication Congress,
Ghent, Belgium, 2004.
[5] F. Akyildiz, X. Wang and W. Wang, “Wireless Mesh Network: A Survey” in Computer
Networks and ISDN Systems, Vol. 47, Issue 4, March 2005.
[6] M.T. Hyland, B.E. Mullins, R.O. Baldwin, M.A. Temple, “Simulation based performance
evaluation of mobile ad hoc routing protocols ina swarm of unmanned aerial vehicles”,
in: Proceedings of the 21stInternational Conference on Advanced Information
Networking and Applications Workshops , Vol. 02, AINAW ’07, IEEE Computer
Society, Washington, DC, USA, pp. 249–256,2007.
[7] Otrok, Hadi, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya. "A game-
theoretic intrusion detection model for mobile ad hoc networks."Computer
communications Vol. 31, Issue 4, 708-721,2008.
[11] L. Abusalah, A. Khokhar, and M. Guizani."A survey of secure mobile ad hoc routing
protocols." Communications Surveys & Tutorials, IEEE, Vol. 10, Issue 4, pp. 78-93,
2008.
21
[12] J. T. Chang, S. Gundala, T.S. Moh, and M. Moh. "VESS: a Versatile Extensible Security
Suite for MANET Routing." InCommunications, Computers and Signal Processing,
2009.PacRim 2009.IEEE Pacific Rim Conference on, pp. 944-950, 2009.
[13] W.Lou, W. Liu, Y. Zhang, and Y. Fang. "SPREAD: Improving network security by
multipath routing in mobile ad hoc networks."Wireless Networks, Vol.15, Issue 3, pp.
279-294, 2009.
[17] A.I. Alshabtat, L. Dong, J. Li, and F. Yang."Low latency routing algorithm for unmanned
aerial vehicles ad-hoc networks." International Journal of Electrical and Computer
Engineering, Vol. 6, Issue 1, pp. 48-54,2010.
[20] S. Mutly, and G. Yilmaz. "A distributed cooperative trust based intrusion detection
framework for MANETs." In ICNS 2011, The Seventh International Conference on
Networking and Services, pp. 292-298, 2011.
[22] C. Zang, and S. Zang. "Mobility prediction clustering algorithm for UAV
networking."In GLOBECOM Workshops (GC Wkshps), 2011 IEEE, pp. 1158-1161,
2011.
[23] M. Müller. "Flying Ad-Hoc Networks." Institute of Media Informatics Ulm University,
Vol. 53, 2012.
22
[24] N. Saxena, and N. S. Chaudhari. "Message Security in Wireless Networks: Infrastructure
based vs. Infrastructure-less Networks." IEEE, New Jersey ,2012.
[25] S.W. Kim, and S.W. Seo."Cooperative unmanned autonomous vehicle control for
spatially secure group communications." Selected Areas in Communications, IEEE
Journal on 30, Vol. 5, pp. 870-882, 2012.
[26] A.Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam."Cyber security threat analysis
and modeling of an unmanned aerial vehicle system."In Homeland Security (HST), 2012
IEEE Conference on Technologies for, pp. 585-590.2012.
[27] L. Lin, Q. Sun, J. Li, and F. Yang. "A novel geographic position mobility oriented
routing strategy for UAVs." Journal of Computational Information Systems 8, Vol. 2, pp.
709-716, 2012.
[28] A. Morais, and A. Cavalli. "A distributed intrusion detection scheme for wireless ad hoc
networks."In Proceedings of the 27th Annual ACM Symposium on Applied Computing,
pp. 556-562, 2012.
[31] K. Hartmann, and C. Steup. "The vulnerability of UAVs to cyber attacks-An approach to
the risk assessment." In Cyber Conflict (CyCon), 2013 5th International Conference on,
pp. 1-23, 2013.
[33] K. Mansfield, T. Eveleigh, T. H. Holzer, and S. Sarkani. "Unmanned aerial vehicle smart
device ground control station cyber security threat model." In Technologies for
Homeland Security (HST), 2013 IEEE International Conference on, pp. 722-728, 2013.
[34] M. Liu, J. Lin, and Y. Yuan."Research of UAV cooperative reconnaissance with self-
organization path planning."In International Conference on Computer, Networks and
Communication Engineering (ICCNCE 2013).Atlantis Press, 2013.
23
[35] O. K. Sahingoz. "Networking models in flying Ad-hoc networks (FANETs): Concepts
and challenges." Journal of Intelligent & Robotic Systems, Vol. 74, Issue 1-2, pp. 513-
527, 2014.
[36] S. Rosati, K. Kruzelecki, G. Heitz, D. Floreano, and B. Rimoldi. "Dynamic Routing for
Flying Ad Hoc Networks." arXiv preprint arXiv:1406.4399, 2014.
[37] T. V. P.Sundararajan, S. M. Ramesh, R. Maheswar, and K. R. Deepak."Biologically
inspired artificial intrusion detection system for detecting wormhole attack in
MANET." Wireless networks, Vol. 20, Issue 4, pp. 563-578, 2014.
[39] S. Amin, T. Clark, R. Offutt, and K. Serenko. "Design of a cyber-security framework for
ADS-B based surveillance systems." In Systems and Information Engineering Design
Symposium (SIEDS), 2014, pp. 304-309, 2014.
[41] S. Temel, and I. Bekmezci. "LODMAC: Location Oriented Directional MAC Protocol
for FANETs." Computer Networks, 2015.
[42] V. Sharma and R. Kumar. "Cross Layer Design For Secure Service Dissemination Over
Flying Ad Hoc Networks.", 2015.
[44] U. Khan, S. Agrawal, and S. Silakari. "A Detailed Survey on Misbehavior Node
Detection Techniques in Vehicular Ad Hoc Networks." In Information Systems Design
and Intelligent Applications, Springer India, pp. 11-19. 2015.
[45] W. S. Yap, J. K. Liu, S. Y. Tan, and B.M. Goi."On the security of a lightweight
authentication and encryption scheme for mobile ad hoc network."Security and
Communication Networks, 2015.
24