Abstract
Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called ’mission’ to provide a wide range of applications/services. Without loss of generality, the services and applications offered by the FANET are based on data/content delivery in various forms such as, but not limited to, pictures, video, status, warnings, and so on. Therefore, a content-centric communication mechanism such as Information Centric Networking (ICN) is essential for FANET. ICN addresses the problems of classical TCP/IP-based Internet. To this end, Content-centric networking (CCN), and Named Data Networking (NDN) are two of the most famous and widely-adapted implementations of ICN due to their intrinsic security mechanism and Interest/Data-based communication. To ensure data security, a signature on the contents is appended to each response/data packet in transit. However, trusted communication is of paramount importance and currently lacks in NDN-driven communication. To fill the gaps, in this paper, we propose a novel trust-aware Monitor-based communication architecture for Flying Named Data Networking (FNDN). We first select the monitors based on their trust and stability, which then become responsible for the interest packets dissemination to avoid broadcast storm problem. Once the interest reaches data producer, the data comes back to the requester through the shortest and most trusted path (which is also the same path through which the interest packet arrived at the producer). Simultaneously, the intermediate UAVs choose whether to check the data authenticity or not, following their subjective belief on its producer’s behavior and thus-forth reducing the computation complexity and delay. Simulation results show that our proposal can sustain the vanilla NDN security levels exceeding the 80% dishonesty detection ratio while reducing the generated end-to-end delay to less than 1 s in the worst case and reducing the average consumed energy by more than two times.
Highlights
Flying ad-hoc network (FANET) employing Unmanned Aerial Vehicles (UAVs) as nodes is a new breed of Self-Organized Networks (SONs) offering a plethora of innovative and exciting applications including, but not limited to, Disaster Management [1] and public safety insurance [2]
Internet Architecture (FIA), recently content-centric networking (CCN) and named data networking (NDN) have been considered to be the architectural backbones for SONs and its breeds, such as VANET-based and FANET-based clouds [3,4] and flying social networks [5]; this paper only focuses on FANET
The remainder of the paper is organized as follows: in Section 2, we present the existing trust establishment works for FANET, and the data authentication process used by the vanilla NDN
Summary
Flying ad-hoc network (FANET) employing Unmanned Aerial Vehicles (UAVs) as nodes is a new breed of Self-Organized Networks (SONs) offering a plethora of innovative and exciting applications including, but not limited to, Disaster Management [1] and public safety insurance [2]. Among other challenges for most of SONs and mainly FANETs, security and privacy are two of the most daunting challenges due to several reasons such as resource-constraints, mobility, stringent delay requirements, and so forth. Owing to the nature of FANET applications, security of the content and its communication through the network are of paramount importance and prone to content-related attacks. To this end, several solutions have been proposed to secure the content communication and guarantee trusted delivery of the exchanged messages [6,7]. There exist trust establishment solutions for both MANET and VANET contexts
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.