Flooding Attack: Implementation, Detection, and Prevention for UAV

  • Faten Al-Abdulwahhab*
  • , Uthman Baroudi
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Unmanned Aerial Vehicles (UAVs) use is increasing daily, which results in increasing their security threat landscape. A major security threat to availability for network-based devices is Denial of Service (DoS) and Flooding attacks, which impact the system resources and disturb the network communications. For Mobile Ad hoc Networks (MANETs), there are multiple previous works on DoS attacks implementation and mitigation using different techniques. However, the work is limited for 2D networks with little focus on detecting and mitigating such attacks on 3D networks of Flying AdHoc Networks (FANETs). This study focuses on the RREQ flooding attack on a 3D network of drones and proposes a threshold-based detection and mitigation mechanism that considers the drones limited resources. The simulation experiments demonstrate a 34% throughput improvement and 3% energy saving.

Original languageEnglish
Title of host publication2023 20th International Multi-Conference on Systems, Signals and Devices, SSD 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages263-268
Number of pages6
ISBN (Electronic)9798350332568
DOIs
StatePublished - 2023
Event20th International Multi-Conference on Systems, Signals and Devices, SSD 2023 - Mahdia, Tunisia
Duration: 20 Feb 202323 Feb 2023

Publication series

Name2023 20th International Multi-Conference on Systems, Signals and Devices, SSD 2023

Conference

Conference20th International Multi-Conference on Systems, Signals and Devices, SSD 2023
Country/TerritoryTunisia
CityMahdia
Period20/02/2323/02/23

Bibliographical note

Publisher Copyright:
© 2023 IEEE.

Keywords

  • AODV
  • DoS
  • FANET
  • IoD
  • RREQ
  • UAV
  • cybersecurity
  • drones
  • flooding attack

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Science Applications
  • Computer Networks and Communications
  • Information Systems
  • Signal Processing
  • Health Informatics
  • Instrumentation

Fingerprint

Dive into the research topics of 'Flooding Attack: Implementation, Detection, and Prevention for UAV'. Together they form a unique fingerprint.

Cite this