Abstract
Unmanned Aerial Vehicles (UAVs) use is increasing daily, which results in increasing their security threat landscape. A major security threat to availability for network-based devices is Denial of Service (DoS) and Flooding attacks, which impact the system resources and disturb the network communications. For Mobile Ad hoc Networks (MANETs), there are multiple previous works on DoS attacks implementation and mitigation using different techniques. However, the work is limited for 2D networks with little focus on detecting and mitigating such attacks on 3D networks of Flying AdHoc Networks (FANETs). This study focuses on the RREQ flooding attack on a 3D network of drones and proposes a threshold-based detection and mitigation mechanism that considers the drones limited resources. The simulation experiments demonstrate a 34% throughput improvement and 3% energy saving.
| Original language | English |
|---|---|
| Title of host publication | 2023 20th International Multi-Conference on Systems, Signals and Devices, SSD 2023 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 263-268 |
| Number of pages | 6 |
| ISBN (Electronic) | 9798350332568 |
| DOIs | |
| State | Published - 2023 |
| Event | 20th International Multi-Conference on Systems, Signals and Devices, SSD 2023 - Mahdia, Tunisia Duration: 20 Feb 2023 → 23 Feb 2023 |
Publication series
| Name | 2023 20th International Multi-Conference on Systems, Signals and Devices, SSD 2023 |
|---|
Conference
| Conference | 20th International Multi-Conference on Systems, Signals and Devices, SSD 2023 |
|---|---|
| Country/Territory | Tunisia |
| City | Mahdia |
| Period | 20/02/23 → 23/02/23 |
Bibliographical note
Publisher Copyright:© 2023 IEEE.
Keywords
- AODV
- DoS
- FANET
- IoD
- RREQ
- UAV
- cybersecurity
- drones
- flooding attack
ASJC Scopus subject areas
- Artificial Intelligence
- Computer Science Applications
- Computer Networks and Communications
- Information Systems
- Signal Processing
- Health Informatics
- Instrumentation
Fingerprint
Dive into the research topics of 'Flooding Attack: Implementation, Detection, and Prevention for UAV'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver