Addressing The Concern of Malicious Drone in The Internet of Drone Sixth Generation Mobile System Powered by WSNs Using Three Security Levels
DOI:
https://doi.org/10.13052/jcsm2245-1439.13610Keywords:
Security, Malicious Drones, IoD, 6G network, Trust Value, PDRAbstract
Securing communications in drone networks is an essential aspect of ensuring good network performance. Data transferred over the Internet of Drones (IoD) Communications, which is rapidly growing, holds crucial information for navigation, coordination, data sharing, and control, and enables the creation of smart services in many sectors. Sixth-generation (6G) mobile systems are anticipated to be impacted by the plethora of IoD. The possibility of malevolent drones intercepting or altering data before it reaches its target is a serious worry. Operations on IoD networks may be hampered by this, and safety issues may arise. Utilizing three security levels, the suggested method solves the issue of malicious drones in the IoD network. The suggested system’s first level allocates a trust value to IoD drones based on behaviors including prior drone behavioral histories, packet losses, and processing delays. This can be accomplished by choosing drones as investigators to monitor the actions of neighboring drones and assess the level of trust value. The second level involves communication protection, which is accomplished by historical communication behavior. The purpose of the final security level is to safeguard the reliability of the data used to calculate trust values. The fundamental topical of our proposed system is to propose and explore a novel tactic for detecting malicious UAVs within the internet of drone framework, using theoretical and simulations models. Because that 6G networks are still now in the developmental stage, the results presented are based on predictive analyses and simulations rather than real-world applications.
Downloads
References
F. M. Salman, A. A. Mohammed, and A. F. Mutar, “Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime,” Journal of Cyber Security and Mobility, vol. 12, no. 3, pp. 275–296, 2023.
P. Krishnan, S. Duttagupta, and K. Achuthan, “VARMAN: Multi-plane security framework for software defined networks,” Computer Communications, vol. 148, pp. 215–239, 2019.
S. Zhang and D. Zhu, “Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities,” Computer Networks, vol. 183, p. 107556, 2020.
S. Hajiheidari, K. Wakil, M. Badri, and N. J. Navimipour, “Intrusion detection systems in the Internet of things: A comprehensive investigation,” Computer Networks, vol. 160, pp. 165–191, 2019.
A. A. M. Lehmoud, N. T. Obeis, and A. F. Mutar, “Proposing a security system for the VPN through design and implementation of a scheme for android and IOS mobiles based on two-factor authentication,” Periodicals of Engineering and Natural Sciences, vol. 10, no. 2, pp. 292–303, 2022.
P. Bhattacharya et al., “Towards future internet: The metaverse perspective for diverse industrial applications,” Mathematics, vol. 11, no. 4, p. 941, 2023.
L. Aversano, M. L. Bernardi, M. Cimitile, and R. Pecori, “A systematic review on Deep Learning approaches for IoT security,” Computer Science Review, vol. 40, p. 100389, 2021.
F. M. Salman, A. A. M. Lehmoud, and F. A. Joda, “ Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks,” Journal of Cyber Security and Mobility, vol. 12, no. 5, pp. 785–812, 2023.
S. M. Tahsien, H. Karimipour, and P. Spachos, “Machine learning based solutions for security of Internet of Things (IoT): A survey,” Journal of Network and Computer Applications, vol. 161, p. 102630, 2020.
F. M. Salman, A. A. M. Lehmoud, and F. A. Joda, “ ESMCH: An Energy-Saving, Multi-Hop, Clustering, and Hierarchy Protocol for Homogeneous WSNs,” Journal of Cyber Security and Mobility, vol. 65, no. 6, pp. 3451–3467, 2024.
L. Abualigah, A. Diabat, P. Sumari, and A. H. Gandomi, “Applications, deployments, and integration of internet of drones (iod): a review,” IEEE Sensors Journal, vol. 21, no. 22, pp. 25532–25546, 2021.
Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electronics, vol. 12, no. 6, p. 1333, 2023.
A. Albanese, F. Devoti, V. Sciancalepore, M. Di Renzo, A. Banchs, and X. Costa-Pérez, “ARES: Autonomous RIS solution with Energy harvesting and Self-configuration towards 6G,” arXiv preprint arXiv:2303.01161, 2023.
Cunha, J., Ferreira, P., Castro, E. M., Oliveira, P. C., Nicolau, M. J., Núñez, I., … and Serôdio, C. (2024). Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies. Future Internet, 16(7), 226.
K. A. Darabkh, A. a. B. Amareen, M. Al-Akhras, and W. a. K. Kassab, “An innovative cluster-based power-aware protocol for Internet of Things sensors utilizing mobile sink and particle swarm optimization,” Neural Computing and Applications, pp. 1–44, 2023.
B. Li, Z. Fei, and Y. Zhang, “UAV communications for 5G and beyond: Recent advances and future trends,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2241–2263, 2018.
X. Cao, P. Yang, M. Alzenad, X. Xi, D. Wu, and H. Yanikomeroglu, “Airborne communication networks: A survey,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 9, pp. 1907–1926, 2018.
Y. Zeng, Q. Wu, and R. Zhang, “Accessing from the sky: A tutorial on UAV communications for 5G and beyond,” Proceedings of the IEEE, vol. 107, no. 12, pp. 2327–2375, 2019.
A. Fotouhi et al., “Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges,” IEEE Communications surveys & tutorials, vol. 21, no. 4, pp. 3417–3442, 2019.
A. Sharma et al., “Communication and networking technologies for UAVs: A survey,” Journal of Network and Computer Applications, vol. 168, p. 102739, 2020.
Z. Ullah, F. Al-Turjman, and L. Mostarda, “Cognition in UAV-aided 5G and beyond communications: A survey,” IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 3, pp. 872–891, 2020.
V. Sanchez-Aguero, L. F. Gonzalez, F. Valera, I. Vidal, and R. A. López da Silva, “Cellular and virtualization technologies for UAVs: An experimental perspective,” Sensors, vol. 21, no. 9, p. 3093, 2021.
R. Gupta, A. Nair, S. Tanwar, and N. Kumar, “Blockchain-assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges,” IET communications, vol. 15, no. 10, pp. 1352–1367, 2021.
M. A. Khan et al., “Swarm of UAVs for network management in 6G: A technical review,” IEEE Transactions on Network and Service Management, 2022.
J. Wu, W. Yuan, and L. Hanzo, “When UAVs Meet ISAC: Real-Time Trajectory Design for Secure Communications,” arXiv preprint arXiv:2306.14140, 2023.
I. Orikumhi, J. Bae, H. Park, and S. Kim, “DRL-based Multi-UAV trajectory optimization for ultra-dense small cells,” ICT Express, 2023.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.