Addressing The Concern of Malicious Drone in The Internet of Drone Sixth Generation Mobile System Powered by WSNs Using Three Security Levels

Authors

  • Ahssan Ahmed Mohammed Lehmoud Ministry of Education, Babylon Education Directorate, Iraq
  • Fadhil Mohammed Slman Ministry of Education, Babylon Education Directorate, Iraq https://orcid.org/0000-0002-7210-1797
  • Mohamed Q. Mohamed Ministry of Education, Babylon Education Directorate, Iraq
  • Fanar Ali Joda Department of Air Conditioning & Refrigeration Engineering Techniques, Al-Mustaqbal University, Iraq. Ministry of Education, Babylon Education Directorate, Babylon, Iraq
  • Mohammed Hasan Aldulaimi Department of Computer Techniques Engineering, Al-Mustaqbal University, Iraq

DOI:

https://doi.org/10.13052/jcsm2245-1439.13610

Keywords:

Security, Malicious Drones, IoD, 6G network, Trust Value, PDR

Abstract

Securing communications in drone networks is an essential aspect of ensuring good network performance. Data transferred over the Internet of Drones (IoD) Communications, which is rapidly growing, holds crucial information for navigation, coordination, data sharing, and control, and enables the creation of smart services in many sectors. Sixth-generation (6G) mobile systems are anticipated to be impacted by the plethora of IoD. The possibility of malevolent drones intercepting or altering data before it reaches its target is a serious worry. Operations on IoD networks may be hampered by this, and safety issues may arise. Utilizing three security levels, the suggested method solves the issue of malicious drones in the IoD network. The suggested system’s first level allocates a trust value to IoD drones based on behaviors including prior drone behavioral histories, packet losses, and processing delays. This can be accomplished by choosing drones as investigators to monitor the actions of neighboring drones and assess the level of trust value. The second level involves communication protection, which is accomplished by historical communication behavior. The purpose of the final security level is to safeguard the reliability of the data used to calculate trust values. The fundamental topical of our proposed system is to propose and explore a novel tactic for detecting malicious UAVs within the internet of drone framework, using theoretical and simulations models. Because that 6G networks are still now in the developmental stage, the results presented are based on predictive analyses and simulations rather than real-world applications.

Downloads

Download data is not yet available.

Author Biographies

Ahssan Ahmed Mohammed Lehmoud, Ministry of Education, Babylon Education Directorate, Iraq

Ahssan Ahmed Mohammed Lehmoud received his BS in computer science from the University of Babylon in Iraq in 2006. From 2009 to 2011, he completed his master’s in Computer Science from the Department of Computer Science and Information Technology at Dr. BabaSahib Ambedkar Marthwada University, India. He received his Ph.D. thesis in information technology from the Department of Software College of Information Technology University of Babylon, Iraq, in April 2018. He has been a lecturer at the Babylon Education Directorate since 2008 till now. His research interests include (Information Security, Network Security, Cryptography, Steganography, Image Processing, and Data Mining).

Fadhil Mohammed Slman, Ministry of Education, Babylon Education Directorate, Iraq

Fadhil Mohammed Salman received his BS in computer science from the University of Anbar in Iraq in 2005. From 2010 to 2012, he completed his master’s in Computer Science from the Department of Computer Science University of Babylon, Iraq. He received his Ph.D. thesis in information technology from the Department of Software College of Information Technology University of Babylon, Iraq, in 2019. He has been a lecturer at the Babylon Education Directorate since 2007 till now. His research interests include (Computer Networks, Network Security, Data Compression, Image Processing, and Data Mining).

Mohamed Q. Mohamed, Ministry of Education, Babylon Education Directorate, Iraq

Mohamed Q. Mohamed in Hilla, Babylon City, Iraq, on May 29, 1988, received his BSc degree in Computer Science from the University of Babylon in Iraq in 2010. He received the MSc in Multimedia in 2022 from Babylon University – Iraq. He has been a lecturer at the Babylon Education Directorate since 2012 till now. His research interests include Multimedia, Bioinformatics, Artificial Intelligence, Image Processing, and Data Mining, and Security.

Fanar Ali Joda, Department of Air Conditioning & Refrigeration Engineering Techniques, Al-Mustaqbal University, Iraq. Ministry of Education, Babylon Education Directorate, Babylon, Iraq

Fanar Ali Joda in Hilla, Babylon City, Iraq, on November 27, 1980. He received a BSc degree in computer science in 2002 from the University of Babylon/Computer Science Dept.-Iraq. He received the MSc in Data Compression 2015 from Babylon University – Iraq. He received his Ph.D. degree in Computer Vision in 2019 from Babylon University-Iraq. Currently, Joda is Lecturer at Al-Mustaqbal University – Air Conditioning & Refrigeration Engineering Techniques Dept. His research interests include (Computer Vision and Information Hiding).

Mohammed Hasan Aldulaimi, Department of Computer Techniques Engineering, Al-Mustaqbal University, Iraq

Mohammed Hasan Aldulaimi in Hilla, Babylon City, Iraq, on May 01, 1980. He received a BSc degree in computer science in 2002 from the University of Babylon/Computer Science Dept.-Iraq. He received the MSc in Knowledge Audit 2011 from University Tenaga National – Malaysia. He received his Ph.D. degree in Bioinformatics in 2017 from Universiti Kebangsaan Malaysia (UKM). Currently, Aldulaimi is Lecturer at Al-Mustaqbal University – Computer Engineering Techniques Dept. His research interests include (Information Technology, Artificial Intelligence, Knowledge Management, and Bioinformatics).

References

F. M. Salman, A. A. Mohammed, and A. F. Mutar, “Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime,” Journal of Cyber Security and Mobility, vol. 12, no. 3, pp. 275–296, 2023.

P. Krishnan, S. Duttagupta, and K. Achuthan, “VARMAN: Multi-plane security framework for software defined networks,” Computer Communications, vol. 148, pp. 215–239, 2019.

S. Zhang and D. Zhu, “Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities,” Computer Networks, vol. 183, p. 107556, 2020.

S. Hajiheidari, K. Wakil, M. Badri, and N. J. Navimipour, “Intrusion detection systems in the Internet of things: A comprehensive investigation,” Computer Networks, vol. 160, pp. 165–191, 2019.

A. A. M. Lehmoud, N. T. Obeis, and A. F. Mutar, “Proposing a security system for the VPN through design and implementation of a scheme for android and IOS mobiles based on two-factor authentication,” Periodicals of Engineering and Natural Sciences, vol. 10, no. 2, pp. 292–303, 2022.

P. Bhattacharya et al., “Towards future internet: The metaverse perspective for diverse industrial applications,” Mathematics, vol. 11, no. 4, p. 941, 2023.

L. Aversano, M. L. Bernardi, M. Cimitile, and R. Pecori, “A systematic review on Deep Learning approaches for IoT security,” Computer Science Review, vol. 40, p. 100389, 2021.

F. M. Salman, A. A. M. Lehmoud, and F. A. Joda, “ Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks,” Journal of Cyber Security and Mobility, vol. 12, no. 5, pp. 785–812, 2023.

S. M. Tahsien, H. Karimipour, and P. Spachos, “Machine learning based solutions for security of Internet of Things (IoT): A survey,” Journal of Network and Computer Applications, vol. 161, p. 102630, 2020.

F. M. Salman, A. A. M. Lehmoud, and F. A. Joda, “ ESMCH: An Energy-Saving, Multi-Hop, Clustering, and Hierarchy Protocol for Homogeneous WSNs,” Journal of Cyber Security and Mobility, vol. 65, no. 6, pp. 3451–3467, 2024.

L. Abualigah, A. Diabat, P. Sumari, and A. H. Gandomi, “Applications, deployments, and integration of internet of drones (iod): a review,” IEEE Sensors Journal, vol. 21, no. 22, pp. 25532–25546, 2021.

Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electronics, vol. 12, no. 6, p. 1333, 2023.

A. Albanese, F. Devoti, V. Sciancalepore, M. Di Renzo, A. Banchs, and X. Costa-Pérez, “ARES: Autonomous RIS solution with Energy harvesting and Self-configuration towards 6G,” arXiv preprint arXiv:2303.01161, 2023.

Cunha, J., Ferreira, P., Castro, E. M., Oliveira, P. C., Nicolau, M. J., Núñez, I., … and Serôdio, C. (2024). Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies. Future Internet, 16(7), 226.

K. A. Darabkh, A. a. B. Amareen, M. Al-Akhras, and W. a. K. Kassab, “An innovative cluster-based power-aware protocol for Internet of Things sensors utilizing mobile sink and particle swarm optimization,” Neural Computing and Applications, pp. 1–44, 2023.

B. Li, Z. Fei, and Y. Zhang, “UAV communications for 5G and beyond: Recent advances and future trends,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2241–2263, 2018.

X. Cao, P. Yang, M. Alzenad, X. Xi, D. Wu, and H. Yanikomeroglu, “Airborne communication networks: A survey,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 9, pp. 1907–1926, 2018.

Y. Zeng, Q. Wu, and R. Zhang, “Accessing from the sky: A tutorial on UAV communications for 5G and beyond,” Proceedings of the IEEE, vol. 107, no. 12, pp. 2327–2375, 2019.

A. Fotouhi et al., “Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges,” IEEE Communications surveys & tutorials, vol. 21, no. 4, pp. 3417–3442, 2019.

A. Sharma et al., “Communication and networking technologies for UAVs: A survey,” Journal of Network and Computer Applications, vol. 168, p. 102739, 2020.

Z. Ullah, F. Al-Turjman, and L. Mostarda, “Cognition in UAV-aided 5G and beyond communications: A survey,” IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 3, pp. 872–891, 2020.

V. Sanchez-Aguero, L. F. Gonzalez, F. Valera, I. Vidal, and R. A. López da Silva, “Cellular and virtualization technologies for UAVs: An experimental perspective,” Sensors, vol. 21, no. 9, p. 3093, 2021.

R. Gupta, A. Nair, S. Tanwar, and N. Kumar, “Blockchain-assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges,” IET communications, vol. 15, no. 10, pp. 1352–1367, 2021.

M. A. Khan et al., “Swarm of UAVs for network management in 6G: A technical review,” IEEE Transactions on Network and Service Management, 2022.

J. Wu, W. Yuan, and L. Hanzo, “When UAVs Meet ISAC: Real-Time Trajectory Design for Secure Communications,” arXiv preprint arXiv:2306.14140, 2023.

I. Orikumhi, J. Bae, H. Park, and S. Kim, “DRL-based Multi-UAV trajectory optimization for ultra-dense small cells,” ICT Express, 2023.

Downloads

Published

2024-11-23

How to Cite

1.
Lehmoud AAM, Slman FM, Mohamed MQ, Joda FA, Aldulaimi MH. Addressing The Concern of Malicious Drone in The Internet of Drone Sixth Generation Mobile System Powered by WSNs Using Three Security Levels. JCSANDM [Internet]. 2024 Nov. 23 [cited 2024 Nov. 24];13(6):1449–1466. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/26223

Issue

Section

Articles