Using VPNS and RIS to ensure communication security in dynamic UAV swarm networks: integration paths, resource allocation, and simulation results
Abstract
Keywords
Full Text:
PDF (Українська)References
Gilani, S. M., Anjum, A., Khan, A., Syed, M. H., Moqurrab, S. A., & Srivastava, G. A robust Internet of Drones security surveillance communication network based on IOTA. Internet of Things, 2024, article no. 101066. DOI: 10.1016/j.iot.2024.101066.
Zemlianko, H., & Kharchenko, V. Ensuring Cybersecurity of the Cyber Physical System of Combined Fleets of Unmanned Aerial, Ground and Sea Vehicles, Integrated Computer Technologies in Mechanical Engineering – 2023. ICTM 2023. Lecture Notes in Networks and Systems, Springer, Cham, 2024, vol. 996, pp. 392-403. DOI: 10.1007/978-3-031-60549-9_29.
Mozaffari, M., Saad, W., Bennis, M., Nam, Y. H., & Debbah, M. A. Tutorial on UAVs for wireless networks: Applications, challenges, and open problems. IEEE Communications Surveys & Tutorials, 2019, vol. 21, iss. 3, pp. 2334-2360. DOI: 10.1109/comst.2019.2902862.
Mishra, D., & Natalizio, E. A survey on cellular-connected UAVs: Design challenges, enabling 5G/B5G innovations, and experimental advancements. Computer Networks, 2020, vol. 182, article no. 107451. DOI: 10.1016/j.comnet.2020.107451.
Illiashenko, O., Kharchenko, V., Babeshko, I., Fesenko, H., & Di Giandomenico, F. Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. Entropy, 2023, vol. 25, iss. 8, article no. 1123. DOI: 10.3390/e25081123.
Kovacs, I., Amorim, R., Nguyen, H. C., Wigard, J., & Mogensen, P. Interference analysis for UAV connectivity over LTE using aerial radio measurements. IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 24–27 September 2017, 2017, pp. 1-6. DOI:10.1109/VTCFall.2017.8287891.
Pevnev, V., Torianyk, V., & Kharchenko, V. Kiberbezpeka bezprovodovykh smart-system: kanaly vtruchanʹ ta radiochastotni vrazlyvosti [Cyber security of wireless smart systems: channels of intrusions and radio frequency vulnerabilities], Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, no. 4, pp. 79-92. DOI: 10.32620/reks.2020.4.07. (In Ukrainian).
Lappas, V., Zoumponos, G., Kostopoulos, V., Shin, H., Tsourdos, A., Tantarini, M., Shmoko, D., Munoz, J., Amoratis, N., Maragkakis, A., Machairas, T., & Trifas, A. EuroDRONE, A European UTM Testbed for U-Space. International Conference on Unmanned Aircraft Systems (ICUAS 2020), Athens, Greece, 1–4 September 2020, pp. 1766-1774. DOI: 10.1109/ICUAS48674.2020.9214020.
Donenfeld, J. A. WireGuard: Next Generation Secure Network Tunnel. YouTube. 2020. Avaiable at: https://www.youtube.com/watch?v=88GyLoZbDNw (accessed: 12.05.2024).
Reconfigurable Intelligent Surfaces (RIS); Technological challenges, architecture and impact on standardization. ETSI GR RIS 002 v1.1.1. F-06921 Sophia Antipolis Cedex - FRANCE, 2023. 33 p. Available at: https://www.etsi.org/deliver/etsi_gr/RIS/001_099/002/01.01.01_60/gr_RIS002v010101p.pdf. (accessed: 13.05.2024).
Koulianos, A., & Litke, A. Blockchain Technology for Secure Communication and Formation Control in Smart Drone Swarms. Future Internet, 2023, vol. 15, iss. 10, article no. 344. DOI: 10.3390/fi15100344.
Aljehani, M., & Inoue, M. Multi-UAV tracking and scanning systems in M2M communication for disaster response. IEEE 5th Global Conference Consumer Electronics, Kyoto, Japan, 2016, pp. 1-2. DOI: 10.1109/GCCE.2016.7800524.
Locke, J. Can Drones Be Hacked, Tracked, and Used to Carry Passengers? DIGI International, 2023. Available at: https://www.digi.com/blog/post/can-drones-be-hacked-tracked-and-carry-passengers (accessed 14.05.2024).
Björnson, E., Wymeersch, H., Matthiesen, B., Popovski, P., Sanguinetti, L., & De Carvalho, E. Reconfigurable Intelligent Surfaces: A signal processing perspective with wireless applications. IEEE Signal Processing Magazine, 2022, vol. 39, iss. 2, pp. 135-158. DOI: 10.1109/msp.2021.3130549.
Zhi, Y., Fu, Z., Sun, X., & Yu, J. Security and Privacy Issues of UAV: A Survey. Mobile Networks and Applications, 2019, vol. 25, no. 1, pp. 95-101. DOI: 10.1007/s11036-018-1193-x.
Yang, Y., Du, H., Xiong, Z., Niyato, D., Jamalipour, A., & Han, Z. Enhancing Wireless Networks with Attention Mechanisms: Insights from Mobile Crowdsensing. arXiv, 2024, article no. 2407.15483v1, pp. 1-9. Available at: https://arxiv.org/html/2407.15483v1 (accessed: 14.05.2024).
Veprytska, O., & Kharchenko, V. Analysis of AI powered attacks and protection of UAV assets: quality model-based assessing cybersecurity of mobile system for demining. 5th International Workshop on Intelligent Information Technologies and Systems of Information Security (IntelITSIS’2024), March 28, 2024, Khmelnytskyi, 2024, pp. 1-19. Available at: https://ceur-ws.org/Vol-3675/paper26.pdf. (accessed: 14.05.2024).
DOI: https://doi.org/10.32620/aktt.2024.4.11