
Research Article
Analysis of Routing Attacks in FANETs
@INPROCEEDINGS{10.1007/978-3-030-98005-4_1, author={Ozlem Ceviz and Pinar Sadioglu and Sevil Sen}, title={Analysis of Routing Attacks in FANETs}, proceedings={Ad Hoc Networks and Tools for IT. 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6--7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings}, proceedings_a={ADHOCNETS \& TRIDENTCOM}, year={2022}, month={3}, keywords={FANET UAV AODV Routing attacks Blackhole attack Flooding attack Dropping attack}, doi={10.1007/978-3-030-98005-4_1} }
- Ozlem Ceviz
Pinar Sadioglu
Sevil Sen
Year: 2022
Analysis of Routing Attacks in FANETs
ADHOCNETS & TRIDENTCOM
Springer
DOI: 10.1007/978-3-030-98005-4_1
Abstract
Nowadays, Unmanned Aerial Vehicles (UAV) are widely used in a variety of fields, especially in military and industrial applications. However, the usage of a single UAV has begun to be insufficient in most missions. A single UAV may not complete its mission in cases of rapid depletion of its batteries, limited field of view, long-term performance of a task, a fall or a malfunction in the system due to an external effect. In such cases, Flying Ad Hoc Networks (FANETs) that allow more than one UAV to participate in a common network and execute complex tasks in an organized manner is recommended. However, FANETS are target of attacks due to being used in critical applications. Moreover, they are vulnerable to a variety of attacks due to their very nature and the cooperative routing protocols they use. Moreover, FANETs requires new security solutions or adaptation of existing security solutions of Mobile Ad Hoc Networks (MANETs), since it has much higher mobility than MANETs. Since mobility could affect security in different ways, at first attacks against FANETs should be analyzed. This is the main aim of this study. In this paper, various attacks against FANETs, namely dropping, blackhole, sinkhole, flooding attacks are analyzed. This is the first study that presents a comprehensive attack analysis in FANETs by simulating realistic network scenarios, where UAVs move in 3D as in real life.