Drones Operations and Communications in an Urban Environment (original) (raw)

A Practical Deployment of a Communication Infrastructure to Support the Employment of Multiple Surveillance Drones Systems

Drones

In many incidents involving amateur drones (ADr), the big challenge is to quickly deploy a surveillance system that countermeasures the threat and keeps track of the intruders. Depending on the area under concern, launching a single surveillance drone (SDr) to hunt the intruder is not efficient, but employing multiple ones can cope with the problem. However, in order to make this approach feasible, an easy to use mission setup and control station for multiple SDr is required, which by its turn, requires a communication infrastructure able to handle the connection of multiple SDr among themselves and their ground control and payload visualization station. Concerning this Issue, this paper presents a proposal of a network infrastructure to support the operation of multiple SDr and its practical deployment. This infrastructure extends the existing Micro Air Vehicle Link (MAVLink) protocol to support multiple connections among the SDrs and between them and a ground control station. Enco...

UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”

Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring applications. Lately, there has been heavy investment in the development of UAVs and multi-UAVs systems that can collaborate and complete missions more efficiently and economically. Emerging technologies such as 4G/5G networks have significant potential on UAVs equipped with cameras, sensors, and GPS receivers in delivering Internet of Things (IoT) services from great heights, creating an airborne domain of the IoT. However, there are many issues to be resolved before the effective use of UAVs can be made, including security, privacy, and management. As such, in this paper we review new UAV application areas enabled by the IoT and 5G technologies, analyze the sensor requirements, and overview solutions for fleet management over aerial-networking, privacy, and security challenges. Finally, we propose a framework that supports and enables these technologies on UAVs. The introduced framework provisions a holistic IoT architecture that enables the protection of UAVs as “flying” things in a collaborative networked environment.

Communication and networking technologies for UAVs: A survey

Journal of Network and Computer Applications, 2020

With the advancement in drone technology, in just a few years, drones will be assisting humans in every domain. But there are many challenges to be tackled, communication being the chief one. This paper aims at providing insights into the latest UAV (Unmanned Aerial Vehicle) communication technologies through investigation of suitable task modules, antennas, resource handling platforms, and network architectures. Additionally, we explore techniques such as machine learning and path planning to enhance existing drone communication methods.Encryption and optimization techniques for ensuring long−lasting and secure communications, as well as for power management, are discussed.Moreover, applications of UAV networks for different contextual uses ranging from navigation to surveillance, URLLC (Ultra-reliable and low−latency communications), edge computing and work related to artificial intelligence are examined. In particular, the intricate interplay between UAV, advanced cellular communication, and internet of things constitutes one of the focal points of this paper. The survey encompasses lessons learned, insights, challenges, open issues, and future directions in UAV communications.

Survey of Important Issues in UAV Communication Networks

2016

Unmanned Aerial Vehicles (UAVs) have enormous potential in the public and civil domains. These are particularly useful in applications where human lives would otherwise be endangered. Multi-UAV systems can collaboratively complete missions more efficiently and economically as compared to single UAV systems. However, there are many issues to be resolved before effective use of UAVs can be made to provide stable and reliable context-specific networks. Much of the work carried out in the areas of Mobile Ad Hoc Networks (MANETs), and Vehicular Ad Hoc Networks (VANETs) does not address the unique characteristics of the UAV networks. UAV networks may vary from slow dynamic to dynamic; have intermittent links and fluid topology. While it is believed that ad hoc mesh network would be most suitable for UAV networks yet the architecture of multi-UAV networks has been an understudied area. Software Defined Networking (SDN) could facilitate flexible deployment and management of new services and...

IRJET- A Secured Communication Model for Authenticated Data Transmission among Internet of Drones

IRJET, 2021

The Internet of Drones (IoD) is a layered network control system primarily designed to coordinate the connectivity of unmanned aerial vehicles. We propose a cloud integrated IoD architecture and put forth a software architecture for the cloud-based management of drones linked via Internet .In this paper we focus on securing the identity or location of clients who want to get access to the drones that are connected through internet and have a common cloud database. By implementing the software architecture proposed in this paper, users can have flexible access to the stored data in a secured way .It also limits the level of access being given to the untrusted cloud service providers.

A New FANET Simulator for Managing Drone Networks and Providing Dynamic Connectivity

Electronics, 2020

In the last decade, the attention on unmanned aerial vehicles has rapidly grown, due to their ability to help in many human activities. Among their widespread benefits, one of the most important uses regards the possibility of distributing wireless connectivity to many users in a specific coverage area. In this study, we focus our attention on these new kinds of networks, called flying ad-hoc networks. As stated in the literature, they are suitable for all emergency situations where the traditional networking paradigm may have many issues or difficulties to be implemented. The use of a software simulator can give important help to the scientific community in the choice of the right UAV/drone parameters in many different situations. In particular, in this work, we focus our main attention on the new ways of area covering and human mobility behaviors with the introduction of a UAV/drone behavior model to take into account also drones energetic issues. A deep campaign of simulations was carried out to evaluate the goodness of the proposed simulator illustrating how it works.

Data communication for drone-enabled internet of things

2021

Internet of things (IoT) is one of the prominent emerged technology of interconnected devices for people convenient and smart services. Recent advancement in this area caused various new challenges especially deployment of infrastructure. In order to fulfill the network requirements, the dynamic and dedicated drone networks have designed as a cost effective and flexible solution. The technologies of IoT and drone are emerged to collect, forward the data for further process. Data communication among drones and IoT infrastructure is new area of research where various different existing protocol are used. However, still this area need attention due to mobility of drones, obstacles and interferences in these networks. This paper proposes a Drone enabled Data Communication for Internet of Things (DDC-IoT) as a data communication solution for IoT networks, data collection centers and drones. The proposed data commination solution is tested in simulation to analyze its performance especial...

Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges

IEEE Access, 2021

Internet of Drones (IoD) is a decentralized network and management framework that links drones' access to the controlled airspace and provides inter-location navigation services. The interconnection of drones in the IoD network is through the Internet of Things (IoT). Hence the IoD network is vulnerable to all the security and privacy threats that affect IoT networks. It is highly required to safeguard a good atmosphere free from security and privacy threats to get the desired performance from IoD applications. Security and privacy issues have significantly restricted the overall influence of the IoD paradigm. There are existing survey studies that helped lay a vital foundation for understanding the IoD security and privacy issues. However, not all have thoroughly investigated the level of security and privacy threats associated with the various drone categories. Besides, most existing review studies do not examine secured IoD architecture. This paper aims to assess the recent trends in the security and privacy issues that affect the IoD network. We investigate the level of security and privacy threats of the various drone categories. We then highlight the need for secured IoD architecture and propose one. We also give a comprehensive taxonomy of the attacks on the IoD network. Moreover, we review the recent IoD attack mitigating techniques. We also provide the performance evaluation methods and the performance metrics employed by the techniques. Finally, we give research future direction to help researchers identify the latest opportunities in IoD research. INDEX TERMS Attacks, Internet of Drones, IoD architecture, localization error attacks, security and privacy, UAS, UAV, UUV. I. INTRODUCTION A drone is an aircraft or submarine operated remotely without a human pilot [1]. It has many other names. It is called Unmanned Aerial Vehicle (UAV) when used on land, Unmanned Aircraft System (UAS) when operated on air, and Unmanned UnderWater Vehicle (UUV) when employed underwater. The term drone originated from the military, while UAV and UAS were adopted by some regulators of the The associate editor coordinating the review of this manuscript and approving it for publication was Ahmed Farouk. US Federal Aviation Administration (FAA) [2]. The history of the first drone named Torpedo can be traced back to World War I. It was invented by Dayton-Wright Airplane company for military applications [3]. However, large-scale drone production started during World War II by a company called Reginald Danny. They produced almost 15,000 drones for the US army [3]. They fitted the drones with different cameras that sent data to ground equipment [2]. The drones were also embedded with a Global Positioning System (GPS), equipment for accessing data from Google Earth and a sensor with a circuit board for data recording [2].

A secure communication protocol for civil drones

Indonesian Journal of Electrical Engineering and Computer Science, 2022

This paper introduces a secure communication protocol that provides secured communication pathways to manipulate drones through unsecured communication. The deployment of the proposed protocol works through providing two secured communication paths ; drones to the drone's controller path and controller to data centre path. The first secured communication path has achieved a high level of security and privacy by using a modification of SHA-1 method and an advanced encryption method. The modification of the SHA-1 is called 83SHA-1. These modifications can increase rounds in the first stage up to 83 rounds, inject each round with expansion and S-Boxes procedures that are used in DES to extend length from 160 to 240 bits then reduce it from 240 to 160 bits. After hash data from the drone then use the advanced encryption method which is called Geffe-Genetic (GG) Encryption algorithm where three types of keys will be used for deception attackers. The second accomplishment is to ensure providing secure communication between the drone's controller and datacentre by using RNA-RADG-CBC (RRCBC) encryption algorithm where will generate an initialization vector (IV) for cipher block chaining (CBC) randomly, generate keys, and propose an encryption/decryption method. The security analysis shows a promising high security level of drones's data.