Skip to main content

A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks

  • Conference paper
  • First Online:
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation (ICC3 2017)

Abstract

Unmanned Aerial Vehicles (UAV) systems are autonomous systems that can fly separately or it can be functioned remotely without carrying any individuals. These networks prone to various attacks. The people are benefitted from the current growth of networking and cyber world; however, the rapid development of cyber world has furthermore contributed to immoral practices by persons who are using the technology to utilize others. That type of utilization of cyber world with the intension of accessing unauthorized or protected information, collapsing networks, spying, data and currency theft is called as cyber-attack. There is a tremendous increase in Cyber-attacks in number and complexity greater than the previous era, and also lack of awareness on cyber- attacks which has provided many people/societies/groups reveal the true to these attacks. The main aim of this study is to do a brief study of these cyber-attacks in order to create alertness about the various types of attacks and their action so that suitable security methods can be originated against such attacks and also this paper explores the impacts and parameters affected by the most dangerous cyber-attack namely, false data dissemination attack on UAV networks for further implementation and research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bekmezci, I., Sahingoz, O.K., Temel, S.: Flying Ad-Hoc Networks (FANETs): a survey. Ad-hoc Netw. 1, 1254–1270 (2013)

    Article  Google Scholar 

  2. Oubbati, O.S., et al.: Intelligent UAV-assisted routing protocol for urban VANETS. Comput. Commun. 107, 93–111 (2017)

    Article  Google Scholar 

  3. Sedjelmaci, H., Senouci, S.M.: A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans. Syst. Man Cybern. Syst. PP, 1–13 (2016)

    Google Scholar 

  4. Kim, A., et al.: Cyber-attack vulnerabilities analysis for unmanned aerial vehicles. In: Infotech@ Aerospace, pp. 1–30 (2012)

    Google Scholar 

  5. George, S.: FAA Unmanned Aircraft Systems (UAS) Cyber Security Initiatives, pp. 1–19. Federal Aviation Administration (2015)

    Google Scholar 

  6. Podins, K., Stinissen, J., Maybaum, M. (eds.) The vulnerability of UAVs to cyber-attacks - an approach to the risk assessment. In: 5th International Conference on Cyber Conflict (2015)

    Google Scholar 

  7. Abbaspoura, A., et al.: Detection of fault data injection attack on UAV using adaptive neural network. Proc. Comput. Sci. 95, 193–200 (2016)

    Article  Google Scholar 

  8. Mokdada, L., Ben-Othmanb, J., Nguyena, A.T.: DJAVAN: detecting jamming attacks in Vehicle Ad hoc Networks. Perform. Eval. 87, 47–59 (2015)

    Article  Google Scholar 

  9. Zhou, Y., Cheng, N., Lu, N., (Sherman) Shen, X.: Multi-UAV-Aided networks. IEEE Veh. Technol. Mag. 10, 36–44 (2015)

    Article  Google Scholar 

  10. He, D., Chan, S., Guizani, M.: Communication security of unmanned aerial vehicles. IEEE Wirel. Commun. 24, 1415–1420 (2017)

    Google Scholar 

  11. Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber-attacks - an approach to the risk assessment. In: Cyber Conflict (CyCon), 5th International Conference, pp. 1–23. IEEE, June 2013

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Vanitha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vanitha, N., Padmavathi, G. (2018). A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks. In: Ganapathi, G., Subramaniam, A., Graña, M., Balusamy, S., Natarajan, R., Ramanathan, P. (eds) Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation. ICC3 2017. Communications in Computer and Information Science, vol 844. Springer, Singapore. https://doi.org/10.1007/978-981-13-0716-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0716-4_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0715-7

  • Online ISBN: 978-981-13-0716-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics