Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey
Abstract
:1. Introduction
- Presenting a comprehensive study on security aspects of SDN enabled UAV networks.
- Presenting a summary of attacks and countermeasures for SDN enabled UAV networks in a tabular form for a side-by-side comparison.
- Presenting a discussion of research challenges, recent trends, insights and open problems for SDN enabled UAV security.
2. Brief Timeline of Advances in UAVs
3. UAV Network Architecture and Communications
3.1. UAV Network Architecture
3.2. Flying Ad-Hoc Network and Routing
3.3. Communications in UAV Networks and Vulnerabilities
4. Software Defined Networking (SDN) Architecture and Its Features
4.1. A Typical SDN Architecture
4.2. SDN Features for Network Security
5. SDN Based UAV Network
6. Cyber Attacks in UAV Networks and SDN-Based Countermeasures
7. SDN Enabled UAV Security
7.1. Confidentiality Attacks on UAV Networks
7.2. Integrity Attacks on UAV Networks
7.3. Availability Attacks on UAV Networks
8. Open Issues and Research Perspectives
9. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Rango, A.; Laliberte, A.; Steele, C.; Herrick, J.E.; Bestelmeyer, B.; Schmugge, T.; Roanhorse, A.; Jenkins, V. Using unmanned aerial vehicles for rangelands: current applications and future potentials. Environ. Pract. 2006, 8, 159–168. [Google Scholar] [CrossRef] [Green Version]
- Grodi, R.; Rawat, D.B. UAV-assisted broadband network for emergency and public safety communications. In Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Orlando, FL, USA, 14–16 December 2015; pp. 10–14. [Google Scholar]
- Rawat, D.B.; Grodi, R.; Bajracharya, C. Enhancing connectivity for communication and control in unmanned aerial vehicle networks. In Proceedings of the 2015 IEEE Radio and Wireless Symposium (RWS), San Diego, CA, USA, 25–28 January 2015; pp. 200–202. [Google Scholar]
- Rawat, D.B.; Ghafoor, K.Z. Smart Cities Cybersecurity and Privacy; Elsevier: Amsterdam, The Netherlands, 2018. [Google Scholar]
- Unmanned Aircraft System (UAS) Service Demand 2015–2035; U.S. Air Force: Bedford, MA, USA, 2013.
- Hartmann, K.; Steup, C. The vulnerability of UAVs to cyber attacks-An approach to the risk assessment. In Proceedings of the 2013 5th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 4–7 June 2013; pp. 1–23. [Google Scholar]
- Rani, C.; Modares, H.; Sriram, R.; Mikulski, D.; Lewis, F.L. Security of unmanned aerial vehicle systems against cyber-physical attacks. J. Def. Model. Simul. 2016, 13, 331–342. [Google Scholar] [CrossRef]
- Kim, A.; Wampler, B.; Goppert, J.; Hwang, I.; Aldridge, H. Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In Proceedings of the Infotech@Aerospace 2012, Garden Grove, CA, USA, 19–21 June 2012; p. 2438. [Google Scholar]
- Mount, M.; Quijano, E. Iraqi Insurgents Hacked Predator Drone Feeds, U.S. Official Indicates. Available online: http://edition.cnn.com/2009/US/12/17/drone.video.hacked/index.html (accessed on 18 December 2009).
- Arthur, C. SkyGrabber: The $26 Software Used by Insurgents to Hack into US Drones. Guardian 2009, 17. Available online: https://www.theguardian.com/technology/2009/dec/17/skygrabber-software-drones-hacked (accessed on 17 December 2019).
- Rawat, D.B.; Reddy, S.R. Software defined networking architecture, security and energy efficiency: A survey. IEEE Commun. Surv. Tutor. 2017, 19, 1. [Google Scholar] [CrossRef]
- Haleplidis, E.; Pentikousis, K.; Denazis, S.; Salim, J.H.; Meyer, D.; Koufopavlou, O. Software-Defined Networking (SDN): Layers and Architecture Terminology; Technical Report; Internet Research Task Force, 2015; Available online: https://www.rfc-editor.org/info/rfc7426 (accessed on 31 January 2015).
- Wagner, W. Lightning Bugs and Other Reconnaissance Drones; Armed Forces Journal International: Springfield, VA, USA, 1982. [Google Scholar]
- Sanders, R. An Israeli Military Innovation: Uavs; Technical Report; Industrial College of the Armed Forces: Washington, DC, USA, 2003. [Google Scholar]
- Carr, E.B. Unmanned Aerial Vehicles: Examining the Safety, Security, Privacy and Regulatory Issues of Integration into U.S. Airspace; National Centre for Policy Analysis (NCPA): Dallas, TX, USA, 2013. [Google Scholar]
- Newcome, L.R. Unmanned Aviation: A Brief History of Unmanned Aerial Vehicles; American Institute of Aeronautics and Astronautics: Reston, VA, USA, 2004. [Google Scholar]
- Mahmoud, S.; Mohamed, N. Collaborative UAVs cloud. In Proceedings of the 2014 International Conference on Unmanned Aircraft Systems (ICUAS), Orlando, FL, USA, 27–30 May 2014; pp. 365–373. [Google Scholar]
- Jawhar, I.; Mohamed, N.; Al-Jaroodi, J.; Agrawal, D.P.; Zhang, S. Communication and networking of UAV-based systems: Classification and associated architectures. J. Netw. Comput. Appl. 2017, 84, 93–108. [Google Scholar] [CrossRef]
- Oubbati, O.S.; Lakas, A.; Lagraa, N.; Yagoubi, M.B. UVAR: An intersection UAV-assisted VANET routing protocol. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
- Scherer, J.; Yahyanejad, S.; Hayat, S.; Yanmaz, E.; Andre, T.; Khan, A.; Vukadinovic, V.; Bettstetter, C.; Hellwagner, H.; Rinner, B. An autonomous multi-UAV system for search and rescue. In Proceedings of the First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, Florence, Italy, 18 May 2015; ACM: New York, NY, USA, 2015; pp. 33–38. [Google Scholar]
- Cumino, P.; Lobato Junior, W.; Tavares, T.; Santos, H.; Rosário, D.; Cerqueira, E.; Villas, L.; Gerla, M. Cooperative UAV Scheme for Enhancing Video Transmission and Global Network Energy Efficiency. Sensors 2018, 18, 4155. [Google Scholar] [CrossRef] [Green Version]
- Wei, S.; Ge, L.; Yu, W.; Chen, G.; Pham, K.; Blasch, E.; Shen, D.; Lu, C. Simulation study of unmanned aerial vehicle communication networks addressing bandwidth disruptions. In Sensors and Systems for Space Applications VII: International Society for Optics and Photonics; SPIE: Bellingham, WA, USA, 2014; Volume 9085. [Google Scholar]
- Scott-Hayward, S.; O’Callaghan, G.; Sezer, S. SDN security: A survey. In Proceedings of the 2013 IEEE SDN For Future Networks and Services (SDN4FNS), Trento, Italy, 11–13 November 2013; pp. 1–7. [Google Scholar]
- Kreutz, D.; Ramos, F.M.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-defined networking: A comprehensive survey. Proc. IEEE 2015, 103, 14–76. [Google Scholar] [CrossRef] [Green Version]
- MacFarland, D.C.; Shue, C.A. The SDN shuffle: creating a moving-target defense using host-based software-defined networking. In Proceedings of the Second ACM Workshop on Moving Target Defense, Denver, CO, USA, 12 October 2015; ACM: New York, NY, USA, 2015; pp. 37–41. [Google Scholar]
- Nunes, B.A.A.; Mendonca, M.; Nguyen, X.N.; Obraczka, K.; Turletti, T. A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 2014, 16, 1617–1634. [Google Scholar] [CrossRef] [Green Version]
- Jagadeesan, N.A.; Krishnamachari, B. Software-defined networking paradigms in wireless networks: A survey. ACM Comput. Surv. 2015, 47, 27. [Google Scholar] [CrossRef]
- Hadj, S.B.; Rekhis, S.; Boudriga, N.; Bagula, A. A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs. In Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, Singapore, 28–30 November 2016; ACM: New York, NY, USA, 2016; pp. 317–326. [Google Scholar]
- Shin, S.; Xu, L.; Hong, S.; Gu, G. Enhancing network security through software defined networking (SDN). In Proceedings of the 2016 IEEE 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–9. [Google Scholar]
- Shu, Z.; Wan, J.; Li, D.; Lin, J.; Vasilakos, A.V.; Imran, M. Security in software-defined networking: Threats and countermeasures. Mob. Netw. Appl. 2016, 21, 764–776. [Google Scholar] [CrossRef]
- Weinstein, S.B. SDN control in a combined sensor, information retrieval, and communications network for dangerous environments. In Proceedings of the 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS), Tel-Aviv, Israel, 13–15 November 2017; pp. 1–5. [Google Scholar]
- Caria, M.; Jukan, A.; Hoffmann, M. SDN partitioning: A centralized control plane for distributed routing protocols. IEEE Trans. Netw. Serv. Manag. 2016, 13, 381–393. [Google Scholar] [CrossRef] [Green Version]
- Liyanage, M.; Abro, A.B.; Ylianttila, M.; Gurtov, A. Opportunities and challenges of software-defined mobile networks in network security. IEEE Secur. Priv. 2016, 14, 34–44. [Google Scholar] [CrossRef]
- Shaghaghi, A.; Kaafar, M.A.; Buyya, R.; Jha, S. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions. arXiv 2018, arXiv:1804.00262. [Google Scholar]
- Sasaki, T.; Pappas, C.; Lee, T.; Hoefler, T.; Perrig, A. SDNsec: Forwarding accountability for the SDN data plane. In Proceedings of the 2016 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–10. [Google Scholar]
- Gupta, L.; Jain, R.; Vaszkun, G. Survey of important issues in UAV communication networks. IEEE Commun. Surv. Tutor. 2016, 18, 1123–1152. [Google Scholar] [CrossRef] [Green Version]
- Barritt, B.; Kichkaylo, T.; Mandke, K.; Zalcman, A.; Lin, V. Operating a UAV mesh & internet backhaul network using temporospatial SDN. In Proceedings of the 2017 IEEE Aerospace Conference, Big Sky, MT, USA, 4–11 March 2017; pp. 1–7. [Google Scholar]
- Mozaffari, M.; Saad, W.; Bennis, M.; Nam, Y.H.; Debbah, M. A tutorial on UAVs for wireless networks: Applications, challenges, and open problems. arXiv 2018, arXiv:1803.00680. [Google Scholar] [CrossRef] [Green Version]
- Lee, S.; Yoon, C.; Lee, C.; Shin, S.; Yegneswaran, V.; Porras, P.A. DELTA: A Security Assessment Framework for Software-Defined Networks; NDSS: New York, NY, USA, 2017. [Google Scholar]
- Giotis, K.; Argyropoulos, C.; Androulidakis, G.; Kalogeras, D.; Maglaris, V. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 2014, 62, 122–136. [Google Scholar] [CrossRef]
- Mousavi, S.M.; St-Hilaire, M. Early detection of DDoS attacks against SDN controllers. In Proceedings of the 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA, 16–19 February 2015; pp. 77–81. [Google Scholar]
- Gillani, F.; Al-Shaer, E.; Duan, Q. In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks. In Proceedings of the 5th ACM Workshop on Moving Target Defense, Toronto, ON, Canada, 15 October 2018; ACM: New York, NY, USA, 2018; pp. 80–89. [Google Scholar]
- Wang, A.; Guo, Y.; Hao, F.; Lakshman, T.; Chen, S. Scotch: Elastically scaling up sdn control-plane using vswitch based overlay. In Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, Sydney, Australia, 2–5 December 2014; ACM: New York, NY, USA, 2014; pp. 403–414. [Google Scholar]
- Ashraf, J.; Latif, S. Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques. In Proceedings of the 2014 National Software Engineering Conference, Rawalpindi, Pakistan, 11–12 November 2014; pp. 55–60. [Google Scholar]
- Kirichek, R.; Vladyko, A.; Paramonov, A.; Koucheryavy, A. Software-defined architecture for flying ubiquitous sensor networking. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, Korea, 19–22 February 2017; pp. 158–162. [Google Scholar]
- Secinti, G.; Darian, P.B.; Canberk, B.; Chowdhury, K.R. SDNs in the Sky: Robust End-to-End Connectivity for Aerial Vehicular Networks. IEEE Commun. Mag. 2018, 56, 16–21. [Google Scholar] [CrossRef]
- Bindra, N.; Sood, M. Is SDN the Real Solution to Security Threats in Networks? A Security Update on Various SDN Models. Indian J. Sci. Technol. 2016, 9. [Google Scholar] [CrossRef] [Green Version]
- Conti, M.; Di Pietro, R.; Mancini, L.; Mei, A. Distributed detection of clone attacks in wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 2011, 8, 685–698. [Google Scholar] [CrossRef]
- Roy, S.; Conti, M.; Setia, S.; Jajodia, S. Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Trans. Inf. Forensics Secur. 2014, 9, 681–694. [Google Scholar] [CrossRef]
- Sriramulu, R.K. Constructing Dynamic Ad-hoc Emergency Networks using Software-Defined Wireless Mesh Networks. Master’s Thesis, San Jose State University, San Jose, CA, USA, 2018. [Google Scholar]
- Afek, Y.; Bremler-Barr, A.; Shafir, L. Network anti-spoofing with SDN data plane. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM 2017), Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
- Dharma, N.G.; Muthohar, M.F.; Prayuda, J.A.; Priagung, K.; Choi, D. Time-based DDoS detection and mitigation for SDN controller. In Proceedings of the 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), Busan, Korea, 19–21 August 2015; pp. 550–553. [Google Scholar]
- Ali, A.; Cziva, R.; Jouët, S.; Pezaros, D.P. SDNFV-Based DDoS Detection and Remediation in Multi-tenant, Virtualised Infrastructures. In Guide to Security in SDN and NFV; Springer: Berlin, Germany, 2017; pp. 171–196. [Google Scholar]
- Pu, C. Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks. IEEE Access 2018, 6, 68472–68486. [Google Scholar] [CrossRef]
- Sliti, M.; Abdallah, W.; Boudriga, N. Jamming Attack Detection in Optical UAV Networks. In Proceedings of the 2018 20th International Conference on Transparent Optical Networks (ICTON), Bucharest, Romania, 1–5 July 2018; pp. 1–5. [Google Scholar]
- Conti, M.; Di Pietro, R.; Spognardi, A. Clone wars: Distributed detection of clone attacks in mobile WSNs. J. Comput. Syst. Sci. 2014, 80, 654–669. [Google Scholar] [CrossRef]
- Dong, M.; Ota, K.; Yang, L.T.; Liu, A.; Guo, M. LSCD: A low-storage clone detection protocol for cyber-physical systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2016, 35, 712–723. [Google Scholar] [CrossRef] [Green Version]
- Zheng, Z.; Liu, A.; Cai, L.X.; Chen, Z.; Shen, X.S. Energy and memory efficient clone detection in wireless sensor networks. IEEE Trans. Mob. Comput. 2016, 15, 1130–1143. [Google Scholar] [CrossRef]
- Lal, A.; Selvakumar, J. Secure low-storage clone detection technique for wireless sensor networks. In Proceedings of the 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 20–22 April 2017; Volume 1, pp. 669–672. [Google Scholar]
- Aalsalem, M.Y.; Khan, W.Z.; Saad, N.; Hossain, M.S.; Atiquzzaman, M.; Khan, M.K. A new random walk for replica detection in WSNs. PLoS ONE 2016, 11, e0158072. [Google Scholar] [CrossRef] [Green Version]
- McKeown, N.; Anderson, T.; Balakrishnan, H.; Parulkar, G.; Peterson, L.; Rexford, J.; Shenker, S.; Turner, J. OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 69–74. [Google Scholar] [CrossRef]
- Sayeed, M.A.; Sayeed, M.A.; Saxena, S. Intrusion detection system based on Software Defined Network firewall. In Proceedings of the 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, 4–5 September 2015; pp. 379–382. [Google Scholar]
- Toso, G.; Munaretto, D.; Conti, M.; Zorzi, M. Attack resilient underwater networks through software defined networking. In Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, 12–14 November 2014; ACM: New York, NY, USA, 2014; p. 44. [Google Scholar]
- Noble, D.; Bhandari, S. Neural network based nonlinear model reference adaptive controller for an unmanned aerial vehicle. In Proceedings of the 2017 International Conference on Unmanned Aircraft Systems (ICUAS), Miami, FL, USA, 13–16 June 2017; pp. 94–103. [Google Scholar]
- Yapp, J.; Seker, R.; Babiceanu, R. UAV as a Service: A Network Simulation Environment to Identify Performance and Security Issues for Commercial UAVs in a Coordinated, Cooperative Environment. In Proceedings of the International Workshop on Modelling and Simulation for Autonomous Systems, Rome, Italy, 15–16 June 2016; Springer: Cham, Switzerland, 2016; pp. 347–355. [Google Scholar]
- Mishra, V.; Verma, D.; Williams, C. Leveraging sdn for cyber situational awareness in coalition tactical networks. In Proceedings of the IST-148 Meeting, Sofia, Bulgaria, 3–4 October 2016; pp. 3–4. [Google Scholar]
- White, K.J.; Denney, E.; Knudson, M.D.; Mamerides, A.K.; Pezaros, D.P. A programmable SDN+ NFV-based architecture for uav telemetry monitoring. In Proceedings of the 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017; pp. 522–527. [Google Scholar]
- Mishra, V.K.; Verma, D.C.; Williams, C. Improving Security in Coalition Tactical Environments Using an SDN Approach. In Guide to Security in SDN and NFV; Springer: Cham, Switzerland, 2017; pp. 273–298. [Google Scholar]
- Kumar, R.; Sayeed, M.A.; Sharma, V.; You, I. An SDN-Based Secure Mobility Model for UAV-Ground Communications. In Proceedings of the International Symposium on Mobile Internet Security, Jeju Island, Korea, 19–22 October 2017; Springer: Singapore, 2017; pp. 169–179. [Google Scholar]
- Ur Rahman, S.; Kim, G.H.; Cho, Y.Z.; Khan, A. Deployment of an SDN-based UAV network: Controller placement and tradeoff between control overhead and delay. In Proceedings of the 2017 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 18–20 October 2017; pp. 1290–1292. [Google Scholar]
- Moradi, M. Software-Driven and Virtualized Architectures for Scalable 5G Networks. Ph.D. Thesis, The University of Michigan, Ann Arbor, MI, USA, 2018. [Google Scholar]
- Zhao, Q.; Du, P.; Gerla, M.; Brown, A.J.; Kim, J.H. Software Defined Multi-Path TCP Solution for Mobile Wireless Tactical Networks. In Proceedings of the 2018 IEEE Military Communications Conference (MILCOM 2018), Los Angeles, CA, USA, 29–31 October 2018; pp. 1–9. [Google Scholar]
- Li, Z.; Lu, Y.; Shi, Y.; Wang, Z.; Qiao, W.; Liu, Y. A Dyna-Q-Based Solution for UAV Networks Against Smart Jamming Attacks. Symmetry 2019, 11, 617. [Google Scholar] [CrossRef] [Green Version]
- Sedjelmaci, H.; Senouci, S.M.; Ansari, N. A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans. Syst. Man. Cybern. Syst. 2018, 48, 1594–1606. [Google Scholar] [CrossRef]
- Secinti, G.; Darian, P.B.; Canberk, B.; Chowdhury, K.R. Resilient end-to-end connectivity for software defined unmanned aerial vehicular networks. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–5. [Google Scholar]
Attack Type | SDN-Based Attack Mitigation | Pros and Cons |
---|---|---|
DDoS | Packet Flow Analysis [40] | Pros:
|
DDoS | Machine Learning algorithms [41] | Pros:
|
DDos | Resilient Control Network [42] | Pros:
|
DDos | Scotah: tool uses overlay based on vSwitch [43] | Pros:
|
DDos | ANN based algorithm [44] | Pros:
|
DDos | Packet Flow Analysis and filtering [45] | Pros:
|
Jamming | Network Management Protocol [46] | Pros:
|
Jamming | Network Parameter Analysis [47] | Pros:
|
Clone Attacks | SDN based collaborative RED Protocol [48] | Pros:
|
Energy Consumption and Clone Attacks | SDN based Collaborative Rule Enforcement [49] | Pros:
|
Spoofing Attack | GPS position finder algorithm [50] | Pros:
|
Spoofing Attack | Node Configuration Restoration [51] | Pros:
|
SDN Solution Class | SDN Enabled UAV Security Solutions | Pros and Cons |
---|---|---|
Availability | UAV as a Servi [65] | Pros:
|
Availability | Proposed SDN/OODA Networking Architecture [66] | Pros:
|
Availability | Temporospatial Software Defined Networking (TS-SDN) [37] | Pros:
|
Availability | SDN/NFV Integrated Monitoring Architecture [67] | Pros:
|
Availability | SDN/OODA Integrated Platform [68] | Pros:
|
Availability | Mobility Model for Multi-UAV WSN networks [69] | Pros:
|
Availability | Large scale UAV nodes in network [70] | Pros:
|
Availability | Large scale UAV nodes in network [21] | Pros:
|
Availability | Large scale UAV nodes in network [71] | Pros:
|
Availability | Multi-tier mesh UAV network [71] | Pros:
|
Availability | Multi-tier heterogeneous UAV networks [72] | Pros:
|
Availability | Dyna-Q-based reinforcement learning algorithm [73] | Pros:
|
Availability | SDN-Based Secure Mobility Model | Pros:
|
Availability | Hierarchical Detection and Response Scheme [74] | Pros:
|
Availability | SDN/OODA Integrated Platform [68] | Pros:
|
Availability | SD-UAV Networking Architecture which leverages Various Wireless Link Technologies [46] | Pros:
|
Availability | SDN Based Weighted Routing Framework [75] | Pros:
|
Availability | Aerial Network management protocol [46] | Pros:
|
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
McCoy, J.; Rawat, D.B. Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey. Electronics 2019, 8, 1468. https://doi.org/10.3390/electronics8121468
McCoy J, Rawat DB. Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey. Electronics. 2019; 8(12):1468. https://doi.org/10.3390/electronics8121468
Chicago/Turabian StyleMcCoy, James, and Danda B. Rawat. 2019. "Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey" Electronics 8, no. 12: 1468. https://doi.org/10.3390/electronics8121468