sensors-logo

Journal Browser

Journal Browser

Unmanned Aerial Vehicles (UAVs) Networks: Security Challenges and Solutions

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (15 March 2022) | Viewed by 4577

Special Issue Editors


E-Mail Website
Guest Editor
SMILE Lab, University of Macedonia, 54636 Thessaloniki, Greece
Interests: adaptive mobile personalized and collaborative teaching and learning; digital skills and competences; open educations, MOOCs, and OERs; user experience of smart Internet of Things applications
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Electrical and Computer Engineering, University of Western Macedonia, 50100 Kozani, Greece
Interests: IoT; 5G mobile communication; UAV; quality of service; radio access networks; computer network security; radio networks; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Sensors are integrated in various devices (e.g., smartphones, home appliances, vehicles, and machines) and are used by many applications in many Internet of Things (IoT) sectors (e.g., smart health, smart agriculture, smart logistics, smart transportation, smart homes, smart cities, and smart industry). Furthermore, these sensors are usually interconnected in networks via wireless or wired links. Sensors collect sensitive data, and so they have become a target of malicious agents. Consequently, these sensor networks are exposed to security issues (e.g., authentication, access control, privacy, threats, attacks, trust management, data storage, device security, and communications security). A sensor network may be attacked using various methods (e.g., malware injection, denial of service, man in the middle, botnets, DNS spoofing, scavenging, data deduplication, jamming, tampering, and eavesdropping). Such attacks are commonly observed in modern ICT infrastructures supporting the deployment of smart IoT applications in eHealth, agriculture, industrial automation, power and energy systems, and transportation. These novel critical infrastructures include various security vulnerabilities due to their vast scale and dependency on smart sensor IoT devices. Major security concerns include confidentiality, integrity, availability, non-repudiation, privacy, authenticity, trustworthiness, accountability, auditability, etc. Many security techniques and protocols have been proposed for addressing special security problems in sensor networks, but there are still many open problems. Furthermore, the deployment of Software Defined Networking (SDN) in various IoT application domains has attracted the interest of researchers toward enhancing the robustness and safety of sensor communication networks in modern societies. However, many challenges remain regarding its efficient operation and reliability.

A special case of sensor networks is an Unmanned Aerial Vehicles (UAVs) Network. The aim of this Special Issue is to bring together innovative ideas, methods, techniques, solutions, and experiences addressing the security and privacy issues of Unmanned Aerial Vehicles (UAVs) Networks. Reliability and efficiency are essential for the employment of Unmanned Aerial Vehicles (UAVs) Networks. Paper acceptance will be based on quality, relevance, and originality. The topics that can be addressed include, but are not limited to:

  • Security models, frameworks, architectures, and protocols of Unmanned Aerial Vehicles (UAVs) Networks;
  • Security evaluation of Unmanned Aerial Vehicles (UAVs) Networks;
  • Vulnerabilities and risk assessment of Unmanned Aerial Vehicles (UAVs) Networks;
  • Detection of threats and attacks in Unmanned Aerial Vehicles (UAVs) Networks;
  • Secure routing and management in Unmanned Aerial Vehicles (UAVs) Networks;
  • Secure communications in Unmanned Aerial Vehicles (UAVs) Networks;
  • Security and privacy-preserving in Unmanned Aerial Vehicles (UAVs) Networks;
  • Intrusion detection and prevention in Unmanned Aerial Vehicles (UAVs) Networks;
  • Enhanced authentication in Unmanned Aerial Vehicles (UAVs) Networks via cost-effective distributed edge solutions;
  • AI- and machine-learning-enabled attacks in Unmanned Aerial Vehicles (UAVs) Networks;
  • AI- and machine-learning-enabled defense methods in Unmanned Aerial Vehicles (UAVs) Networks;
  • Federated learning toward enabling privacy by design in Unmanned Aerial Vehicles (UAVs) Networks;
  • Energy efficient security management of Unmanned Aerial Vehicles (UAVs) Networks;
  • Blockchain solutions for Unmanned Aerial Vehicles (UAVs) Networks;
  • Accessing the security and vulnerabilities of Unmanned Aerial Vehicle (UAV) remote sensing networks;
  • Decentralized security mechanisms in Unmanned Aerial Vehicles (UAVs) Networks;
  • Economics of security of Unmanned Aerial Vehicles (UAVs) Networks;
  • Security visualization for Unmanned Aerial Vehicles (UAVs) Networks.

Prof. Dr. Anastasios A. Economides
Prof. Dr. Panagiotis Sarigiannidis
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 7691 KiB  
Article
D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield
by Sang Seo, Sangwoo Han and Dohoon Kim
Sensors 2022, 22(9), 3147; https://doi.org/10.3390/s22093147 - 20 Apr 2022
Cited by 7 | Viewed by 3468
Abstract
Currently, in the field of military modernization, tactical networks using advanced unmanned aerial vehicle systems, such as drones, place an emphasis on proactively preventing operational limiting factors produced by cyber-electronic warfare threats and responding to them. This characteristic has recently been highlighted as [...] Read more.
Currently, in the field of military modernization, tactical networks using advanced unmanned aerial vehicle systems, such as drones, place an emphasis on proactively preventing operational limiting factors produced by cyber-electronic warfare threats and responding to them. This characteristic has recently been highlighted as a key concern in the functioning of modern network-based combat systems in research on combat effect analysis. In this paper, a novel discrete-event-system-specification-based cyber-electronic warfare M&S (D-CEWS) was first proposed as an integrated framework for analyzing communication effects and engagement effects on cyber-electronic warfare threats and related countermeasures that may occur within drones. Accordingly, for the first time, based on communication metrics in tactical ad hoc networks, an analysis was conducted on the engagement effect of blue forces by major wireless threats, such as multi-layered jamming, routing attacks, and network worms. In addition, the correlations and response logics between competitive agents were also analyzed in order to recognize the efficiency of mutual engagements between them based on the communication system incapacitation scenarios for diverse wireless threats. As a result, the damage effect by the cyber-electronic warfare threat, which could not be considered in the existing military M&S, could be calculated according to the PDR (packet delivery ratio) and related malicious pool rate change in the combat area, and the relevance with various threats by a quantifiable mission attribute given to swarming drones could also be additionally secured. Full article
Show Figures

Figure 1

Back to TopTop