Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol

Gaurav Choudhary, Vishal Sharma, Ilsun You*

*Corresponding author for this work

Research output: Contribution to journalArticle

7 Citations (Scopus)

Abstract

Internet of Drones (IoD) involves cooperation and policing amongst Unmanned Aerial Vehicles (UAVs) based on waypoints generated through a series of algorithms. The dynamic reconfigurability of conveyances in IoD demands a secure trajectory and channel accessibility which is procurable through an efficient Medium Access Control (MAC) protocol. The majority of existing works considers the security of UAV-trajectories as a part of cryptographic and channel accessibility only, whereas the proposed approach idealizes link stability as one of the essential components for attaining secure trajectories. Furthermore, this paper proposes a deep neural network-based security framework, which embeds an efficient MAC protocol controlled by Macaulay's duration. The proposed approach fortifies that an extensive control over links provides an adequate duration for enhancing the security aspects of IoD and launching countermeasures against any known cyber attacks.

Original languageEnglish
Pages (from-to)59-73
Number of pages15
JournalComputers and Electrical Engineering
Volume74
Early online date19 Jan 2019
DOIs
Publication statusPublished - 01 Mar 2019
Externally publishedYes

Keywords

  • Deep neural networks
  • Internet of Drones
  • Link durations
  • MAC Protocol
  • Security
  • Trajectory
  • UAVs

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol'. Together they form a unique fingerprint.

  • Cite this