

Beschreibung
Autorentext Taskeen Zaidi, PhD works in the School of Computer Science and Information Technology at Jain University with over 12 years of research and teaching experience. She has published over 40 research papers in international journals, conferences, and w...Autorentext
Taskeen Zaidi, PhD works in the School of Computer Science and Information Technology at Jain University with over 12 years of research and teaching experience. She has published over 40 research papers in international journals, conferences, and workshops. Her areas of interest include cloud computing, ad-hoc networks, distributed computing, and mobile application development. Adarsh Kumar, PhD is an associate professor in the School of Computer Science at the University of Petroleum and Energy Studies. He has published over 120 research papers in reputed journals, conferences, and workshops. His primary research interests include cybersecurity, cryptography, network security, and ad-hoc networks. Saurav Mallik, PhD is a research scientist in the Department of Pharmacology and Toxicology at the University of Arizona. He has edited one book and coauthored over 82 research papers in peer-reviewed international journals, conferences, and book chapters. His research areas include data mining, computational biology, bioinformatics, biostatistics, and machine learning. Keshav Kaushik, PhD is an assistant professor in the Systemic Cluster under the School of Computer Science at the University of Petroleum and Energy Studies with over eight years of teaching experience. He has edited over ten books and published over 65 research papers in international journals and conferences. His research focuses on cybersecurity, digital forensics, and the Internet of Things.
Klappentext
Learn to leverage the power of Autonomous Flying Ad-Hoc Networks (FANETs) for everything from urban surveillance to disaster relief, and stay ahead in the rapidly evolving world of drone technology and AI. Flying ad-hoc networks (FANETS) are emerging as an innovative technology in the Unmanned Aerial Vehicles (UAV) space, which has proven its usefulness in urban surveillance, disaster management, and rescue operations. In FANETs, a swarm of UAVs are locally connected together through a base station and the nearby environment to gather the information. FANETs are able to cover larger distances than its predecessors, MANETs (Mobile Ad-hoc Networks) and VANETs (Vehicle Ad-Hoc Networks), making them an ideal solution for gathering vital data. As artificial intelligence is implemented across a number of industries, this technology has the capability to train large datasets. Researchers are exploring ways to improve AI algorithms and quantum computing using this technology. Autonomous Flying Ad-Hoc Networks offers comprehensive coverage of the fundamentals of FANET technology by comparing the differences between FANETs, MANETs, and VANETs, including their characteristics, features, and design models, and discussing the applications and challenges of FANET adoption.
Inhalt
Preface xv
*1 Research Perspectives of Various Routing Protocols for Flying Ad Hoc Networks (FANETs) 1
**Kanthavel R., Adline Freeda R., Anju A., Dhaya R. and Frank Vijay
1.1 Introduction 2
1.2 Unmanned Aerial Vehicles 3
1.3 FANET Characteristics 5
1.4 Routing Protocols for FANETs 6
1.5 Communication Pedagogy for FANETs 7
1.6 Challenges and Applications of FANET Configuration 9
1.6.1 Issues and Challenges in FANETs 9
1.6.2 Applications for FANETs 10
1.6.2.1 Multilevel-UAV Collaboration 10
1.6.2.2 UAV-to-Ground Cooperation 11
1.6.2.3 UAVs in VANETs 12
1.7 Conclusion 12
References 13
*2 Exploring Quantum Cryptography, Blockchain, and Flying Ad Hoc Networks: A Comprehensive Survey with Mathematical Analysis 15
**Tarun Kumar Vashishth, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary and Rajneesh Panwar
2.1 Introduction to Quantum Cryptography 16
2.1.1 Quantum Mechanics Primer 16
2.1.2 Genesis of Quantum Cryptography 16
2.2 Quantum Key Distribution 16
2.2.1 Components of Quantum Key Distribution 17
2.2.2 Key Aspects and Security 18
2.2.3 Challenges and Practical Considerations 18
2.2.4 Applications 18
2.3 Literature Review 19
2.4 Blockchain Technology: Enhancing Security and Transparency 20
2.4.1 Decentralization and Consensus Mechanisms 21
2.4.2 Enhancing Security 21
2.4.3 Transparency and Auditability 23
2.4.4 Use Cases 24
2.4.5 Challenges and Prospects 25
2.4.6 Synergy Between Quantum Cryptography and Blockchain 26
2.5 Flying Ad Hoc Networks: A Dynamic Communication Infrastructure 28
2.5.1 Key Characteristics and Components 28
2.5.2 Challenges and Considerations 29
2.5.3 Applications 30
2.5.4 Convergence of Quantum Cryptography, Blockchain, and FANETs 30
2.6 Future Directions and Challenges 32
2.6.1 Future Directions 32
2.6.2 Challenges 33
2.7 Conclusion 33
References 34
3 A Survey on Security Issues, Challenges, and Future Perspectives on FANETs 37
Syed Mohd Faisal, Wasim Khan, Mohammad Ishrat and Taskeen Zaidi
3.1 Introduction 38
3.2 Architecture of FANET 40
3.3 Unmanned Aerial Vehicle Classification 44
3.3.1 Classification of UAVs According to the Size 46
3.3.1.1 Very Small UAVs 46
3.3.1.2 Small UAVs 48
3.3.1.3 Medium UAV 51
3.3.1.4 Large UAVs 52
3.3.2 Classification of UAVs Based on Wing Type 53
3.3.2.1 Multi-Rotor Drones 53
3.3.2.2 Fixed-Wing Drones 53
3.3.2.3 Single-Rotor Helicopter Drones 55
3.3.2.4 Fixed-Wing Hybrid VTOL Drones 55
3.3.3 Classifications of Drones Based on Payload 56
3.3.3.1 Featherweight Drones 56
3.3.3.2 Lightweight Drones 56
3.3.3.3 Middleweight Drones 56
3.3.3.4 Heavy Lift Drones 56
3.4 Security Requirements 57
3.4.1 Confidentiality 57
3.4.2 Integrity 58
3.4.3 Availability 58
3.4.4 Authentication 58
3.4.5 Non-Repudiation 58
3.4.6 Authorization 58
3.4.7 Non-Disclosure 59
3.5 Routing Protocols 59
3.5.1 Static Routing Protocol 59
3.5.1.1 Load Carry and Deliver Routing 60
3.5.1.2 Multi-Level Hierarchical Routing Protocol 61
3.5.1.3 Data-Centric Routing 62
3.5.2 Proactive Routing Protocol 63
3.5.2.1 Destination Sequenced Distance Vector (DSDV) Routing Protocol 63
3.5.2.2 Optimized Link State Routing 64
3.5.3 Reactive Routing Protocol 65
3.5.3.1 Dynamic Source Routing Protocol 66
3.5.3.2 Ad Hoc On-Demand Distance Vector Routing Protocol 66
3.5.3.3 Time-Slotted On-Demand Routing Protocol 67
3.5.4 Hybrid Routing Protocols 67
3.5.4.1 Zone Routing Protocol 67
3.5.4.2 Temporarily Ordered Routing Algorithm 68
3.5.5 Geographic-Based Routing Protocols 68
3.5.5.1 Greedy Perimeter Stateless Routing 69
3.5.5.2 Mobility-Oriented Geographical Routing 69
3.5.6 Hierarchical Routing Protocols 69
3.5.7 Mobility Prediction Clustering Algorithm 69
3.5.8 Clustering Algorithm 70
3.6 Security Issues and Countermeasures in FANET 70
3.6.1 Sensor Level Security Issues 70
3.6.1.1 Vulnerabilities and Treats 70
3.6.1.2 Sensor-Based Attacks 71
3.6.1.3 Defense Mechanisms Against Sensor-Based Attacks 72
3.6.2 Hardware Level Issues 73
3.6.2.1 Vulnerabilities and Threats 73
3.6.2.2 Hardware-Based Attacks 74
3.6.2.3 Defense Mechanisms Against Hardware- Based Attack 76
3.6.3 Software Level Issues 77
3.6.3.1 Vulnerabilities and Threats 78
3.6.3.2 Software-Level Attacks 78
3.6.3.3 Defense Mechanism Against Software- Based Attack 79
3.7 Conclusion 80
References 81
4 Quantum Cryptography for Secure FANET 87
Taskeen Zaidi and Neha S.
Abbreviations 87
4.1 Introduction 88
4.2 Network Security Requirements 88
4.3 Security Threats 89
4.3.1 Taxonomy of Security Threats/Attacks 90
4.3.1.1 Denial of Service Attack 90
4.3.1.2 Modification and Fabrication Attacks 92
4.3.1.3 Routing Attacks 94
4.3.1.4 Other Attacks 95
4.3.2 Summary 97
4.4 Quantum Cryptography 100
4.4.1 Quantum Cryptography Introduction 100
4.4.2 QPKE Based FANET Model (Based on the Encryption Model Introduced by Yuqi Wang) 101
4.5 Conclusion 104
References 104
5 A Review of Various Routing Protocols for FANET 105
*Nitya…
