On understanding the impact of RTT in the mobile network for detecting the rogue UAVs

2020 
In recent times, Unmanned-aerial-vehicles (UAVs) have grasped significant attentions for performing various operations without a constant intervention of the human users. Due to the power and computing constraints, however, it is difficult for an UAV to perform all the tasks independently. Hence, to achieve its goals, a UAV may share various sensitive data with the nearest edge servers through some access points (APs). Prior to sending any sensitive information through an AP, it is very important for an UAV to determine the authenticity of the selected AP. In this paper, we have applied a timing-based algorithm for spotting rogue APs by the UAVs − while selecting an edge server. The timing-based algorithm does not require any additional hardware or any change in the network protocol for detection purpose. This fact, in turn, reduces the effort from UAV’s side for detecting a breach. An extensive experimental study shows that with a little manipulation in speed, an UAV can detect the presence of any rogue AP almost every time with only 6% false-positive rate.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    30
    References
    0
    Citations
    NaN
    KQI
    []