Doctor of Philosophy in Engineering, University of Toledo, 2021, Engineering
The applications of Unmanned Aerial Vehicles (UAVs) range from military to filming. Soon pizza and post-delivery services will utilize UAVs. Being airborne, UAVs can be a target of physical or cyber-attacks. UAVs depend on continuous communication with the ground control station (GCS), a global positioning system (GPS), and other UAVs within the UAV Network (UAVNet). UAVs connected in ad-hoc manner are called Flying Ad hoc Networks (FANETs). They depend on protocols and communication models quite similar to preexisting ad hoc networks such as MANETs, VANETs, etc. Recent cyberattacks have revealed severe loopholes and vulnerabilities in drone networks. Hence, a detailed study demands to recreate the attacking scenarios and improvise on the vulnerabilities for developing strong security measures- this is achievable by simulating accurate attacks and then employing a security model. This work considers the simulation and implementation of the security model in three stages: In Stage-I, we identify a comprehensive UAV simulator's characteristics and simulate attacks; In Stage II, we utilize game theory and Quantal Response Equilibrium (QRE) for the prevention of DDoS attack; and in the Stage-III we implement Bounded rationality for the security of delivery systems. The majority of the available drone simulators focus on the designing, gaming, or military aspects. But from a cybersecurity standpoint, an effective simulator demands the inclusion of accurate mathematical modeling, correct representation of path and terrains, fly zones, easy to handle user interface, and, most importantly, the communicative elements of the Flying ad hoc network (FANETs).
Learning about UAVs as networking devices is essential from a security perspective because hackers aim to attack a communicating network's vulnerable aspects. Therefore, in Stage I of our work, we studied several application-specific UAV simulators and then proposed an ideal drone simulator's characteristics. Later (open full item for complete abstract)
Committee: Ahmad Y. Javaid (Committee Chair); Vijay Devabhaktuni (Committee Co-Chair); Weiqing Sun (Committee Member); Devinder Kaur (Committee Member); Mohammed Y. Niamat (Committee Member)
Subjects: Computer Engineering; Computer Science; Engineering; Information Science; Information Systems; Information Technology