A Trusted Lightweight Communication Strategy for Flying Named Data Networking

Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called ’mission’ to provide a wide range of applications/services. Without loss of generality, the services and applications offered by the FANET are based on data/content delivery in various forms such as, but not limited to, pictures, video, status, warnings, and so on. Therefore, a content-centric communication mechanism such as Information Centric Networking (ICN) is essential for FANET. ICN addresses the problems of classical TCP/IP-based Internet. To this end, Content-centric networking (CCN), and Named Data Networking (NDN) are two of the most famous and widely-adapted implementations of ICN due to their intrinsic security mechanism and Interest/Data-based communication. To ensure data security, a signature on the contents is appended to each response/data packet in transit. However, trusted communication is of paramount importance and currently lacks in NDN-driven communication. To fill the gaps, in this paper, we propose a novel trust-aware Monitor-based communication architecture for Flying Named Data Networking (FNDN). We first select the monitors based on their trust and stability, which then become responsible for the interest packets dissemination to avoid broadcast storm problem. Once the interest reaches data producer, the data comes back to the requester through the shortest and most trusted path (which is also the same path through which the interest packet arrived at the producer). Simultaneously, the intermediate UAVs choose whether to check the data authenticity or not, following their subjective belief on its producer’s behavior and thus-forth reducing the computation complexity and delay. Simulation results show that our proposal can sustain the vanilla NDN security levels exceeding the 80% dishonesty detection ratio while reducing the generated end-to-end delay to less than 1 s in the worst case and reducing the average consumed energy by more than two times.

[1]  Kuldeep Singh,et al.  FCTM: A Novel Fuzzy Classification Trust Model for Enhancing Reliability in Flying Ad Hoc Networks (FANETs) , 2018, Ad Hoc Sens. Wirel. Networks.

[2]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[3]  Nello Cristianini,et al.  Kernel Methods for Pattern Analysis , 2003, ICTAI.

[4]  Abderrahmane Lakas,et al.  UAV-assisted technique for the detection of malicious and selfish nodes in VANETs , 2018, Veh. Commun..

[5]  Daniel Gutiérrez-Reina,et al.  A survey on unmanned aerial and aquatic vehicle multi-hop networks: Wireless communications, evaluation tools and applications , 2018, Comput. Commun..

[6]  Juan-Carlos Cano,et al.  A bounding algorithm for the broadcast storm problem in mobile ad hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[7]  Nadeem Javaid,et al.  Realization of VANET-Based Cloud Services through Named Data Networking , 2018, IEEE Communications Magazine.

[8]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[9]  Syed Hassan Ahmed,et al.  Named Data Networking for Software Defined Vehicular Networks , 2017, IEEE Communications Magazine.

[10]  Lav Gupta,et al.  Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.

[11]  Nader Mohamed,et al.  Towards Trusted and Efficient UAV-Based Communication , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[12]  Van Jacobson,et al.  Schematizing Trust in Named Data Networking , 2015, ICN.

[13]  Deborah Estrin,et al.  Named Data Networking (NDN) Project , 2010 .

[14]  Ozgur Koray Sahingoz,et al.  Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges , 2013, Journal of Intelligent & Robotic Systems.

[15]  Mohsen Guizani,et al.  Drone-Assisted Public Safety Networks: The Security Aspect , 2017, IEEE Communications Magazine.

[16]  Alexander Afanasyev,et al.  Security Support in Named Data Networking , 2018 .

[17]  Mario Gerla,et al.  Social network based security scheme in mobile information-centric network , 2013, 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[18]  Ehssan Sakhaee,et al.  A Novel Scheme to Reduce Control Overhead and Increase Link Duration in Highly Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[19]  Asma Adnane,et al.  Design of trust based context aware routing protocol in vehicular networks , 2015 .

[20]  Riham Altawy,et al.  Security, Privacy, and Safety Aspects of Civilian Drones , 2016, ACM Trans. Cyber Phys. Syst..

[21]  Abderrahmane Lakas,et al.  Reputation-aware energy-efficient solution for FANET monitoring , 2017, 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC).

[22]  Mianxiong Dong,et al.  CAMF: Context-Aware Message Forwarding in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[23]  Ian F. Akyildiz,et al.  Help from the Sky: Leveraging UAVs for Disaster Management , 2017, IEEE Pervasive Computing.

[24]  Rajendra Singh Kushwah,et al.  NDN architectures in VANET scenario , 2017, 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT).

[25]  Victor C. M. Leung,et al.  Information-Centric Networking for VANETs , 2015 .

[26]  Wenjun Xu,et al.  Trust connectivity analysis in overlaid unmanned aerial vehicle networks , 2017, 2017 17th International Symposium on Communications and Information Technologies (ISCIT).

[27]  Maria Rita Palattella,et al.  Security Challenges in Future NDN-Enabled VANETs , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[28]  Bernhard Rinner,et al.  Drone networks: Communications, coordination, and sensing , 2018, Ad Hoc Networks.

[29]  Juan-Carlos Cano,et al.  Trust Management for Vehicular Networks: An Adversary-Oriented Overview , 2016, IEEE Access.

[30]  Daniel Zappala,et al.  Content-based security for the web , 2016, NSPW.

[31]  Juan-Carlos Cano,et al.  UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication , 2018 .

[32]  Alexander Afanasyev,et al.  NDN DeLorean: an authentication system for data archives in named data networking , 2017, ICN.