Model Driven Approach to design a Secure Routing Protocol for UAV Ad Hoc Networks

UAANET (UAV Ad Hoc Network) is a wireless network that is able to organize itself without a pre-existing infrastructure. It consists of forming an ad hoc network with multiple UAVs and the Ground Control Station (GCS). In order to route data packets between nodes, a routing protocol is required. This routing protocol must not only satisfy the UAANET network requirements but also the validation requirements with a formal method to verify the routing protocol conformance. This will eventually contribute to the certification of the UAANET communication network (e.g to be compatible with the specification document DO 178C). In this paper, we propose a validation model of a secure routing ad hoc protocol for UAANET based on the well known AODV algorithm. The MDD (Model Driven Development) approach is used and provides a formal specification capabilities to ensure reusability, modularity, and conformance of the AODV implementation.

[1]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[2]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Barry E. Mullins,et al.  A novel communications protocol using geographic routing for swarming UAVs performing a Search Mission , 2012, 2009 IEEE International Conference on Pervasive Computing and Communications.

[4]  Yannick Moy,et al.  Testing or Formal Verification: DO-178C Alternatives and Industrial Experience , 2013, IEEE Software.

[5]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[7]  Marianne Azer,et al.  Immunizing the SAODV protocol against routing information disclosure , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[8]  Jean-Aimé Maxa,et al.  Emulation-Based Performance Evaluation of Routing Protocols for Uaanets , 2015, Nets4Cars/Nets4Trains/Nets4Aircraft.

[9]  Liang Dong,et al.  Low Latency Routing Algorithm for Unmanned Aerial Vehicles Ad-Hoc Networks , 2011 .

[10]  Nicolas Larrieu How can model driven development approaches improve the certification process for UAS? , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).

[11]  Juan Li,et al.  A Novel DSR-Based Protocol for Small Reconnaissance UAV Ad Hoc Network , 2014 .

[12]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[13]  Bixio Rimoldi,et al.  Speed-aware routing for UAV ad-hoc networks , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[14]  Rostam Shirani,et al.  Combined Reactive-Geographic routing for Unmanned Aeronautical Ad-hoc Networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[15]  Robert E. Hiromoto,et al.  A time-slotted on-demand routing protocol for mobile ad hoc unmanned vehicle systems , 2007, SPIE Defense + Commercial Sensing.

[16]  Stephan Eichler,et al.  Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.