Detection Of Malicious Nodes in Flying Ad-HOC Networks (FANET)

International Journal of Electronics and Communication Engineering
© 2018 by SSRG - IJECE Journal
Volume 5 Issue 9
Year of Publication : 2018
Authors : Eti Walia, Vinay Bhatia and Gurdeep Kaur
How to Cite?

Eti Walia, Vinay Bhatia and Gurdeep Kaur, "Detection Of Malicious Nodes in Flying Ad-HOC Networks (FANET)," SSRG International Journal of Electronics and Communication Engineering, vol. 5,  no. 9, pp. 6-12, 2018. Crossref,


The usage of Unmanned Aerial Vehicles (UAV) is increasing each day. The UAV network is the decentralized and self - configuring network in which nodes can join or leave the network any time. Security is the biggest challenge in flying ad-hoc networks (FANETs). In Sybil attack, FANET is unstable by malicious nodes which create fake identities. In this paper, a mutual authentication technique is proposed to detect Sybil attack in network. . A multiple copies of fake identities create by Sybil attack which is harmful for the network. Malicious nodes flood the wrong information in the network that degrades the network performance. In this paper, simulation results show the mutual authentication scheme is used to trigger the Sybil attack in network.


VANET, FANET, malicious node, Sybil attack, UAV to UAV communication


[1] Man deep Kaur Saggy and Ramjet Kaur, “ Isolation of Sybil Attack in VANET using Neighbouring Information”, April 2015,pp.994206. 
[2] Yanmaz, Costanzia, Bettstetter and W. Elmenreich “A discrete stochastic process for coverage analysis of autonomous UAV networks”, “GLOBECOM Workshops GC Wkshps”, 2010 IEEE, pp. 1777-1782. 
[3] Sahingoz, “Networking models in flying Ad-hoc networks (FANETs)”, “Journal of Intelligent & Robotic Systems”, 74(1-2), 513-527 2014. 
[4] Singh, A. K. “Applying OLSR routing in FANETs”, “ In Advanced Communication Control and Computing Technologies”, (ICACCT), 2014 . 
[5] N.M Rodday, R.D Schmidth “Exploring securities vulnerabilities of unmanned aerial vehicles”, “ in IEE/IFIP Network Operations and management symposium”, (NOMS), April 2016, pp.993-994. 
[6] D.Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks in Mobile Computing”, (T. Imielinskiand H. Korth, eds.), Kluwere Academic Publishers. 
[7] W.Saad, A. L. Glass, N. B. Mandayam, and H. V. Poor, “Toward a consumer-centric grid: A behavioural perspective proceedings “,IEEE, vol. 104, no. 4, pp. 865–882, April 2016. 
[8] Vinay Bhatia, D.G Gupta and H.P Sinha, “Impact of security algorithms on various performance matrices of Wireless LAN”, “international conference of wireless networks, LONDON, U.K, July – 2013). 
[9] A.Ranet, S.sharma, “VANET security attacks and its possible solutions”, “Journal of information and operation management, vol.3-no.1,pp 301-304” , 2012. 
[10] Yap, W. SLiu, J. K., Tan, S. Yon the security of a lightweight authentication and encryption scheme for mobile ad hoc network. 2015. 
[11] A.Sanjab and W.Saad, “Data injection attacks a smart grid” Vol.7, no. 4, pp.2038-2049, July 2016. 
[12] G.E.Rahi, A. Sanjab, W. Saad, N. B. Mandayam, and H. V. Poor, “Prospect theory for enhanced smart grid resilience using distributed energy storage,” in 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Sept 2016, pp. 248. 
[13] W.Zafar and B. M. Khan, “ “Networking models in flying ad-hoc networks(FANETs) Concepts and challenges”, Journal of intelligent and Robotic Systems, vol. 74, no. 1, pp. 512-527, 2014. 
[14] D.Johnson, D. A. Maltz, and J. Broch, “The dynamic source routing protocol for mobile ad hoc networks (Internet-Draft)”,Mar. 1998. 
[15] Vinay Bhatia and Gurdeep Kaur, “ Evaluation and Improvement in AODV for Path Establishment using Bio Inspired Techniques” , “IEEE International conference of power, control and signal and institutional(ICPCSI)’’ 2017.