ArticlePDF Available

A Review on Communications Perspective of Flying Ad-Hoc Networks: Key Enabling Wireless Technologies, Applications, Challenges and Open Research Topics

Authors:
  • Islamic University of Madinah
  • Faculty of Engineering Sciences and Technology

Abstract and Figures

Unmanned aerial vehicles (UAVs), also known as drones, once centric to military applications, are presently finding their way in many civilian and commercial applications. If national legislations permit UAVs to operate autonomously, one will see the skies become populated with many small UAVs, each one performing various tasks such as mail and package delivery, traffic monitoring, event filming, surveillance, search and rescue, and other applications. Thus, advancing to multiple small UAVs from a single large UAV has resulted in a new clan of networks known as flying ad-hoc networks (FANETs). Such networks provide reliability, ease of deployment, and relatively low operating costs by offering a robust communication network among the UAVs and base stations (BS). Although FANETs offer many benefits, there also exist a number of challenges that need to be addressed; the most significant of these being the communication one. Therefore, the article aims to provide insights into the key enabling communication technologies through the investigation of data rate, spectrum type, coverage, and latency. Moreover, application scenarios along with the feasibility of key enabling technologies are also examined. Finally, challenges and open research topics are discussed to further hone the research work.
Content may be subject to copyright.
drones
Review
A Review on Communications Perspective of Flying
Ad-Hoc Networks: Key Enabling Wireless
Technologies, Applications, Challenges and Open
Research Topics
Fazal Noor 1, Muhammad Asghar Khan 2, * , Ali Al-Zahrani 1, Insaf Ullah 2and
Kawther A. Al-Dhlan 3
1Faculty of Computer Science and Information Systems, Islamic University of Madinah,
Madinah 400411, Saudi Arabia; mfnoor@iu.edu.sa (F.N.); a.alzahrani@iu.edu.sa (A.A.-Z.)
2Department of Electrical Engineering, Hamdard University, Islamabad 44000, Pakistan;
insaf.ullah@hamdard.edu.pk
3Department of Computer Science and Information, University of Hail, Ha’il 55425, Saudi Arabia;
k.aldhlan@uoh.edu.sa
*Correspondence: m.asghar@hamdard.edu.pk; Tel.: +92-336-5276465
Received: 6 September 2020; Accepted: 28 September 2020; Published: 30 September 2020


Abstract:
Unmanned aerial vehicles (UAVs), also known as drones, once centric to military
applications, are presently finding their way in many civilian and commercial applications. If national
legislations permit UAVs to operate autonomously, one will see the skies become populated with many
small UAVs, each one performing various tasks such as mail and package delivery, trac monitoring,
event filming, surveillance, search and rescue, and other applications. Thus, advancing to multiple
small UAVs from a single large UAV has resulted in a new clan of networks known as flying ad-hoc
networks (FANETs). Such networks provide reliability, ease of deployment, and relatively low
operating costs by oering a robust communication network among the UAVs and base stations
(BS). Although FANETs oer many benefits, there also exist a number of challenges that need to be
addressed; the most significant of these being the communication one. Therefore, the article aims to
provide insights into the key enabling communication technologies through the investigation of data
rate, spectrum type, coverage, and latency. Moreover, application scenarios along with the feasibility
of key enabling technologies are also examined. Finally, challenges and open research topics are
discussed to further hone the research work.
Keywords: UAVs; FANETs; Bluetooth; ZigBee; 5G; 6G; security; privacy; blockchain; energy harvesting
1. Introduction
Unmanned aerial vehicles (UAVs) have gained recognition for their variety of applications in
dierent domains such as surveillance, agriculture, health care, trac control, inspections, and public
safety [
1
]. Moreover, in comparison to a stand-alone UAV, multiple small UAVs can be eectively
combined to execute assigned tasks in autonomous ways [
2
]. Thus, advancing from a single UAV
to multi-UAVs results in the emergence of a new clan of networks named flying ad-hoc networks
(FANETs) [
3
]. Smaller interconnected UAVs can exchange data with each other and with base stations
(BS) in a FANET system [
4
]. FANETs possess advanced features such as high mobility, fast deployment,
self-configurations, low cost, scalability, and others. However, such specific features demand a set of
guidelines that need to be addressed for eective implementation. Particularly, when selecting a FANET
system for real-time communication, Quality of Service (QoS) should be guaranteed [
5
]. In addition,
Drones 2020,4, 65; doi:10.3390/drones4040065 www.mdpi.com/journal/drones
Drones 2020,4, 65 2 of 14
for the exchange of information between UAVs and a BS, the network must have incorporated an
ecient and secure wireless connection.
FANETs can be deployed either individually or incorporated into traditional cellular infrastructures.
The subject has attracted the interest of both industry and academic experts. Most related research
studies seek to integrate FANETs with or without traditional networks in a manner that upholds
the QoS, security, and reliability requirements of small UAVs [
6
]. Therefore, the detection and
identification of vulnerabilities in the current systems are important for developing solutions that
enable high-throughputs and reliable data communications. The popular short-range wireless
networking technologies such as Wi-Fi (IEEE 802.11), ZigBee (IEEE 802.15.4), Bluetooth (IEEE 802.15.1),
and others can be utilized to incorporate a FANET system independently. Such technologies not only
provide wireless networking in the immediate vicinity, but also provide spectrum-free bands [
7
]. In the
following two scenarios, they are a good choice: in the event of failure due to the deterioration of
existing communication networks, and in remote areas, where problems do not enable installation
and deployment immediately. Additionally, they can step up rescue operations by maintaining
eective UAV communications. In addition, the low altitude of UAVs due to short-distance wireless
communication significantly improves the performance of networks in terms of QoS.
The Fifth-Generation (5G) technologies are projected to oer improved services in terms of data
rates and coverages in linking FANETs to existing cellular networks [
8
]. Moreover, 5G provides
multi-access edge computing (MEC), incorporating cloud computing capabilities. MEC prevents
resource-aected UAVs from performing compute-intensive tasks in a UAV environment and provides
ooading facilities to the edge of the network. Hence, 5G has many benefits for high-altitude
UAVs equipped with cameras, sensors, and GPS receivers. In addition, 5G has made it possible to
envision cellular networks beyond 5G (B5G) and sixth-generation (6G) is capable of incorporating
autonomous services as well as emerging developments to be envisioned [
9
]. The main issues are the
safe usage of these technologies and the provision of privacy in small UAVs in future wireless networks.
The design considerations of small UAVs rarely address the security concerns [
10
]. Small UAVs
also suer from security vulnerabilities due to limited and insucient onboard computing and
energy capabilities [
11
,
12
]. Such constraints prevent UAV deployment for longer periods of time
and for safer operations. Significant attempts have been made to resolve the underlying technical
problems in order to take advantage of the wider benefits of the multi-UAV networks [
13
]. Figure 1
shows a diagram summarizing the communication scope in FANETs, their involvement with recent
technological advances, and their combined applications. Therefore, it is essential to have adequate
wireless technologies and lightweight security schemes that can significantly stabilize battery life,
have minimal computational costs, and encourage better connectivity. In comparison, in this review,
key enabling technologies are addressed that manifest themselves as the paradigms needed to eectively
deploy FANETs in the future. It also highlights the main challenges and provides guidance for future
research work.
Drones 2020, 4, x FOR PEER REVIEW 2 of 14
selecting a FANET system for real-time communication, Quality of Service (QoS) should be
guaranteed [5]. In addition, for the exchange of information between UAVs and a BS, the network
must have incorporated an efficient and secure wireless connection.
FANETs can be deployed either individually or incorporated into traditional cellular
infrastructures. The subject has attracted the interest of both industry and academic experts. Most
related research studies seek to integrate FANETs with or without traditional networks in a manner
that upholds the QoS, security, and reliability requirements of small UAVs [6]. Therefore, the detection
and identification of vulnerabilities in the current systems are important for developing solutions that
enable high-throughputs and reliable data communications. The popular short-range wireless
networking technologies such as Wi-Fi (IEEE 802.11), ZigBee (IEEE 802.15.4), Bluetooth (IEEE 802.15.1),
and others can be utilized to incorporate a FANET system independently. Such technologies not only
provide wireless networking in the immediate vicinity, but also provide spectrum-free bands [7]. In the
following two scenarios, they are a good choice: in the event of failure due to the deterioration of
existing communication networks, and in remote areas, where problems do not enable installation and
deployment immediately. Additionally, they can step up rescue operations by maintaining effective
UAV communications. In addition, the low altitude of UAVs due to short-distance wireless
communication significantly improves the performance of networks in terms of QoS.
The Fifth-Generation (5G) technologies are projected to offer improved services in terms of data
rates and coverages in linking FANETs to existing cellular networks [8]. Moreover, 5G provides
multi-access edge computing (MEC), incorporating cloud computing capabilities. MEC prevents
resource-affected UAVs from performing compute-intensive tasks in a UAV environment and
provides offloading facilities to the edge of the network. Hence, 5G has many benefits for high-
altitude UAVs equipped with cameras, sensors, and GPS receivers. In addition, 5G has made it
possible to envision cellular networks beyond 5G (B5G) and sixth-generation (6G) is capable of
incorporating autonomous services as well as emerging developments to be envisioned [9]. The main
issues are the safe usage of these technologies and the provision of privacy in small UAVs in future
wireless networks. The design considerations of small UAVs rarely address the security concerns
[10]. Small UAVs also suffer from security vulnerabilities due to limited and insufficient onboard
computing and energy capabilities [11,12]. Such constraints prevent UAV deployment for longer
periods of time and for safer operations. Significant attempts have been made to resolve the
underlying technical problems in order to take advantage of the wider benefits of the multi-UAV
networks [13]. Figure 1 shows a diagram summarizing the communication scope in FANETs, their
involvement with recent technological advances, and their combined applications. Therefore, it is
essential to have adequate wireless technologies and lightweight security schemes that can
significantly stabilize battery life, have minimal computational costs, and encourage better
connectivity. In comparison, in this review, key enabling technologies are addressed that manifest
themselves as the paradigms needed to effectively deploy FANETs in the future. It also highlights
the main challenges and provides guidance for future research work.
Figure 1. Scope of communication with technological advancements for various applications in
FANETs.
Figure 1.
Scope of communication with technological advancements for various applications in FANETs.
Drones 2020,4, 65 3 of 14
The rest of the paper is organized as follows. Section 2describes the key enabling wireless
technologies; Section 3elaborates on applications; in Section 4, the challenges are discussed; Section 5
highlights the future work, and finally Section 6contains the conclusions.
2. Key Enabling Wireless Technologies
The choice of appropriate wireless communication technologies for FANETs depends on the
type of an application and the nature of the mission involved. Unlicensed wireless technologies such
as Wi-Fi, ZigBee, and Bluetooth are widely used for fast deployment and small- to medium-scale
applications [
6
,
7
]. Licensed wireless technologies such as 5G/6G, on the other hand, are used to satisfy
the requirements of broadband access everywhere, high device mobility, and integration of a massive
number of UAVs in an ultra-reliable way [
14
]. Based on the spectrum type (licensed/unlicensed),
the most suitable wireless technologies for FANETs are categorized in Table 1. To provide wireless
connectivity in the immediate vicinity, unlicensed or short-range wireless technologies have the ability
to oer o-the-shelf, lightweight, and cost-eective wireless connectivity. Unlicensed technologies
oer information transfer in the instant vicinity ranging from millimeters to a few hundred meters.
The most suitable short-range wireless technologies are Wi-Fi, Bluetooth, and ZigBee, which can
be used for medium and low data rate applications of FANETs. Wi-Fi provides a set of specifications for
the implementation of wireless local area networks (WLANs) with radio bands of 2.4, 3.6, 5, and 60 GHz,
respectively. IEEE 802.11a/b/g/n/ac is the first choice of variants for many FANET applications to
provide the required throughput for transmitting medium size data such as video and images [
15
].
The standard Wi-Fi system has a transmission range of approximately 100 m. A multi-hop networking
scheme may expand the transmission range to kilometers. However, it cuts down the lifetime of the
network from hours to minutes. An alternative to Wi-Fi is the use of low-cost and low-power radios
like Bluetooth and ZigBee. Bluetooth (IEE 802.15.1) is a possible candidate for the deployment of
FANETs at low cost and low power manners. It operates in an unlicensed frequency band of 2.4 GHz
with a contact range of 10 to 100 m and uses a distributed frequency-hopping transmission spectrum.
Bluetooth technology, with data rate ranging from 1 to 3 Mbps and a capacity of 24 Mbps, can be used in
three dierent models. The new version of Bluetooth core specification is Bluetooth 5 [
16
]. The primary
focus of Bluetooth 5 is to improve data rate, coverage, energy eciency, and coexistence with other
technologies. Given the major improvements, Bluetooth 5 appears to be a possible candidate for
implementing future FANET systems at low cost and low power manners. Similarly, ZigBee technology
is widely used in applications that require long battery life, low data rates, and secure networking.
It ranges from 10 to 100 m and is less expensive and convenient than proprietary communication
technologies such as Bluetooth and Wi-Fi.
Low-power wide area networks (LPWAN) can be another good option that consumes less energy
and oers a wide range of connectivity for UAVs [
17
20
]. LPWAN allows transmitting data for a
longer duration of time and without much loss of energy resources. LoRaWAN has been designed as a
convention explicitly for the management of low energy consumption transmissions when Internet of
Things (IoT) devices on LPWAN [
21
,
22
]. For IoT users, LoRaWAN uses a novel network paradigm
for bidirectional connectivity, localization, and mobility management services [
23
]. It provides a new
framework for LPWAN execution for long-range communications. It has the potential to operate over
the ISM band (868 MHz and 900 MHz) with data rates ranging from 0.3 kbps to 50 kbps and network
coverage from 5 to 15 km [
24
26
]. Sigfox, similar to LoRaWAN, is a low-speed but low-power and
long-range solution for UAVs. It uses the same ISM band as LoRaWAN. One of the advantages of
Sigfox is that it supports open-sight up to 30 km of range.
Drones 2020,4, 65 4 of 14
Table 1. Comparison between the various communication technologies for FANETs.
Communication
Technology Standard/Service Category Spectrum Type Frequency/Medium Device Mobility Theoretical Data Rate Range
Indoor-Outdoor Latency
Wi-Fi
802.11 Unlicensed 2.4 GHz IR Yes Up to 2 Mbps 20–100 m
<5 ms
802.11a Unlicensed 5 GHz Yes Up to 54 Mbps 35–120 m
802.11b Unlicensed 2.4 GHz Yes Up to 11 Mbps 35–140 m
802.11n Unlicensed 2.4/5 GHz Yes Up to 600 Mbps 70–250 m
802.11g Unlicensed 2.4 GHz Yes Up to 54 Mbps 38–140 m
802.11ac Unlicensed 5 GHz Yes Up to 866.7 Mbps 35–120 m
ZigBee 802.15.4 Unlicensed 2.4 GHz Yes Up to 25 kbps 10–100 m 15 ms
Bluetooth V5 802.15.1 Unlicensed 2.4 GHz Yes Up to 2 Mbps 10–200 m 3 ms
LoRaWAN IEEE 802.15.4g Unlicensed 868 MHz, 915 MHz Yes Up to 50 kbps 05–15 km
Device Class Dependent
Sigfox - Unlicensed 868 MHz, 902 MHz Yes Up to 100 bps 03–30 km 2 s
NB-IoT
LTE Cat NB1
LTE Cat NB2 licensed 200 KHz Yes Up to 250 kbps 10–35 km 1.6–10 s
5G
mMTC
URLLC
eMBB
licensed
Sub-6 GHz
MmWave for fixed access Yes Up to 1 Gbps Wide Area 1 ms
B5G
mMTC
URLLC
eMBB
Hybrid (URLLC +eMBB)
licensed
Sub-6 GHz
MmWave for fixed access Yes Up to 100 Gbps Wide Area 1 ms
6G
MBRLLC
mURLLC
HCS
MPS
licensed
Sub-6 GHz
MmWave for mobile access
Exploration of higher frequency
and THz bands (above 300 GHz)
Non-RF (e.g., optical, VLC, etc.)
Yes Up to 1 Tbps Wide Area <1 ms
Drones 2020,4, 65 5 of 14
If the unlicensed wireless technologies are not capable of meeting the UAV throughput
requirements, traditional cellular communications can be used as a backhaul for providing data
transmission services in two sights. Narrow band Internet of Things (NB-IoT) is a LPWA standard
technology designed to provide connectivity and access to new services for a wide range of the
latest IoT devices. NB-IoT, especially in deep coverage, significantly improves user device power
consumption, system capacity, and spectrum eciency. Moreover, as the later proposals in 5G have
made it conceivable to conceptualize cellular systems beyond 5G (B5G) and sixth-generation (6G),
able of unleashing the complete potential of copious, past-including autonomous administrations
as well as emerging trends. They give capacity extension methodologies to resolve the issue of
gigantic connectivity and give ultra-high throughput, indeed in extraordinary or crisis circumstances
where there may be shifting framework densities, transmission capacity as well as trac pattern.
These technologies can moreover be valuable to FANETs by empowering UAVs to communicate
specifically with each other and at the same time with a fixed communication framework. Within the
same setting, the limited onboard processing capacity of small UAVs, storage, and battery imperatives
raises a number of concerns over the eective execution of complex assignments. Leveraging the
cloud storage facility oered by 5G to ooad both computation and storage-intensive activities
from resource-constrained UAVs to remote cloud servers is an eective technique to overcome these
limitations. Furthermore, the deployment of UAVs as a flying base station (BS) with other physical
layering mechanisms such as massive MIMO, cognitive radios, mmWave, and others as a prerequisite,
is a promising approach to achieve data-hungry services [27].
The above discussions led to the conclusion that depending on the range and throughput
requirements, Bluetooth, ZigBee, Wi-Fi, LoRaWAN, and Sigfox can be considered, depending on the
range and throughput requirements [
28
]. 5G and 6G can be a more suitable choice if the coverage area
is large, together with high throughput demands. However, these technologies require the existing
telecommunications infrastructure.
3. Applications and Feasibility of the Wireless Technologies
The use of small UAVs for multiple insurgents, civilian, and commercial applications is expected
to produce good results when it comes to providing accurate and reliable data transfer. As shown
in Figure 2, some of the areas where FANETs can be used are search and rescue, mail and delivery,
trac monitoring, precision agriculture, reconnaissance, and others.
Drones 2020, 4, x FOR PEER REVIEW 8 of 14
Figure 2. Advantages, key wireless technologies, applications, and challenges of flying ad-hoc
networks.
4. Challenges
4.1. Security and Privacy
The design consideration of small UAVs rarely addresses the security considerations [7]. This
vulnerability could adversely affect the network security and privacy, resulting in colossal damage
to the information exchange operations within the network. An intruder intending to harm the
FANET system has many options for carrying out malicious intentions. For example, the attacker can
transmit plenty of reservation requests, eavesdrop the control messages, and/or forge the
information. UAVs connected with Wi-Fi are considered to be more unsecure as opposed to cellular
networks due to unreliable links and poor security mechanisms [43]. The authors in [44], ascertained
that Wi-Fi-based UAVs were vulnerable to fundamental security attacks. Someone with an
appropriate transmitter could attach to a UAV and embed commands into a progressing session,
making it easy to interpret any UAV. In addition, UAVs can become a luring target for physical
attacks in the event that it hovers over a hostile environment, which is another aspect of security
concern in the UAV network [45–48]. In such instances, an attacker dissembles the captured UAV to
gain access to retrieve internal data via common interfaces or ports such as a USB.
Global positioning system (GPS) spoofing [49–54] is another major security threat affecting the
privacy of small UAVs in which UAV GPS signals are manipulated by an intruder. An adversary
generally transmits fake GPS signals to an intended UAV with a slightly higher power than the actual
GPS signals in this attack in order to trick the UAV into thinking that it is at another location. This
technique can therefore be used by the attacker to send the UAV to the desired predetermined area
where it can be effortlessly captured [55]. The attack environment used to exploit the GPS spoofing
vulnerability of the commercial drone of the 3D Robotics firm is presented in Figure 3. A laptop with
a virtual machine and a Linux operating system equipped with Ubuntu 14.04 and BladeRF X40 are
required to exploit the particular vulnerability of transmitting fake coordinates. This can, however,
be possible only if the necessary libraries have been designed to work with the BladeRF [56]. The
cooperative localization system must use the actual positions of neighboring UAVs and their
associated distances in order to avoid the GPS spoofing attack to help UAVs determine their desired
location.
Figure 2.
Advantages, key wireless technologies, applications, and challenges of flying ad-hoc networks.
Drones 2020,4, 65 6 of 14
3.1. Search and Rescue (SAR)
SAR missions are amongst the most popular aerial robotics driving applications. This is largely
due to UAVs’ unique features such as versatility, flexibility, and scalability in contrast with human
vehicles [
29
]. Furthermore, the UAVs are able to fly autonomously, access dicult terrain, and perform
tasks of data collection, which are impossible for human vehicles. The advent of FANETs has further
increased UAV participation in active search and rescue operations [
30
]. In the event of unexpected
natural disasters, hazardous gas intrusions, wildfires, avalanches, and the rapid identification of
missing persons, FANETs will serve as the first line of protection. In such scenarios, FANETs could
be deployed in the aected areas, in exchange for sending humanitarian aid that could be at risk.
UAVs were first used during the 2005 Hurricane Katrina search and rescue missions and later in the
2011 Fukushima and 2015 Nepal earthquake, respectively [31].
In [
32
], the authors proposed a modern search and rescue operations (SARO) strategy to search
for survivors following major disasters on the assumption that wireless communication network cells
are partly functional while taking advantage of the UAV-based network. These SAROs are based on
the notion that nearly all survivors should be equipped with handheld remote gadgets called User
Equipment (UEs), which function on the ground as human-based sensors. The control messages in
SAR operations include the exchange of task assignment, position and heading, and map information,
while the data messages involve either images or video streaming, requiring a minimum data rate
of 1 Mbps and 2 Mbps, respectively. In addition, the delay limits for these operations is about 50 ms
and 100 ms and covers small- to medium-sized areas. Thus, keeping these parameters in mind,
unlicensed (i.e., Wi-Fi and Bluetooth 5) technologies can be used for limited coverage areas and a
fewer number of nodes, whereas cellular technologies can be used for large coverage areas and mass
deployment of UAVs.
3.2. Mailing and Delivery
Package delivery is one of the most enticing UAV applications supported by major courier
companies for quick, cost-eective and ecient transportation of packages that weigh less than a UAV
maximum bearing load [
33
]. For example, Amazon reports that 83 percent of its packages weigh less
than 2.5 kg [
34
], while the average FedX package weighs less than 5 kg [
35
]. Moreover, the adoption of
UAVs is increasing rapidly due to the growing trend of online ordering in congested cities, especially in
the retail sector. Many major retailers and logistics companies are stepping up eorts to integrate small
UAVs into their transport systems to solve the problem of “last mail” delivery. The authors in [
36
]
illustrated the plans of large retailers and logistics companies as follows: DHL launched its drone
delivery service for express and emergency products and began the first automated drone delivery to
Juist Island in 2014; later on, DHL successfully made more than 100 deliveries in the Bavarian Alps
in early 2016 through its Parcelcopter 3.0 drone; UPS tested the delivery of a successful automated
drone in Florida in 2017 from the roof of a company electric vehicle; and through securing a U.S.
patent, Amazon created major competition to legalize its UAV distribution project called “Prime Air.”
Patent and Trademark Oce are dropping packages from drones to consumers through the use
of parachutes.
Mailing and delivery operations require low throughputs for trajectory planning, however,
the coverage areas may be large. The communication range of unlicensed technologies is limited, so it
is therefore possible to use any appropriate licensed technology for mailing and delivery operations.
3.3. Trac Monitoring
Roadway trac surveillance is also a possible application where FANETs can replace the laborious
and complex infrastructures used for observations. UAVs are less costly than traditional trac control
devices used on the roadside such as loop detectors, video surveillance cameras, and microwave
sensors [37]. Moreover, data obtained from detector technology is somewhat statistical in nature and
Drones 2020,4, 65 7 of 14
does not provide precise tracking of the individual vehicle path within the stream of trac. It limits the
use of data obtained in the study of calibration, human driving behaviors, and simulation models [
38
].
Additionally, disasters can easily damage the fixed structures located along the road side used for
computing, communications, and electrical systems. Such shortcomings result in a complete lack of
the transport network capacity to track and gather data [
39
]. Alternatively, the FANETs that can track
and record accidents or perform trac management statistics are an economically and socially viable
choice because of their 3D movement, high speed, and wide coverage.
In trac monitoring, UAVs are involved in transmitting images and video streaming to the
control center in real-time; thus, licensed technologies will be a better choice. In addition, licensed
technologies make use of existing communication infrastructures, particularly in urban areas and can
operate without line-of-sight.
3.4. Precision Agriculture
Management of agriculture production includes the monitoring of crop health. Despite manned
aerial vehicles having been used in this sector over the decades, however, the new concept of
autonomous UAVs is considered more beneficial as they conduct field operations with greater precision
on smaller as well as wider fields [
40
]. High-resolution crop images can be taken with the aid of small
UAVs. The captured images are processed in order to produce relevant information, which can then be
used for future decision-making. Crop health is defined using data obtained from the color imaging
mapping of the normalized vegetation dierence index (NDVI) [
41
]. These color images are usually
obtained through a multispectral high-definition camera installed on the UAVs. NDVIs are counted as
separating healthy from unhealthy plants, which is achieved by calculating the level of chlorophyll
in crops. It takes advantage of the knowledge to identify the area under greater stress. The decision
support engine (DSE) is responsible for taking the appropriate steps to process the task.
The coverage area in precision agriculture can be small or medium in size. Short-range wireless
technologies, particularly Wi-Fi, can be the most appropriate choice to meet the requirements in terms
of coverage, latency, and throughput in crop health monitoring.
3.5. Reconnaissance
For a long time, UAVs have been used for surveillance applications. However, with the advent
of FANETs, the idea of surveillance is supposed to be more revolutionized. UAV plays a key role in
reducing human intervention in patrolling a particular geographic location. Aerial surveillance tasks
may involve collecting battlefield information, mapping areas aected by earthquakes, and monitoring
law enforcement activities. Taking photographs of items distributed over large regions and areas
of interest can also be used in surveillance work. For example, a border surveillance UAV group
can detect not only unplanned humanitarian problems including weapons and drugs, but illegal
border crossings [
42
]. The collected information can then be analyzed and transferred directly to
the Intelligence Control Centers. However, data sensitivity calls for high precision and accuracy
for immediate intervention. All such surveillance missions are complex in nature and are usually
intolerant to false alarms.
Similar to search and rescue operations, in reconnaissance, unlicensed (i.e., Wi-Fi and Bluetooth 5)
technologies can be used for cases of limited coverage areas and fewer number of nodes connectivity,
whereas licensed technologies can be used for large coverage areas and mass deployment of UAVs.
4. Challenges
4.1. Security and Privacy
The design consideration of small UAVs rarely addresses the security considerations [
7
].
This vulnerability could adversely aect the network security and privacy, resulting in colossal
damage to the information exchange operations within the network. An intruder intending to harm the
Drones 2020,4, 65 8 of 14
FANET system has many options for carrying out malicious intentions. For example, the attacker can
transmit plenty of reservation requests, eavesdrop the control messages, and/or forge the information.
UAVs connected with Wi-Fi are considered to be more unsecure as opposed to cellular networks due to
unreliable links and poor security mechanisms [
43
]. The authors in [
44
], ascertained that Wi-Fi-based
UAVs were vulnerable to fundamental security attacks. Someone with an appropriate transmitter
could attach to a UAV and embed commands into a progressing session, making it easy to interpret
any UAV. In addition, UAVs can become a luring target for physical attacks in the event that it hovers
over a hostile environment, which is another aspect of security concern in the UAV network [
45
48
].
In such instances, an attacker dissembles the captured UAV to gain access to retrieve internal data via
common interfaces or ports such as a USB.
Global positioning system (GPS) spoofing [
49
54
] is another major security threat aecting the
privacy of small UAVs in which UAV GPS signals are manipulated by an intruder. An adversary
generally transmits fake GPS signals to an intended UAV with a slightly higher power than the
actual GPS signals in this attack in order to trick the UAV into thinking that it is at another location.
This technique can therefore be used by the attacker to send the UAV to the desired predetermined
area where it can be eortlessly captured [
55
]. The attack environment used to exploit the GPS
spoofing vulnerability of the commercial drone of the 3D Robotics firm is presented in Figure 3.
A laptop with a virtual machine and a Linux operating system equipped with Ubuntu 14.04 and
BladeRF X40 are required to exploit the particular vulnerability of transmitting fake coordinates.
This can, however, be possible only if the necessary libraries have been designed to work with the
BladeRF [
56
]. The cooperative localization system must use the actual positions of neighboring UAVs
and their associated distances in order to avoid the GPS spoofing attack to help UAVs determine their
desired location.
Drones 2020, 4, x FOR PEER REVIEW 9 of 14
Figure 3. Global positioning system (GPS) spoofing vulnerability for the commercial drone of the
company 3D Robotics [52].
4.2. Safety
FANETs deployed for various applications raise major safety issues, for example, crashing
UAVs could cause tremendous damage to property or humans on the ground. This could be the
result of a mid-air collisions, technological malfunction, or misuse by its operator [57,58]. Extreme
weather conditions such as turbulence, lightning, battery life, and lifting capability have caused
public property concerns about the failure of UAVs. In addition, there is also a significant risk of
airborne accidents, leading to widespread devastation due to the sharing of airspace with other
passenger planes in larger cities.
4.3. Energy Limitations
Limited onboard energy is one of the main limitations impeding the development of small
UAVs. The key issue with small UAVs is flight time, because small UAVs of the general domain use
standard onboard batteries that have a finite life time [59]. Additionally, it is hard to swap UAV
batteries during the flight. Completing the resource-hungry applications for the FANET system in a
timely fashion, is therefore a crucial task.
4.4. Storage and Computation Restrictions
The limited storage and computing capabilities mounted on small UAVs do not allow for
computational-intensive tasks to be performed locally [45]. Moreover, the data aggregated by the
small UAVs could be too large for the same UAV to process and store it onboard, as it engages in the
monitoring task [46]. It also requires high computing and storage capacity. In addition, performing
computationally intensive assignments may result in slower response times, which in turn can
impede the overall performance of FANETs.
4.5. Routing
Routing allows for the UAVs to collaborate and coordinate amongst themselves and set up an
optimal route for data transmission. Routing is the most challenging job in FANETs due to the unique
attributes of UAVs such as high mobility, 3D movement, and rapid topology changes [60–63]. In
addition, highly sensitive applications need FANETs to provide accurate, stable, and efficient data
transfer. To make the applications and services more persistent and active, it is therefore important
to develop and choose suitable routing protocols for FANETs. Network efficiency in terms of
throughput and response time are important parameters, which is based on the potency of the
algorithm running within the routing protocol.
Figure 3.
Global positioning system (GPS) spoofing vulnerability for the commercial drone of the
company 3D Robotics [52].
4.2. Safety
FANETs deployed for various applications raise major safety issues, for example, crashing UAVs
could cause tremendous damage to property or humans on the ground. This could be the result of
a mid-air collisions, technological malfunction, or misuse by its operator [
57
,
58
]. Extreme weather
conditions such as turbulence, lightning, battery life, and lifting capability have caused public property
concerns about the failure of UAVs. In addition, there is also a significant risk of airborne accidents,
leading to widespread devastation due to the sharing of airspace with other passenger planes in
larger cities.
4.3. Energy Limitations
Limited onboard energy is one of the main limitations impeding the development of small UAVs.
The key issue with small UAVs is flight time, because small UAVs of the general domain use standard
onboard batteries that have a finite life time [
59
]. Additionally, it is hard to swap UAV batteries during
Drones 2020,4, 65 9 of 14
the flight. Completing the resource-hungry applications for the FANET system in a timely fashion,
is therefore a crucial task.
4.4. Storage and Computation Restrictions
The limited storage and computing capabilities mounted on small UAVs do not allow for
computational-intensive tasks to be performed locally [
45
]. Moreover, the data aggregated by the
small UAVs could be too large for the same UAV to process and store it onboard, as it engages in the
monitoring task [
46
]. It also requires high computing and storage capacity. In addition, performing
computationally intensive assignments may result in slower response times, which in turn can impede
the overall performance of FANETs.
4.5. Routing
Routing allows for the UAVs to collaborate and coordinate amongst themselves and set up an
optimal route for data transmission. Routing is the most challenging job in FANETs due to the
unique attributes of UAVs such as high mobility, 3D movement, and rapid topology changes [
60
63
].
In addition, highly sensitive applications need FANETs to provide accurate, stable, and ecient data
transfer. To make the applications and services more persistent and active, it is therefore important to
develop and choose suitable routing protocols for FANETs. Network eciency in terms of throughput
and response time are important parameters, which is based on the potency of the algorithm running
within the routing protocol.
4.6. Path Planning and Navigation
Unless UAVs collide with each other and with moving objects that appear stable or dynamic in the
flying space, FANETs cannot guarantee safe operation. Thus, path planning and navigation of multiple
UAVs have become a prime concern to eciently accomplish the assigned task [
64
]. To prevent a
possible collision and ensure the safety of the whole system, a predictive method must be established
for path planning and navigation in order to find the best way to avoid collisions.
5. Open Research Topics
The research on FANETs is still in its infancy. As a flying platform, a UAV network may further
contribute to various services. For more guidance in the study, some open research topics are
mentioned below.
5.1. Aerial Blockchain
An emerging trend for adaptive security of privacy preferences in UAV communication networks
supported by 5G, B5G, and 6G is expected to be the aerial blockchain. The privacy and integrity
of data collected by UAVs can be assured using an aerial blockchain approach [
65
]. Furthermore,
the integration of blockchain and 5G/6G technologies make the UAV communication more secure
against cybersecurity vulnerabilities [
66
]. Blockchain-enabled UAV softwarization can also be used
to provide UAV network communication services with flexible, dynamic, and on-the-fly decision
capabilities [
67
]. Although numerous research eorts have been devoted to blockchain technology in
UAV networks, researchers have not yet explored blockchain-enabled UAV network softwarization [
67
].
5.2. High-Speed Backhaul Connectivity
To support high data rate services, backhaul networks in 6G need to manage the huge amount
of data to integrate the UAV networks with the core network. For high-speed backhaul connectivity,
optical fiber and FSO networks can be a potential solution here; however, any increase in the
performance of these networks is challenging due to the demand for exponential data growth [68].
Drones 2020,4, 65 10 of 14
5.3. Deep Reinforcement Learning
Since cellular technology is a key enabler for providing high-speed data communication services
to the swarm of UAVs in the sky, however, it enforces challenges like supporting mobility [
69
].
Deep-reinforcement learning techniques can be used to refine handover decisions dynamically to
ensure stable communication. In addition, deep-reinforcement learning methods may also be used to
find the optimal way to avoid collisions during real-time path planning and navigation [70,71].
5.4. Energy Harvesting Technologies
Limited battery power and limited weight restrictions with a short flight duration time of UAVs
is still a key factor in preventing the involvement of FANETs in a wide range of applications.
Charging UAVs using energy harvesting technologies can overcome the short flight duration
problem [72].
5.5. Virtualization of Unmanned Aerial Vehicles (UAV)-Enabled 5G Networks
UAVs can potentially be integrated into the Internet to leverage the cloud computing facility,
web technologies, and service-oriented infrastructures for enabling smart IoT applications [
73
].
Within the same settings, UAV resources can be virtualized and integrated into an interconnected
environment with other network resources. Therefore, in the future, ecient methods for the
virtualization of UAV-enabled 5G networks need to be developed.
6. Conclusions
A flying ad-hoc network (FANET) is a flying platform that controls the autonomous dynamic
movement of numerous UAVs, simply called drones. However, wireless communication systems
that connect multiple UAVs to a FANET system have the potential for further improvements.
Wireless communication systems that can be deployed quickly to functional FANETs in challenging
environments are currently in high demand. In addition, for long transmission range and high
data rate applications, traditional cellular communication systems can be used as a backhaul link.
The inclusion of 5G and 6G technologies will make UAV networks ultra-reliable and ubiquitous.
However, challenges such as security and privacy, limited onboard energy and restricted computational
capabilities confine the participation of FANETs in a wide range of applications. A perfect balance
between communication technologies, security schemes, and energy harvesting methods are required
to provide secure and ecient communication links with long flight times and minimal communication
latencies for dierent real-time applications. Therefore, in this article, key enabling technologies,
applications, challenges, and open research problems were thoroughly investigated.
Author Contributions:
Conceptualization, M.A.K. and F.N.; Methodology, M.A.K. and F.N.; Software, M.A.K. and
F.N.; Validation, M.A.K., F.N., and I.U.; Formal analysis, M.A.K., F.N., and I.U.; Investigation, M.A.K. and
F.N.; Resources, M.A.K. and A.A.-Z.; Data curation, M.A.K. and K.A.A.-D.; Writing—original draft preparation,
M.A.K.; F.N., K.A.A.-D., and A.A.-Z.; Writing—review and editing, M.A.K., A.A.-Z., and K.A.A.-D.; Visualization,
M.A.K., A.A.-Z., and K.A.A.-D.; Supervision, F.N. All authors have read and agreed to the published version of
the manuscript.
Funding: This research received no external funding.
Conflicts of Interest: The authors declare no conflict of interest.
Drones 2020,4, 65 11 of 14
Abbreviations
The following abbreviations are used in this manuscript.
UAV Unmanned Aerial Vehicle
FANETs Flying Ad-Hoc Networks
IMU Inertial Measurement Unit
GPS Global Positioning System
BS Base Station
FSO Free Space Optics
DSE Decision Support Engine
NDVI Normalized Vegetation Dierence Index
6G Sixth-Generation
B5G Beyond Fifth-Generation
mmWave Millimeter Wave
SAR Search and Rescue
LPWAN Low-Power Wide Area Networks
MEC Multi-Access Edge Computing
References
1.
Shakoor, S.; Kaleem, Z.; Baig, M.I.; Chughtai, O.; Duong, T.Q.; Nguyen, L.D. Role of UAVs in Public Safety
Communications: Energy Eciency Perspective. IEEE Access 2019,7, 140665–140679. [CrossRef]
2.
Yanmaz, E.; Yahyanejad, S.; Rinner, B.; Hellwagner, H.; Bettstetter, C. Drone networks: Communications,
coordination, and sensing. Ad Hoc Netw. 2018,68, 1–15. [CrossRef]
3.
Sharma, V. Advances in Drone Communications, State-of-the-Art and Architectures. Drones
2019
,3, 21. [CrossRef]
4.
Oubbati, O.S.; Atiquzzaman, M.; Lorenz, P.; Tareque, M.H.; Hossain, M.S. Routing in Flying Ad Hoc Networks:
Survey, Constraints, and Future Challenge Perspectives. IEEE Access 2019,7, 81057–81105. [CrossRef]
5.
Guillen-Perez, A.; Cano, M.-D. Flying Ad Hoc Networks: A New Domain for Network Communications.
Sensors 2018,18, 3571. [CrossRef]
6.
Khan, M.A.; Qureshi, I.M.; Khanzada, F. A Hybrid Communication Scheme for Ecient and Low-Cost
Deployment of Future Flying Ad-Hoc Network (FANET). Drones 2019,3, 16. [CrossRef]
7.
Khan, M.A.; Khalid, A.; Khanzada, F. Dual-Radio Dual-Band Configuration for Flexible Communication
in Flying Ad-hoc Networks (FANET). In Proceedings of the International Conference on Communication
Technologies (ComTech’2019), Rawalpindi, Pakistan, 20–21 March 2019.
8.
Marchese, M.; Moheddine, A.; Patrone, F. IoT and UAV Integration in 5G Hybrid Terrestrial-Satellite
Networks. Sensors 2019,19, 3704. [CrossRef]
9.
Saad, W.; Bennis, M.; Chen, M. A Vision of 6G Wireless Systems: Applications, Trends, Technologies,
and Open Research Problems. arXiv 2019, arXiv:1902.10265. [CrossRef]
10.
Lin, C.; He, D.; Kumar, N.; Choo, K.-K.R.; Vinel, A.; Huang, X. Security and Privacy for the Internet of Drones:
Challenges and Solutions. IEEE Commun. Mag. 2018,56, 64–69. [CrossRef]
11.
Zhi, Y.; Fu, Z.; Sun, X.; Yu, J. Security and Privacy Issues of UAV: A Survey. Mob. Netw. Appl.
2019
,
25, 95–101. [CrossRef]
12.
Hassanalian, M.; Abdelkefi, A. Classifications, applications, and design challenges of drones: A review.
Prog. Aerosp. Sci. 2017,91, 99–131. [CrossRef]
13.
Sharma, A.; Vanjani, P.; Paliwal, N.; Basnayaka, C.M.W.; Jayakody, U.N.K.; Wang, H.-C.;
Muthuchidambaranathan, P. Communication and networking technologies for UAVs: A survey. J. Netw.
Comput. Appl. 2020,168, 02739. [CrossRef]
14.
Zhang, S.; Zhang, H.; Song, L. Beyond D2D: Full Dimension UAV-to-Everything Communications in 6G.
IEEE Trans. Veh. Technol. 2020,69, 6592–6602. [CrossRef]
15.
Van den Bergh, B.; Chiumento, A.; Pollin, S. Ultra-Reliable IEEE 802.11 for UAV Video Streaming:
From Network to Application. In Advances in Ubiquitous Networking 2. UNet 2016; El-Azouzi, R., Menasche, D.,
Sabir, E., De Pellegrini, F., Benjillali, M., Eds.; Lecture Notes in Electrical Engineering; Springer: Singapore,
2016; Volume 397.
Drones 2020,4, 65 12 of 14
16.
Bluetooth Core Specification, Bluetooth Special Interest Group (SIG). 2016. Available online: https://www.bluetooth.
com/specifications/bluetooth-core-specification (accessed on 1 September 2020).
17.
Sharma, V.; You, I.; Pau, G.; Collotta, M.; Lim, J.D.; Kim, J.N. LoRaWAN-Based Energy-Ecient Surveillance
by Drones for Intelligent Transportation Systems. Energies 2018,11, 573. [CrossRef]
18.
Neumann, P.; Montavont, J.; Noël, T. Indoor deployment of low-power wide area networks (LPWAN):
A LoRaWAN case study. In Proceedings of the 2016 IEEE 12th International Conference on Wireless and
Mobile Computing, Networking and Communications (WiMob), New York, NY, USA, 17–19 October 2016;
pp. 1–8.
19.
Bardyn, J.P.; Melly, T.; Seller, O.; Sornin, N. IoT: The era of LPWAN is starting now. In Proceedings of
the 42nd European Solid-State Circuits Conference (ESSCIRC Conference 2016), Lausanne, Switzerland,
12–15 September 2016; pp. 25–30.
20.
Sanchez-Iborra, R.; Gamez, J.S.; Santa, J.; Fernandez, P.J.; Skarmeta, A.F. Integrating LP-WAN Communications
within the Vehicular Ecosystem. J. Internet Serv. Inf. Secur. 2017,7, 45–56.
21.
Garcia, D.; Marin, R.; Kandasamy, A.; Pelov, A. LoRaWAN Authentication in RADIUS
Draft-Garcia-RadextRadius-Lorawan-03. 2 May 2017. Available online: https://www.ietf.org/archive/
id/draft-garcia-radextradius-lorawan-03.txt (accessed on 26 December 2017).
22.
Garcia, D.; Marin, R.; Kandasamy, A.; Pelov, A. LoRaWAN Authentication in Diameter
Draft-Garcia-DimeDiameter-Lorawan-00. 30 May 2016. Available online: https://tools.ietf.org/html/draft-
garcia-dimediameter-lorawan- 00 (accessed on 26 December 2017).
23.
LoRa Alliance Technology. Available online: https://www.lora-alliance.org/technology (accessed on
25 January 2018).
24.
Casals, L.; Mir, B.; Vidal, R.; Gomez, C. Modeling the Energy Performance of LoRaWAN. Sensors
2017
,
17, 2364. [CrossRef]
25.
Naoui, S.; Elhdhili, M.E.; Saidane, L.A. Enhancing the security of the IoT LoraWAN architecture.
In Proceedings of the International Conference on Performance Evaluation and Modeling in Wired and
Wireless Networks (PEMWN), Paris, France, 22–25 November 2016; pp. 1–7.
26.
Sornin, N.; Luis, M.; Eirich, T.; Kramp, T.; Hersent, O. LoRaWAN Specification V1.0.2; Technical Report;
LoRa Alliance: Beaverton, OR, USA, 2016.
27.
Mozaari, M.; Saad, W.; Bennis, M.; Nam, Y.; Debbah, M. A tutorial on UAVs for wireless networks:
Applications, challenges, and open problems. IEEE Commun. Surv. Tutor. 2019,21, 2334–2360. [CrossRef]
28.
Hayat, S.; Yanmaz, E.; Muzaar, M. Survey on unmanned aerial vehicle networks for civil applications:
A communications viewpoint. IEEE Commun. Surv. Tutor. 2016,18, 2624–2661. [CrossRef]
29.
P
ó
łka, M.; Ptak, S.; Kuziora, Ł. The use of UAV’s for search and rescue operations. Procedia Eng.
2017
,
192, 748–752. [CrossRef]
30.
Zafar, W.; Khan, B.M. Flying Ad-Hoc Networks: Technological and Social Implications. IEEE Technol.
Soc. Mag. 2016,35, 67–74. [CrossRef]
31.
Allmer, T.; Fuchs, C.; Kreilinger, V.; Sevignani, S. Social networking sites in the surveillance society. In Media,
Surveillance, and Identity: Social Perspectives; Jansson, A., Christensen, M., Eds.; Peter Lang: New York, NY,
USA, 2014; pp. 49–70.
32.
Alsaeedy, A.A.R.; Chong, E.K.P. 5G and UAVs for Mission-Critical Communications: Swift Network Recovery
for Search-and-Rescue Operations. Mob. Netw. Appl. 2020, 1–19. [CrossRef]
33. Gharibi, M.; Boutaba, R.; Waslander, S.L. Internet of drones. IEEE Access 2016,4, 1148–1162. [CrossRef]
34.
Gross, D. Amazon’s Drone Delivery: How Would it Work? 2013. Available online: http://www.cnn.com/
2013/12/02/tech/innovation/amazondrones-questions/(accessed on 14 August 2020).
35.
FedEx Corporation. Q1 Fiscal 2015 Statistics. 2015. Available online: http://investors.fedex.com/files/
docdownloads/statistical/FedEx-Q1-FY15-Stat-Bookv001t195uu.pdf (accessed on 14 August 2020).
36.
Khan, M.A.; Alvi, B.A.; Safi, A.; Khan, I.U. Drones for Good in Smart Cities: A Review. In Proceedings of the
International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing
(EECCMC), Tamil Nadu, India, 28–29 January 2018.
37.
Ke, R.; Li, Z.; Kim, S.; Ash, J.; Cui, Z.; Wang, Y. Real-time bidirectional trac flow parameter estimation from
aerial videos. IEEE Trans. Intell. Transp. Syst. 2017,18, 890–901. [CrossRef]
38.
Guido, G.; Gallelli, V.; Rogano, D.; Vitale, A. Evaluating the accuracy of vehicle tracking data obtained from
unmanned aerial vehicles. Int. J. Transp. Sci. Technol. 2016,5, 136–151. [CrossRef]
Drones 2020,4, 65 13 of 14
39.
Leitlo, J.; Rosenbaum, D.; Kurz, F.; Meynberg, O.; Reinartz, P. An operational system for estimating road
trac information from aerial images. Remote Sens. 2014,6, 11315–11341. [CrossRef]
40.
Tsouros, D.C.; Bibi, S.; Sarigiannidis, P.G. A review on UAV-based applications for precision agriculture.
Information 2019,10, 349. [CrossRef]
41.
Shafi, U.; Mumtaz, R.; Garc
í
a-Nieto, J.; Hassan, S.A.; Zaidi, S.; Iqbal, N. Precision Agriculture Techniques
and Practices: From Considerations to Applications. Sensors 2019,19, 3796. [CrossRef]
42.
Berrahal, S.; Kim, J.H.; Rekhis, S.; Boudriga, N.; Wilkins, D.; Acevedo, J. Border Surveillance Monitoring
Using Quadcopter UAV-Aided Wireless Sensor Networks. J. Commun. Softw. Syst.
2016
,12, 67–82. [CrossRef]
43.
Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and
challenges. IEEE Commun. Mag. 2016,54, 36–42. [CrossRef]
44.
Hooper, M.; Tian, Y.; Zhou, R.; Cao, B.; Lauf, A.P.; Watkins, L.; Robinson, W.H.; Alexis, W. Securing commercial
Wi-Fi-based UAVs from common security attacks. In Proceedings of the Military Communications Conference,
Baltimore, MD, USA, 1–3 November 2016.
45.
Khan, M.A.; Ullah, I.; Nisar, S.; Noor, F.; Qureshi, I.M.; Khanzada, F.; Khattak, H.; Aziz, M.A. Multi-access
Edge Computing (MEC) Enabled Flying Ad-hoc Networks with Secure Deployment Using Identity Based
Generalized Signcryption. Mob. Inf. Syst. 2020,2020, 8861947.
46.
Khan, M.A.; Ullah, I.; Qureshi, I.M.; Noor, F.; Khanzada, F. An Efficient and Provably Secure Certificateless
Key-Encapsulated Signcryption Scheme for Flying Ad-Hoc Network. IEEE Access
2020
,8, 36807–36828. [CrossRef]
47.
Khan, M.A.; Qureshi, I.M.; Ullah, I.; Khan, S.; Khanzada, F.; Noor, F. An Ecient and Provably Secure
Certificateless Blind Signature Scheme for Flying Ad-Hoc Network Based on Multi-Access Edge Computing.
Electronics 2020,9, 30. [CrossRef]
48.
Jiang, B.; Yang, J.; Song, H. Protecting Privacy From Aerial photography: State of the Art, Opportunities,
and Challenges. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer
Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 799–804.
49.
Guo, Y.; Wu, M.; Tang, K.; Tie, J.; Li, X. Covert Spoofing Algorithm of UAV Based on GPS/INS-Integrated
Navigation. IEEE Trans. Veh. Technol. 2019,68, 6557–6564. [CrossRef]
50.
Eldosouky, A.; Ferdowsi, A.; Saad, W. Drones in Distress: A Game-Theoretic Countermeasure for Protecting
UAVs Against GPS Spoofing. IEEE Internet Things J. 2020,7, 2840–2854. [CrossRef]
51.
Krishna, C.G.L.; Murphy, R.R. A review on cybersecurity vulnerabilities for unmanned aerial vehicles.
In Proceedings of the 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR),
Shanghai, China, 11–13 October 2017; pp. 194–199.
52.
Arteaga, S.P.; Hern
á
ndez, L.A.M.; P
é
rez, G.S.; Orozco, A.L.S.; Villalba, L.J.G. Analysis of the GPS Spoofing
Vulnerability in the Drone 3DR Solo. IEEE Access 2019,7, 51782–51789. [CrossRef]
53.
Feng, Z.; Guan, N.; Lv, M.; Liu, W.; Deng, Q.; Liu, X.; Yi, W. Ecient drone hijacking detection using onboard
motion sensors. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE),
Lausanne, Switzerland, 27–31 March 2017; pp. 1414–1419.
54.
Wang, J. Counter-Unmanned Aircraft System(s) (C-UAS): State of the Art, Challenges and Future Trends.
arXiv 2020, arXiv:2008.12461.
55.
Kerns, A.J.; Shepard, D.P.; Bhatti, J.A.; Humphreys, T.E. Unmanned aircraft capture and control via GPS
spoofing. J. Field Robot. 2014,31, 617–636. [CrossRef]
56.
Kang, W.C.; Aimin, S.P. Time and position spoong with open source projects. Proc. Black Hat Eur.
2015
,
148, 1–8.
57.
Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on
UAV cellular communications: Practical aspects, standardization advancements, regulation, and security
challenges. IEEE Commun. Surv. Tutor. 2019,21, 3417–3442. [CrossRef]
58.
Bolkcom, C.; Bone, E. Unmanned aerial vehicles: Background and issues for congress, report for congress,
congressional research service. In Library of Congress; UNT Digital Library: Washington, DC, USA, 2003.
59.
Li, B.; Fei, Z.; Zhang, Y. UAV communications for 5G and beyond: Recent advances and future trends.
IEEE Internet Things J. 2018,6, 2241–2263. [CrossRef]
60.
Sang, Q.; Wu, H.; Xing, L.; Xie, P. Review and Comparison of Emerging Routing Protocols in Flying Ad Hoc
Networks. Symmetry 2020,12, 971. [CrossRef]
61.
Khan, M.A.; Khan, I.U.; Safi, A.; Quershi, I.M. Dynamic Routing in Flying Ad-Hoc Networks Using
Topology-Based Routing Protocols. Drones 2018,2, 27. [CrossRef]
Drones 2020,4, 65 14 of 14
62.
Lakew, D.S.; Sa’ad, U.; Dao, N.-N.; Na, W.; Cho, S. Routing in Flying Ad Hoc Networks: A Comprehensive
Survey. IEEE Commun. Surv. Tutor. 2020,22, 1071–1120. [CrossRef]
63.
Khan, M.A.; Qureshi, I.M.; Safi, A.; Khan, I.U. Flying Ad-Hoc Networks (FANETs): A Review of
Communication architectures, and Routing protocols. In Proceedings of the 2017 First International
Conference on Latest Trends in Electrical Engineering and Computing Technologies (INTELLECT), Karachi,
Pakistan, 15–16 November 2017; pp. 692–699.
64.
Ashraf, A.; Majd, A.; Troubitsyna, E. Online Path Generation and Navigation for Swarms of UAVs. Sci. Program.
2020,2020, 8530763. [CrossRef]
65.
Li, B.; Fei, Z.; Zhang, Y.; Guizani, M. Secure UAV communication networks over 5G. IEEE Wirel. Commun.
2019,26, 114–120. [CrossRef]
66.
Mehta, P.; Gupta, R.; Tanwar, S. Blockchain envisioned UAV networks: Challenges, solutions,
and comparisons. Comput. Commun. 2020,151, 518–538. [CrossRef]
67.
Kumari, A.; Gupta, R.; Tanwar, S.; Kumar, N. A taxonomy of blockchain-enabled softwarization for secure
UAV network. Comput. Commun. 2020,161, 304–323. [CrossRef]
68.
Chowdhury, M.Z.; Shahjalal, M.; Ahmed, S.; Jang, Y.M. 6G Wireless Communication Systems: Applications,
Requirements, Technologies, Challenges, and Research Directions. arXiv
2019
, arXiv:1909.11315. [CrossRef]
69.
Chen, Y.; Lin, X.; Khan, T.; Mozaari, M. Ecient Drone Mobility Support Using Reinforcement Learning.
In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul,
Korea, 25–28 May 2020; pp. 1–6.
70.
Challita, U.; Saad, W.; Bettstetter, C. Deep Reinforcement Learning for Interference-Aware Path Planning of
Cellular-Connected UAVs. In Proceedings of the 2018 IEEE International Conference on Communications
(ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–7.
71.
Liu, Q.; Shi, L.; Sun, L.; Li, J.; Ding, M.; Shu, F. Path Planning for UAV-Mounted Mobile Edge Computing
With Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 2020,69, 5723–5728. [CrossRef]
72.
Liu, Q.; Li, M.; Yang, J.; Lv, J.; Hwang, J.; Hossain, A.S.; Muhammad, G. Joint power and time allocation in
energy harvesting of UAV operating system. Comput. Commun. 2020,150, 811–817. [CrossRef]
73.
Sekander, S.; Tabassum, H.; Hossain, E. Multi-tier drone architecture for 5G/B5G cellular networks: Challenges,
trends, and prospects. IEEE Commun. Mag. 2018,56, 96–103. [CrossRef]
©
2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
... Following this discussion, it should be noted that some well-designed hardware with security proof is still susceptible to internal and external threats due to the extensive heterogeneity and communication environment. These difficulties are more difficult when considering IoT devices' constrained energy, computing, and communication resources [7]. These restrictions diminish the adaptability of traditional security approaches, which can be effective against adversaries' anticipation in these networks [8]. ...
Conference Paper
Full-text available
Unmanned aerial vehicles (UAVs) can provide an effective and practical communication paradigm for many Internet of Things applications when acting as an intermediary. This cutting-edge technology, modeled after the operating capabilities of IoTs, could be very beneficial in areas where they can access is impossible. IoT devices function in a no-infrastructure environment, interacting wirelessly with one another to share accumulated data in network topological order. Due to their unstructured deployment with wireless and dynamic connectivity, they are vulnerable to several security flaws, which must be addressed for optimal results. This work's primary objective is thoroughly examining the theoretical literature relevant to security risks with this developing technology from 2015 to 2022. We have analyzed numerous security concerns of UAV-aided IoT applications, followed by their mitigation strategies, to identify the current difficulties and requirements of this developing technology paradigm that researchers, the enterprise market, and industry players must address. We have conducted a section-by-section comparison with competing papers to demonstrate how this work differs from theirs in novelty and distinctiveness.
... The use of drone technology is estimated to be between 2 and 7 million drones [1] and according to [2] the drone industry would reach 30 billion dollars by 2036. Drones are used in various fields of expertise, including civil, logistical, military, agricultural and cinematographic applications and surveillance to guide disaster victims and to save their lives [3] [4]. This important use is justified by the ease of deployment of drone technology as well as its very low deployment costs. ...
Conference Paper
Full-text available
Nowadays, civilian drones are the current trend area and the scientific community continues to come up with new approaches to make this technology more and more sophisticated. In addition, most of the research works conducted by the community mainly focused on a few aspects, namely drone functionality, routing protocols and battery life. However, the study of the computational security posture of drones is ignored and few research works focused on it at a time when cybercriminal actions take advantage of it to compromise the security principles of drone components. Moreover, the geospatial data transiting or stored in drone networks is of a very critical and sensitive nature, as a simple compromise of this data could have adverse impacts that could go as far as endangering human lives, especially in the case of intercepting drones used for blood delivery. Well-known cyber-attacks affecting drone security include Denial of Service (DoS) and Distributed DoS (DDoS) intrusions. DoS and DDoS attacks do not require hacking expertise, and even script kiddies can use tools published on the Internet to implement this type of attack against drone networks. DoS and DDoS attacks can easily result in the loss of the drone and the violation of its security policies. Therefore, protecting drone systems from these intrusions is a vital mission that must be taken seriously to ensure the proper functioning of this technology under safer conditions with a much-reduced risk of falling victim to DoS/DDoS attacks. In this work, we proposed an intrusion detection system capable of detecting known and unknown DoS attacks based on artificial intelligence techniques such as multi-agent systems and machine learning algorithms.
Article
Full-text available
In emergency scenarios, infrastructure of wireless networks is usually damaged and becomes out of service. Therefore, Unmanned Aerial Vehicles (UAVs) have been widely nominated as an alternative to provide prompt and efficient wireless connectivity. To this end, UAV-assisted communication systems are recently being under investigation. In this paper, the focus is on UAV-assisted dual-hop links in which the source, relay and destination can be either ground-based or aerial nodes. Specifically, the paper analyzes the performance of these links in terms of the outage probability (OP) and the bit error rate (BER) considering eight different setups of dual-hop UAV-assisted links operating over the millimeter wave (mmWave) band. Unlike others, the performance analysis is conducted considering practical models of the channel fading, path loss, antennas gain and UAVs’ fluctuations. A generalized mathematical framework is followed to obtain the cumulative distribution function (CDF) and the probability density function (pdf) of the overall signal-to-noise ratio (SNR), which are utilized to characterize closed form expressions for the average OP and BER for all proposed setups. Analytical results are validated by Monte Carlo simulations which investigate the role of many setup parameters including the number of antenna elements, the fluctuation intensity, the transmit power and the modulation order. Moreover, results indicate that increasing the number of aerial entities in the link negatively affects its performance due to the impact of the fluctuations on the directional antennas in the mmWave band.
Chapter
Unmanned aerial vehicles are becoming more common among business users and enthusiasts. The integration of technology is having a huge impact on globalization. There is a growing need for forensic examination of these devices due to the popularity of drones and their potential use for criminal activity. One notable example of a technical innovation is drone technology. The usage of drones in various fields, such as military, medical, and agriculture, has increased dramatically. Drones in agriculture give farmers access to real-time data, enabling them to make educated decisions about how best to use farm inputs. Drones are also significant to the healthcare industry because they allow flying vital medical supplies—like blood, vaccines, medications, and lab samples—to remote places in impoverished countries during medical severe situations. Drones monitor enemy movements and enable targeted attacks, which improve security and surveillance operations in the military. Drones have many advantages, but it's essential to recognize that they also have risks.
Chapter
The unmanned aerial vehicle (UAV) industry, commonly referred to as the drone industry, has grown rapidly in recent years and changed many industries' operational procedures. Drones are adaptable AUs that have the ability to operate independently or remotely. The drone business has developed into a vibrant, diverse sector with applications in many other industries. Drone technology is set to grow and become more integrated into daily life and corporate operations as long as regulations keep up with technological advancements. Artificial intelligence (AI) technologies are increasingly used in various industries, notably drone companies. AI can improve drone technology's effectiveness, dependability, and efficiency, creating new opportunities for the drone industry to service multiple applications and sectors.
Chapter
Drones' cyber-physical systems (CPS), which integrate computer, networking, and physical systems, can also be vulnerable to various security threats. As CPS often consists of a network of interdependent devices and systems, any one part may be the target of a cyberattack. By inserting malware into the software, exploiting vulnerabilities, or initiating cyber attacks, including denial-of-service attacks, cyber attackers can access the drone's control system unauthorised. Drones' onboard computers produce an immense amount of data, some of which may be very confidential. Data breaches and privacy violations can occur if this information is not encrypted or maintained securely.
Article
Full-text available
The rapid advancement of fifth-generation (5G)-and-beyond networks coupled with unmanned aerial vehicles (UAVs) has opened up exciting possibilities for diverse applications and cutting-edge technologies, revolutionizing the way connections, communications, and innovations unfold in the digital age. This paper presents a comprehensive survey of the deployment scenarios, applications, emerging technologies, regulatory aspects, research trends, and challenges associated with the use of UAVs in 5G-and-beyond networks. It begins with a succinct background and motivation, followed by a systematic UAV classification and a review of relevant works. The survey covers UAV deployment scenarios, including single and multiple UAV configurations. The categorization of UAV applications in 5G is presented, along with investigations into emerging technologies for enhancing UAV communications. Regulatory considerations encompassing flight guidelines, spectrum allocation, privacy, and safety are discussed. Moreover, light is shed on the latest research trends and open challenges in the field, with promising directions for future investigations identified, concluding with a summary of key findings and contributions. This survey serves as a valuable resource for researchers, practitioners, and policymakers in the UAV and communication domains. Additionally, it offers a comprehensive foundation for informed decision-making, fostering collaboration, and driving advancements in UAV and communication technologies to address the evolving needs of our interconnected world.
Article
Full-text available
Unmanned aircraft systems (UAS), or unmanned aerial vehicles, often referred to as drones, have been experiencing healthy growth in the United States and around the world. The positive uses of UAS have the potential to save lives, increase safety and efficiency, and enable more effective science and engineering research. However, UAS are subject to threats stemming from increasing reliance on computer and communication technologies, which place public safety, national security, and individual privacy at risk. To promote safe, secure, and privacy-respecting UAS operations, there is an urgent need for innovative technologies for detecting, tracking, identifying, and mitigating UAS. A Counter-UAS (C-UAS) system is defined as a system or device capable of lawfully and safely disabling, disrupting, or seizing control of an unmanned aircraft or UAS. Over the past five years, significant research efforts have been made to detect, and mitigate UAS: detection technologies are based on acoustic, vision, passive radio frequency, radar, and data fusion; and mitigation technologies include physical capture or jamming. In this tutorial, we provide a comprehensive survey of existing literature in the area of C-UAS, identify the challenges in countering unauthorized or unsafe UAS, and evaluate the trends of detection and mitigation for protecting against UAS-based threats. The objective of this tutorial is to present a systematic introduction of C-UAS technologies, thus fostering a research community committed to the safe integration of UAS into the airspace system.
Article
Full-text available
The demand for wireless connectivity has grown exponentially over the last few decades. Fifth-generation (5G) communications, with far more features than fourth-generation communications, will soon be deployed worldwide. A new paradigm of wireless communication, the sixth-generation (6G) system, with the full support of artificial intelligence, is expected to be implemented between 2027 and 2030. Beyond 5G, some fundamental issues that need to be addressed are higher system capacity, higher data rate, lower latency, higher security, and improved quality of service (QoS) compared to the 5G system. This paper presents the vision of future 6G wireless communication and its network architecture. This article describes emerging technologies such as artificial intelligence, terahertz communications, wireless optical technology, free-space optical network, blockchain, three-dimensional networking, quantum communications, unmanned aerial vehicles, cell-free communications, integration of wireless information and energy transfer, integrated sensing and communication, integrated access-backhaul networks, dynamic network slicing, holographic beamforming, backscatter communication, intelligent reflecting surface, proactive caching, and big data analytics that can assist the 6G architecture development in guaranteeing the QoS. Besides, expected applications with 6G communication requirements and possible technologies are presented. We also describe potential challenges and research directions for achieving this goal.
Article
Full-text available
With the development of Unmanned Air Vehicle (UAV) communication, Flying Ad Hoc Network (FANET) has become a hot research area in recent years, which is widely used in civil and military fields due to its unique advantages. FANET is a special kind of networks which are composed of UAV nodes, and can be used to implement data transfer in certain unique scenarios. To achieve reliable and robust communication among UAVs, a routing algorithm is the key factor and should be designed elaborately. Because of its importance and usefulness, this topic has attracted many researchers, and various routing protocols have also been put forward to improve the quality of data transmission in FANETs. Thus, in this paper, we give a survey on the state-of-the-art of routing protocols proposed in recent years. First, an in-depth research of the routing in FANETs recently has been brought out by absolutely differentiating them based on their routing mechanism. Then, we give a comparative analysis of each protocol based on their characteristics and service quality indicators. Finally, we propose some unsolved problems and future research directions for FANET routing.
Article
Full-text available
A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typically, prone to security lapses because of limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such limitations hinder the applicability of standard cryptographic techniques. Thus, assuring confidentiality and authentication on part of small UAV remains a far-fetched goal. We aim to address such an issue by proposing an identity-based generalized signcryption scheme. The lightweight security scheme employs multiaccess edge computing (MEC) whereby the primary UAV, as a MEC node, provides offloading to the computationally fragile member UAVs. The scheme is based on the concept of the hyperelliptic curve (HEC), which is characterized by a smaller key size and is, therefore, suitable for small UAVs. The scheme is robust since it offers confidentiality and authentication simultaneously as well as singly. Formal as well as informal security analyses and the validation results, using the Automated Validation for Internet Security Validation and Application (AVISPA) tool, second such notion. Comparative analysis with the existing schemes further authenticates the sturdiness of the proposed scheme. As a case study, the scheme is applied for monitoring crops in an agricultural field. It has been found out that the scheme promises higher security and incurs lower computational and communication costs.
Article
Full-text available
We introduce a new approach for Search-and-Rescue Operations (SAROs) to search for survivors after large-scale disasters, assuming the wireless communication network cells are partially operational and exploiting the recent trend of using Unmanned Aerial Vehicles (UAVs) as a part of the network. These SAROs are based on the idea that almost all survivors have their own wireless mobile devices, called User Equipments (UEs), which serve as human-based sensors on the ground. Our approach is aimed at accounting for limited UE battery power while providing critical information to first responders: 1) generate immediate crisis maps for the disaster-impacted areas, 2) provide vital information about where the majority of survivors are clustered/crowded, and 3) prioritize the impacted areas to identify regions that urgently need communication coverage.
Article
The recent advancements in unmanned aerial vehicles (UAVs) upsurges its usages in commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs are vulnerable to being destroyed, lost, or stolen in case of security breaches of its network. The network management of UAVs is a crucial task due to its high mobility, which necessitates UAV network softwarization. Then, it becomes indispensable that allows the separation of control functions (i.e., control plane data) from hardware for smooth execution of complex operations. Further, UAV uses the Internet (an open channel) for communication in its complex system that raises a network security concern. The well-known softwarization techniques, i.e., software-defined networking (SDN) and network function virtualization (NFV) can be used to accomplish the secure network services on less expense. Conversely, these softwarization techniques may suffer from various threats like access control, user authentication, controller hijacking, and many more attack. The existing solutions are using a centralized system, which is having a single point of failure issue and vulnerable to security threats. Motivated from these facts, we present a comprehensive and systematic survey on the blockchain-based softwarization for a secure UAV network. Then, we propose a blockchain-enabled UAV softwarization architecture for secure communication and network management. It provides dynamic, flexible, and on-the-fly decision capabilities for communication services over the UAV network. Eventually, we analyzed the open research issues and challenges for future research directions in this emerging area.
Article
With the advancement in drone technology, in just a few years, drones will be assisting humans in every domain. But there are many challenges to be tackled, communication being the chief one. This paper aims at providing insights into the latest UAV (Unmanned Aerial Vehicle) communication technologies through investigation of suitable task modules, antennas, resource handling platforms, and network architectures. Additionally, we explore techniques such as machine learning and path planning to enhance existing drone communication methods. Encryption and optimization techniques for ensuring long−lasting and secure communications, as well as for power management, are discussed. Moreover, applications of UAV networks for different contextual uses ranging from navigation to surveillance, URLLC (Ultra-reliable and low−latency communications), edge computing and work related to artificial intelligence are examined. In particular, the intricate interplay between UAV, advanced cellular communication, and internet of things constitutes one of the focal points of this paper. The survey encompasses lessons learned, insights, challenges, open issues, and future directions in UAV communications. Our literature review reveals the need for more research work on drone−to−drone and drone−to−device communications.
Article
In this paper, we consider an Internet of unmanned aerial vehicles (UAVs) over cellular networks, where UAVs work as aerial users to collect various sensory data, and send the collected data to their transmission destinations over cellular links. Unlike the terrestrial users in the conventional cellular networks, different UAVs have various communication requirements due to their sensing applications, and a more flexible communication framework is in demand. To tackle this problem, we propose a UAV-to-Everything (U2X) networking, which enables the UAVs to adjust their communication modes full dimensionally according to the requirements of their sensing applications. In this article, we first introduce the concept of U2X communications, and elaborate on its three communication modes. Afterwards, we discuss the key techniques of the U2X communications, including joint sensing and transmission protocol, UAV trajectory design, and radio resource management. A reinforcement learning-based mathematical framework for U2X communications is then proposed. Finally, the extensions of the U2X communications are presented.