Title
On Understanding the Impact of RTT in the Mobile Network for Detecting the Rogue UAVs
Abstract
In recent times, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Unmanned-aerial-vehicles</i> (UAVs) have grasped significant attentions for performing various operations without a constant intervention of the human users. Due to the power and computing constraints, however, it is difficult for an UAV to perform all the tasks independently. Hence, to achieve its goals, a UAV may share various sensitive data with the nearest edge servers through some <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">access points</i> (APs). Prior to sending any sensitive information through an AP, it is very important for an UAV to determine the authenticity of the selected AP. In this paper, we have applied a <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">timing-based</i> algorithm for spotting rogue APs by the UAVs − while selecting an edge server. The timing-based algorithm does not require any additional hardware or any change in the network protocol for detection purpose. This fact, in turn, reduces the effort from UAV’s side for detecting a breach. An extensive experimental study shows that with a little manipulation in speed, an UAV can detect the presence of any rogue AP almost every time with only 6% false-positive rate.
Year
DOI
Venue
2020
10.1109/TCCN.2020.3004583
IEEE Transactions on Cognitive Communications and Networking
Keywords
DocType
Volume
UAV,rogue access point,edge-server,wireless communication,mobile network,round trip time
Journal
6
Issue
ISSN
Citations 
4
2332-7731
0
PageRank 
References 
Authors
0.34
0
7
Name
Order
Citations
PageRank
Nilesh Chakraborty1228.33
Yao Chao200.68
Chengwen Luo319321.49
Jian-qiang Li443348.60
Pan Ziying500.34
Jie Chen639265.58
Yi Pan72507203.23