Autonomous Flying Ad-Hoc Networks
Inbunden, Engelska, 2025
Av Taskeen Zaidi, Adarsh Kumar, Saurav Mallik, Keshav Kaushik, Taskeen (Jain University) Zaidi, Adarsh (University of Petroleum and Energy Studies) Kumar, Saurav (University of Arizona) Mallik, Keshav (University of Petroleum and Energy Studies) Kaushik
2 469 kr
Produktinformation
- Utgivningsdatum2025-10-10
- Mått160 x 237 x 24 mm
- Vikt680 g
- FormatInbunden
- SpråkEngelska
- Antal sidor288
- FörlagJohn Wiley & Sons Inc
- ISBN9781394231058
Tillhör följande kategorier
Taskeen Zaidi, PhD works in the School of Computer Science and Information Technology at Jain University with over 12 years of research and teaching experience. She has published over 40 research papers in international journals, conferences, and workshops. Her areas of interest include cloud computing, ad-hoc networks, distributed computing, and mobile application development. Adarsh Kumar, PhD is an associate professor in the School of Computer Science at the University of Petroleum and Energy Studies. He has published over 120 research papers in reputed journals, conferences, and workshops. His primary research interests include cybersecurity, cryptography, network security, and ad-hoc networks. Saurav Mallik, PhD is a research scientist in the Department of Pharmacology and Toxicology at the University of Arizona. He has edited one book and coauthored over 82 research papers in peer-reviewed international journals, conferences, and book chapters. His research areas include data mining, computational biology, bioinformatics, biostatistics, and machine learning. Keshav Kaushik, PhD is an assistant professor in the Systemic Cluster under the School of Computer Science at the University of Petroleum and Energy Studies with over eight years of teaching experience. He has edited over ten books and published over 65 research papers in international journals and conferences. His research focuses on cybersecurity, digital forensics, and the Internet of Things.
- Preface xv1 Research Perspectives of Various Routing Protocols for Flying Ad Hoc Networks (FANETs) 1Kanthavel R., Adline Freeda R., Anju A., Dhaya R. and Frank Vijay1.1 Introduction 21.2 Unmanned Aerial Vehicles 31.3 FANET Characteristics 51.4 Routing Protocols for FANETs 61.5 Communication Pedagogy for FANETs 71.6 Challenges and Applications of FANET Configuration 91.6.1 Issues and Challenges in FANETs 91.6.2 Applications for FANETs 101.6.2.1 Multilevel-UAV Collaboration 101.6.2.2 UAV-to-Ground Cooperation 111.6.2.3 UAVs in VANETs 121.7 Conclusion 12References 132 Exploring Quantum Cryptography, Blockchain, and Flying Ad Hoc Networks: A Comprehensive Survey with Mathematical Analysis 15Tarun Kumar Vashishth, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary and Rajneesh Panwar2.1 Introduction to Quantum Cryptography 162.1.1 Quantum Mechanics Primer 162.1.2 Genesis of Quantum Cryptography 162.2 Quantum Key Distribution 162.2.1 Components of Quantum Key Distribution 172.2.2 Key Aspects and Security 182.2.3 Challenges and Practical Considerations 182.2.4 Applications 182.3 Literature Review 192.4 Blockchain Technology: Enhancing Security and Transparency 202.4.1 Decentralization and Consensus Mechanisms 212.4.2 Enhancing Security 212.4.3 Transparency and Auditability 232.4.4 Use Cases 242.4.5 Challenges and Prospects 252.4.6 Synergy Between Quantum Cryptography and Blockchain 262.5 Flying Ad Hoc Networks: A Dynamic Communication Infrastructure 282.5.1 Key Characteristics and Components 282.5.2 Challenges and Considerations 292.5.3 Applications 302.5.4 Convergence of Quantum Cryptography, Blockchain, and FANETs 302.6 Future Directions and Challenges 322.6.1 Future Directions 322.6.2 Challenges 332.7 Conclusion 33References 343 A Survey on Security Issues, Challenges, and Future Perspectives on FANETs 37Syed Mohd Faisal, Wasim Khan, Mohammad Ishrat and Taskeen Zaidi3.1 Introduction 383.2 Architecture of FANET 403.3 Unmanned Aerial Vehicle Classification 443.3.1 Classification of UAVs According to the Size 463.3.1.1 Very Small UAVs 463.3.1.2 Small UAVs 483.3.1.3 Medium UAV 513.3.1.4 Large UAVs 523.3.2 Classification of UAVs Based on Wing Type 533.3.2.1 Multi-Rotor Drones 533.3.2.2 Fixed-Wing Drones 533.3.2.3 Single-Rotor Helicopter Drones 553.3.2.4 Fixed-Wing Hybrid VTOL Drones 553.3.3 Classifications of Drones Based on Payload 563.3.3.1 Featherweight Drones 563.3.3.2 Lightweight Drones 563.3.3.3 Middleweight Drones 563.3.3.4 Heavy Lift Drones 563.4 Security Requirements 573.4.1 Confidentiality 573.4.2 Integrity 583.4.3 Availability 583.4.4 Authentication 583.4.5 Non-Repudiation 583.4.6 Authorization 583.4.7 Non-Disclosure 593.5 Routing Protocols 593.5.1 Static Routing Protocol 593.5.1.1 Load Carry and Deliver Routing 603.5.1.2 Multi-Level Hierarchical Routing Protocol 613.5.1.3 Data-Centric Routing 623.5.2 Proactive Routing Protocol 633.5.2.1 Destination Sequenced Distance Vector (DSDV) Routing Protocol 633.5.2.2 Optimized Link State Routing 643.5.3 Reactive Routing Protocol 653.5.3.1 Dynamic Source Routing Protocol 663.5.3.2 Ad Hoc On-Demand Distance Vector Routing Protocol 663.5.3.3 Time-Slotted On-Demand Routing Protocol 673.5.4 Hybrid Routing Protocols 673.5.4.1 Zone Routing Protocol 673.5.4.2 Temporarily Ordered Routing Algorithm 683.5.5 Geographic-Based Routing Protocols 683.5.5.1 Greedy Perimeter Stateless Routing 693.5.5.2 Mobility-Oriented Geographical Routing 693.5.6 Hierarchical Routing Protocols 693.5.7 Mobility Prediction Clustering Algorithm 693.5.8 Clustering Algorithm 703.6 Security Issues and Countermeasures in FANET 703.6.1 Sensor Level Security Issues 703.6.1.1 Vulnerabilities and Treats 703.6.1.2 Sensor-Based Attacks 713.6.1.3 Defense Mechanisms Against Sensor-Based Attacks 723.6.2 Hardware Level Issues 733.6.2.1 Vulnerabilities and Threats 733.6.2.2 Hardware-Based Attacks 743.6.2.3 Defense Mechanisms Against Hardware- Based Attack 763.6.3 Software Level Issues 773.6.3.1 Vulnerabilities and Threats 783.6.3.2 Software-Level Attacks 783.6.3.3 Defense Mechanism Against Software- Based Attack 793.7 Conclusion 80References 814 Quantum Cryptography for Secure FANET 87Taskeen Zaidi and Neha S.Abbreviations 874.1 Introduction 884.2 Network Security Requirements 884.3 Security Threats 894.3.1 Taxonomy of Security Threats/Attacks 904.3.1.1 Denial of Service Attack 904.3.1.2 Modification and Fabrication Attacks 924.3.1.3 Routing Attacks 944.3.1.4 Other Attacks 954.3.2 Summary 974.4 Quantum Cryptography 1004.4.1 Quantum Cryptography Introduction 1004.4.2 QPKE Based FANET Model (Based on the Encryption Model Introduced by Yuqi Wang) 1014.5 Conclusion 104References 1045 A Review of Various Routing Protocols for FANET 105Nitya Nand Dwivedi5.1 Introduction 1055.2 Flying Ad Hoc Network Routing Protocol 1075.2.1 Static Routing 1075.2.2 Hierarchical Routing 1085.2.2.1 Data-Centric Routing 1085.2.2.2 Load, Carry, and Delivery Routing 1095.2.3 Proactive Routing 1095.2.3.1 Optimized Link State Routing 1095.2.3.2 Destination-Sequenced Distance Vector (dsdv) 1105.2.4 Reactive Routing 1105.2.4.1 Dynamic Source Routing 1115.2.4.2 Ad Hoc On-Demand Distance Vector 1115.2.5 Hybrid Routing 1115.2.5.1 Zone Routing Protocol 1125.2.5.2 Temporarily Ordered Routing Algorithm (tora) 1125.2.6 Geographic (or Position)-Based Routing 1125.2.6.1 DREAM (Temporarily Ordered Routing Algorithm) 1135.2.6.2 Location-Aided Routing 1135.2.6.3 Greedy Perimeter Stateless Routing 1135.2.6.4 AeroRP 1135.2.7 Cross-Layer Routing 1145.3 Conclusion 114References 1156 The Integration of the Internet of Things in FANET 119Ankur Chaudhary, Neetu Faujdar and Ritesh Rastogi6.1 Introduction 1206.1.1 Integration of IoT Technology with a FANET 1206.1.2 Overview of FANET and Its Applications 1216.1.3 Introduction of IoT and Its Relevance in FANET 1246.1.4 Importance of Integrating IoT with FANET for Enhanced Capabilities 1256.2 Fundamentals of FANETs 1276.2.1 Explanation of FANET Architecture and Operation 1296.2.1.1 Challenges in FANET Activity 1306.2.1.2 Activity of FANETs 1306.2.2 Explanation of FANET Architecture and Operation 1316.2.2.1 Key Characteristics and Difficulties of FANETs 1316.2.3 Use Cases and Advantages of a FANET in Various Industries 1326.2.3.1 Applications of a FANET 1326.2.3.2 Benefits of a FANET 1336.3 Introduction to the IoT 1346.3.1 Advantages of the IoT 1356.3.2 Difficulties of the IoT 1366.3.2.1 Definition and Core Principles of the IoT 1366.3.2.2 Components and Layers of the IoT Ecosystem 1386.4 Internet-of-Things-Enabled Communication in a FANET 1396.5 Internet-of-Things Communication Protocol 1416.5.1 Message Queuing Telemetry Transport 1416.5.2 Constrained Application Protocol 1416.5.3 Data Aggregation and Routing Strategies in IoT-Enabled FANET 1426.5.3.1 Methodologies of IoT-Enabled FANETs 1426.5.3.2 Methodologies of IoT-Empowered FANETs 1436.6 Conclusion 1436.6.1 Recap of the Key Points 1436.6.2 Potential Impact of IoT Integration on the Future of FANET 145Bibliography 1457 Enhancing Precision Agriculture Through Bio-Inspired Routing Protocols for Flying Ad Hoc Networks 149S. Nandhini and K. S. Jeen Marseline7.1 Introduction 1507.2 Precision Agriculture 1517.3 Bio-Inspired Routing Protocols for FANET 1527.3.1 Gray Wolf Optimization 1557.3.2 BAT Algorithm 1557.3.3 Sand Cat Swarm Optimization Algorithm 1557.3.4 Ant Colony Optimization Algorithm 1567.3.5 Bee Colony Optimization 1567.3.6 Firefly Optimization Algorithm 1577.3.7 Case Studies and Real-World Examples of FANET in Precision Agriculture 1577.3.7.1 Case Study 1 1577.3.7.2 Case Study 2 1577.3.7.3 Case Study 3 1587.3.7.4 Case Study 4 1587.3.7.5 Case Study 5 1587.4 Real-World Applications 1587.5 Conclusion 160References 1608 Disaster Recovery Management in FANETs 165Amit Kumar, Sachin Ahuja and Ganesh Gupta8.1 Introduction 1668.2 Related Work/Literature Survey 1678.3 Disaster Recovery Method of FANETs 1688.4 Proposed New Solutions for Improved Disaster Management in FANETs 1708.5 Conclusion 1728.6 Future Techniques for Disaster Recovery in FANETs 173Bibliography 1759 AI-Based Cybersecurity Opportunities and Issues on the IIoT 177Akashdeep Bhardwaj9.1 Introduction 1779.2 Application of AI in IIoT Cybersecurity 1799.2.1 Anomaly Detection 1809.2.2 Threat Intelligence 1819.2.3 Network Security 1829.2.4 User Behavioral Analysis 1839.2.5 Predictive Maintenance 1859.2.6 Fraud Detection 1869.2.7 Cybersecurity Automation 1879.3 Potential Benefits and Issues 1899.4 AI-Cybersecurity Use Cases 1919.4.1 Siemens 1929.4.2 Honeywell 1929.4.3 Darktrace 1939.4.4 Symantec 1949.4.5 Ibm 1959.5 Conclusion 196References 19710 Exploring the Synergy of Fog Computing and FANETs for Next-Generation Networking 199Akashdeep Bhardwaj10.1 Introduction 20010.2 Fog Computing and FANET 20510.3 Synergy Between Fog Computing and FANETs 20710.4 Integration Challenges 21310.5 Architectural Implications 21710.6 Deployment Considerations 22210.7 Conclusion 230References 23011 Quantum Cryptography and FANET Security 233M. G. Sumithra, R. Remya, Ashwini A., G. Dhivyasri and M. Manikandan11.1 Introduction 23311.1.1 How Does It Work? 23411.1.2 Difference Between Post-Quantum Cryptography and Quantum Cryptography 23511.1.3 Tomorrow’s Solution 23611.1.4 Flying Ad Hoc Network Security 23611.2 Components of a FANET 23611.2.1 Unmanned Aerial Vehicles 23611.2.2 Communication Hardware 23711.2.3 Routing Protocol 23711.2.4 Mobility 23711.2.5 Sensors and Payloads 23711.2.6 Autonomy and Control 23711.2.7 Energy Considerations 23811.2.8 Ground Control Station 23811.3 Characteristics of FANETS 23811.3.1 Mobility 23811.3.2 Decentralization 23811.3.3 Scalability 23811.3.4 Constraint to Resources 23811.4 Challenges in FANETS 23911.5 Applications of FANETS 23911.5.1 Search and Rescue 23911.5.2 Precision Agriculture 24011.5.3 Communication Relays 24011.5.4 Military and Defense 24111.6 Quantum Computing in FANET Security 241Conclusion 242References 242About the Editors 245Index 247
Du kanske också är intresserad av
Blockchain, IoT, and AI Technologies for Supply Chain Management
Priyanka Chawla, Adarsh Kumar, Anand Nayyar, Mohd Naved, Priyanka (Lovely Professional University) Chawla, Adarsh (University of Petroleum and Energy Studies) Kumar, Vietnam) Nayyar, Anand (Duy Tan University, India) Naved, Mohd (Amity Uni., Noida
2 179 kr
Blockchain, IoT, and AI Technologies for Supply Chain Management
Priyanka Chawla, Adarsh Kumar, Anand Nayyar, Mohd Naved, Priyanka (Lovely Professional University) Chawla, Adarsh (University of Petroleum and Energy Studies) Kumar, Vietnam) Nayyar, Anand (Duy Tan University, India) Naved, Mohd (Amity Uni., Noida
829 kr