Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Drones in Smart-Cities: Security and Performance
Drones in Smart-Cities: Security and Performance
Drones in Smart-Cities: Security and Performance
Ebook416 pages5 hours

Drones in Smart-Cities: Security and Performance

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Drones in Smart-Cities: Security and Performance is the first book dedicated to drones in smart cities, helping address the many research challenges in bringing UAVs into practice. The book incorporates insights from the latest research in Internet of Things, big data, and cloud computing, 5G, and other communication technologies. It examines the design and implementation of UAV, focusing on data delivery, performability, and security. Intended for researchers, engineers, and practitioners, Drones in Smart-Cities: Security and Performance combines the technical aspects with academic theory to help implement the smart city vision around the globe.

  • Addresses UAV and IoT for smart cities applications
  • Examines topics as UAV safety, challenges, localization methods. QoS, simulation tools, and more
  • Collect the relevant knowledge in one resource, saving research time and effort
LanguageEnglish
Release dateJun 4, 2020
ISBN9780128204306
Drones in Smart-Cities: Security and Performance

Related to Drones in Smart-Cities

Related ebooks

Social Science For You

View More

Related articles

Reviews for Drones in Smart-Cities

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Drones in Smart-Cities - Fadi Al-Turjman

    Drones in Smart-Cities

    Security and Performance

    Edited by

    Fadi Al-Turjman

    Professor, Department of Artificial Intelligence

    Near East University

    Nicosia, Mersin 10, Turkey

    Contents

    Cover

    Title page

    Copyright

    Dedication

    Contributors

    Preface

    Chapter One: Aerial and underwater drone communication: potentials and vulnerabilities

    Abstract

    1. Introduction

    2. Main communication technologies in UWC and UAV

    3. Aerial vehicle communication

    4. Aerial vehicle control architecture

    5. Path planning

    6. Machine learning and artificial intelligence technologies

    7. Vision-based technologies

    8. UAV attacks

    9. Phases of UAV networks

    10. UAV challenges and main issues in underwater RF communication

    11. Discussions and open issues

    12. Conclusion and future work

    Chapter Two: Machine learning for cyber security frameworks: a review

    Abstract

    1. Introduction

    2. Machine learning tasks

    3. Cyber security tasks

    4. Machine learning approaches for cyber security

    5. The effectiveness of machine learning in cyber security

    6. Conclusion

    Chapter Three: Emerging use of UAV’s: secure communication protocol issues and challenges

    Abstract

    1. Introduction

    2. Unmanned aerial vehicles (UAVs)

    3. Ground control station (GCS)

    4. Types of UAVs

    5. Communication protocols for UAVs

    6. Critical analysis of these protocols

    7. Discussion

    8. Conclusion

    9. Future work

    Chapter Four: A survey study on MAC and routing protocols to facilitate energy efficient and effective UAV-based communication systems

    Abstract

    1. Introduction

    2. Routing protocols for UAVs

    3. Data delivery models in UAVs

    4. MAC protocols for UAVs

    5. Conclusion

    Chapter Five: UAVs: communication aspects and cellular service provisioning

    Abstract

    1. Introduction

    2. System model

    3. Performance analysis

    4. Results

    5. Conclusion

    Chapter Six: AI simulations and programming environments for drones: an overview

    Abstract

    1. Introduction

    2. Why simulators are important in drones

    3. Where it is applicable

    4. Simulation environments

    5. Artificial intelligence types and issues

    6. Applications

    7. Other assessment methods

    8. Open research issues

    9. Conclusion

    Chapter Seven: Smart agriculture framework using UAVs in the Internet of Things era

    Abstract

    1. Introduction

    2. System model

    3. The smart framework

    4. Discussions

    5. Concluding remark

    Chapter Eight: Coastline change determination using UAV technology: a case study along the Konyaaltı coast, Antalya, Turkey

    Abstract

    1. Introduction

    2. Study area

    3. Methodology

    4. Results and discussion

    5. Summary and conclusions

    Chapter Nine: Explorative analysis of AUV-aided cluster-based routing protocols for Internet of intelligent underwater sensors

    Abstract

    1. Introduction

    2. Internet of intelligent underwater sensor networks (IoIUSN) application: AUV-aided WQM

    3. CBR protocols for UWSN

    4. Results and discussion

    5. Conclusion

    Acknowledgments

    Chapter Ten: Physics of stabilization and control for the Drone’s quadrotors

    Abstract

    1. Introduction

    2. Momentum theory of rotors

    3. Control techniques

    4. Hardware

    5. Conclusion

    Chapter Eleven: Critical analysis of security and privacy challenges for the Internet of drones: a survey

    Abstract

    1. Introduction

    2. Related works: security challenges

    3. Conclusions and future works

    Index

    Copyright

    Elsevier

    Radarweg 29, PO Box 211, 1000 AE Amsterdam, Netherlands

    The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom

    50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States

    Copyright © 2020 Elsevier Inc. All rights reserved.

    No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

    This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

    Notices

    Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

    Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

    To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

    Library of Congress Cataloging-in-Publication Data

    A catalog record for this book is available from the Library of Congress

    British Library Cataloguing-in-Publication Data

    A catalogue record for this book is available from the British Library

    ISBN: 978-0-12-819972-5

    For information on all Elsevier publications visit our website at https://www.elsevier.com/books-and-journals

    Publisher: Joe Hayton

    Acquisitions Editor: Brian Romer

    Editorial Project Manager: Ali Afzal-Khan

    Production Project Manager: Swapna Srinivasan

    Designer: Mark Rogers

    Typeset by Thomson Digital

    Dedication

    To the best parents.

    To Sinem and the little beautiful stars.

    Love you all.

    Fadi Al-Turjman

    Contributors

    Emmanuel Adewale Adedokun,     Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria

    Hamit Altiparmak,     Department of Computer Engineering, Near East University, Nicosia, Mersin, Turkey

    Fadi Al-Turjman,     Department of Artificial Intelligence Engineering, Research Centre for AI and IoT, Near East University, Nicosia, Mersin, Turkey

    Habeeb Bello-Salau,     Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria

    Sarfraz Nawaz Brohi,     School of Computing and Information Technology (SOCIT), Taylors University, Subang Jaya, Selangor, Malaysia

    Bakkiam David Deebak,     School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India

    Kamil Dimililer,     Department of Electrical and Electronic Engineering, Research Centre for AI and IoT, Near East University, Nicosia, Cyprus, Mersin, Turkey

    Krishna Doddapaneni,     Amazon Web Services, San Francisco, CA, United States

    Eustace M. Dogo,     Institute for Intelligent Systems, University of Johannesburg, Johannesburg, South Africa

    Enver Ever,     Computer Engineering, Middle East Technical University, Northern Cyprus Campus, Mersin, Turkey

    Syed Ali Hassan,     School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan

    Galip Savas Ilgi,     Information Systems Engineering Department, Faculty of Engineering, and Research Centre for Artificial Intelligence in IoT, Near East University, Nicosia, Mersin, Turkey

    Muhammad Asim Jan,     School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan

    Noor Zaman Jhanjhi,     School of Computing and Information Technology (SOCIT), Taylors University, Subang Jaya, Selangor, Malaysia

    Haejoon Jung,     Department of Information and Telecommunication Engineering, Incheon National University, Incheon, Korea

    Navid Ali Khan,     School of Computing and Information Technology (SOCIT), Taylors University, Subang Jaya, Selangor, Malaysia

    Yoney Kirsal Ever,     Software Engineering Department, Faculty of Engineering, and Research Centre for Artificial Intelligence in IoT, Near East University, Nicosia, Mersin, Turkey

    Yoney Kirsal-Ever,     Research Centre for AI and IoT, Near East University, Nicosia, Cyprus, Mersin, Turkey

    Ali Danandeh Mehr,     Civil Engineering Department, Antalya Bilim University, Antalya, Turkey

    Anand Nayyar,     School of Computing and Information Technology (SOCIT), Taylors University, Subang Jaya, Selangor, Malaysia

    Ezekiel T. Ogidan,     Research Centre for AI and IoT, Near East University, Nicosia, Cyprus, Mersin, Turkey

    Oluwaseun Priscilla Olawale,     Department of Software Engineering, Research Center for AI and IoT, Near East University, Nicosia, Mersin, Turkey

    Bashir Olaniyi Sadiq,     Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria

    Abdulazeez Femi Salami,     Department of Computer Engineering, University of Ilorin, Ilorin, Nigeria

    Hanifa Teimourian,     Department of Electrical and Electronic Engineering; Department of Artificial Intelligence Engineering, Research Centre for AI and IoT, Near East University, Nicosia, Mersin, Turkey

    Rifat Tur,     Civil Engineering Department, Akdeniz University, Antalya, Turkey

    Levent Uzunsakal,     Civil Engineering Department, Akdeniz University, Antalya, Turkey

    Preface

    Security and Drones have been considered as a complementary package toward realizing the emerging smart-cities paradigm. From this perspective, it is essential to understand the role of these significant components, which will provide a comprehensive vision for the worldwide smart city project in the near future. It is also essential to consider the emerging Drones-based intelligent applications for better lifestyle and more optimized solutions in our daily life.

    The objective of this book is to overview the existing Drone-based Smart-cities applications while focusing on security issues/challenges. The main focus is on the Drones-based intelligence aspects that can help in realizing such paradigm in a secured way. The Artificial Intelligent (AI) techniques as well as the new emerging technologies such as the Internet of Things (IoT) accompanied with critical evaluation metrics, constraints, and open research issues are included for discussion. This conceptual book, which is unique in the field, will assist researchers and professionals working in the area to better assess the proposed Drone-based Smart cities paradigms, which have already started to appear in our societies.

    Hope you enjoy it...

    Fadi Al-Turjman

    Chapter One

    Aerial and underwater drone communication: potentials and vulnerabilities

    Bakkiam David Deebaka

    Fadi Al-Turjmanb

    a    School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India

    b    Department of Artificial Intelligence Engineering, Research Centre for AI and IoT, Near East University, Nicosia, Mersin, Turkey

    Abstract

    In the past, unmanned aerial vehicles (UAV) has become a hot topic for the development of research application systems. It has the real-time applications namely surveillance, camerawork in movies, communication, transportation, agriculture, delivery of goods, and for the remote rescue operations in various application scenarios. Navigation tool uses drones to address the challenges of technologies including both hardware and software. Therefore UAV and drone communication is important to study potential uses, strategies, vulnerabilities, and solution. This survey reports the characteristics and requirements of UAV networks to envision the civil applications in use of navigation. It is encompassed of both indoor and outdoor aspects, such as control, hardware, algorithms, path-planning, and communication requirements. This work includes machine learning and artificial intelligence for autonomous drone navigation. They use vision-based navigation like locality sensors and camera to discuss the features of security and safety. In addition, this work presents the review of drone navigation methods and its applications, focusing on modern network platform. Of late, a lot of applications have been developed using aerial vehicles as a pivot. This development provides vast range of support to modern computing applications such as urban computing, Internet of Things, ubiquitous computing, and Internet. These applications use UAV to complete any complex task. However, providing secure communication for aerial vehicles is not an easy task because of its easy customization and synchronization to the wide vast range of computing applications. These communication nodes are prone to coagulation attack, which is derived from the clotting properties of fluids. In this paper, the concept, issues, challenges, and research aspects for coagulation attack is thoroughly studied. In order to monitor different phenomenal activities in an underwater environment, such as environmental impact surveillance, marine life, oil and gas exploration. Underwater Wireless Communication (UWC) is nowadays becoming an important field for optical, acoustic, and electromagnetic waves to transmit the data on UWC. The possible UWC techniques include experimental observation, data collection and analysis, underwater navigation, disaster prevention and early detection warning of a tsunami using wireless communication. Above all, this work presents an overview, main initiatives and up-to-date contributions of UWC techniques, that is, underwater wireless optical communication, underwater wireless acoustic communication, and underwater electromagnetic transmission. In addition, the emerging technologies summarize the challenges of UWC, future research directions and recommendations using sixth generation network.

    Keywords

    UAV

    drone

    path planning

    autonomous navigation

    communication

    vision-based 15 navigation

    underwater wireless acoustic communication (UWAC)

    underwater electromagnetic radio frequency communication (UWRF)

    underwater optical communication (UWOC)

    5G wireless communication

    Chapter outline

    1 Introduction

    1.1 Motivation

    1.2 Modern computing systems: cyberattacks

    2 Main communication technologies in UWC and UAV

    2.1 Seawater categorization

    3 Aerial vehicle communication

    4 Aerial vehicle control architecture

    5 Path planning

    6 Machine learning and artificial intelligence technologies

    7 Vision-based technologies

    8 UAV attacks

    9 Phases of UAV networks

    10 UAV challenges and main issues in underwater RF communication

    11 Discussions and open issues

    11.1 Most common Issues in underwater acoustic communication

    11.2 Applicability and applications

    11.3 Applications based on machine learning

    12 Conclusion and future work

    References

    1. Introduction

    An autonomous-based unmanned aerial vehicles known as drones has gained more attention for boarder surveillance, disaster monitoring, and relay communication [1,2]. An aircraft without pilot on board is particularly aimed to ease deployment complexity, low acquirement and maintenance cost. The development activities address the control issues related to robustness, stability and maneuverability. In general, the autonomous vehicles are capable of minimum user interaction to collaborate with UAV communication system. The vehicular applications connect multiple smart aerials over networks to meet the time critical missions. However, they have limited data payload and energy. They can autonomously fly through flight plans controlled by software or controlled by a remote control. Generally speaking, navigation refers to the activity or process to accurately determine one's position and plans to follow a path routing. Hence, drone navigation can be the field of research focusing on system development to measure the position and lay down an effective path plan for drones. It is the key to develop the next generation autonomous drones. They may be helpful to reach the areas beyond the reach of human being.

    In such situations, they are engaged in critical operations such as disaster monitoring [3], surveillance, transportation, agriculture [4], forestry, and environment protection [5]. Farmers use drones to map out their crops in order to check irrigation systems, and also determine which areas of crops are impaired to make proper treatment accordingly. Drones have also been used by many retailers like Amazon to deliver the products. They are also heavily used in movie industries to cover the beautiful cinematic shots. Nowadays, it is easily available for everyone to purchase and access at low prices to boot. Initially, the independent drones are deployed in such situations owing to the advancement in drone and communication technologies. Multiple drones perform the critical operations to experience proper synchronization. More UAV are being employed in civil applications due to high mobility and flexibility.

    However, in some complex environments, UAV cannot sense the environment parameters due to limited communication and traditional sensor perception capabilities. Despite many efforts to overcome these weaknesses, it is still necessary to develop more efficient and effective method in order to perform more stability, predictability, and security. Therefore, high performance independent navigation is of great importance to develop the application of UAV as shown in Fig. 1.1. The control of each drone falls on pilot to use visual tracking to determine position and orientation. More advanced drones use global positioning system (GPS) receivers to play a significant role, that is, navigation and control loop. Some smart features include drone memorization to track the position track. The trajectory of the drone can be predetermined to establish GPS waypoints. When this function is executed, the drone will use autopilot to follow this path.

    Figure 1.1   High-level design architecture for drone communication.

    1.1. Motivation

    This paper aims at providing all recent developments in various communication fields of drone navigation on one platform. So as to gain knowledge about developments in the field, we are trying to contribute the state-of-art concepts. The motivation of this work is derived from vast applications to possess. A flying robot can be used to perform data collection and patrolling [3]. Multiple microaerial vehicles (M-MAVs) can be used to extend joint search and rescue after disaster situations [4]. Mini drones can be perceived through the distinct sound and can act as an HCI for navigating visually impaired persons [6]. Mid-air displays can be used in scenarios like controlling large crowds in emergency situations, navigation in crowd gatherings like sports [7]. The paper is divided into eight major domains that together comprise navigation systems of a drone. This includes ML-, AI- and vision-based technologies, control systems, communication systems, path planning, and autonomous navigation [8,9]. Shakhatreh et al. [10] identifies the application areas and its related domain functionalities to signify the key factors of public safety and civil security. From Table 1.1, a comprehensive overview is summarized to realize the deficiency factors of application domains.

    Table 1.1

    GD, Goods Delivery/ Logistics; INT, Surveillance; RS, Remote Sensing; RTM, Real Time Monitoring; SAR, Search and Rescue; SI, Structural Inspection; WAN, Wide Area Network

    M-MAV provides diversity to observe and sense the environment, which improves data reliability and fault tolerance. The design challenges are highly extended to meet the goals of civil applications. Some research challenges are associated with on-board sensors, embedded hardware and software that exchange the data over wireless channel. Importantly, communication networks have been a source of interconnected systems for effective data sharing. Modern day networks have extended their limits for effective data transmission. UAVs have gained a lot of attention over a decade. These vehicles use UAV as network nodes to represent a real-world case study to investigate distributed and centralized approaches [17]. The applications of existing network envision to illustrate the time-critical applications, that is, for real-time support. In cooperative mode, multiple UAVs have further introduced as new network node that behaves as traditional networks to operate.

    1.2. Modern computing systems: cyberattacks

    Modern computing applications such as Urban Computing, Internet of Things, Ubiquitous Computing, and the Internet for All have sought applications of UAVs to attain complex tasks [18–21]. However, the rapid usage and its related issues could not ensure better robustness and fault-free networks. Security is one of the major issues for all types of aerial networks. A lot of network attacks have been addressed for vulnerability assessments that may be cooperative to identify the possible threats on an aerial network [22–25]. Security has always been a concern for UAV. Trustworthy and secure communication system is the major demand of unmanned aerial vehicle systems [26,27]. In the past, the concept of attacks in UAVs has been studied for cyber-physical systems. UAVs incorporate cyber systems to analyze various possible attacks and countermeasures [28]. Cyber attacks can heavily impact the operations of regular aerial vehicles affecting process of autopilot systems [29]. In autopilot systems, vulnerability may cause severe devastation effects resulting in fatal incidents [30]. False data injection is the major defect of cyberattacks that may influence a crucial issue with drone delivery system [31].

    The cyberattacks can damage the entire business model to transform the aerial vehicles as potential attackers [32]. This paper introduces a new attack that proves as an intruder for the whole networks. This attack is termed as antidrone cyberattacks for target systems. The attack derives its name from both cyber and physical system properties. With an ease of reconfigurability and availability, this type of attack has full possibilities to affect the whole networks. In this paper, the concept of antidrone cyberattacks, issues in handling them, various research aspects and simulative case study have been discussed that focus on robust and fault-free connectivity over networked UAVs. Of late, global warming has become an open issue that gradually unfreezes the polar ice caps causing rise of sea level. Underwater Wireless Communication (UWC) provides a support for surveillance of boarder security especially for military purposes and commercially useful for the detection of natural resources in underwater.

    Moreover, it is helpful to map and discover the unobserved underwater region. Nowadays, it is using for experimental observation, data collection, and analysis, underwater navigation, disaster prevention, and early detection warning of tsunami [33]. Optical, acoustic and radio frequency (RF) wireless carriers are considered to envisage UWC in underwater applications. Deploying UWC techniques in an unexplored water medium are highly challenging as compared to terrestrial wireless communication [34]. However, quality and reliability of data transmission in shallow and deep water completely depends on physical characteristics of water medium [35]. The UWC quality of service (QoS) depends on water medium and physical characteristic of electromagnetic radio frequency, optical and acoustic waves. UWC plays a significant role in underwater application on wireless communication network.

    The deployment of configurations in underwater system consist of fixed and anchored sensor nodes with the sea bed, floating unmanned under-water vehicle nodes or autonomous underwater vehicle, signal receiver processing towers, floating devices (buoy) submarines, ship, and onshore base station [36]. Underwater wireless optical communication (UWOC) has less explored and rather difficult to deploy than acoustic propagation in underwater [37]. The existing underwater wireless acoustic communication (UWAC) has limited performance of low bandwidth, latency and multipath propagation in water medium [38]. Electromagnetic (EM) waves, in RF 3 Hz–3 kHz ranges are capable for high data acquisition and transformation

    Enjoying the preview?
    Page 1 of 1