Sahil Garg
Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks
Garg, Sahil; Aujla, Gagangeet Singh; Kumar, Neeraj; Batra, Shalini
Authors
Dr Gagangeet Aujla gagangeet.s.aujla@durham.ac.uk
Associate Professor in Computer Science
Neeraj Kumar
Shalini Batra
Abstract
Unmanned aerial vehicles (UAVs) networks are attack-prone networks due to high mobility and distributed nature. Most of the existing approaches focus on prevention instead of analyzing the security vulnerabilities. For an efficient analysis, the interaction between attackers and defenders need to be investigated. Hence, a tree-based attack-defense model for security analysis of multi-UAV networks has been discussed in this paper. An attack-defense tree has been designed that depicts every move of the defender with respect to the attacker's strategies. Using this attack-defense tree, a game theoretic scheme for risk assessment is formulated. The efficiency of the proposed scheme has been evaluated using a case study for the distributed denial-of-service attack.
Citation
Garg, S., Aujla, G. S., Kumar, N., & Batra, S. (2019). Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks. IEEE Consumer Electronics Magazine, 8(6), 35-41. https://doi.org/10.1109/mce.2019.2941345
Journal Article Type | Article |
---|---|
Online Publication Date | Oct 31, 2019 |
Publication Date | Nov 1, 2019 |
Deposit Date | Apr 27, 2021 |
Journal | IEEE Consumer Electronics Magazine |
Print ISSN | 2162-2248 |
Electronic ISSN | 2162-2256 |
Publisher | Institute of Electrical and Electronics Engineers |
Volume | 8 |
Issue | 6 |
Pages | 35-41 |
DOI | https://doi.org/10.1109/mce.2019.2941345 |
Public URL | https://durham-repository.worktribe.com/output/1276690 |
You might also like
Scalable and Reliable Data Framework for Sensor-enabled Virtual Power Plant Digital Twin
(2025)
Journal Article
COPS: Controller Placement in Next-Generation Software Defined Edge-Cloud Networks
(2025)
Presentation / Conference Contribution
Energy-based Predictive Root Cause Analysis for Real-Time Anomaly Detection in Big Data Systems
(2025)
Presentation / Conference Contribution
Green Reinforcement and Split Learning Framework for Edge-Fog-Cloud Continuum in 6G Networks
(2025)
Presentation / Conference Contribution
Intelligent edge–fog interplay for healthcare informatics: A blockchain perspective
(2024)
Journal Article