{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:04:29Z","timestamp":1775469869478,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2018,8,15]],"date-time":"2018-08-15T00:00:00Z","timestamp":1534291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006013","name":"United Arab Emirates University","doi-asserted-by":"publisher","award":["31T065"],"award-info":[{"award-number":["31T065"]}],"id":[{"id":"10.13039\/501100006013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called \u2019mission\u2019 to provide a wide range of applications\/services. Without loss of generality, the services and applications offered by the FANET are based on data\/content delivery in various forms such as, but not limited to, pictures, video, status, warnings, and so on. Therefore, a content-centric communication mechanism such as Information Centric Networking (ICN) is essential for FANET. ICN addresses the problems of classical TCP\/IP-based Internet. To this end, Content-centric networking (CCN), and Named Data Networking (NDN) are two of the most famous and widely-adapted implementations of ICN due to their intrinsic security mechanism and Interest\/Data-based communication. To ensure data security, a signature on the contents is appended to each response\/data packet in transit. However, trusted communication is of paramount importance and currently lacks in NDN-driven communication. To fill the gaps, in this paper, we propose a novel trust-aware Monitor-based communication architecture for Flying Named Data Networking (FNDN). We first select the monitors based on their trust and stability, which then become responsible for the interest packets dissemination to avoid broadcast storm problem. Once the interest reaches data producer, the data comes back to the requester through the shortest and most trusted path (which is also the same path through which the interest packet arrived at the producer). Simultaneously, the intermediate UAVs choose whether to check the data authenticity or not, following their subjective belief on its producer\u2019s behavior and thus-forth reducing the computation complexity and delay. Simulation results show that our proposal can sustain the vanilla NDN security levels exceeding the 80% dishonesty detection ratio while reducing the generated end-to-end delay to less than 1 s in the worst case and reducing the average consumed energy by more than two times.<\/jats:p>","DOI":"10.3390\/s18082683","type":"journal-article","created":{"date-parts":[[2018,8,15]],"date-time":"2018-08-15T10:40:07Z","timestamp":1534329607000},"page":"2683","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":58,"title":["A Trusted Lightweight Communication Strategy for Flying Named Data Networking"],"prefix":"10.3390","volume":"18","author":[{"given":"Ezedin","family":"Barka","sequence":"first","affiliation":[{"name":"College of Information Technology, United Arab Emirates University, P.O. Box 17551, Al Ain 15551, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9990-519X","authenticated-orcid":false,"given":"Chaker Abdelaziz","family":"Kerrache","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Ghardaia, Ghardaia 47000, Algeria"},{"name":"Laboratoire d\u2019Informatique et de Math\u00e9matiques, University of Laghouat, BP 37G, Route de Ghardaia, Laghouat 03000, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3771-7537","authenticated-orcid":false,"given":"Rasheed","family":"Hussain","sequence":"additional","affiliation":[{"name":"Institute of Information Systems, Innopolis University, Innopolis 420500, Russia"}]},{"given":"Nasreddine","family":"Lagraa","sequence":"additional","affiliation":[{"name":"Laboratoire d\u2019Informatique et de Math\u00e9matiques, University of Laghouat, BP 37G, Route de Ghardaia, Laghouat 03000, Algeria"}]},{"given":"Abderrahmane","family":"Lakas","sequence":"additional","affiliation":[{"name":"College of Information Technology, United Arab Emirates University, P.O. Box 17551, Al Ain 15551, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1764-7703","authenticated-orcid":false,"given":"Safdar Hussain","family":"Bouk","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Daegu Gyeongbuk Institute of Science and Technology (DGIST), Daegu 42988, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2018,8,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MPRV.2017.11","article-title":"Help from the sky: Leveraging UAVs for disaster management","volume":"16","author":"Erdelj","year":"2017","journal-title":"IEEE Pervasive Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/MCOM.2017.1600799CM","article-title":"Drone-assisted public safety networks: The security aspect","volume":"55","author":"He","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCOM.2017.1601137","article-title":"Named data networking for software defined vehicular networks","volume":"55","author":"Ahmed","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hussain, R., Bouk, S.H., Javaid, N., Khan, A.M., and Lee, J. (2018). Realization of VANET-based Clouds Services Through Named Data Networking. IEEE Commun. Mag., Available online: https:\/\/www.researchgate.net\/publication\/324517792_Realization_of_VANET-based_Clouds_Services_ Through_Named_Data_Networking.","DOI":"10.1109\/MCOM.2018.1700514"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2178","DOI":"10.1109\/TPDS.2014.2346212","article-title":"CAMF: Context-aware message forwarding in mobile social networks","volume":"26","author":"Wei","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","article-title":"Survey of important issues in UAV communication networks","volume":"18","author":"Gupta","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2017.09.001","article-title":"Drone networks: Communications, coordination, and sensing","volume":"68","author":"Yanmaz","year":"2018","journal-title":"Ad Hoc Netw."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yu, Y., Afanasyev, A., Clark, D., Jacobson, V., and Zhang, L. (2015, January 30). Schematizing trust in named data networking. Proceedings of the 2nd International Conference on Information-Centric Networking, San Francisco, CA, USA.","DOI":"10.1145\/2810156.2810170"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/3001836","article-title":"Security, privacy, and safety aspects of civilian drones: A survey","volume":"1","author":"Altawy","year":"2017","journal-title":"ACM Trans. Cyber Phys. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.comcom.2018.02.002","article-title":"A survey on unmanned aerial and aquatic vehicle multi-hop networks: Wireless communications, evaluation tools and applications","volume":"119","author":"Arzamendia","year":"2018","journal-title":"Comput. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Signorello, S., Palattella, M.R., and Grieco, L.A. (2016, January 23\u201326). Security Challenges in Future NDN-Enabled VANETs. Proceedings of the 2016 IEEE Trustcom\/BigDataSE\/ISPA, Tianjin, China.","DOI":"10.1109\/TrustCom.2016.0272"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Yu, Y., Afanasyev, A., Seedorf, J., Zhang, Z., and Zhang, L. (2017, January 26\u201328). NDN DeLorean: An authentication system for data archives in named data networking. Proceedings of the 4th ACM Conference on Information-Centric Networking, Berlin, Germany.","DOI":"10.1145\/3125719.3125724"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Afanasyev, A., Halderman, J.A., Ruoti, S., Seamons, K., Yu, Y., Zappala, D., and Zhang, L. (2016, January 26\u201328). Content-based security for the web. Proceedings of the 2016 New Security Paradigms Workshop, Granby, CO, USA.","DOI":"10.1145\/3011883.3011890"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s10846-013-9959-7","article-title":"Networking models in flying ad-hoc networks (FANETs): Concepts and challenges","volume":"74","author":"Sahingoz","year":"2014","journal-title":"J. Intell. Robot. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Kerrache, C.A., Barka, E., Lagraa, N., and Lakas, A. (2017, January 25\u201327). Reputation-aware energy-efficient solution for FANET monitoring. Proceedings of the 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC), Valencia, Spain.","DOI":"10.1109\/WMNC.2017.8248851"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","author":"Cho","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"9293","DOI":"10.1109\/ACCESS.2016.2645452","article-title":"Trust management for vehicular networks: An adversary-oriented overview","volume":"4","author":"Kerrache","year":"2016","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lu, Y., Wang, Z., Yu, Y.T., Fan, R., and Gerla, M. (2013, January 24\u201326). Social network based security scheme in mobile information-centric network. Proceedings of the 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), Corsica, Ajaccio, France.","DOI":"10.1109\/MedHocNet.2013.6767402"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"TalebiFard, P., Leung, V.C., Amadeo, M., Campolo, C., and Molinaro, A. (2015). Information-centric networking for VANETs. Vehicular ad Hoc Networks, Springer.","DOI":"10.1007\/978-3-319-15497-8_17"},{"key":"ref_20","unstructured":"Ahmad, F., and Adnane, A. (2015, January 26\u201328). Design of trust based context aware routing protocol in vehicular networks. Proceedings of the Ninth IFIP WG 11.11 International Conference on Trust Management, Hamburg, Germany."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Jain, V., and Kushwah, R.S. (2017, January 10\u201311). NDN architectures in VANET scenario. Proceedings of the 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India.","DOI":"10.1109\/ICICCT.2017.7975183"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Mohammed, F., Jawhar, I., Mohamed, N., and Idries, A. (2016, January 9\u201310). Towards trusted and efficient UAV-Based communication. Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.57"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Yuan, X., Wei, Z., Feng, Z., and Xu, W. (2017, January 25-27). Trust connectivity analysis in overlaid unmanned aerial vehicle networks. Proceedings of the 2017 17th International Symposium on Communications and Information Technologies (ISCIT), Cairns, QLD, Australia.","DOI":"10.1109\/ISCIT.2017.8261181"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"7475357","DOI":"10.1155\/2018\/7475357","article-title":"UNION: A trust model distinguishing intentional and UNIntentional misbehavior in inter-UAV communicatiON","volume":"2018","author":"Barka","year":"2018","journal-title":"J. Adv. Transp."},{"key":"ref_25","first-page":"23","article-title":"FCTM: A Novel Fuzzy Classification Trust Model for Enhancing Reliability in Flying Ad hoc Networks (FANETs)","volume":"40","author":"Singh","year":"2018","journal-title":"Adhoc Sens. Wirel. Netw."},{"key":"ref_26","unstructured":"Zhang, L., Estrin, D., Burke, J., Jacobson, V., Thornton, J.D., Smetters, D.K., Zhang, B., Tsudik, G., Massey, D., and Papadopoulos, C. (2010). Named data networking (ndn) project. Relat\u00f3rio T\u00e9cnico NDN-0001, Xerox Palo Alto Research Center-PARC, PARC."},{"key":"ref_27","unstructured":"Zhang, Z., Zhang, H., Newberry, E., Mastorakis, S., Li, Y., Afanasyev, A., and Zhang, L. (2018, March 18). Security Support in Named Data Networking. Available online: https:\/\/named-data.net\/wp-content\/uploads\/2018\/03\/ndn-0057-1-ndn-security.pdf."},{"key":"ref_28","first-page":"1","article-title":"UAV-assisted technique for the detection of malicious and selfish nodes in VANETs","volume":"11","author":"Kerrache","year":"2018","journal-title":"Veh. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Shawe-Taylor, J., and Cristianini, N. (2004). Kernel Methods for Pattern Analysis, Cambridge University Press.","DOI":"10.1017\/CBO9780511809682"},{"key":"ref_30","unstructured":"Kim, D., Toh, C.K., Cano, J.C., and Manzoni, P. (2003, January 16\u201320). A bounding algorithm for the broadcast storm problem in mobile ad hoc networks. Proceedings of the 2003 IEEE Wireless Communications and Networking, New Orleans, LA, USA."},{"key":"ref_31","unstructured":"Rappaport, T.S. (1996). Wireless Communications: Principles and Practice, Prentice Hall PTR."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Sakhaee, E., Taleb, T., Jamalipour, A., Kato, N., and Nemoto, Y. (2007, January 11\u201315). A novel scheme to reduce control overhead and increase link duration in highly mobile ad hoc networks. Proceedings of the 2007 IEEEWireless Communications and Networking Conference, Kowloon, China.","DOI":"10.1109\/WCNC.2007.726"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/8\/2683\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:18:54Z","timestamp":1760195934000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/8\/2683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,15]]},"references-count":32,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,8]]}},"alternative-id":["s18082683"],"URL":"https:\/\/doi.org\/10.3390\/s18082683","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,15]]}}}