Identifying a Malicious Node in a UAV Network

被引:3
作者
Zilberman, Aviram [1 ,2 ,3 ]
Stulman, Ariel [2 ]
Dvir, Amit [1 ]
机构
[1] Ariel Univ, Ariel Cyber Innovat Ctr, Dept Comp Sci, Ariel, Israel
[2] Jerusalem Coll Technol, Dept Comp Sci, Jerusalem, Israel
[3] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2024年 / 21卷 / 01期
关键词
Attacker; location; cheating identification; DSR; MANET; secret sharing; UAV; malicious node; man-in-the-middle; COMPUTING SUBGRAPH PROBABILITY; RANDOM GEOMETRIC GRAPHS; INTRUSION DETECTION; SECURITY; INTERNET; ATTACKS; IDENTIFICATION; CHALLENGES;
D O I
10.1109/TNSM.2023.3300809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of new and exciting wireless technologies and capabilities, Unmanned Aerial Vehicles (UAVs) and the services they allow, stand to be a major influencer in our daily lives. Unfortunately, they are also prone to a plethora of security issues. Existing studies propose both prevention and identification schemes for various routing attacks. They do not, however, preclude future malicious attempts. Hence, in this work we identify the specific UAV that is compromising the network, with the specific purpose of flushing it out. The proposed solution combines secret sharing and cheating identification schemes with multi-path routing protocols, to deterministically pinpoint the compromised node that is cheating the UAV flock. It assures a quiet identification of the adversary creating new opportunities for its attack, even when facing a sophisticated adversary that selectively modifies data messages or re-routes them in within the network. We took special care to allow for applicability in existing networks by adhering to two basic principles: only using pre-existing standard routing protocols and not relying on a centralized or trusted third party node such as a base station. All information must be gleaned by each node using only primitives which already exist in the underlying communication protocols. We provide a rigorous mathematical proof of the cost bounds, and run simulations to prove feasibility. Moreover, the simulations show a 100% detection rate and message delivery rate. The communication overhead varies, on average, between $0.4\cdot 10<^>{6}-0.8\cdot 10<^>{6}$ bytes, depending on various parameters such as the network size and the reception rate of network nodes. The time required varies between 0.2-0.4 seconds, depending mainly on the network size.
引用
收藏
页码:1226 / 1240
页数:15
相关论文
共 66 条
  • [1] Comprehensive Review of UAV Detection, Security, and Communication Advancements to Prevent Threats
    Abro, Ghulam E. Mustafa
    Zulkifli, Saiful Azrin B. M.
    Masood, Rana Javed
    Asirvadam, Vijanth Sagayan
    Laouti, Anis
    [J]. DRONES, 2022, 6 (10)
  • [2] High-performance intrusion detection system for networked UAVs via deep learning
    Abu Al-Haija, Qasem
    Al Badawi, Ahmad
    [J]. NEURAL COMPUTING & APPLICATIONS, 2022, 34 (13) : 10885 - 10900
  • [3] A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions
    Alkatheiri, Mohammed Saeed
    Saleem, Sajid
    Alqarni, Mohammed Ali
    Aseeri, Ahmad O.
    Chauhdary, Sajjad Hussain
    Zhuang, Yu
    [J]. ELECTRONICS, 2022, 11 (18)
  • [4] Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges
    Ambrosin, Moreno
    Conti, Mauro
    Lazzeretti, Riccardo
    Rabbani, Md Masoom
    Ranise, Silvio
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2447 - 2461
  • [5] PADS: Practical Attestation for Highly Dynamic Swarm Topologies
    Ambrosin, Moreno
    Conti, Mauro
    Lazzeretti, Riccardo
    Rabbani, Md Masoom
    Ranise, Silvio
    [J]. 2018 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2018), 2018, : 18 - 27
  • [6] [Anonymous], 2007, RFC: 4728
  • [7] Machine Learning Methods for UAV Flocks Management-A Survey
    Azoulay, Rina
    Haddad, Yoram
    Reches, Shulamit
    [J]. IEEE ACCESS, 2021, 9 : 139146 - 139175
  • [8] Secure and Trusted Attestation Protocol for UAV Fleets
    Bansal, Gaurang
    Sikdar, Biplab
    [J]. IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [9] Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure
    Barka, Ezedin
    Kerrache, Chaker Abdelaziz
    Benkraouda, Hadjer
    Shuaib, Khaled
    Ahmad, Farhan
    Kurugollu, Fatih
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08)
  • [10] A Trusted Lightweight Communication Strategy for Flying Named Data Networking
    Barka, Ezedin
    Kerrache, Chaker Abdelaziz
    Hussain, Rasheed
    Lagraa, Nasreddine
    Lakas, Abderrahmane
    Bouk, Safdar Hussain
    [J]. SENSORS, 2018, 18 (08)