A Study of the Data Security Attack and Defense Pattern in a Centralized UAV-Cloud Architecture

被引:7
作者
Airlangga, Gregorius [1 ,2 ]
Liu, Alan [2 ]
机构
[1] Atma Jaya Catholic Univ Indonesia, Informat Syst Dept, Jakarta 12930, Indonesia
[2] Natl Chung Cheng Univ, Elect Engn Dept, Chiayi 621301, Taiwan
关键词
security; drone; UAV; multi-UAV; pattern language; defense pattern; UML; class diagram; software architecture; centralized; quality attributes; NETWORKS ARCHITECTURE; COMMUNICATION; TECHNOLOGIES; CHALLENGES; INTERNET; PRIVACY; ISSUES;
D O I
10.3390/drones7050289
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
An unmanned aerial vehicle (UAV) is an autonomous flying robot that has attracted the interest of several communities because of its capacity to increase the safety and productivity of labor. In terms of software engineering, UAV system development is extremely difficult because the focus is not only on functional requirement fulfillment, but also on nonfunctional requirements such as security and safety, which play a crucial role in mission success. Consequently, architecture robustness is very important, and one of the most common architectures developed is based on a centralized pattern in which all UAVs are controlled from a central location. Even though this is a very important problem, many developers must expend a great deal of effort to adapt and improve security. This is because there are few practical perspectives of security development in the context of UAV system development; therefore, the study of attack and defense patterns in centralized architecture is required to fill this knowledge gap. This paper concentrates on enhancing the security aspect of UAV system development by examining attack and defense patterns in centralized architectures. We contribute to the field by identifying 26 attack variations, presenting corresponding countermeasures from a software analyst's standpoint, and supplying a node.js code template for developers to strengthen their systems' security. Our comprehensive analysis evaluates the proposed defense strategies in terms of time and space complexity, ensuring their effectiveness. By providing a focused and in-depth perspective on security patterns, our research offers crucial guidance for communities and developers working on UAV-based systems, facilitating the development of more secure and robust solutions.
引用
收藏
页数:102
相关论文
共 44 条
[1]   Efficient Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles Using Deep Learning [J].
Agyapong, Richmond Asiedu ;
Nabil, Mahmoud ;
Nuhu, Abdul-Rauf ;
Rasul, Mushahid, I ;
Homaifar, Abdollah .
2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
[2]   A Survey on UAV Computing Platforms: A Hardware Reliability Perspective [J].
Ahmed, Foisal ;
Jenihhin, Maksim .
SENSORS, 2022, 22 (16)
[3]   UAVs assessment in software-defined IoT networks: An overview [J].
Al-Turjman, Fadi ;
Abujubbeh, Mohammad ;
Malekloo, Arman ;
Mostarda, Leonardo .
COMPUTER COMMUNICATIONS, 2020, 150 :519-536
[4]   A Survey on the Jamming and Spoofing attacks on the Unmanned Aerial Vehicle Networks [J].
Alrefaei, Faisal ;
Alzahrani, Abdullah ;
Song, Houbing ;
Alrefaei, Salma .
2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, :981-987
[5]   A survey on the role of UAVs in the communication process: A technological perspective [J].
Alsuhli, Ghada ;
Fahim, Ahmed ;
Gadallah, Yasser .
COMPUTER COMMUNICATIONS, 2022, 194 :86-123
[6]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy, Riham ;
Youssef, Amr M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[7]   UAV SECaaS: Game-Theoretic Formulation for Security as a Service in UAV Swarms [J].
Bansal, Gaurang ;
Chamola, Vinay ;
Sikdar, Biplab ;
Yu, Fei Richard .
IEEE SYSTEMS JOURNAL, 2022, 16 (04) :6209-6218
[8]   Flying Ad-Hoc Networks (FANETs): A survey [J].
Bekmezci, Ilker ;
Sahingoz, Ozgur Koray ;
Temel, Samil .
AD HOC NETWORKS, 2013, 11 (03) :1254-1270
[9]  
Benfriha S., 2023, P 2022 INT ARAB C IN
[10]   Adversarial Sybil attacks against Deep RL based drone trajectory planning [J].
Bhandarkar, Adhitya Bantwal ;
Jayaweera, Sudharman K. ;
Lane, Steven A. .
2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,