An approach to enhance the security of unmanned aerial vehicles (UAVs)

被引:0
作者
Noshin A. Sabuwala
Rohin D. Daruwala
机构
[1] Veermata Jijabai Technological Institute,Electrical Engineering Department
来源
The Journal of Supercomputing | 2024年 / 80卷
关键词
Unmanned aerial vehicles (UAVs); Communication security; MAVLink; Stream cipher; Internet of things (IoT);
D O I
暂无
中图分类号
学科分类号
摘要
There is a significant surge in unmanned aerial vehicles’ (UAVs) popularity with an ongoing increase in demand due to their multi-functional uses. The capacity of the UAVs to respond to society and industry needs account for their pervasiveness. UAVs can be strategically deployed to enhance network efficiency and support critical missions, including vital tasks like infrastructure monitoring operations. To be effective, a UAV must interact securely with its network’s entities, such as ground control stations, other UAVs, air traffic control systems, and navigation satellite systems. UAVs are exposed to a dangerous and costly world of cyber dangers as a result of cyber technology and connections. The UAV and the Ground Control Station (GCS) exchange information using communication lines, which are vulnerable to cyber-attacks. As a result, detective, defensive, and preventative countermeasures are critical. The Micro Air Vehicle Link (MAVLink) protocol is a widely used lightweight communication protocol for enabling communication between UAVs and GCSs. It outlines communication exchanges between a GCS and a UAV. It carries information about the UAV’s condition as well as commands for control from the GCS. Although widely used, the MAVLink protocol lacks sufficient security measures and is susceptible to various types of attacks, which can pose significant risks to public safety. UAV data should be encrypted because they are very sensitive. To give a high level of security, complex operation encryption techniques are developed. These mathematical operations bring forth issues with efficiency and power usage, though. One of these methods, the ChaCha cipher, recently gained popularity after Google used it in several applications. In the current study, a new stream cipher method with low-duty cycles is proposed for protecting data in UAVs and is compared with existing security algorithms on the basis of various factors. The research findings show that by including the suggested method in MAVLink, it is possible to maintain both message secrecy and battery life for a resource-constrained UAV. This can be done while using comparable amounts of memory and CPU and without affecting MAVLink’s performance.
引用
收藏
页码:9609 / 9639
页数:30
相关论文
共 111 条
[1]  
Kwon YM(2018)Empirical analysis of MAVLink protocol vulnerability for attacking unmanned aerial vehicles IEEE Access 6 203-212
[2]  
Yu J(2015)Security of unmanned aerial vehicle systems against cyber-physical attacks J Def Model Simul 13 331-342
[3]  
Cho BM(2020)Cryptographic system for data applications, in the context of internet of things Microprocess Microsyst 72 102921-37
[4]  
Eun Y(2017)Lightweight distributed secure data management system for health internet of things J Netw Comput Appl 89 26-3450
[5]  
Park KJ(2020)A lightweight ECC-based authentication scheme for internet of things (IoT) IEEE Syst J 14 3440-16
[6]  
Rani C(2020)Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices Internet Things J 12 100319-618
[7]  
Modares H(2022)DMAV: enhanced MAV link protocol using dynamic DNA coding for unmanned aerial vehicles Int J Online Biomed Eng (IJOE) 18 4-401
[8]  
Sriram R(2021)A secure communication protocol for unmanned aerial vehicles Comput Mater Continua 70 601-1389
[9]  
Mikulski D(2019)Cyber-attacks on unmanned aerial system networks: detection, countermeasure, and future research directions Comput Secur 85 386-9046
[10]  
Lewis FL(2019)Securing UAV communications via joint trajectory and power control IEEE Trans Wirel Commun 18 1376-2294