Review
BibTex RIS Cite

Security in UAV ecosystem: An implementation perspective

Year 2024, Volume: 42 Issue: 6, 1986 - 1994, 09.12.2024

Abstract

This paper focuses on implementational security measures to protect the UAV (Unmanned Aerial Vehicles) ecosystem from malicious adversaries reducing the surface of vulnerability against the malicious intent of these threat actors. The primary objectives of this paper are incorporated in five security measures to enhance the security of UAVs by implementing light-weight cryptographic functions for firmware encryption and safeguarding Peripheral Component Interconnect (PCI) buses, fortifying UAV ground stations by disabling non-utilized ports, thereby minimizing potential attack vectors, mitigating threats from malicious actors by implementing an intrusion detection and prevention system (IDPS) to block inorganic network traffic, obscuring the Service Set Identifier (SSID) from broadcast scans, and to reinforce security through filter scrubs and dynamic whitelisting to protect UAV systems against unauthorized access. This paper dives into different methods of the detailed implementation of the aforementioned security measures, providing insights into UAV’s configurational practices. Each measure is described and analyzed in parallel to ensure comprehensive coverage of the UAV-Ecosystem’s security. The results of this paper are both challenging and rewarding. The proposed measures help improve the security of the UAV ecosystem and protect it from different attacks. In conclusion, this paper has demonstrated the importance of implementing security measures to safeguard the UAV ecosystem from malicious threats. It is crucial to recognize that UAVs may not be entirely immune to sophisticated attackers. Nevertheless, by implementing these security measures and maintaining vigilance, we can prolong the lifespan of UAVs and the entire UAV-Ecosystem and improve their security against malicious intent.

References

  • REFERENCES
  • [1] Abualigah L, Diabat A, Sumari P, Gandomi AH. Applications, deployments, and integration of internet of drones (IOD): a review. IEEE Sensors J 2021;21:2553225546. [CrossRef]
  • [2] Yaacoub JP, Noura H, Salman O, Chehab A. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things (Amst) 2020;11:100218. [CrossRef]
  • [3] Sinha H, Malik N, Dahiya M. Drone Ecosystem: Architecture for Configuring and Securing UAVs. Proceedings of Fourth International Conference on Computing, Communications, and Cyber- Security (IC4S 2022). Singapore: Springer; 2023. [CrossRef]
  • [4] Mekdad Y, Aris A, Babun L, Fergougui AE, Conti M, Lazzeretti, R, et al. A Survey on Security and Privacy Issues of UAVs. arXiv preprint arXiv: 2021:2109.14442.
  • [5] Tiwari M, Kumar R, Bharti A, Kishan J. Intrusion detection system. Int J Tech Res Appl 2017;5:38-44.
  • [6] Keleman L, Matić D, Popović M, Kaštelan I. Secure firmware update in embedded systems. In 2019 IEEE 9th International Conference on Consumer Electronics (ICCE-Berlin) (pp. 16-19). IEEE, 2019. [CrossRef]
  • [7] Wu Y, Noonan JP, Agaian S. Shannon entropy based randomness measurement and test for image encryption. arXiv preprint arXiv:2021:1103.5520.
  • [8] Haider SK, Nauman A, Jamshed MA, Jiang A, Batool S, Kim SW. Internet of drones: Routing algorithms, techniques, and challenges. Mathematics 2022;10:1488. [CrossRef]
  • [9] Lin C, He, D, Kumar N, Choo KKR, Vinel A, Huang X. Security and privacy for the internet of drones: Challenges and solutions. IEEE Commun Mag 2018;56:6469. [CrossRef]
  • [10] Dabrowski A, Pianta N, Klepp, T, Mulazzani M, Weippl E. IMSI-catch me if you can: IMSI-catcher-catchers. In Proceedings of the 30th annual computer security applications Conference (pp. 246255), 2014. [CrossRef]
  • [11] Langley A, Riddoch A, Wilk A, Vicente A, Krasic C, Zhang D, et al. The quic transport protocol: Design and internet-scale deployment. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (pp. 183196), 2017. [CrossRef] [12] Roy M, Ahsan S, Kumar G, Vimal, A. Implementation of quick UDP internet connections (QUIC) protocol. Int J Eng Comput Sci 2020;9:2492124924. [CrossRef]
  • [13] Miller I. Protection against a variant of the tiny fragment attack (RFC 1858) (No. rfc3128), 2001. [CrossRef]
  • [14] Xu F, Ahmad S, Ahmed M, Raza S, Khan F, Ma Y, et al. Beyond Encryption: Exploring the Potential of Physical Layer Security in UAV Networks. J King Saud Univ Comput Inform Sci 2023;35:101717. [CrossRef]
  • [15] Mekdad Y, Aris A, Babun L, El Fergougui A, Conti M, et al. A survey on security and privacy issues of UAVs. Comput Netw 2023;224:109626. [CrossRef]
There are 15 citations in total.

Details

Primary Language English
Subjects Biochemistry and Cell Biology (Other)
Journal Section Reviews
Authors

Nikita Malik This is me 0000-0002-5141-388X

Harsh Sinha This is me 0009-0007-5087-7459

Menal Dahiya This is me 0000-0002-5306-2286

Publication Date December 9, 2024
Submission Date July 6, 2023
Published in Issue Year 2024 Volume: 42 Issue: 6

Cite

Vancouver Malik N, Sinha H, Dahiya M. Security in UAV ecosystem: An implementation perspective. SIGMA. 2024;42(6):1986-94.

IMPORTANT NOTE: JOURNAL SUBMISSION LINK https://eds.yildiz.edu.tr/sigma/