Skip to main content

2018 | OriginalPaper | Buchkapitel

A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)

verfasst von : Md Samsul Haque, Morshed U. Chowdhury

Erschienen in: Security and Privacy in Communication Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber Physical Systems (CPS) like UAVs are used for mission critical tasks including military and civilian operations. Their potentiality of usage is rapidly increasing in commercial space. The need for a secure channel to wirelessly communicate and transfer message between CPS is very crucial. Key idea behind this study is to propose a novel framework that is lightweight, robust and at the same time do not compromise security and pragmatic in the jurisdictions of energy-efficient atmospheres. This paper presents an idea for a practical and efficient hierarchical architecture for UAV network using identity-based encryption. Also, proposes selective encryption technique to reduce overheads and data hiding mechanism to increase confidentiality of the message.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Burmester, M., Magkos, E., Chrissikopoulos, V.: Modeling security in cyber–physical systems. Int. J. Crit. Infrastruct. Prot. 5(3), 118–126 (2012)CrossRef Burmester, M., Magkos, E., Chrissikopoulos, V.: Modeling security in cyber–physical systems. Int. J. Crit. Infrastruct. Prot. 5(3), 118–126 (2012)CrossRef
3.
Zurück zum Zitat Austin, R.: Unmanned Aircraft Systems: UAVS Design, Development and Deployment. Wiley, Hoboken (2011) Austin, R.: Unmanned Aircraft Systems: UAVS Design, Development and Deployment. Wiley, Hoboken (2011)
6.
Zurück zum Zitat Rani, C., Modares, H., Sriram, R., Mikulski, D., Lewis, F.L.: Security of unmanned aerial vehicle systems against cyber-physical attacks. J. Def. Model. Simul. Appl. Methodol. Technol. 13(3), 331–342 (2015) Rani, C., Modares, H., Sriram, R., Mikulski, D., Lewis, F.L.: Security of unmanned aerial vehicle systems against cyber-physical attacks. J. Def. Model. Simul. Appl. Methodol. Technol. 13(3), 331–342 (2015)
8.
Zurück zum Zitat Mansfield, K., Eveleigh, T., Holzer, T.H., Sarkani, S.: Unmanned aerial vehicle smart device ground control station cyber security threat model. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 722–728. IEEE (2013) Mansfield, K., Eveleigh, T., Holzer, T.H., Sarkani, S.: Unmanned aerial vehicle smart device ground control station cyber security threat model. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 722–728. IEEE (2013)
9.
Zurück zum Zitat Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In: Infotech@ Aerospace, pp. 1–30 (2012) Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In: Infotech@ Aerospace, pp. 1–30 (2012)
10.
Zurück zum Zitat Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 585–590. IEEE (2012) Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 585–590. IEEE (2012)
12.
Zurück zum Zitat Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1–23. IEEE (2013) Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1–23. IEEE (2013)
13.
Zurück zum Zitat Javaid, A.Y.: Cyber security threat analysis and attack simulation for unmanned aerial vehicle network. University of Toledo (2015) Javaid, A.Y.: Cyber security threat analysis and attack simulation for unmanned aerial vehicle network. University of Toledo (2015)
14.
Zurück zum Zitat Hu, S.: A hierarchical key management scheme for wireless sensor networks based on identity-based encryption. In: 2015 IEEE International Conference on Computer and Communications (ICCC), pp. 384–389. IEEE (2015) Hu, S.: A hierarchical key management scheme for wireless sensor networks based on identity-based encryption. In: 2015 IEEE International Conference on Computer and Communications (ICCC), pp. 384–389. IEEE (2015)
15.
Zurück zum Zitat Yu, F.R., Tang, H., Mason, P.C., Wang, F.: A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans. Netw. Serv. Manage. 7(4), 258–267 (2010)CrossRef Yu, F.R., Tang, H., Mason, P.C., Wang, F.: A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans. Netw. Serv. Manage. 7(4), 258–267 (2010)CrossRef
16.
Zurück zum Zitat Sarmah, D.K., Bajpai, N.: Proposed system for data hiding using cryptography and steganography. Int. J. Comput. Appl. 8(9), 7–10 (2010) Sarmah, D.K., Bajpai, N.: Proposed system for data hiding using cryptography and steganography. Int. J. Comput. Appl. 8(9), 7–10 (2010)
17.
Zurück zum Zitat Altigani, A., Barry, B.: A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and word shift coding protocol. In: 2013 International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), pp. 134–139. IEEE (2013) Altigani, A., Barry, B.: A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and word shift coding protocol. In: 2013 International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), pp. 134–139. IEEE (2013)
18.
Zurück zum Zitat Vegh, L., Miclea, L.: A new approach towards increased security in cyber-physical systems. In: Systems, Signals and Image Processing (IWSSIP), pp. 175–178: IEEE (2014) Vegh, L., Miclea, L.: A new approach towards increased security in cyber-physical systems. In: Systems, Signals and Image Processing (IWSSIP), pp. 175–178: IEEE (2014)
19.
Zurück zum Zitat Vegh, L., Miclea, L.: Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In: 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, pp. 1–6. IEEE (2014) Vegh, L., Miclea, L.: Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In: 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, pp. 1–6. IEEE (2014)
21.
Zurück zum Zitat Bekmezci, I., Sahingoz, O.K., Temel, Ş.: Flying ad-hoc networks (FANETs): a survey. Ad Hoc Netw. 11(3), 1254–1270 (2013)CrossRef Bekmezci, I., Sahingoz, O.K., Temel, Ş.: Flying ad-hoc networks (FANETs): a survey. Ad Hoc Netw. 11(3), 1254–1270 (2013)CrossRef
22.
Zurück zum Zitat Faquih, A., Kadam, P., Saquib, Z.: Cryptographic techniques for wireless sensor networks: a survey. In: 2015 IEEE Bombay Section Symposium (IBSS), pp. 1–6. IEEE (2015) Faquih, A., Kadam, P., Saquib, Z.: Cryptographic techniques for wireless sensor networks: a survey. In: 2015 IEEE Bombay Section Symposium (IBSS), pp. 1–6. IEEE (2015)
24.
Zurück zum Zitat Fang, Y., Zhu, X., Zhang, Y.: Securing resource-constrained wireless ad hoc networks. IEEE Wirel. Commun. 16(2), 24–30 (2009)CrossRef Fang, Y., Zhu, X., Zhang, Y.: Securing resource-constrained wireless ad hoc networks. IEEE Wirel. Commun. 16(2), 24–30 (2009)CrossRef
25.
Zurück zum Zitat Zhang, L., Tang, S., Luo, H.: Elliptic curve cryptography-based authentication with identity protection for smart grids. PLoS ONE 11(3), e0151253 (2016)CrossRef Zhang, L., Tang, S., Luo, H.: Elliptic curve cryptography-based authentication with identity protection for smart grids. PLoS ONE 11(3), e0151253 (2016)CrossRef
26.
Zurück zum Zitat Kodali, R.K., Chougule, S.K.: Hierarchical key agreement protocol for wireless sensor networks. Int. J. Recent Trends Eng. Technol. 9(1), 25 (2013) Kodali, R.K., Chougule, S.K.: Hierarchical key agreement protocol for wireless sensor networks. Int. J. Recent Trends Eng. Technol. 9(1), 25 (2013)
27.
Zurück zum Zitat Oh, J.-Y., Yang, D.-I., Chon, K.-H.: A selective encryption algorithm based on AES for medical information. Healthc. Inf. Res. 16(1), 22–29 (2010)CrossRef Oh, J.-Y., Yang, D.-I., Chon, K.-H.: A selective encryption algorithm based on AES for medical information. Healthc. Inf. Res. 16(1), 22–29 (2010)CrossRef
28.
Zurück zum Zitat Ren, Y., Boukerche, A., Mokdad, L.: Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In: 2011 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1038–1043. IEEE (2011) Ren, Y., Boukerche, A., Mokdad, L.: Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In: 2011 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1038–1043. IEEE (2011)
29.
Zurück zum Zitat Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography. Comput. Sci. Inf. Technol. 7(3), 63–74 (2017) Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography. Comput. Sci. Inf. Technol. 7(3), 63–74 (2017)
30.
Zurück zum Zitat Sahingoz, O.K.: Large scale wireless sensor networks with multi-level dynamic key management scheme. J. Syst. Architect. 59(9), 801–807 (2013)CrossRef Sahingoz, O.K.: Large scale wireless sensor networks with multi-level dynamic key management scheme. J. Syst. Architect. 59(9), 801–807 (2013)CrossRef
Metadaten
Titel
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)
verfasst von
Md Samsul Haque
Morshed U. Chowdhury
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-78816-6_9