Skip to main content
Erschienen in: The Journal of Supercomputing 10/2018

26.02.2018

Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution

verfasst von: Hichem Sedjelmaci, Sidi Mohamed Senouci

Erschienen in: The Journal of Supercomputing | Ausgabe 10/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Aerial vehicle networks (AVNs) compose a large number of heterogeneous aerial nodes, such as unmanned aerial vehicles, aircrafts and helicopters. The main characteristics of these networks are the high mobility of aerial nodes and the dynamic network topology. AVNs represent attractive targets for attackers due to the fact that aerial nodes could be connected to an untrusted network and hence lead the attackers to launch lethal threats, e.g., aircraft crash. Therefore, the security of AVNs is mandatory. In this article, we examine the challenges of cyber detection methods to secure AVNs and review exiting security schemes proposed in the current literature. Furthermore, we propose a security framework to protect an aircraft (SFA) against malicious behaviors that target aircrafts communication systems. Numerical results show that SFA achieves a high accuracy detection and prediction rates as compared to the current intrusion detection for aircrafts communication system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Strohmeier M, Schfer M, Smith M, Lenders V, Martinovic I (2016) Assessing the impact of aviation security on cyber power. In: 8th IEEE International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, pp 223–241 Strohmeier M, Schfer M, Smith M, Lenders V, Martinovic I (2016) Assessing the impact of aviation security on cyber power. In: 8th IEEE International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, pp 223–241
2.
Zurück zum Zitat Strohmeier M, Schfer M, Pinheiro R, Lenders V, Martinovic I (2017) On perception and reality in wireless air traffic communication security. IEEE Trans Intell Transp Syst 18(6):1338–1357 Strohmeier M, Schfer M, Pinheiro R, Lenders V, Martinovic I (2017) On perception and reality in wireless air traffic communication security. IEEE Trans Intell Transp Syst 18(6):1338–1357
3.
Zurück zum Zitat Sparrow RD, Adekunle AA, Berry RJ, Farnis RJ (2016) A novel block cipher design paradigm for secured communication. In: IEEE Annual Systems Conference (SysCon), Orlando, Florida, USA Sparrow RD, Adekunle AA, Berry RJ, Farnis RJ (2016) A novel block cipher design paradigm for secured communication. In: IEEE Annual Systems Conference (SysCon), Orlando, Florida, USA
4.
Zurück zum Zitat Mitchell R, Chen IR (2014) Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans Syst Man Cybern Syst 40(5):593–604CrossRef Mitchell R, Chen IR (2014) Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans Syst Man Cybern Syst 40(5):593–604CrossRef
5.
Zurück zum Zitat Sedjelmaci H, Senouci SM, Messous MA (2016) How to detect cyber-attacks in unmanned aerial vehicles network? IEEE Globecom, Washington DC, USA Sedjelmaci H, Senouci SM, Messous MA (2016) How to detect cyber-attacks in unmanned aerial vehicles network? IEEE Globecom, Washington DC, USA
6.
Zurück zum Zitat Strohmeier M, Lenders V, Martinovic I (2015) Intrusion detection for airborne communication using PHY-layer information. In: SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milan, Italy Strohmeier M, Lenders V, Martinovic I (2015) Intrusion detection for airborne communication using PHY-layer information. In: SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Milan, Italy
7.
Zurück zum Zitat Casals SG, Owezarski P, Descargues G (2013) Generic and autonomous system for airborne networks cyber-threat detection. IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), New York, USA, pp 1–14 Casals SG, Owezarski P, Descargues G (2013) Generic and autonomous system for airborne networks cyber-threat detection. IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), New York, USA, pp 1–14
8.
Zurück zum Zitat Sedjelmaci H, Senouci SM, Ansari N (2017) Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans Intell Transp Syst 18(5):1143–1153CrossRef Sedjelmaci H, Senouci SM, Ansari N (2017) Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans Intell Transp Syst 18(5):1143–1153CrossRef
9.
Zurück zum Zitat Callegari C, Vaton S, Pagano M (2010) A new statistical method for detecting network anomalies in TCP traffic. Trans Emerg Telecommun Technol 21(7):575–585CrossRef Callegari C, Vaton S, Pagano M (2010) A new statistical method for detecting network anomalies in TCP traffic. Trans Emerg Telecommun Technol 21(7):575–585CrossRef
10.
Zurück zum Zitat Meisel M, Pappas V, Zhang L (2010) A taxonomy of biologically inspired research in computer networking. Comput Netw 54(6):90116CrossRef Meisel M, Pappas V, Zhang L (2010) A taxonomy of biologically inspired research in computer networking. Comput Netw 54(6):90116CrossRef
11.
Zurück zum Zitat Namuduri K, Wan Y, Gomathisankaran M, Pendse R (2012) Airborne network: a cyber-physical system perspective. In: Proceedings of the First ACM MobiHoc Workshop on Airborne Networks and Communications, South Carolina, USA, pp 55–60 Namuduri K, Wan Y, Gomathisankaran M, Pendse R (2012) Airborne network: a cyber-physical system perspective. In: Proceedings of the First ACM MobiHoc Workshop on Airborne Networks and Communications, South Carolina, USA, pp 55–60
12.
Zurück zum Zitat Shepard DP, Bhatti JA, Humphreys TE, Fansler AA (2012) Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Proceedings of the ION GNSS, Meeting Nashville, USA Shepard DP, Bhatti JA, Humphreys TE, Fansler AA (2012) Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Proceedings of the ION GNSS, Meeting Nashville, USA
13.
Zurück zum Zitat He D, Chan S, Guizani M (2017) Drone-assisted public safety networks: the security aspect. IEEE Commun Mag 55(8):218–223CrossRef He D, Chan S, Guizani M (2017) Drone-assisted public safety networks: the security aspect. IEEE Commun Mag 55(8):218–223CrossRef
14.
Zurück zum Zitat Sedjelmaci H, Senouci SM, Ansari N (2017) A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans Syst Man Cybern Syst 1–13 Sedjelmaci H, Senouci SM, Ansari N (2017) A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans Syst Man Cybern Syst 1–13
15.
Zurück zum Zitat Kacem T, Wijesekera D, Costa W, Barreto A (2016) An ADS-B intrusion detection system. IEEE TrustCom-BigDataSE-ISPA, Tianjin, China, pp 544–551 Kacem T, Wijesekera D, Costa W, Barreto A (2016) An ADS-B intrusion detection system. IEEE TrustCom-BigDataSE-ISPA, Tianjin, China, pp 544–551
16.
Zurück zum Zitat Rani C, Modares H, Sriram R, Mikulski D, Lewis FL (2016) Security of unmanned aerial vehicle systems against cyber-physical attacks. J Def Model Simul Appl Methodol Technol 13(3):331–342CrossRef Rani C, Modares H, Sriram R, Mikulski D, Lewis FL (2016) Security of unmanned aerial vehicle systems against cyber-physical attacks. J Def Model Simul Appl Methodol Technol 13(3):331–342CrossRef
17.
Zurück zum Zitat Polstra P (2014) Cyber-hijacking airplanes. DEFCON, Las Vegas, USA Polstra P (2014) Cyber-hijacking airplanes. DEFCON, Las Vegas, USA
18.
Zurück zum Zitat He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles. IEEE Wirel Commun Mag 24(4):134–139CrossRef He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles. IEEE Wirel Commun Mag 24(4):134–139CrossRef
19.
Zurück zum Zitat Shepard DP, Bhatti JA, Humpherys TE (2012) Spoofing attack demonstration on a civilian unmanned aerial vehicle. GPS World Mag 30–33 Shepard DP, Bhatti JA, Humpherys TE (2012) Spoofing attack demonstration on a civilian unmanned aerial vehicle. GPS World Mag 30–33
20.
Zurück zum Zitat Moon D, Im H, Kim I, Park JH (2015) DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J Supercomput 73(7):2881–2895CrossRef Moon D, Im H, Kim I, Park JH (2015) DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J Supercomput 73(7):2881–2895CrossRef
21.
Zurück zum Zitat Nezarat A, Shams Y (2017) A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment. J Supercomput 73(10):4407–4427CrossRef Nezarat A, Shams Y (2017) A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment. J Supercomput 73(10):4407–4427CrossRef
23.
Zurück zum Zitat Newton B, Aikat J, Jeffay K (2014) Simulating large-scale airborne networks with ns-3. ACM Workshop on ns-3, Barcelona, Spain, pp 32–39 Newton B, Aikat J, Jeffay K (2014) Simulating large-scale airborne networks with ns-3. ACM Workshop on ns-3, Barcelona, Spain, pp 32–39
24.
Zurück zum Zitat Chen H, Howard FH (2016) A Kalman filter based method for GPS spoofing detection. In: Proceedings of the 2016 International Technical Meeting of the Institute of Navigation, Monterey, California, pp 151–159 Chen H, Howard FH (2016) A Kalman filter based method for GPS spoofing detection. In: Proceedings of the 2016 International Technical Meeting of the Institute of Navigation, Monterey, California, pp 151–159
25.
Zurück zum Zitat Garnaev A, Baykal-Gursoy M, Poor HV (2016) Security games with unknown adversarial strategies. IEEE Trans Cybern 46(10):22912299CrossRef Garnaev A, Baykal-Gursoy M, Poor HV (2016) Security games with unknown adversarial strategies. IEEE Trans Cybern 46(10):22912299CrossRef
26.
Zurück zum Zitat Maxa JA, Mahmoud MS, Larrieu N (2016) Extended verification of secure UAANET routing protocol. In: 35th IEEE/AIAA Digital Avionics Systems Conference (DASC), Sacramento, CA, USA, pp 1–16 Maxa JA, Mahmoud MS, Larrieu N (2016) Extended verification of secure UAANET routing protocol. In: 35th IEEE/AIAA Digital Avionics Systems Conference (DASC), Sacramento, CA, USA, pp 1–16
27.
Zurück zum Zitat Qiu Q, Xiong Q (2004) Research on elliptic curve cryptography. In: IEEE 8th International Conference on Computer Supported Cooperative Work in Design Proceedings, Xiamen, China, pp 698–701 Qiu Q, Xiong Q (2004) Research on elliptic curve cryptography. In: IEEE 8th International Conference on Computer Supported Cooperative Work in Design Proceedings, Xiamen, China, pp 698–701
Metadaten
Titel
Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution
verfasst von
Hichem Sedjelmaci
Sidi Mohamed Senouci
Publikationsdatum
26.02.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 10/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2287-8

Weitere Artikel der Ausgabe 10/2018

The Journal of Supercomputing 10/2018 Zur Ausgabe

Premium Partner