Abstract
Cyber Physical Systems (CPS) like UAVs are used for mission critical tasks including military and civilian operations. Their potentiality of usage is rapidly increasing in commercial space. The need for a secure channel to wirelessly communicate and transfer message between CPS is very crucial. Key idea behind this study is to propose a novel framework that is lightweight, robust and at the same time do not compromise security and pragmatic in the jurisdictions of energy-efficient atmospheres. This paper presents an idea for a practical and efficient hierarchical architecture for UAV network using identity-based encryption. Also, proposes selective encryption technique to reduce overheads and data hiding mechanism to increase confidentiality of the message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Burmester, M., Magkos, E., Chrissikopoulos, V.: Modeling security in cyber–physical systems. Int. J. Crit. Infrastruct. Prot. 5(3), 118–126 (2012)
Dini, G., Tiloca, M.: A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems. In: Hodicky, J. (ed.) MESAS. LNCS, vol. 8906, pp. 77–94. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-13823-7_8
Austin, R.: Unmanned Aircraft Systems: UAVS Design, Development and Deployment. Wiley, Hoboken (2011)
Airborg™ H8 10 K with top flight hybrid-power system (2017). http://www.tflighttech.com/products/airborg-h8-10k-with-top-flight-hybrid-power-system.html. Accessed July 2017
Snell, B.: McAfee labs 2017 threats predictions: “Dronejacking” places threats in the sky (2016). https://www.mcafee.com/au/resources/reports/rp-threats-predictions-2017.pdf
Rani, C., Modares, H., Sriram, R., Mikulski, D., Lewis, F.L.: Security of unmanned aerial vehicle systems against cyber-physical attacks. J. Def. Model. Simul. Appl. Methodol. Technol. 13(3), 331–342 (2015)
FAA releases 2016 to 2036 aerospace forecast (2016). https://www.faa.gov/news/updates/?newsId=85227
Mansfield, K., Eveleigh, T., Holzer, T.H., Sarkani, S.: Unmanned aerial vehicle smart device ground control station cyber security threat model. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 722–728. IEEE (2013)
Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In: Infotech@ Aerospace, pp. 1–30 (2012)
Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 585–590. IEEE (2012)
Gallagher, S.: Triathlete injured by “hacked” camera drone (2014). https://arstechnica.com/security/2014/04/triathlete-injured-by-hacked-camera-drone/. Accessed June 2017
Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1–23. IEEE (2013)
Javaid, A.Y.: Cyber security threat analysis and attack simulation for unmanned aerial vehicle network. University of Toledo (2015)
Hu, S.: A hierarchical key management scheme for wireless sensor networks based on identity-based encryption. In: 2015 IEEE International Conference on Computer and Communications (ICCC), pp. 384–389. IEEE (2015)
Yu, F.R., Tang, H., Mason, P.C., Wang, F.: A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans. Netw. Serv. Manage. 7(4), 258–267 (2010)
Sarmah, D.K., Bajpai, N.: Proposed system for data hiding using cryptography and steganography. Int. J. Comput. Appl. 8(9), 7–10 (2010)
Altigani, A., Barry, B.: A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and word shift coding protocol. In: 2013 International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), pp. 134–139. IEEE (2013)
Vegh, L., Miclea, L.: A new approach towards increased security in cyber-physical systems. In: Systems, Signals and Image Processing (IWSSIP), pp. 175–178: IEEE (2014)
Vegh, L., Miclea, L.: Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In: 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, pp. 1–6. IEEE (2014)
Yang, Y., Lu, J., Choo, K.-K.R., Liu, J.K.: On lightweight security enforcement in cyber-physical systems. In: Güneysu, T., Leander, G., Moradi, A. (eds.) LightSec 2015. LNCS, vol. 9542, pp. 97–112. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29078-2_6
Bekmezci, I., Sahingoz, O.K., Temel, Ş.: Flying ad-hoc networks (FANETs): a survey. Ad Hoc Netw. 11(3), 1254–1270 (2013)
Faquih, A., Kadam, P., Saquib, Z.: Cryptographic techniques for wireless sensor networks: a survey. In: 2015 IEEE Bombay Section Symposium (IBSS), pp. 1–6. IEEE (2015)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Fang, Y., Zhu, X., Zhang, Y.: Securing resource-constrained wireless ad hoc networks. IEEE Wirel. Commun. 16(2), 24–30 (2009)
Zhang, L., Tang, S., Luo, H.: Elliptic curve cryptography-based authentication with identity protection for smart grids. PLoS ONE 11(3), e0151253 (2016)
Kodali, R.K., Chougule, S.K.: Hierarchical key agreement protocol for wireless sensor networks. Int. J. Recent Trends Eng. Technol. 9(1), 25 (2013)
Oh, J.-Y., Yang, D.-I., Chon, K.-H.: A selective encryption algorithm based on AES for medical information. Healthc. Inf. Res. 16(1), 22–29 (2010)
Ren, Y., Boukerche, A., Mokdad, L.: Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In: 2011 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1038–1043. IEEE (2011)
Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography. Comput. Sci. Inf. Technol. 7(3), 63–74 (2017)
Sahingoz, O.K.: Large scale wireless sensor networks with multi-level dynamic key management scheme. J. Syst. Architect. 59(9), 801–807 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Haque, M.S., Chowdhury, M.U. (2018). A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV). In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds) Security and Privacy in Communication Networks. SecureComm 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-78816-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-78816-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78815-9
Online ISBN: 978-3-319-78816-6
eBook Packages: Computer ScienceComputer Science (R0)