An Architecture to Secure (UAV) Cluster Communication

  • Richard Joseph
  • Sreevidya Iyer
  • Anjali Nambiar
  • Purva Badguja
  • Dhanashree Shetty
Keywords: drone security, UAV, cluster communication, IBOOS protocol, iot security

Abstract

UAVs are being increasingly used in military and commercial areas alike. They often carry sensitive information making them vulnerable to cybersecurity attacks. Potential security vulnerabilities may also exist in the modules used for functioning of the drone, for example, by launching a GPS spoofing attack or WIFI attack, adversaries can get hold of important information. RF signals are used to control UAVs, but this does not work for clusters. Hence, we use wireless networking for UAV clusters. We use the WIFI module for this, but this, too, has vulnerabilities. In this paper, we have attempted to strengthen the security layer for UAV communication by exploring various security threats.

Downloads

Download data is not yet available.

References

[1]. Huang Lu, Jie Li and Mohsen Guizani ,"Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks",IEEE Transactions on Parallel and Distributed Systems,vol. 25,no. 3,March ,pp. 750-761,2014.
[2]. Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos and Joel J. P. C. Rodrigues,,"Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment" IEEE Internet of Things Journal , vol. 6,no. 2 , April ,pp. 3572-3584 ,2019.
[3]. Air Force Institute of Technology, “A secure Group Communication Architecture For a Swarm of Autonomous Unmanned Aerial Vehicles”, DC. Department of Air Force of the United State, 2008
[4]. Ahmad Y. Javaid,Weiqing Sun,Vijay K. Devabhaktuni,Mansoor Alam,”Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System”,
[5]. Navneet Verma, Suman Sangwan, Sukhdeep Sangwan, Devender Parsad,”IoT Security Challenges and Counters Measures”,International Journal of Recent Technology and Engineering (IJRTE)ISSN: 2277-3878, Volume-8 Issue-3, September 2019.
[6]. Leela Krishna C. G. and Robin R. Murphy,”A Review on Cybersecurity Vulnerabilities for Unmanned Aerial Vehicles ”,2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR)Shanghai, China, October 11-13, 2017.
Published
2020-03-26
How to Cite
Joseph, R., Iyer, S., Nambiar, A., Badguja, P., & Shetty, D. (2020). An Architecture to Secure (UAV) Cluster Communication. Asian Journal For Convergence In Technology (AJCT), 5(3), 113-117. Retrieved from http://asianssr.org/index.php/ajct/article/view/931