An Architecture to Secure (UAV) Cluster Communication

  • Richard Joseph
  • Sreevidya Iyer
  • Anjali Nambiar
  • Purva Badguja
  • Dhanashree Shetty
Keywords: drone security, UAV, cluster communication, IBOOS protocol, iot security

Abstract

UAVs are being increasingly used in military and commercial areas alike. They often carry sensitive information making them vulnerable to cybersecurity attacks. Potential security vulnerabilities may also exist in the modules used for functioning of the drone, for example, by launching a GPS spoofing attack or WIFI attack, adversaries can get hold of important information. RF signals are used to control UAVs, but this does not work for clusters. Hence, we use wireless networking for UAV clusters. We use the WIFI module for this, but this, too, has vulnerabilities. In this paper, we have attempted to strengthen the security layer for UAV communication by exploring various security threats.

References

[1]. Huang Lu, Jie Li and Mohsen Guizani ,"Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks",IEEE Transactions on Parallel and Distributed Systems,vol. 25,no. 3,March ,pp. 750-761,2014.
[2]. Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos and Joel J. P. C. Rodrigues,,"Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment" IEEE Internet of Things Journal , vol. 6,no. 2 , April ,pp. 3572-3584 ,2019.
[3]. Air Force Institute of Technology, “A secure Group Communication Architecture For a Swarm of Autonomous Unmanned Aerial Vehicles”, DC. Department of Air Force of the United State, 2008
[4]. Ahmad Y. Javaid,Weiqing Sun,Vijay K. Devabhaktuni,Mansoor Alam,”Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System”,
[5]. Navneet Verma, Suman Sangwan, Sukhdeep Sangwan, Devender Parsad,”IoT Security Challenges and Counters Measures”,International Journal of Recent Technology and Engineering (IJRTE)ISSN: 2277-3878, Volume-8 Issue-3, September 2019.
[6]. Leela Krishna C. G. and Robin R. Murphy,”A Review on Cybersecurity Vulnerabilities for Unmanned Aerial Vehicles ”,2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR)Shanghai, China, October 11-13, 2017.
Published
2020-03-26
How to Cite
Joseph, R., Iyer, S., Nambiar, A., Badguja, P., & Shetty, D. (2020). An Architecture to Secure (UAV) Cluster Communication. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 5(3), 113-117. Retrieved from https://asianssr.org/index.php/ajct/article/view/931

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.