157 research outputs found
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements
International audienc
Security, privacy and safety evaluation of dynamic and static fleets of drones
Inter-connected objects, either via public or private networks are the near
future of modern societies. Such inter-connected objects are referred to as
Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of
such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such
vehicles are prophesied to take on multiple roles involving mundane to
high-sensitive, such as, prompt pizza or shopping deliveries to your homes to
battlefield deployment for reconnaissance and combat missions. Drones, as we
refer to UAVs in this paper, either can operate individually (solo missions) or
part of a fleet (group missions), with and without constant connection with the
base station. The base station acts as the command centre to manage the
activities of the drones. However, an independent, localised and effective
fleet control is required, potentially based on swarm intelligence, for the
reasons: 1) increase in the number of drone fleets, 2) number of drones in a
fleet might be multiple of tens, 3) time-criticality in making decisions by
such fleets in the wild, 4) potential communication congestions/lag, and 5) in
some cases working in challenging terrains that hinders or mandates-limited
communication with control centre (i.e., operations spanning long period of
times or military usage of such fleets in enemy territory). This self-ware,
mission-focused and independent fleet of drones that potential utilises swarm
intelligence for a) air-traffic and/or flight control management, b) obstacle
avoidance, c) self-preservation while maintaining the mission criteria, d)
collaboration with other fleets in the wild (autonomously) and e) assuring the
security, privacy and safety of physical (drones itself) and virtual (data,
software) assets. In this paper, we investigate the challenges faced by fleet
of drones and propose a potential course of action on how to overcome them.Comment: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics
Systems Conference (DASC'17
Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives
The development of the Internet of Drones (IoD) becomes vital because of a
proliferation of drone-based civilian or military applications. The IoD based
technological revolution upgrades the current Internet environment into a more
pervasive and ubiquitous world. IoD is capable of enhancing the
state-of-the-art for drones while leveraging services from the existing
cellular networks. Irrespective to a vast domain and range of applications, IoD
is vulnerable to malicious attacks over open-air radio space. Due to increasing
threats and attacks, there has been a lot of attention on deploying security
measures for IoD networks. In this paper, critical threats and vulnerabilities
of IoD are presented. Moreover, taxonomy is created to classify attacks based
on the threats and vulnerabilities associated with the networking of drone and
their incorporation in the existing cellular setups. In addition, this article
summarizes the challenges and research directions to be followed for the
security of IoD.Comment: 13 pages, 3 Figures, 1 Table, The 3rd International Symposium on
Mobile Internet Security (MobiSec'18), Auguest 29-September 1, 2018, Cebu,
Philippines, Article No. 37, pp. 1-1
Safe and Secure Support for Public Safety Networks
International audienceAs explained by Tanzi et al. in the first volume of this book, communicating and autonomous devices will surely have a role to play in the future Public Safety Networks. The “communicating” feature comes from the fact that the information should be delivered in a fast way to rescuers. The “autonomous” characteristic comes from the fact that rescuers should not have to concern themselves about these objects: they should perform their mission autonomously so as not to delay the intervention of the rescuers, but rather to assist them efficiently and reliably.</p
Security Architecture for Swarms of Autonomous Vehicles in Smart Farming
Nowadays, autonomous vehicles are incorporated into farms to facilitate manual labour. Being connected vehicles, as IoT systems, they are susceptible to cyber security attacks that try to cause damage to hardware, software or even living beings. Therefore, it is important to provide sufficient security mechanisms to protect both the communications and the data, mitigating any possible risk or harm to farmers, livestock or crops. Technology providers are aware of the importance of ensuring security, and more and more secure solutions can be found on the market today. However, generally, these particular solutions are not sufficient when they are part of complex hybrid systems, since there is no single global solution proposal. In addition, as the number of technologies and protocols used increases, the number of security threats also increases. This article presents a cyber-security architecture proposal for swarms of heterogeneous vehicles in smart farming, which covers all of the aspects recommended by the ISO 7798-2 specification in terms of security. As a result of this analysis, a detailed summary of the possible solutions and available technologies for each of the communication channels of the target system as well as some recommendations are presented.ECSEL JU (H2020–EU.2.1.1.7.–ECSEL RIA) and the Spanish Ministry of Economic Affairs and Digital Transformatio
Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique
The subject of this study is to ensure the cybersecurity of systems of multifunctional UAV fleets (SMF UAV). The purpose of this study is to identify and analyze the risks associated with the cybersecurity of multi-functional UAV fleets, develop models of threats, vulnerabilities, and attacks, and conduct IMECA analysis of cyber-attacks. Tasks: 1) analyze threats that may affect the security of multifunctional UAV fleets; 2) identify system vulnerabilities and their possible consequences in case of exploitation; 3) develop models of the system infrastructure and threats, vulnerabilities, and attacks, considering the specifics of the functionality and communication between system elements; 4) perform a risk-based analysis, identifying and classifying potential threats and their impact. The following results were obtained. The following results were obtained. 1. Cybersecurity threats to multifunctional UAV fleets are described and classified. 2. Identified and analyzed system vulnerabilities and their potential consequences. 3. Developed models of threats, vulnerabilities, and cyberattacks, considering the specifics of the UAV fleet. 4. Conducted a risk-based analysis, determined the level of threat, and developed recommendations for improving the cybersecurity of the UAV fleet based on the results of the IMECA analysis. Conclusions. The research emphasizes the importance of the developed model and tool for the detection and analysis of cyber threats to the SMF UAV. This allows increasing the cybersecurity and reliability of the system and ensuring timely response to cyber threats. Areas for further research: development of a model and method to consider the specifics of cyber threats and the technological characteristics of the SMF infrastructure; development and implementation of proactive protection tools in the context of combined cyber-attacks; and expansion of the scope of these tools in various industries, including smart cities
Hybrid Satellite-Terrestrial Communication Networks for the Maritime Internet of Things: Key Technologies, Opportunities, and Challenges
With the rapid development of marine activities, there has been an increasing
number of maritime mobile terminals, as well as a growing demand for high-speed
and ultra-reliable maritime communications to keep them connected.
Traditionally, the maritime Internet of Things (IoT) is enabled by maritime
satellites. However, satellites are seriously restricted by their high latency
and relatively low data rate. As an alternative, shore & island-based base
stations (BSs) can be built to extend the coverage of terrestrial networks
using fourth-generation (4G), fifth-generation (5G), and beyond 5G services.
Unmanned aerial vehicles can also be exploited to serve as aerial maritime BSs.
Despite of all these approaches, there are still open issues for an efficient
maritime communication network (MCN). For example, due to the complicated
electromagnetic propagation environment, the limited geometrically available BS
sites, and rigorous service demands from mission-critical applications,
conventional communication and networking theories and methods should be
tailored for maritime scenarios. Towards this end, we provide a survey on the
demand for maritime communications, the state-of-the-art MCNs, and key
technologies for enhancing transmission efficiency, extending network coverage,
and provisioning maritime-specific services. Future challenges in developing an
environment-aware, service-driven, and integrated satellite-air-ground MCN to
be smart enough to utilize external auxiliary information, e.g., sea state and
atmosphere conditions, are also discussed
Privaros: A Framework for Privacy-Compliant Delivery Drones
We present Privaros, a framework to enforce privacy policies on drones.
Privaros is designed for commercial delivery drones, such as the ones that will
likely be used by Amazon Prime Air. Such drones visit a number of host
airspaces, each of which may have different privacy requirements. Privaros
provides an information flow control framework to enforce the policies of these
hosts on the guest delivery drones. The mechanisms in Privaros are built on top
of ROS, a middleware popular in many drone platforms. This paper presents the
design and implementation of these mechanisms, describes how policies are
specified, and shows that Privaros's policy specification can be integrated
with India's Digital Sky portal. Our evaluation shows that a drone running
Privaros can robustly enforce various privacy policies specified by hosts, and
that its core mechanisms only marginally increase communication latency and
power consumption
Cyber Risk Assessment and Scoring Model for Small Unmanned Aerial Vehicles
The commercial-off-the-shelf small Unmanned Aerial Vehicle (UAV) market is expanding rapidly in response to interest from hobbyists, commercial businesses, and military operators. The core commercial mission set directly relates to many current military requirements and strategies, with a priority on short range, low cost, real time aerial imaging, and limited modular payloads. These small vehicles present small radar cross sections, low heat signatures, and carry a variety of sensors and payloads. As with many new technologies, security seems secondary to the goal of reaching the market as soon as innovation is viable. Research indicates a growth in exploits and vulnerabilities applicable to small UAV systems, from individual UAV guidance and autopilot controls to the mobile ground station devices that may be as simple as a cellphone application controlling several aircraft. Even if developers strive to improve the security of small UAVs, consumers are left without meaningful insight into the hardware and software protections installed when buying these systems. To date, there is no marketed or accredited risk index for small UAVs. Building from similar domains of aircraft operation, information technologies, cyber-physical systems, and cyber insurance, a cyber risk assessment methodology tailored for small UAVs is proposed and presented in this research. Through case studies of popular models and tailored mission-environment scenarios, the assessment is shown to meet the three objectives of ease-of-use, breadth, and readability. By allowing a cyber risk assessment at or before acquisition, organizations and individuals will be able to accurately compare and choose the best aircraft for their mission
- …