Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks

Unmanned aerial vehicles (UAVs) networks are attack-prone networks due to high mobility and distributed nature. Most of the existing approaches focus on prevention instead of analyzing the security vulnerabilities. For an efficient analysis, the interaction between attackers and defenders need to be investigated. Hence, a tree-based attack–defense model for security analysis of multi-UAV networks has been discussed in this paper. An attack–defense tree has been designed that depicts every move of the defender with respect to the attacker's strategies. Using this attack–defense tree, a game theoretic scheme for risk assessment is formulated. The efficiency of the proposed scheme has been evaluated using a case study for the distributed denial-of-service attack.

[1]  Priyadarsi Nanda,et al.  Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions] , 2017, IEEE Consumer Electronics Magazine.

[2]  Joel J. P. C. Rodrigues,et al.  SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment , 2018, IEEE Communications Magazine.

[3]  Mohsen Guizani,et al.  Drone-Assisted Public Safety Networks: The Security Aspect , 2017, IEEE Communications Magazine.

[4]  Sahil Garg,et al.  Accessing risk priority of SSL SYN attack using game theoretic attack defense tree model for VANETs , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[5]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[6]  Kim-Kwang Raymond Choo,et al.  Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Ilker Bekmezci,et al.  SECURITY ISSUES IN FLYING AD-HOC NETWORKS (FANETs) , 2016 .

[8]  Zhenyu Guo,et al.  Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection , 2013, 2013 IEEE Systems and Information Engineering Design Symposium.

[9]  Kai Hong,et al.  Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities , 2014, IEEE Transactions on Vehicular Technology.

[10]  JooSeok Song,et al.  Novel defense mechanism against data flooding attacks in wireless ad hoc networks , 2010, IEEE Transactions on Consumer Electronics.

[11]  Saraju P. Mohanty,et al.  Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment , 2017, IEEE Consumer Electronics Magazine.

[12]  Bo Wan,et al.  An improved cost-based method of Risk Priority Number , 2012, Proceedings of the IEEE 2012 Prognostics and System Health Management Conference (PHM-2012 Beijing).

[13]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[14]  Deepak Puthal,et al.  Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks , 2017, IEEE Consumer Electronics Magazine.