A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud Architecture

An unmanned aerial vehicle (UAV) is an autonomous flying robot that has attracted the interest of several communities because of its capacity to increase the safety and productivity of labor. In terms of software engineering, UAV system development is extremely difficult because the focus is not only on functional requirement fulfillment, but also on nonfunctional requirements such as security and safety, which play a crucial role in mission success. Consequently, architecture robustness is very important, and one of the most common architectures developed is based on a centralized pattern in which all UAVs are controlled from a central location. Even though this is a very important problem, many developers must expend a great deal of effort to adapt and improve security. This is because there are few practical perspectives of security development in the context of UAV system development; therefore, the study of attack and defense patterns in centralized architecture is required to fill this knowledge gap. This paper concentrates on enhancing the security aspect of UAV system development by examining attack and defense patterns in centralized architectures. We contribute to the field by identifying 26 attack variations, presenting corresponding countermeasures from a software analyst’s standpoint, and supplying a node.js code template for developers to strengthen their systems’ security. Our comprehensive analysis evaluates the proposed defense strategies in terms of time and space complexity, ensuring their effectiveness. By providing a focused and in-depth perspective on security patterns, our research offers crucial guidance for communities and developers working on UAV-based systems, facilitating the development of more secure and robust solutions.

[1]  Hassan Jalil Hadi,et al.  A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs , 2023, J. Netw. Comput. Appl..

[2]  Nawaf Qasem Hamood Othman,et al.  Unmanned aerial vehicles (UAVs): practical aspects, applications, open challenges, security issues, and future trends , 2023, Intelligent Service Robotics.

[3]  F. Yu,et al.  UAV SECaaS: Game-Theoretic Formulation for Security as a Service in UAV Swarms , 2022, IEEE Systems Journal.

[4]  Meng Li,et al.  Eavesdropping and Anti-Eavesdropping Game in UAV Wiretap System: A Differential Game Approach , 2022, IEEE Transactions on Wireless Communications.

[5]  Madhusanka Liyanage,et al.  A Survey on the Convergence of Edge Computing and AI for UAVs: Opportunities and Challenges , 2022, IEEE Internet of Things Journal.

[6]  Muhammad R. A. Khandaker,et al.  Secure data collection via UAV-carried IRS , 2022, ICT Express.

[7]  M. Jenihhin,et al.  A Survey on UAV Computing Platforms: A Hardware Reliability Perspective , 2022, Sensors.

[8]  Nan Sha,et al.  Secure transmission in satellite-UAV integrated system against eavesdropping and jamming: A two-level stackelberg game model , 2022, China Communications.

[9]  Ghada H. Alsuhli,et al.  A survey on the role of UAVs in the communication process: A technological perspective , 2022, Comput. Commun..

[10]  Linga Reddy Cenkeramaddi,et al.  Improving Quality-of-Service in Cluster-Based UAV-Assisted Edge Networks , 2022, IEEE Transactions on Network and Service Management.

[11]  V. G. Vassilakis,et al.  A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks , 2022, Ad Hoc Networks.

[12]  L. Chaari,et al.  Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures , 2022, Ad Hoc Networks.

[13]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of UAVs , 2021, Comput. Networks.

[14]  Mohsen Guizani,et al.  Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey , 2021, IEEE Communications Surveys & Tutorials.

[15]  Haipeng Dai,et al.  Decentralized Federated Learning for UAV Networks: Architecture, Challenges, and Opportunities , 2021, IEEE Network.

[16]  W. Yue,et al.  Cooperative search for dynamic targets by multiple UAVs with communication data losses. , 2021, ISA transactions.

[17]  Fadi Al-Turjman,et al.  UAVs assessment in software-defined IoT networks: An overview , 2020, Comput. Commun..

[18]  Riham Altawy,et al.  Security, Privacy, and Safety Aspects of Civilian Drones , 2016, ACM Trans. Cyber Phys. Syst..

[19]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[20]  Jun Du,et al.  Distributed Artificial Intelligence Enabled Aerial-Ground Networks: Architecture, Technologies and Challenges , 2022, IEEE Access.

[21]  D. Gurjar,et al.  Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey , 2022, IEEE Access.

[22]  Wencheng Yang,et al.  A Review on Security Issues and Solutions of the Internet of Drones , 2022, IEEE Open Journal of the Computer Society.

[23]  Kim-Kwang Raymond Choo,et al.  Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.