Unmanned aerial vehicle smart device ground control station cyber security threat model

The Department of the Defense has transitioned smart devices into the battlefield as a portable hand-held unmanned aerial vehicle ground control station without adequate cyber security protections, putting critical mission data at risk to cyber security attacks. Industry has developed software apps for smart phones and tablets that allows soldiers to not only pilot unmanned aerial vehicles (UAVs) but to share and receive intelligence and reconnaissance videos and images remotely from the ground control station (GCS) or directly from the UAV. The Department of Defense has not developed a secure communication network that will support a large quantity of smart devices, nor certification, standards or policies for operation of secure smart devices. Therefore, mission critical information will be shared through unsecured, mobile and wireless networks and through unclassified, unsecure smart technology that are vulnerable to cyber security risks. Lack of security of the mobile and wireless networks and smart devices could result in the unintentional sharing of data as well as loss of control of the UAV to enemies. The Department of Defense has failed to develop a threat model and risk assessment to identify the cyber security threats and ensure the proper security countermeasures are in place. This paper will analyze the cyber security vulnerabilities within the communication links, smart devices hardware, specifically smart phones and tablets, and software applications to develop a risk model of the threat profile of the GCS networking hub. This model will help designers and users of the military and civilian UAV communities to understand the threat profile of the GCS networking hub to develop a secure communication network based upon the vulnerabilities identified for smart phones and tablets.

[1]  Charlie Miller,et al.  Mobile Attacks and Defense , 2011, IEEE Security & Privacy.

[2]  Helen J. Wang,et al.  Smartphone attacks and defenses , 2004 .

[3]  E. Cummins,et al.  Best security practices for android, blackberry, and iOS , 2012, 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT).

[4]  Ravi Sharma,et al.  Study of Latest Emerging Trends on Cyber Security and its challenges to Society , 2012 .

[5]  Dimitris Gritzalis,et al.  A Risk Assessment Method for Smartphones , 2012, SEC.

[6]  Marwan Omar,et al.  CYBER SECURITY AND MOBILE THREATS: THE NEED FOR ANTIVIRUS APPLICATIONS FOR SMART PHONES , 2012 .

[7]  F. Ashcroft,et al.  VIII. References , 1955 .

[8]  R. Holloway,et al.  The cyber crime threat on mobile devices , 2012 .

[9]  Igor Bernik,et al.  Mobile Devices and Corporate Data Security , .

[10]  Yuval Elovici,et al.  Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.

[11]  Jessica Keyes Guidelines for Managing and Securing Mobile Devices in the Enterprise , 2013 .

[12]  Marin Silic,et al.  Emerging security threats for mobile platforms , 2011, 2011 Proceedings of the 34th International Convention MIPRO.

[13]  Bharat Bhargava,et al.  Secure Wireless Network with Movable Base Stations , 2003 .

[14]  Ralph Kohler,et al.  Infrastructure, middleware, and applications for portable cellular devices in tactical edge networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[15]  Neal Leavitt,et al.  Mobile Security: Finally a Serious Problem? , 2011, Computer.

[16]  Steve Mansfield-Devine,et al.  Android architecture: attacking the weak points , 2012, Netw. Secur..

[17]  Yong Wang,et al.  Smartphone Security Challenges , 2012, Computer.

[18]  Chang-Joo Moon,et al.  Ground System Software for Unmanned Aerial Vehicles on Android Device , 2013 .

[19]  M. Dunn,et al.  NONFORMAL, INFORMAL EDUCATION AND POVERTY REDUCTION – A ROLE FOR TVET? , 2012 .

[20]  John P. O'Sullivan Potential Vulnerabilities of a USMC Tactical Wireless Local Area Network , 2001 .

[21]  Chris Rose Smart Phone, Dumb Security , 2011, BIS 2011.

[22]  Dongho Won,et al.  A Practical Analysis of Smartphone Security , 2011, HCI.