How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network?

Security issues in unmanned aerial vehicle (UAV) networks attract the attention of both industry and research community. This is due to the large number of attacks that can target such networks with a goal for instance to jam the communication, disturb the network operation, inject wrong data, etc. In this paper, we propose and implement a cyber security system to protect the UAVs against the most dangerous threats: cyber-attacks that target the data integrity and network availability. Our system is based on a cyber detection mechanism to promptly detect these attacks as soon as they unfold. Minimizing false positives and false negatives rates is a major issue since classifying a legitimate node as an intruder and vice versa may compromises the efficiency of the security system . Thereby, to address this issue, a threat estimation model based on Belief approach is proposed. Simulation results show that our security system exhibits a high accuracy detection compared to cyber detection system proposed in current literature.

[1]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[2]  Xinming Ou,et al.  Prioritizing intrusion analysis using Dempster-Shafer theory , 2011, AISec '11.

[3]  Inseok Hwang,et al.  Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.

[4]  Daniel P. Shepard,et al.  Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .

[5]  Jörg Widmer,et al.  Contention-based forwarding for mobile ad hoc networks , 2003, Ad Hoc Networks.

[6]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[7]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[8]  Gonzalo Pajares,et al.  Overview and Current Status of Remote Sensing Applications Based on Unmanned Aerial Vehicles (UAVs) , 2015 .

[9]  S Bhattacharya,et al.  Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.

[10]  Sidi-Mohammed Senouci,et al.  Efficient data dissemination in cooperative vehicular networks , 2013, Wirel. Commun. Mob. Comput..

[11]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[12]  Sidi-Mohammed Senouci,et al.  Network connectivity and area coverage for UAV fleet mobility model with energy constraint , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[13]  Ing-Ray Chen,et al.  Specification based intrusion detection for unmanned aircraft systems , 2012, Airborne '12.

[14]  Zdobysław Goraj,et al.  Security analysis of uav radio communication system , 2009 .

[15]  Christian Bettstetter,et al.  Channel measurements over 802.11a-based UAV-to-ground links , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[16]  Javier Gozálvez,et al.  Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks , 2013, Comput. Networks.

[17]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.