Securing Authentication and Detecting Malicious Entities in Drone Missions
Abstract
:1. Introduction
- Passive attacks. Passive attacks involve monitoring communication channels without altering the data being transmitted. Attackers use techniques such as eavesdropping to capture unencrypted messages or metadata. For example:
- -
- By intercepting GPS coordinates transmitted between drones, attackers can infer the location and trajectory of a drone group, compromising operational secrecy.
- -
- Monitoring command messages allows adversaries to predict future actions, posing risks in military or sensitive commercial applications.
These attacks can lead to significant breaches of confidentiality and privacy, as attackers gain insight into sensitive operations without leaving traces. - Active attacks. Active attacks involve direct tampering with or manipulation of communication. Examples include:
- -
- Man-in-the-middle (MITM) attacks: An attacker intercepts communication between drones, modifies commands, or relays altered messages. For instance, false GPS coordinates can redirect drones to unintended locations.
- -
- Data injection: Adversaries insert malicious commands or alter payload data, leading to undesired behavior such as collisions or operational failures. A notable example is spoofing drone communication to execute malicious tasks, which has been documented in incidents involving unprotected communication protocols.
- Multi-layer encryption. Modern drone systems employ advanced encryption algorithms such as AES (Advanced Encryption Standard) or ChaCha20 to ensure the confidentiality and integrity of communication. These methods protect data across multiple communication layers, reducing the risk of interception or unauthorized access.
- Link-layer protection. Protocols like WPA3 or custom secure link-layer solutions are implemented to safeguard drone-to-drone and drone-to-ground station communications. These protocols focus on preventing man-in-the-middle attacks and ensuring secure handshakes between devices.
- Blockchain for secure communication. Emerging technologies such as blockchain are being integrated to create immutable communication logs and facilitate trustless communication between drones. This approach addresses challenges like data tampering and unauthorized commands.
- Artificial intelligence and intrusion detection systems. AI-driven systems are increasingly used to monitor network traffic in real time, detect anomalies, and flag potential security breaches, ensuring proactive threat mitigation.
- Standardization efforts. International bodies such as ETSI (European Telecommunications Standards Institute) are developing guidelines to standardize security measures for drone communication, promoting interoperability and enhanced security.
2. Related Works
- Malicious device detection. Some models rely on signature-based or rule-based mechanisms, which are ineffective against novel or sophisticated attacks. For instance, ref. [23] proposed a framework for anomaly detection in drone communications, but it struggleed with accurately identifying malicious devices in dynamic or large-scale drone networks. This limitation poses a critical security risk, especially in environments with evolving threats.
- Resource efficiency. Many existing approaches employ computationally intensive cryptographic algorithms or require constant communication overhead, leading to excessive energy consumption. For example, the model described in [24] achieves high security but at the cost of reduced battery life and increased latency, making it unsuitable for real-time drone operations or long-duration missions.
- Corruption of a drone, which can:
- a.
- provide false data according to its part of the mission within the group,
- b.
- conduct action against the mission,
- c.
- corrupt other drones,
- d.
- attack other drones.
- Corruption of communications between drones by blocking group authentication methods.
- Corruption of communications between the drones and the control base, resulting in critical situations among which the most important are the following:
- a.
- base misinformation on flight parameters,
- b.
- drone group mission change,
- c.
- identification of action strategies and their modification.
3. Secure Communication and Malicious Entity Detection
3.1. Action Model Description
- Detection and initial response. The drone detecting the threat sends an immediate alert to the rest of the group and the ground station. Based on the severity of the event, a dynamic priority shift occurs, reallocating resources to focus on the restricted zone.
- Reallocation of roles.
- -
- The nearest drone(s) are reassigned to closely monitor the intruder’s activity, switching from their original task to focus on high-resolution imaging and live data transmission.
- -
- Drones farther from the event area maintain their original surveillance tasks to ensure mission continuity.
- Collaborative decision-making. The group employs real-time decision-making algorithms to optimize positioning.
- -
- Drones form a perimeter around the restricted zone, ensuring complete coverage and minimizing blind spots.
- -
- Based on the dynamic threat assessment, drones adjust their altitude and camera angles to maximize data collection.
- Emergency escalation. If the threat level escalates (e.g., detection of weapons or hostile behavior), the model triggers an emergency protocol. This includes:
- -
- Notifying the base with live data streams.
- -
- Initiating pre-defined evasion or retreat strategies to ensure the safety of the drones.
- Post-event adjustment. Once the situation stabilizes, the model re-evaluates the mission plan:
- -
- The drones previously reassigned return to their initial tasks.
- -
- The data collected during the event are prioritized for analysis to refine future decision-making strategies.
- Jamming attacks. Jamming involves intentional interference with communication signals, disrupting drone coordination. The model responds by
- -
- Switching to alternate frequency bands or communication protocols to maintain connectivity.
- -
- Implementing frequency-hopping spread spectrum (FHSS) techniques to minimize the impact of jamming.
- -
- Activating pre-programmed autonomous behaviors in drones to ensure mission continuity even during signal loss.
- Hijacking attacks. Hijacking occurs when an attacker gains unauthorized control over a drone. The response measures include
- -
- Utilizing encrypted communication channels and mutual authentication protocols to prevent unauthorized access.
- -
- Detecting anomalies in control signals and triggering an immediate lockdown mode, where the drone terminates external commands and switches to safe-mode operation.
- -
- Broadcasting an alert to the ground station and nearby drones to initiate collaborative threat mitigation.
- Spoofing attacks. Spoofing involves deceiving drones with false GPS signals or data. The action model mitigates this by
- -
- Incorporating redundant sensors (e.g., inertial navigation systems) to cross-verify GPS data and identify inconsistencies.
- -
- Implementing real-time validation of navigation data against predefined mission parameters.
- Physical attacks. Physical attacks, such as direct damage or interception of drones, are countered through
- -
- Collaborative maneuvers where nearby drones assist in evading threats.
- -
- Deploying geofencing techniques to avoid high-risk areas and establishing a safe return-to-home protocol.
3.2. Model Abstraction and Parameterization
- Parameter synergy in mission execution. We consider a scenario where a UAV group is tasked with coordinating a search-and-rescue mission in a disaster zone. The key parameters and their interactions include:
- -
- Bandwidth allocation and data latency: Efficient bandwidth allocation ensures timely data transmission between drones and the control center. However, insufficient bandwidth or high latency can delay critical updates, reducing mission effectiveness integrated into parameters .
- -
- Signal strength and coverage: Strong signal strength facilitates reliable communication over longer distances. However, if coverage areas overlap excessively, it may cause interference, reducing overall network efficiency integrated into parameters .
- -
- Energy consumption and task assignment: The energy consumption parameter interacts with task assignments. Drones with higher energy reserves are prioritized for tasks requiring extended coverage, while drones with lower reserves are reassigned to less energy-intensive roles, integrated in .
These parameters work synergistically to optimize mission execution, ensuring that drones maintain connectivity, adapt dynamically to task demands, and preserve operational continuity. - Impact on mission efficiency and safety,
- -
- Efficiency: Optimal parameter settings reduce communication delays, enhance coordination, and minimize resource wastage, allowing the UAV group to cover larger areas and complete tasks faster, described by .
- -
- Safety: Adjusting signal strength and coverage reduces the risk of communication loss in critical areas, while energy-aware task reassignment prevents drones from depleting their batteries during mission-critical phases, continuously computed through .
- Parameter optimization. The parameter optimization process in this model is based on
- -
- Simulation-based analysis: Parameters are tested in simulated environments to identify optimal values that maximize communication reliability, calculated in relation with and .
- -
- Dynamic adjustment: During missions, parameters are dynamically adjusted based on real-time feedback. For instance, bandwidth allocation is increased for drones handling high-priority tasks or transmitting large amounts of data, calculated in relation with and .
- Key Generation
- ECC: Key generation involves scalar multiplication on elliptic curves, which is computationally intensive, especially for larger key sizes (e.g., 256 bits).
- Proposed model: The key generation process is optimized by leveraging precomputed parameters. The parameters that characterize the subspaces are calculated by the control basis, reducing computational overhead. By calculating the values in a subspace, the required power is reduced to (where represents computing power required in the iterated calculation at the top point and m represents the number of subspaces taken into account) from a mathematical point of view. A 38% reduction is deduced from experiments.
- Encryption and decryption
- ECC: Encryption requires multiple scalar multiplications and additions, resulting in high complexity , where n represents the key size.
- Proposed model: The encryption process is streamlined using lightweight operations, achieving a complexity of , making it more suitable for resource-constrained UAV systems. Decryption similarly benefits from optimized calculations, showing a 15% improvement in computational efficiency.
- Energy consumption
- ECC: High computational demands lead to significant energy consumption, which is a critical limitation for drones with limited power reserves.
- Proposed model: The model reduces energy usage by minimizing redundant computations due to the fact that we work on subspaces defined over elliptic curves, enabling prolonged operation times for drones. From the experiments, an increase of approximately 12% in flight time is deduced.
- Scope of application
- ECC: While ECC provides strong security, its complexity limits its applicability in real-time or energy-critical applications.
- Proposed model: By balancing security with computational efficiency, the proposed model is more applicable to UAV scenarios requiring fast and reliable encryption.
3.3. Mathematical Model
3.4. Algorithmic Model
Algorithm 1 ASes |
|
Algorithm 2 ASes MalU |
|
3.5. Experimental Results
- Drone Characteristics and Their Influence on Results
- Group Drones Hardware Specifications
- -
- Processor: Raspberry Pi 4 Model B with a quad-core 1.5 GHz CPU;
- -
- RAM: 8 GB;
- -
- Communication Module: SX1262 LoRa, frequency band 868 MHz;
- -
- Sensors: Multi-modal sensors for environmental data collection.
Role:- -
- These drones served as the primary computational nodes, handling cryptographic computations, inter-group communication, and real-time risk assessments.
Impact on Results:- -
- The high computational capacity ensured that delays in cryptographic key establishment were minimized, allowing for consistent communication times even under heavy workloads.
- -
- Any variations in results due to computational constraints were negligible for this group.
- Group Drone Hardware Specifications:
- -
- Processor: Single-core SBC with a 1 GHz CPU,
- -
- RAM: 1 GB,
- -
- Communication Module: WiFi with standard 2.4 GHz band,
- -
- Sensors: Basic motion and proximity sensors.
Role:- -
- These drones were responsible for auxiliary tasks, including data collection and relaying information to .
Impact on Results:- -
- The limited computational resources led to longer communication times for inter-group transmissions, particularly during key establishment and risk assessment operations.
- -
- Variability in results was more pronounced for this group due to hardware limitations and increased susceptibility to environmental interference.
- Discussion on Variability
- -
- The observed differences in communication times between and were directly influenced by the disparities in processing power and communication modules.
- -
- For instance, drones in exhibited higher latency during cryptographic operations, which is reflected in the increased overhead for inter-group communications ().
- -
- The results indicate that optimizing hardware configurations, particularly for resource-constrained drones in , could further enhance overall network performance.
- Significance of the Results
- (ms): Represents the time required for direct communication between drones within group under standard conditions. This metric highlights the efficiency of intra-group communication.
- with key establishment (ms): Shows the impact of establishing cryptographic session keys on communication time. The multiplication factor (e.g., ×5.21 for T1) indicates the overhead introduced by the cryptographic computations.
- (ms): Represents the communication time between a drone in group and a drone in group , illustrating the performance of inter-group communication under standard conditions.
- with increased (ms): Highlights the additional overhead caused by increasing the risk assessment factor (), which is used to evaluate the trustworthiness of drones in group .
- Insights from the Results
- -
- Communication Overhead: The results demonstrate that the cryptographic operations, particularly key establishment, significantly increase communication time. However, these operations are essential for ensuring secure interactions.
- -
- Impact of Risk Factors: The increased overhead in inter-group communication with higher values indicates the computational cost of ensuring trust in potentially compromised drones.
- Impact of Key Establishment
- The communication time for increases significantly when keys are established, as shown by the multiplicative factors (e.g., ×5.21 for T1). This trend demonstrates the computational cost associated with cryptographic operations, particularly in secure intra-group communications.
- Similar behavior is observed for , where key establishment further amplifies communication times due to the added complexity of inter-group authentication.
- Effect of Risk Factors
- For , the inclusion of risk factors () results in higher communication times compared to . This trend is consistent across all test cases (T1–T7) and underscores the computational overhead associated with evaluating and addressing potential threats.
- Overall Performance
- Despite the increased communication times, the system maintains acceptable latency levels, ensuring secure and efficient communication. The observed trends validate the effectiveness of the proposed risk assessment and cryptographic processes in real-world scenarios.
- Search-and-rescue in an urban disaster area. In this scenario, a group of drones is deployed to locate survivors in a densely populated urban area affected by a natural disaster. The communication conditions are challenging due to signal interference caused by collapsed buildings and active emergency broadcasts. The model demonstrates its utility as follows:
- Dynamic key management: Secure communication is ensured by dynamically establishing encryption keys between drones and the control center, mitigating the risk of eavesdropping or interference.
- Load balancing: The mathematical model optimizes task allocation by balancing computational and communication loads among drones, ensuring uninterrupted operation even in high-traffic areas.
- Performance outcome: Simulations show a 12% reduction in data latency compared to traditional encryption methods that the client used, with drones successfully covering the area within the operational time limits.
- Surveillance in remote, signal-constrained environments. In this scenario, a drone group monitors wildlife activity in a vast, remote area with limited communication infrastructure. The model handles the following:
- Adaptive communication protocols: It adjusts to low-bandwidth conditions by compressing data and prioritizing critical information, ensuring efficient communication.
- Collaborative decision-making: Drones use the model to share processed data locally, reducing the need for constant uplink communication to the control center.
- Performance outcome: Field tests demonstrate an improvement in energy efficiency compared with the old implementations of the client, as drones operate longer without compromising mission objectives.
- Impact on Battery Life
- -
- Energy demands of key generation: The process of generating keys using elliptic curve cryptography (ECC) involves scalar multiplications, which are computationally intensive and account for approximately 15–25% of the drone’s processor energy usage during the communication phase.
- -
- Key distribution overhead: Transmitting keys securely adds additional communication overhead, especially in environments with low signal quality, further consuming energy.
- Optimization Solutions
- -
- Pre-computed keys: Pre-generating a pool of keys during idle periods significantly reduces computational demands during mission-critical phases. This approach minimizes on-the-fly computations and enhances battery efficiency.
- -
- Batch key distribution: Instead of distributing keys individually, batching key exchanges reduces the frequency of communication events, lowering energy costs.
- -
- Lightweight cryptographic algorithms: Substituting ECC with particular subspaces for frequent operations and complete ECC spaces for control base ones balances security and efficiency.
- -
- Energy-aware task scheduling: Prioritizing drones with higher battery reserves for computationally intensive tasks ensures that drones with lower energy are conserved for simpler roles.
- -
- Hardware acceleration: Leveraging drone hardware with dedicated cryptographic accelerators can reduce the processing time for key generation, thereby decreasing overall energy consumption.
- Experimental Analysis. Simulations show that the above optimizations can reduce the energy consumption of the key exchange process by up to 8%, extending the operational time of drones by approximately 12% under typical mission conditions. The hybrid cryptographic approach in particular demonstrates a 15% improvement in computational efficiency while maintaining robust security guarantees.
- Impact and Mitigation of False Positives
- Impact of False Positives on Task Execution
- -
- Operational Disruption
- -
- Misidentified drones are removed from the mission, leading to a reduction in available resources and potentially compromising mission objectives, especially in scenarios requiring a high degree of coordination.
- -
- For example, during critical search-and-rescue missions, the removal of a legitimate drone might result in delays or incomplete coverage of the target area.
- -
- Resource Reallocation
- -
- The remaining drones must compensate for the loss, increasing their workload and energy consumption. This redistribution may also introduce latency in task completion.
- -
- Trust Erosion
- -
- Frequent false positives could reduce trust in the system, particularly in collaborative operations where drones must rely on each other for data exchange and coordination.
- Strategies to Mitigate False Positives
- -
- Enhanced Risk Assessment
- -
- A multi-stage risk evaluation process should be implemented where initial flags are validated through additional criteria, such as behavioral analysis or cross-validation with other drones in the network.
- -
- Machine learning techniques should be incorporated to improve the accuracy of risk prediction by dynamically learning from mission data and reducing misclassification.
- -
- Redundancy in Identification
- -
- A group-based decision mechanism should be sued where multiple drones or control nodes must agree on a device’s malicious status before it is excluded.
- -
- This reduces the likelihood of false positives caused by isolated anomalies or temporary communication issues.
- -
- Continuous Monitoring
- -
- Instead of immediately excluding a flagged drone, the system can place it under heightened monitoring while allowing limited participation in the mission.
- -
- If the drone continues to exhibit anomalous behavior, it can be escalated for exclusion.
- -
- Feedback Mechanism
- -
- A feedback loop should be introduced where flagged drones can request re-evaluation by providing additional data or undergoing alternative authentication protocols.
- -
- This mechanism helps to recover misidentified drones and restore their functionality within the network.
- Algorithmic Improvements to Reduce False Positives
- -
- Parameter Calibration
- -
- The sensitivity of thresholds used in the risk assessment model should be adjusted to better balance detection accuracy and false positive rates.
- -
- For example, tuning and related parameters based on historical mission data can significantly improve classification reliability.
- -
- Context-Aware Adjustments
- -
- Environmental factors, such as signal interference or network congestion, should be considered when evaluating drone behavior.
- -
- Drones operating in high-risk environments may exhibit temporary anomalies that should not be misclassified as malicious.
- Experimental Validation of Mitigation Strategies
- -
- Simulation Results
- -
- Preliminary tests of the proposed strategies demonstrate a reduction in false positives and a corresponding improvement in task completion rates.
- -
- Future work will focus on refining these approaches through real-world deployments in additional mission scenarios, when they are requested by the beneficiary.
- Comparative Analysis with Existing Models
- Malicious Device Detection
- -
- Existing models such as the anomaly detection framework proposed in [38] often struggle to accurately identify malicious devices in large-scale or dynamic drone networks. These methods rely heavily on predefined rules, making them vulnerable to sophisticated or novel attacks.
- -
- Our Contribution: By integrating a dynamic risk assessment mechanism and redundant data verification, our model improves detection accuracy, especially in heterogeneous and large-scale networks. This capability is critical for ensuring mission integrity in real-world scenarios; more specifically, the number of impersonations was reduced to zero.
- Resource Efficiency
- -
- Solutions such as those in [39] achieve high security at the expense of significant computational and energy overhead, limiting their applicability for resource-constrained drones.
- -
- Our Contribution: The proposed model employs optimized cryptographic computations and lightweight encryption techniques. This results in reduced energy consumption and computational overhead, as evidenced by the experimental results where communication latency and power usage were improved by 15% and 12%, respectively.
- Scalability and Adaptability
- -
- Traditional models, including [40], are designed for single-class or homogenous drone networks, lacking flexibility in adapting to heterogeneous environments.
- -
- Our Contribution: By introducing a hierarchical approach with tailored protocols for and , our framework supports diverse drone capabilities and hierarchical communication structures, enhancing adaptability across varied mission scenarios.
- Real-World Validation
- -
- Many studies rely solely on simulation-based testing, limiting their applicability to real-world environments. For example, [41] proposed an IoD security model but did not validate it under real-world mission conditions.
- -
- Our Contribution: The proposed framework was validated in 23 test missions under controlled and 207 realistic conditions, demonstrating its robustness against active and passive attacks.
4. Model Limitations
- After performing the ASes protocol, a common session key is established or, in case the protocol fails (impersonated drone/man-in-the-middle attack), no session key is established and the drone is considered malicious and removed from the mission.
- Due to the way in which devices in and parameters and are calculated, the necessary computing power, in case P is stored on more than 512b, affects the energy consumption; more precisely, in the tests carried out in the real environment, the autonomy decreased by 17% on average in the case of tests in combat missions, but for normal missions, as described in the article, the improvement was 8%.
- Table 1 shows the latencies associated with the transmissions of three of the drones from to the drones from , as well as the comparison between the latencies in the case of communications to restore the keys for the amounts of time associated with the parts of the mission or in case of increasing the degree of risk.
- Mitigation Strategies
- Session Key Establishment and Failure Cases
- -
- Challenge: When the ASes protocol fails due to impersonation or a man-in-the-middle attack, no session key is established, and the affected drone is removed from the mission.
- -
- Mitigation Strategy:
- -
- Redundancy in key establishment protocols should be implemented by utilizing fallback mechanisms such as pre-shared keys or secondary authentication channels.
- -
- Dynamic reallocation of tasks to unaffected drones should be enabled to minimize operational disruptions.
- Energy Consumption for Large Parameters ()
- -
- Challenge: The computation of parameters and requires significant processing power, particularly when P exceeds 512 bits, resulting in a 17% reduction in autonomy during combat missions.
- -
- Mitigation Strategy:
- -
- The computation of should be optomized using lightweight cryptographic operations or elliptic curve-based methods to reduce processing overhead.
- -
- Adaptive parameter sizing should be employed based on mission requirements; for example, smaller P values can be used in less critical missions to conserve energy.
- -
- Drones should be equipped with energy-efficient processors or supplemental power sources (e.g., solar panels) to sustain extended operations.
- Communication Latencies for Inter-Group Transmissions
- -
- Challenge: As shown in Table 1, inter-group communications and key restoration operations introduce higher latencies, particularly under increased risk conditions.
- -
- Mitigation Strategy:
- -
- Bandwidth-efficient communication protocols (e.g., Time-Division Multiple Access or Frequency-Hopping Spread Spectrum) should be used to reduce latency.
- -
- Hierarchical communication schemes should be implemented to offload certain tasks from to intermediate drones, minimizing direct communication delays.
- -
- Latency-sensitive transmissions should be prioritized by dynamically scheduling tasks based on mission-critical needs.
- Increased Latency Under High-Risk Scenarios
- -
- Challenge: High-risk scenarios further amplify communication delays, as highlighted in Table 1.
- -
- Mitigation Strategy:
- -
- A tiered risk assessment model should be introduced, where only critical drones undergo rigorous risk evaluation while others follow a streamlined process.
- -
- Caching techniques should be employed to temporarily store keys locally, reducing the need for frequent recalculations during high-risk missions.
5. Conclusions and Future Work
Author Contributions
Funding
Conflicts of Interest
References
- Pong, B. The Art of Drone Warfare. J. War Cult. Stud. 2022, 15, 377–387. [Google Scholar] [CrossRef]
- Fatic, A. The Ethics of Drone Warfare. Philos.-Soc.-Filoz. I Drus. 2017, 28, 349–364. [Google Scholar] [CrossRef]
- Yerim, C.; Park, T.J.; Yunhong, M. Usefulness of Drones in the Urban Delivery System: Solving the Vehicle and Drone Routing Problem with Time Window. J. Korean Oper. Res. Manag. Sci. Soc. 2016, 41, 75–96. [Google Scholar] [CrossRef]
- Aker, C.; Kalkan, S. Using Deep Networks for Drone Detection. In Proceedings of the 14th IEEE International Conference on Advanced Video and Signal Based Surveilance (AVSS), Lecce, Italy, 29 August–1 September 2017. [Google Scholar] [CrossRef]
- Chaudhary, D.; Soni, T.; Vasudev, K.L.; Saleem, K. A modified lightweight authenticated key agreement protocol for Internet of Drones. Internet Things 2023, 21, 100669. [Google Scholar] [CrossRef]
- Kumar, A.; Yadav, A.S.; Gill, S.S.; Pervaiz, H.; Ni, Q.; Buyya, R. A Secure Drone-to-Drone Communication and Software Defined Drone Network-Enabled Traffic Monitoring System. Simul. Model. Pract. Theory 2022, 120, 102621. [Google Scholar] [CrossRef]
- Diao, Y.; Zhang, Y.; Zhao, G.; Khamis, M. Drone Authentication via Acoustic Fingerprint. In Proceedings of the 38th Annual Computer Security Applications Conference, ACSAC, Austin, TX, USA, 5–9 December 2022; pp. 658–668. [Google Scholar] [CrossRef]
- Aydin, Y.; Kurt, G.K.; Ozdemir, E.; Yanikomeroglu, H. Group Authentication for Drone Swarms. In Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, Cleveland, OH, USA, 12–14 October 2021. [Google Scholar] [CrossRef]
- Amin, R.; Jayaswal, S.; Sureshkumar, V.; Rathore, B.; Jha, A.; Abdussami, M. IoDseC++: Authenticated key exchange protocol for cloud-enable internet of drone communication. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 9529–9542. [Google Scholar] [CrossRef]
- Ashraf, S.N.; Manickam, S.; Zia, S.S.; Abro, A.A.; Obaidat, M.; Uddin, M.; Abdelhaq, M.; Alsaqour, R. IoT empowered smart cybersecurity framework for intrusion detection in internet of drones. Nat. Sci. Rep. 2023, 13, 18422. [Google Scholar] [CrossRef]
- Nguyen, P.; Truong, H.; Ravindranathan, M.; Nguyen, A.; Han, R.; Vu, T. Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone’s RF Communication. In Proceedings of the 15th ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), Niagara Falls, NY, USA, 19–23 June 2017; pp. 211–224. [Google Scholar] [CrossRef]
- Nam, D.; Yeom, S. Moving Vehicle Detection and Drone Velocity Estimation with a Moving Drone. Int. J. Fuzzy Log. Intell. Syst. 2020, 20, 43–51. [Google Scholar] [CrossRef]
- Akhloufi, M.A.; Arola, S.; Bonnet, A. Drones Chasing Drones: Reinforcement Learning and Deep Search Area Proposal. Drones 2019, 3, 58. [Google Scholar] [CrossRef]
- Sun, M.; Guo, Z.; Li, M. POSTER: Passive Drone Localization Using LTE Signals. In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), San Antonio, TX, USA, 16–19 May 2022; pp. 295–297. [Google Scholar] [CrossRef]
- Delleji, T.; Slimeni, F.; Lafi, M. A C4 Software for Anti-Drone System. Def. Sci. J. 2024, 74, 635–642. [Google Scholar] [CrossRef]
- Owais, M.; Midtiby, H.; Trifon, D.; Hasan, A. Autonomous Drone-Based Antenna Radiation Pattern Characterization. In Proceedings of the International Conference on Unmanned Aircraft Systems (ICUAS), Dubrovnik, Croatia, 21–24 June 2022; pp. 207–213. [Google Scholar] [CrossRef]
- Bretschneider, L.; Bollmann, S.; Houssin-Agbomson, D.; Shaw, J.; Howes, N.; Nguyen, L.; Robinson, R.; Helmore, J.; Lichtenstern, M.; Nwaboh, J.; et al. Concepts for drone based pipeline leak detection. Front. Robot. AI 2024, 11, 1426206. [Google Scholar] [CrossRef]
- Suk, Y.Y. A Criminal Study on Drone. Hannam J. Law Technol. 2019, 25, 83–118. [Google Scholar] [CrossRef]
- Tan, Z.Y.; Karakose, M. Anew approach for drone tracking with drone using Proximal Policy Optimization based distributed deep reinforcement learning. SoftwareX 2023, 23, 101497. [Google Scholar] [CrossRef]
- Studiawan, H.; Ahmad, T.; Santoso, B.J.; Shiddiqi, M.A.; Pratomo, B.A. DroneTimeline: Forensic timeline analysis for drones. SoftwareX 2022, 20, 101255. [Google Scholar] [CrossRef]
- Vetter, R. Security Issues for the Internet of Drones. Computer 2023, 56, 4–5. [Google Scholar] [CrossRef]
- Mekdad, Y.; Aris, A.; Babun, L.; El Fergougui, A.E.; Conti, M.; Lazzereti, R.; Uluagac, S. A survey on security and privacy issues of UAVs. Comput. Netw. 2023, 224, 109626. [Google Scholar] [CrossRef]
- Barbeau, M.; Garcia-Alfaro, J.; Kranakis, E. Risky zone avoidance strategies for drones. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Kingston, ON, Canada, 12–17 September 2021. [Google Scholar] [CrossRef]
- Amin, R.; Islam, S.K.H.; Vijayakumar, P.; Khan, M.K.; Chang, V. A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication. Multimed. Tools Appl. 2018, 77, 11041–11066. [Google Scholar] [CrossRef]
- Teng, M.; Gao, C.; Wang, Z.; Li, X. A communication-based identification of critical drones in malicious drone swarm networks. Complex Intell. Syst. 2024, 10, 3197–3211. [Google Scholar] [CrossRef]
- Zhang, Y.; He, D.; Li, L.; Chen, B. Alightweight authentication and key agreement scheme for Internet of Drones. Comput. Commun. 2020, 154, 455–464. [Google Scholar] [CrossRef]
- Mahdavi, F.; Rajabi, R. Drone Detection Using Convolutional Neural Networks. In Proceedings of the 6th International Conference on Signal Processing and Intelligent Systems (ICSPIS), Tehran, Iran, 23–24 December 2020. [Google Scholar] [CrossRef]
- Kao, D.Y.; Chen, M.C.; Wu, W.Y.; Lin, J.S.; Chen, C.H.; Tsai, F. Drone Forensic Investigation: DJI Spark Drone as A Case Study. In Proceedings of the 23rd KES International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES), Budapest, Hungary, 4–6 September 2019; Volume 159, pp. 1890–1899. [Google Scholar] [CrossRef]
- Almusayli, A.; Zia, T.; Qazi, U.E. Drone Forensics: An Innovative Approach to the Forensic Investigation of Drone Accidents Based on Digital Twin Technology. Technologies 2024, 12, 11. [Google Scholar] [CrossRef]
- Shah, I.A. Drone Industry Security Issues and Challenges in the Context of IoD. In Advances in Information Security, Privacy, and Ethics Cybersecurity Issues and Challenges in the Drone Industry; IGI Global: Hershey, PA, USA, 2024; pp. 310–323. [Google Scholar] [CrossRef]
- Florez, J.A.; Vega, L.A.; Sanchez, E.N.; Loukianov, A.G.; Borras, C. Inducting Chaos on a Drone Network. Ifac Pap. 2021, 54, 99–104. [Google Scholar] [CrossRef]
- Sihag, V.; Choudhary, G.; Choudhary, P.; Dragoni, N. A Systematic Review of Cyber Security and Forensics in Next-Generation Drones. Drones 2023, 7, 430. [Google Scholar] [CrossRef]
- Nikhade, J.R.; Sonekar, S.V. An Analytical Study of Secure Drone Communication Models from a Statistical Perspective. Nanotechnol. Perceptions 2024, 20, 483–490. [Google Scholar]
- Iqbal, F.; Yankson, B.; AlYammahi, M.A.; AlMansoori, N.; Qayed, S.M.; Shah, B.; Baker, T. Drone forensics: Examination and analysis. Int. J. Electron. Secur. Digit. Forensics 2019, 11, 245–264. [Google Scholar] [CrossRef]
- Adoni, W.Y.H.; Nahhal, T.; Aghezzaf, B.; Elbyed, A. The MapReduce-based approach to improve the shortest path computation in large-scale road networks: The case of A* algorithm. J. Big Data 2018, 5, 16. [Google Scholar] [CrossRef]
- Adoni, W.Y.H.; Nahhal, T.; Krichen, M.; El byed, A.; Assayad, I. DHPV: A distributed algorithm for large-scale graph partitioning. J. Big Data 2020, 7, 76. [Google Scholar] [CrossRef]
- Shemanske, T.R. Modern Cryptography and Elliptic Curves; American Mathematical Society: Providence, RI, USA, 2017; 252p. [Google Scholar]
- Jeong, J.Y.; Byun, J.W.; Jeong, I.R. Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones. IEEE Access 2022, 10, 17134–17144. [Google Scholar] [CrossRef]
- Famili, A.; Stavrou, A.; Wang, H.; Park, J.-M. RAIL: Robust Acoustic Indoor Localization for Drones. In Proceedings of the IEEE 95th Vehicular Technology Conference: (VTC-Spring), Helsinki, Finland, 19–22 June 2022. [Google Scholar] [CrossRef]
- Scheau, M.C.; Gabudeanu, L.; Brici, I.; Vilcea, A.L. Preventive cybersecurity steps to enhance drone usage. In Proceedings of the 23rd RSEP International Economics, Finance & Business Conference, Online, 25–26 November 2021; pp. 106–118. [Google Scholar]
- Gharibi, M.; Boutaba, R.; Waslander, L.S. Internet of Drones. IEEE Access 2016, 4, 1148–1162. [Google Scholar] [CrossRef]
(ms) | with Key Establish (ms) | (ms) | with Increased (ms) | |
---|---|---|---|---|
T1 | 29.31 | ×5.21 | 36.19 | ×6.32 |
T2 | 28.42 | ×5.02 | 39.20 | ×7.25 |
T3 | 29.26 | ×5.09 | 41.21 | ×6.22 |
T4 | 28.02 | ×5.30 | 40.56 | ×6.50 |
T5 | 29.36 | ×5.26 | 35.07 | ×5.25 |
T6 | 29.50 | ×4.92 | 39.02 | ×5.27 |
T7 | 29.61 | ×5.83 | 37.01 | ×5.03 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Constantinescu, N.; Ticleanu, O.-A.; Hunyadi, I.D. Securing Authentication and Detecting Malicious Entities in Drone Missions. Drones 2024, 8, 767. https://doi.org/10.3390/drones8120767
Constantinescu N, Ticleanu O-A, Hunyadi ID. Securing Authentication and Detecting Malicious Entities in Drone Missions. Drones. 2024; 8(12):767. https://doi.org/10.3390/drones8120767
Chicago/Turabian StyleConstantinescu, Nicolae, Oana-Adriana Ticleanu, and Ioan Daniel Hunyadi. 2024. "Securing Authentication and Detecting Malicious Entities in Drone Missions" Drones 8, no. 12: 767. https://doi.org/10.3390/drones8120767
APA StyleConstantinescu, N., Ticleanu, O.-A., & Hunyadi, I. D. (2024). Securing Authentication and Detecting Malicious Entities in Drone Missions. Drones, 8(12), 767. https://doi.org/10.3390/drones8120767