Drone Security: Comparison
Please note this is a comparison between Version 2 by Jessie Wu and Version 1 by Imran Ashraf.

The small-drone technology domain is the outcome of a breakthrough in technological advancement for drones. The Internet of Things (IoT) is used by drones to provide inter-location services for navigation. But, due to issues related to their architecture and design, drones are not immune to threats related to security and privacy. Establishing a secure and reliable network is essential to obtaining optimal performance from drones. While small drones offer promising avenues for growth in civil and defense industries, they are prone to attacks on safety, security, and privacy.

  • aerial vehicles
  • autonomous vehicles
  • cyber-security
  • Internet of Things
  • machine learning

1. Introduction

Drones are commonly utilized for military and defense applications. They come in a range of sizes, from large, 200-foot war machines to small, inch-wide micro drones that fly through the air. Size is a critical factor in determining the appropriate use of a drone. Additionally, the flying range of a drone can vary significantly depending on the type, with some advanced military drones being capable of flying up to 17,000 miles without the need for ground control. Maximum flight time also varies based on factors such as altitude, surface area, and terrain. Drones can fly at varying heights, from just a few meters off the ground to as high as 65,000 feet [1].

2. Threats to Drone Security

Drone security measures comprise multiple layers and types, which are dependent on their usage, size, and control techniques. Typically, drones utilize an IEEE 802.11-based [13][2] Wi-Fi communication protocol [14][3] and include both ground stations and a Wi-Fi network. Due to the absence of encryption technologies in the drone, these gadgets are vulnerable to cyber-attacks and hijack [4]. Man-in-the-middle attacks, which can occur within a range of 2 km, are also a common method used to hijack drones [15][5]. In the military industry, the IoD has become increasingly popular, posing a challenge to privacy and security concerns during design [16][6]. To ensure data protection, privacy issues such as data accessibility, information leakage, encryption, and decryption techniques need to be addressed [17][7]. In recent years, researchers have identified four categories of security threats related to sensor- and protocol-based threats, jammers, and conceded components. Table 1 presents a literature review of these categories.
Table 1.
Frequently occurring data privacy and cyber-security threats to smart drones.
Table 1 demonstrates the review of the literature that primarily focused on identifying cyber-security loopholes in drones, with limited discussions on potential solutions. One potential research avenue has been to utilize encryption algorithms to ensure safe and secure data transmission between the drone and its base station [16][6]. Small drones have obtained popularity due to their size and likely peril to the government and general public’s data privacy [26][18]. Researchers also established a risk challenge for drones [14,27,28,29,30][3][19][20][21][22]. For instance, Tian proposed an operative and smart validation model for the IoD assisted by edge, ensuring the drone networks’ data-related security [31][23]. Similarly, a system was presented by Hell to ensure the safety of drone data in a commercial industrial/factory area [2][24]. In 2019, a gas leakage-sensing drone idea was projected by the authors to ensure timely action to curb the fatal scenario [3][25]. Drones are mainly used for monitoring in the agriculture and security fields.
Over the last decade, drone-related security threats are the talk of the town in the research arena. The privacy issues associated with smart-city drone applications are discussed in [19][9], and Table 1 highlights other important issues. Drone network attacks, prospects, and limitations are also the interest areas of researchers in the cyber-security domain [32][26]. The business sector has similar challenges and applications, as presented by similar studies [5,33,34][27][28][29] using blockchain/crypto technology using 5G and drones based on the IoT for the safe transmission of data [34][29]. This system has limitations in manually identifying the intensity and nature of the threats. A secure and smartly effective drone system with the ability to investigate attacks and implement security measures for drone data integrity is the need of the hour. Some studies have attempted to solve device authentication problems by using key agreement [35][30] and key-enabling data [6][31] for secure drone data delivery. Commercial drones [6,35,36,37][30][31][32][33] are facing the general issue of the hijacking of drones, UAVs, and drones in the agricultural sector [22,38][13][34] aided by the IoT. Solutions to these general issues are proposed in [7][35] and [8][36]. Another concern relating drones and UAVs is GPS (global positioning system) tracking [39][37], which requires robust, authentic, and foolproof resolution. Drone interception and hijacking are also part of the studies carried out in this domain [23,24,25,40][15][16][17][38].

3. Implementation of Drone Security with Machine Learning

ML techniques are classified into semi-supervised, supervised, and unsupervised categories. Cloud computing [41][39], mobile networks [42][40], IoT systems [43][41], and sensor-based wireless networks [44][42] are the areas where ML models have been widely used by researchers to handle cyber-attacks. For example, self-learning models were combined with supervised learning models by Vedula et al. [45][43] to use two features to detect DDoS attacks. They combined LSTM Autoencoder and RF classifier. For the scenarios of all and sparse traffic, their window identification approach achieved accuracy rates of 94% and 93.5%, respectively.
ML techniques are classified into semi-supervised, supervised, and unsupervised categories. Cloud computing [41][39], mobile networks [42][40], IoT systems [43][41], and sensor-based wireless networks [44][42] are the areas where ML models have been widely used by researchers to handle cyber-attacks. For example, self-learning models were combined with supervised learning models by Vedula et al. [45][43] to use two features to detect DDoS attacks. They combined LSTM Autoencoder and RF classifier. For the scenarios of all and sparse traffic, their window identification approach achieved accuracy rates of 94% and 93.5%, respectively. Their proposed hybrid LSTM-RF model showed the best results, with a window size of 100.
No research on ML model usage in drone networks for cyber-attack recognition was found. However, another study suggested a probabilistic approach in a constrained cyber–physical system to control and detect actuation attacks [46][44]. Their research was primarily concerned with the PA2 attack, in which the attacker blocks communication between the actuators and the controller. Based on a hypothesis-testing methodology, a group of parallel detectors was suggested. The detection and control goals were written as two distinct stochastic objective functions using a probabilistic technique to cope with uncertainty. The authors also proposed a drone security access control system and have previously used ML for wireless networks (wi-net) security systems, as shown in Table 2.
Table 2.
Machine learning for frequently occurring data privacy and cyber-security threats to smart drones.
Attack Security Technique Machine Learning Solution
Jamming Secure offloading Q-learning [42,44][40][42], DQN [47][45]
Denial of service Secure offloading Neural networks [41][39], Multivariate correlation analysis [48][46], Q-learning [49][47]
Malware Access control Q/Dyna-Q/PDS [50][48], K-nearest neighbors [51][49], Random Forest [51][49]
Intrusion Access control Naive Bayes [43][41], Support vector machine [43][41], neural network [52][50], K-NN [53][51]
Spoofing Authentication SVM [54][52], DNN [55][53], Dyna-Q [56][54], Q-learning [56][54]
Traffic blockage Authentication Q-learning [57][55]
Existing studies related to drone security have certain limitations that need to be addressed. First, the architecture and design of small drones have not received sufficient attention, resulting in vulnerabilities that can be exploited by potential attackers. Additionally, the current data transformation and privacy mechanisms of small drones may not align with the specific requirements of the domain, leaving them susceptible to security breaches. Furthermore, while the Internet of Things (IoT) is utilized for inter-location services in drones, there is a lack of comprehensive research on establishing secure and reliable networks for optimal drone performance. Moreover, previous studies have not fully explored the integration of intelligent machine learning models into the design and structure of IoT-aided drones, which could enhance their adaptability and security. Overall, these limitations highlight the need for further research and development to overcome security challenges and ensure the resilience of drone systems in an interconnected world.
To ensure drone security, a smart vigilant system is a prerequisite to investigate the attacked data automatically and take corrective measures according to the scenario and the situation at hand without in-person interference. ML models have previously been deployed for mobile-based and wireless sensor-based networks for cyber-security, but they are yet to be applied to the security of drone-based vehicles. This restudyearch addresses the issue of access control authentication methods for drones with an ML-based solution.

References

  1. Fujimoto, K. DroneWorks Teams Up with Microsoft to Build a Safety Flight Platform for Industrial Drones by Using Azure IoT Hub. Available online: https://microsoft.github.io/techcasestudies/iot/2017/05/19/DroneWorks.html (accessed on 8 April 2020).
  2. Nayyar, A.; Nguyen, B.L.; Nguyen, N.G. The internet of drone things (IoDT): Future envision of smart drones. In First International Conference on Sustainable Technologies for Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2020; pp. 563–580.
  3. Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33.
  4. Koslowski, R.; Schulzke, M. Drones along borders: Border security UAVs in the United States and the European Union. Int. Stud. Perspect. 2018, 19, 305–324.
  5. Yin, Z.; Song, Q.; Han, G.; Zhu, M. Unmanned optical warning system for drones. In Proceedings of the Global Intelligence Industry Conference (GIIC 2018), International Society for Optics and Photonics, Beijing, China, 21–23 May 2018; Volume 10835, p. 108350Q.
  6. Ozmen, M.O.; Yavuz, A.A. Dronecrypt-an efficient cryptographic framework for small aerial drones. In Proceedings of the MILCOM 2018–2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; pp. 1–6.
  7. Ozmen, M.O.; Behnia, R.; Yavuz, A.A. IoD-crypt: A lightweight cryptographic framework for Internet of drones. arXiv 2019, arXiv:1904.06829.
  8. Bertino, E. Data Security and Privacy in the IoT. EDBT 2016, 2016, 1–3.
  9. Vattapparamban, E.; Güvenç, I.; Yurekli, A.I.; Akkaya, K.; Uluağaç, S. Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, 5–9 September 2016; pp. 216–221.
  10. Lin, C.; He, D.; Kumar, N.; Choo, K.K.R.; Vinel, A.; Huang, X. Security and privacy for the internet of drones: Challenges and solutions. IEEE Commun. Mag. 2018, 56, 64–69.
  11. Rodday, N. Hacking a professional drone. Black Hat Asia 2016, 2016. Available online: https://www.blackhat.com/docs/asia-16/materials/asia-16-Rodday-Hacking-A-Professional-Drone.pdf (accessed on 9 July 2023).
  12. Highnam, K.; Angstadt, K.; Leach, K.; Weimer, W.; Paulos, A.; Hurley, P. An uncrewed aerial vehicle attack scenario and trustworthy repair architecture. In Proceedings of the 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Toulouse, France, 28 June–1 July 2016; pp. 222–225.
  13. Shoufan, A. Continuous authentication of uav flight command data using behaviometrics. In Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), Abu Dhabi, United Arab Emirates, 23–25 October 2017; pp. 1–6.
  14. Nassi, B.; Bitton, R.; Masuoka, R.; Shabtai, A.; Elovici, Y. SoK: Security and privacy in the age of commercial drones. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 24–27 May 2021; pp. 1434–1451.
  15. Feng, Z.; Guan, N.; Lv, M.; Liu, W.; Deng, Q.; Liu, X.; Yi, W. An efficient uav hijacking detection method using onboard inertial measurement unit. ACM Trans. Embed. Comput. Syst. (TECS) 2018, 17, 1–19.
  16. Son, Y.; Shin, H.; Kim, D.; Park, Y.; Noh, J.; Choi, K.; Choi, J.; Kim, Y. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), Washington, DC, USA, 12–14 August 2015; pp. 881–896.
  17. Choi, H.; Lee, W.C.; Aafer, Y.; Fei, F.; Tu, Z.; Zhang, X.; Xu, D.; Deng, X. Detecting attacks against robotic vehicles: A control invariant approach. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 801–816.
  18. Lv, Z. The security of Internet of drones. Comput. Commun. 2019, 148, 208–214.
  19. Choudhary, G.; Sharma, V.; Gupta, T.; Kim, J.; You, I. Internet of Drones (IoD): Threats, vulnerability, and security perspectives. arXiv 2018, arXiv:1808.00203.
  20. Nassi, B.; Shabtai, A.; Masuoka, R.; Elovici, Y. SoK-security and privacy in the age of drones: Threats, challenges, solution mechanisms, and scientific gaps. arXiv 2019, arXiv:1903.05155.
  21. Giraldo, J.; Sarkar, E.; Cardenas, A.A.; Maniatakos, M.; Kantarcioglu, M. Security and privacy in cyber-physical systems: A survey of surveys. IEEE Des. Test 2017, 34, 7–17.
  22. Lagkas, T.; Argyriou, V.; Bibi, S.; Sarigiannidis, P. UAV IoT framework views and challenges: Towards protecting drones as “Things”. Sensors 2018, 18, 4015.
  23. Tian, Y.; Yuan, J.; Song, H. Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 2019, 48, 102354.
  24. Hell, P.M.; Varga, P.J. Drone systems for factory security and surveillance. Interdiscip. Descr. Complex Syst. INDECS 2019, 17, 458–467.
  25. Tosato, P.; Facinelli, D.; Prada, M.; Gemma, L.; Rossi, M.; Brunelli, D. An autonomous swarm of drones for industrial gas sensing applications. In Proceedings of the 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–6.
  26. Yaacoub, J.P.; Noura, H.; Salman, O.; Chehab, A. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 2020, 11, 100218.
  27. Alsamhi, S.H.; Ma, O.; Ansari, M.S.; Almalki, F.A. Survey on collaborative smart drones and internet of things for improving smartness of smart cities. IEEE Access 2019, 7, 128125–128152.
  28. Albalawi, M.; Song, H. Data security and privacy issues in swarms of drones. In Proceedings of the 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA, 9–11 April 2019; pp. 1–11.
  29. Bera, B.; Saha, S.; Das, A.K.; Kumar, N.; Lorenz, P.; Alazab, M. Blockchain-envisioned secure data delivery and collection scheme for 5g-based iot-enabled internet of drones environment. IEEE Trans. Veh. Technol. 2020, 69, 9097–9111.
  30. Zhang, Y.; He, D.; Li, L.; Chen, B. A lightweight authentication and key agreement scheme for internet of drones. Comput. Commun. 2020, 154, 455–464.
  31. Nouacer, R.; Ortiz, H.E.; Ouhammou, Y.; González, R.C. Framework of Key Enabling Technologies for Safe and Autonomous Drones’ Applications. In Proceedings of the 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Greece, 28–30 August 2019; pp. 420–427.
  32. Chriki, A.; Touati, H.; Snoussi, H.; Kamoun, F. FANET: Communication, mobility models and security issues. Comput. Netw. 2019, 163, 106877.
  33. Mehta, P.; Gupta, R.; Tanwar, S. Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. Comput. Commun. 2020, 151, 518–538.
  34. Luo, A. Drones hijacking. DEF CON Paris France Tech. Rep. 2016. Available online: https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/ (accessed on 9 July 2023).
  35. Saha, H.N.; Roy, R.; Chakraborty, M.; Sarkar, C. IoT-Enabled Agricultural System Application, Challenges and Security Issues. In Agricultural Informatics: Automation Using the IoT and Machine Learning; Wiley Online Library: Hoboken, NJ, USA, 2021; pp. 223–247.
  36. Ferrag, M.A.; Shu, L.; Yang, X.; Derhab, A.; Maglaras, L. Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges. IEEE Access 2020, 8, 32031–32053.
  37. Kerns, A.J.; Shepard, D.P.; Bhatti, J.A.; Humphreys, T.E. Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 2014, 31, 617–636.
  38. Feng, Z.; Guan, N.; Lv, M.; Liu, W.; Deng, Q.; Liu, X.; Yi, W. Efficient drone hijacking detection using onboard motion sensors. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), Lausanne, Switzerland, 27–31 March 2017; pp. 1414–1419.
  39. Butt, U.A.; Mehmood, M.; Shah, S.B.H.; Amin, R.; Shaukat, M.W.; Raza, S.M.; Suh, D.Y.; Piran, M.J. A review of machine learning algorithms for cloud computing security. Electronics 2020, 9, 1379.
  40. Gupta, C.; Johri, I.; Srinivasan, K.; Hu, Y.C.; Qaisar, S.M.; Huang, K.Y. A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors 2022, 22, 2017.
  41. Alsheikh, M.A.; Lin, S.; Niyato, D.; Tan, H.P. Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Commun. Surv. Tutor. 2014, 16, 1996–2018.
  42. Sajid, M.B.E.; Ullah, S.; Javaid, N.; Ullah, I.; Qamar, A.M.; Zaman, F. Exploiting machine learning to detect malicious nodes in intelligent sensor-based systems using blockchain. Wirel. Commun. Mob. Comput. 2022, 2022, 1–16.
  43. Vedula, V.; Lama, P.; Boppana, R.V.; Trejo, L.A. On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers. Electronics 2021, 10, 2105.
  44. Hosseinzadeh, M.; Sinopoli, B. Active Attack Detection and Control in Constrained Cyber–Physical Systems Under Prevented Actuation Attack. arXiv 2021, arXiv:2101.09885.
  45. Thanh, P.D.; Giang, H.T.H.; Hong, I.P. Anti-jamming RIS communications using DQN-based algorithm. IEEE Access 2022, 10, 28422–28433.
  46. Khalaf, B.A.; Mostafa, S.A.; Mustapha, A.; Mohammed, M.A.; Abduallah, W.M. Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 2019, 7, 51691–51713.
  47. Yaseen, H.S.; Al-Saadi, A. Q-learning based distributed denial of service detection. Int. J. Electr. Comput. Eng. 2023, 13, 972.
  48. Xiao, L.; Li, Y.; Huang, X.; Du, X. Cloud-based malware detection game for mobile devices with offloading. IEEE Trans. Mob. Comput. 2017, 16, 2742–2750.
  49. Apruzzese, G.; Colajanni, M.; Ferretti, L.; Marchetti, M. Addressing adversarial attacks against security systems based on machine learning. In Proceedings of the 2019 11th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 28–31 May 2019; Volume 900, pp. 1–18.
  50. Almiani, M.; AbuGhazleh, A.; Al-Rahayfeh, A.; Atiewi, S.; Razaque, A. Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 2020, 101, 102031.
  51. Liu, G.; Zhao, H.; Fan, F.; Liu, G.; Xu, Q.; Nazir, S. An enhanced intrusion detection model based on improved kNN in WSNs. Sensors 2022, 22, 1407.
  52. Shafique, A.; Mehmood, A.; Elhadef, M. Detecting signal spoofing attack in uavs using machine learning models. IEEE Access 2021, 9, 93803–93815.
  53. Nugroho, K.; Winarno, E. Spoofing Detection of Fake Speech Using Deep Neural Network Algorithm. In Proceedings of the 2022 International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, Indonesia, 17–18 September 2022; pp. 56–60.
  54. Li, Z.; Lu, Y.; Shi, Y.; Wang, Z.; Qiao, W.; Liu, Y. A Dyna-Q-based solution for UAV networks against smart jamming attacks. Symmetry 2019, 11, 617.
  55. Shingate, K.; Jagdale, K.; Dias, Y. Adaptive traffic control system using reinforcement learning. Int. J. Eng. Res. Technol. 2020, 9.
More
Video Production Service