Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure
Ezedin Barka
College of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates
Search for more papers by this authorCorresponding Author
Chaker Abdelaziz Kerrache
Department of Mathematics and Computer Science, University of Ghardaia, Ghardaia, Algeria
Chaker Abdelaziz Kerrache, Department of Mathematics and Computer Science, University of Ghardaia, 47000 Ghardaia, Algeria.
Email: [email protected];
Search for more papers by this authorHadjer Benkraouda
College of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates
Search for more papers by this authorKhaled Shuaib
College of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates
Search for more papers by this authorFarhan Ahmad
Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby, UK
Search for more papers by this authorFatih Kurugollu
Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby, UK
Search for more papers by this authorEzedin Barka
College of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates
Search for more papers by this authorCorresponding Author
Chaker Abdelaziz Kerrache
Department of Mathematics and Computer Science, University of Ghardaia, Ghardaia, Algeria
Chaker Abdelaziz Kerrache, Department of Mathematics and Computer Science, University of Ghardaia, 47000 Ghardaia, Algeria.
Email: [email protected];
Search for more papers by this authorHadjer Benkraouda
College of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates
Search for more papers by this authorKhaled Shuaib
College of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates
Search for more papers by this authorFarhan Ahmad
Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby, UK
Search for more papers by this authorFatih Kurugollu
Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby, UK
Search for more papers by this authorAbstract
With the exponential growth in the number of vital infrastructures such as nuclear plants and transport and distribution networks, these systems have become more susceptible to coordinated cyberattacks. One of the effective approaches used to strengthen the security of these infrastructures is the use of unmanned aerial vehicles (UAVs) for surveillance and data collection. However, UAVs themselves are prone to attacks on their collected sensor data. Recently, blockchain (BC) has been proposed as a revolutionary technology that can be integrated within Internet of things (IoT) to provide a desired level of security and privacy. However, the integration of BC within IoT networks, where UAV's sensors constitute a major component, is extremely challenging. The major contribution of this study is twofold:(1) survey the security issues for UAV's collected sensor data, define the security requirements for such systems, and identify ways to address them; and (2) propose a novel BC-based solution to ensure the security of and the trust between the UAVs and their relevant ground control stations. Our implementation results and analysis show that using UAVs as means for protecting critical infrastructure is greatly enhanced through the utilization of trusted BC-based unmanned aerial systems.
REFERENCES
- 1Mozaffari M, Saad W, Bennis M, Debbah M. Unmanned aerial vehicle with underlaid device-to-device communications: performance and tradeoffs. IEEE Trans Wirel Commun. 2016; 15(6): 3949-3963.
- 2Bekmezci I, Sahingoz OK, Temel S. Flying ad-hoc networks (FANETs): a survey. Ad Hoc Netw. 2013; 11(3): 1254-1270.
- 3Pajares G. Overview and current status of remote sensing applications based on unmanned aerial vehicles (UAVs). Photogramm Eng Remote Sens. 2015; 81(4): 281-330.
- 4Floreano D, Wood RJ. Science, technology and the future of small autonomous drones. Nature. 2015; 521(7553): 460.
- 5Avola D, Foresti GL, Martinel N, Micheloni C, Pannone D, Piciarelli C. Aerial video surveillance system for small-scale UAV environment monitoring. In: Proceedings of the 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS); 2017; Lecce, Italy.
- 6Yoon K, Park D, Yim Y, Kim K, Yang SK, Robinson M. Security authentication system using encrypted channel on UAV network. In: Proceedings of the IEEE International Conference on Robotic Computing (IRC); 2017; Taichung, Taiwan.
- 7Singh K, Verma AK. A fuzzy-based trust model for flying ad hoc networks (FANETs). Int J Commun Syst. 2018; 31(6):e3517.
- 8Hooper M, Tian Y, Zhou R, et al. Securing commercial Wi-Fi-based UAVS from common security attacks. In: Proceedings of the 2016 IEEE Military Communications Conference (MILCOM); 2016; Baltimore, MD.
- 9Pilkington M. Blockchain technology: Principles and applications. In: Research Handbook on Digital Transformations. Cheltenham, UK: Edward Elgar Publishing; 2016: 225.
10.4337/9781784717766.00019 Google Scholar
- 10Ahmad F, Kerrache CA, Kurugollu F, Hussain R. Realization of blockchain in named data networking-based Internet-of-Vehicles. IT Professional. 2019. http://doi.org/10.1109/MITP.2019.2912142. In press.
- 11Wu HT, Tsai CW. Toward blockchains for health-care systems: applying the bilinear pairing technology to ensure privacy protection and accuracy in data sharing. IEEE Consumer Electron Mag. 2018; 7(4): 65-71.
- 12Miller D. Blockchain and the Internet of Things in the industrial sector. IEEE IT Professional. 2018; 20(3): 15-18.
- 13Perboli G, Musso S, Rosano M. Blockchain in logistics and supply chain: a lean approach for designing real-world use cases. IEEE Access. 2018; 6: 62018-62028.
- 14Campion M, Ranganathan P, Faruque S. UAV swarm communication and control architectures: a review. J Unmanned Veh Syst. 2018; 7: 93-106.
- 15Menouar H, Guvenc I, Akkaya K, Uluagac AS, Kadri A, Tuncer A. UAV-enabled intelligent transportation systems for the smart city: applications and challenges. IEEE Commun Mag. 2017; 55(3): 22-28.
- 16Flammini F, Pragliola C, Smarra G. Railway infrastructure monitoring by drones. In: Proceedings of the 2016 International Conference on Electrical Systems for Aircraft, Railway, Ship Propulsion and Road Vehicles & International Transportation Electrification Conference (ESARS-ITEC); 2016; Toulouse, France.
- 17Samczynski P, Malanowski M, Krawczyk G, Kulpa J, Żywek M. Passive radar as a part of critical infrastructure protection system. In: Proceedings of the 2018 International Conference on Radar (RADAR); 2018; Brisbane, Australia.
- 18Box GE, Tiao GC. Bayesian Inference in Statistical Analysis; vol. 40. Hoboken, NJ: John Wiley & Sons; 2011.
- 19Valavanis KP. Advances in Unmanned Aerial Vehicles: State of the Art and the Road to Autonomy; vol 33. Dordrecht, The Netherlands: Springer Science & Business Media; 2008.
- 20Zhang H, Qi Y, Wu J, Fu L, He L. Dos attack energy management against remote state estimation. IEEE Trans Control Netw Syst. 2018; 5(1): 383-394.
- 21Chen J, Feng Z, Wen J-Y, Liu B, Sha L. A container-based DOS attack-resilient control framework for real-time UAV systems. arXiv preprint arXiv:1812.02834. 2018.
- 22Li Y, Shi L, Cheng P, Chen J, Quevedo DE. Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans Autom Control. 2015; 60(10): 2831-2836.
- 23Bekmezci İ, Şentürk E, Türker T. Security issues in flying ad-hoc networks (FANETs). J Aeronaut Space Technol. 2016; 9(2): 13-21.
- 24Rudinskas D, Goraj Z, Stankūnas J. Security analysis of UAV radio communication system. Aviation. 2009; 13(4): 116-121.
10.3846/1648-7788.2009.13.116-121 Google Scholar
- 25Javaid AY, Sun W, Devabhaktuni VK, Alam M. Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST); 2012; Waltham, MA.
- 26Thing VL, Wu J. Autonomous vehicle security: a taxonomy of attacks and defences. In: Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData); 2016; Chengdu, China.
- 27Krishna CL, Murphy RR. A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In: Proceedings of the 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR); 2017; Shanghai, China.
- 28Wesson K, Humphreys T. Hacking drones. Scientific American. 2013; 309(5): 54-59.
- 29Javaid AY, Jahan F, Sun W. Analysis of global positioning system-based attacks and a novel global positioning system spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation. Simulation. 2017; 93(5): 427-441.
10.1177/0037549716685874 Google Scholar
- 30Radu D, Cretu A, Parrein B, Yi J, Avram C, Aştilean A. Flying ad hoc network for emergency applications connected to a fog system. In: L Barolli, F Xhafa, N Javaid, E Spaho, V Kolici, eds. Advances in Internet, Data & Web Technologies: The 6th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2018). Cham, Switzerland: Springer International Publishing; 2018: 675-686.
10.1007/978-3-319-75928-9_60 Google Scholar
- 31Zhang G, Wu Q, Cui M, Zhang R. Securing UAV communications via joint trajectory and power control. IEEE Trans Wirel Commun. 2019; 18(2): 1376-1389.
- 32Singh K, Verma AK. A trust model for effective cooperation in flying ad hoc networks using genetic algorithm. In: Proceedings of the 2018 International Conference on Communication and Signal Processing (ICCSP); 2018; Chennai, India.
- 33Singh K, Verma AK. FCTM: a novel fuzzy classification trust model for enhancing reliability in flying ad hoc networks (FANETs). Ad Hoc Sens Wirel Netw. 2018; 40: 23-47.
- 34Yuan X, Wei Z, Feng Z, Xu W. Trust connectivity analysis in overlaid unmanned aerial vehicle networks. In: Proceedings of the 2017 17th International Symposium on Communications and Information Technologies (ISCIT); 2017; Cairns, Australia.
- 35Yang Z, Yang K, Lei L, Zheng K, Leung VC. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 2018; 6: 1495-1505.
- 36Barka E, Kerrache CA, Lagraa N, Lakas A, Calafate CT, Cano J-C. Union: a trust model distinguishing intentional and unintentional misbehavior in inter-UAV communication. J Adv Transp. 2018; 2018.
- 37Kerrache CA, Barka E, Lagraa N, Lakas A. Reputation-aware energy-efficient solution for FANET monitoring. In: Proceedings of the 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC); 2017; Valencia, Spain.