A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward

Authors

  • Aminu Abdulkadir Mahmoud, Sofia Najwa Ramli, Mohd Aifaa Mohd Ariff, Chuah Chai Wen, Nordiana Rahim

Keywords:

Unmanned Aerial Vehicle (UAV), Urban Air Mobility (UAM), authentication, blockchain, cybersecurity

Abstract

An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard human pilot. It can be remotely controlled through a ground control station (GCS), remote control, or onboard computer programs. The elements onboard use a network of sensors to communicate with GCS via a wireless link and thus make the system susceptible to various cyber-attacks. These have magnified concerns, especially in recent years, due to the increased adoption of drones across multiple sectors such as governments, industries, businesses, and transport. Given the paramount need to ensure availability, integrity, and confidentiality, securing these systems is crucial. The attacks may present in forms such as jamming, denial of service, signal attack, eavesdropping, hijacking, man-in-the-middle, intrusion, and malicious application, among others, and these attacks could be mitigated using an effective authentication model. This research reviews several such models, majorly cryptographic, lightweight, and blockchain-based, proposed by different scholars. Considering the importance of blockchain, this research grouped these authentication techniques into two: blockchain and non-blockchain-based. The study shows that all the reviewed authentication techniques have certain limitations, indicating the need for enhancement. Finally, this review identifies the need to consider UAV's peculiarities, operating environment, communication channels, energy consumption (battery life), and blockchain technology to formulate an optimal authentication model.

Downloads

Download data is not yet available.

References

N. Barrera, Unmanned Aerial Vehicles. New York: Nova Science Publisher, 2021.

M. Alwateer, S. W. Loke, and N. Fernando, “Enabling drone services: drone crowdsourcing and drone scripting,” IEEE access, vol. 7, pp. 110035–110049, 2019, doi: https://doi.org/10.1109/ACCESS.2019.2933234.

A. C. Tang, “A review on cybersecurity vulnerabilities for urban air mobility,” in AIAA Scitech 2021 Forum, 2021, p. 0773. doi: https://doi.org/10.2514/6.2021-0773.

M. Ináncsi, “Cybersecurity Challenges of the Civilian Unmanned Aircraft Systems,” 2022, doi: https://doi.org/10.32567/hm.2022.2.14.

T. Alladi, V. Chamola, N. Sahu, and M. Guizani, “Applications of blockchain in unmanned aerial vehicles: A review,” Vehicular Communications, vol. 23, p. 100249, 2020, doi: https://doi.org/10.1016/j.vehcom.2020.100249.

M. C. Ertürk, N. Hosseini, H. Jamal, A. Şahin, D. Matolak, and J. Haque, “Requirements And Technologies Towards Uam: Communication, Navigation, And Surveillance,” in 2020 Integrated Communications Navigation and Surveillance Conference (ICNS), IEEE, 2020, pp. 2C2-1. doi: https://doi.org/10.1109/ICNS50378.2020.9223003.

McKinsey & Company, “Study on the societal acceptance of Urban Air Mobility in Europe,” Cologne, Germany, May 2021. Accessed: Jul. 04, 2023. [Online]. Available: https://www.easa.europa.eu/en/full-report-study-societal-acceptance-urban-air-mobility-europe.

R. Altawy and A. M. Youssef, “Security, privacy, and safety aspects of civilian drones: A survey,” ACM Transactions on Cyber-Physical Systems, vol. 1, no. 2, pp. 1–25, 2016, doi: https://doi.org/10.1145/3001836.

H. Wang, H. Zhao, J. Zhang, D. Ma, J. Li, and J. Wei, “Survey on unmanned aerial vehicle networks: A cyber physical system perspective,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1027–1070, 2019, doi: https://doi.org/10.1109/COMST.2019.2962207.

Y. Mekdad et al., “A survey on security and privacy issues of UAVs,” Computer Networks, vol. 224, p. 109626, 2023, doi: https://doi.org/10.1016/j.comnet.2023.109626.

P. Paul, P. S. Aithal, R. Saavedra, and S. Ghosh, “Blockchain Technology and its Types—A Short Review,” International Journal of Applied Science and Engineering (IJASE), vol. 9, no. 2, pp. 189–200, 2021.

C.-L. Chen, Y.-Y. Deng, W. Weng, C.-H. Chen, Y.-J. Chiu, and C.-M. Wu, “A traceable and privacy-preserving authentication for UAV communication control system,” Electronics (Basel), vol. 9, no. 1, p. 62, 2020, doi: https://doi.org/10.3390/electronics9010062.

G. Cho, J. Cho, S. Hyun, and H. Kim, “SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles,” Applied Sciences, vol. 10, no. 9, p. 3149, 2020, doi: https://doi.org/10.3390/app10093149.

S. U. Jan, F. Qayum, and H. U. Khan, “Design and analysis of lightweight authentication protocol for securing IoD,” Ieee access, vol. 9, pp. 69287–69306, 2021, doi: https://doi.org/10.1109/ACCESS.2021.3076692.

X. Du, Y. Li, S. Zhou, and Y. Zhou, “ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks,” Peer Peer Netw Appl, vol. 15, no. 4, pp. 1979–1993, 2022, doi: https://doi.org/10.1007/s12083-022-01330-7.

A. S. Rajasekaran, A. Maria, F. Al-Turjman, C. Altrjman, and L. Mostarda, “Anonymous mutual and batch authentication with location privacy of UAV in FANET,” Drones, vol. 6, no. 1, p. 14, 2022, doi: https://doi.org/10.3390/drones6010014.

A. Chen, K. Peng, Z. Sha, X. Zhou, Z. Yang, and G. Lu, “ToAM: a task-oriented authentication model for UAVs based on blockchain,” EURASIP J Wirel Commun Netw, vol. 2021, pp. 1–15, 2021, doi: https://doi.org/10.1186/s13638-021-02039-6.

D. Kwon et al., “Design of secure handover authentication scheme for urban air mobility environments,” IEEE Access, vol. 10, pp. 42529–42541, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3168843.

A. Al-Adhami, R. K. Hasoun, E. K. Gbashi, and S. Hassan, “A secure communication protocol for civil drones,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 27, no. 3, pp. 1490–1501, 2022, doi: http://doi.org/10.11591/ijeecs.v27.i3.pp1490-1501.

C. Tian, Q. Jiang, T. Li, J. Zhang, N. Xi, and J. Ma, “Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment,” Computer Networks, vol. 218, p. 109421, 2022, doi: https://doi.org/10.1016/j.comnet.2022.109421.

U. Khalid, M. Asim, T. Baker, P. C. K. Hung, M. A. Tariq, and L. Rafferty, “A decentralized lightweight blockchain-based authentication mechanism for IoT systems,” Cluster Comput, vol. 23, no. 3, pp. 2067–2087, 2020, doi: https://doi.org/10.1007/s10586-020-03058-6.

M. S. Rahman, I. Khalil, and M. Atiquzzaman, “Blockchain-powered policy enforcement for ensuring flight compliance in drone-based service systems,” IEEE Netw, vol. 35, no. 1, pp. 116–123, 2021, doi: https://doi.org/10.1109/MNET.011.2000219.

M. Singh, G. S. Aujla, and R. S. Bali, “Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem,” Cluster Comput, vol. 25, no. 3, pp. 2281–2302, 2022, doi: https://doi.org/10.1007/s10586-021-03497-9.

L. Kong, B. Chen, and F. Hu, “Blockchain-Assisted Adaptive Reconfiguration Method for Trusted UAV Network,” Electronics (Basel), vol. 11, no. 16, p. 2549, 2022, doi: https://doi.org/10.3390/electronics11162549.

L. Kong, B. Chen, F. Hu, and J. Zhang, “Lightweight Mutual Authentication Scheme Enabled by Stateless Blockchain for UAV Networks,” Security and Communication Networks, vol. 2022, 2022, doi: 10.1155/2022/2330052.

G. S. Aujla, S. Vashisht, S. Garg, N. Kumar, and G. Kaddoum, “Leveraging blockchain for secure drone-to-everything communications,” IEEE Communications Standards Magazine, vol. 5, no. 4, pp. 80–87, 2021, doi: https://doi.org/10.1109/MCOMSTD.0001.2100012.

M. Golam, R. Akter, E. A. Tuli, D.-S. Kim, and J.-M. Lee, “Lightweight Blockchain Assisted Unauthorized UAV Access Prevention in the Internet of Military Things,” in 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), IEEE, 2022, pp. 890–894. doi: https://doi.org/10.1109/ICTC55196.2022.9953024.

P. Han, A. Sui, and J. Wu, “Identity Management and Authentication of a UAV Swarm Based on a Blockchain,” Applied Sciences, vol. 12, no. 20, p. 10524, 2022, doi: https://doi.org/10.3390/app122010524.

S. Javed et al., “An efficient authentication scheme using blockchain as a certificate authority for the internet of drones,” Drones, vol. 6, no. 10, p. 264, 2022, doi: https://doi.org/10.3390/drones6100264.

N. Andola, Raghav, V. K. Yadav, S. Venkatesan, and S. Verma, “SpyChain: A lightweight blockchain for authentication and anonymous authorization in IoD,” Wirel Pers Commun, vol. 119, pp. 343–362, 2021, doi: https://doi.org/10.1007/s11277-021-08214-8.

Downloads

Published

16.06.2024

How to Cite

Aminu Abdulkadir Mahmoud. (2024). A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 389–398. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6226

Issue

Section

Research Article