A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward
Keywords:
Unmanned Aerial Vehicle (UAV), Urban Air Mobility (UAM), authentication, blockchain, cybersecurityAbstract
An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard human pilot. It can be remotely controlled through a ground control station (GCS), remote control, or onboard computer programs. The elements onboard use a network of sensors to communicate with GCS via a wireless link and thus make the system susceptible to various cyber-attacks. These have magnified concerns, especially in recent years, due to the increased adoption of drones across multiple sectors such as governments, industries, businesses, and transport. Given the paramount need to ensure availability, integrity, and confidentiality, securing these systems is crucial. The attacks may present in forms such as jamming, denial of service, signal attack, eavesdropping, hijacking, man-in-the-middle, intrusion, and malicious application, among others, and these attacks could be mitigated using an effective authentication model. This research reviews several such models, majorly cryptographic, lightweight, and blockchain-based, proposed by different scholars. Considering the importance of blockchain, this research grouped these authentication techniques into two: blockchain and non-blockchain-based. The study shows that all the reviewed authentication techniques have certain limitations, indicating the need for enhancement. Finally, this review identifies the need to consider UAV's peculiarities, operating environment, communication channels, energy consumption (battery life), and blockchain technology to formulate an optimal authentication model.
Downloads
References
N. Barrera, Unmanned Aerial Vehicles. New York: Nova Science Publisher, 2021.
M. Alwateer, S. W. Loke, and N. Fernando, “Enabling drone services: drone crowdsourcing and drone scripting,” IEEE access, vol. 7, pp. 110035–110049, 2019, doi: https://doi.org/10.1109/ACCESS.2019.2933234.
A. C. Tang, “A review on cybersecurity vulnerabilities for urban air mobility,” in AIAA Scitech 2021 Forum, 2021, p. 0773. doi: https://doi.org/10.2514/6.2021-0773.
M. Ináncsi, “Cybersecurity Challenges of the Civilian Unmanned Aircraft Systems,” 2022, doi: https://doi.org/10.32567/hm.2022.2.14.
T. Alladi, V. Chamola, N. Sahu, and M. Guizani, “Applications of blockchain in unmanned aerial vehicles: A review,” Vehicular Communications, vol. 23, p. 100249, 2020, doi: https://doi.org/10.1016/j.vehcom.2020.100249.
M. C. Ertürk, N. Hosseini, H. Jamal, A. Şahin, D. Matolak, and J. Haque, “Requirements And Technologies Towards Uam: Communication, Navigation, And Surveillance,” in 2020 Integrated Communications Navigation and Surveillance Conference (ICNS), IEEE, 2020, pp. 2C2-1. doi: https://doi.org/10.1109/ICNS50378.2020.9223003.
McKinsey & Company, “Study on the societal acceptance of Urban Air Mobility in Europe,” Cologne, Germany, May 2021. Accessed: Jul. 04, 2023. [Online]. Available: https://www.easa.europa.eu/en/full-report-study-societal-acceptance-urban-air-mobility-europe.
R. Altawy and A. M. Youssef, “Security, privacy, and safety aspects of civilian drones: A survey,” ACM Transactions on Cyber-Physical Systems, vol. 1, no. 2, pp. 1–25, 2016, doi: https://doi.org/10.1145/3001836.
H. Wang, H. Zhao, J. Zhang, D. Ma, J. Li, and J. Wei, “Survey on unmanned aerial vehicle networks: A cyber physical system perspective,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1027–1070, 2019, doi: https://doi.org/10.1109/COMST.2019.2962207.
Y. Mekdad et al., “A survey on security and privacy issues of UAVs,” Computer Networks, vol. 224, p. 109626, 2023, doi: https://doi.org/10.1016/j.comnet.2023.109626.
P. Paul, P. S. Aithal, R. Saavedra, and S. Ghosh, “Blockchain Technology and its Types—A Short Review,” International Journal of Applied Science and Engineering (IJASE), vol. 9, no. 2, pp. 189–200, 2021.
C.-L. Chen, Y.-Y. Deng, W. Weng, C.-H. Chen, Y.-J. Chiu, and C.-M. Wu, “A traceable and privacy-preserving authentication for UAV communication control system,” Electronics (Basel), vol. 9, no. 1, p. 62, 2020, doi: https://doi.org/10.3390/electronics9010062.
G. Cho, J. Cho, S. Hyun, and H. Kim, “SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles,” Applied Sciences, vol. 10, no. 9, p. 3149, 2020, doi: https://doi.org/10.3390/app10093149.
S. U. Jan, F. Qayum, and H. U. Khan, “Design and analysis of lightweight authentication protocol for securing IoD,” Ieee access, vol. 9, pp. 69287–69306, 2021, doi: https://doi.org/10.1109/ACCESS.2021.3076692.
X. Du, Y. Li, S. Zhou, and Y. Zhou, “ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks,” Peer Peer Netw Appl, vol. 15, no. 4, pp. 1979–1993, 2022, doi: https://doi.org/10.1007/s12083-022-01330-7.
A. S. Rajasekaran, A. Maria, F. Al-Turjman, C. Altrjman, and L. Mostarda, “Anonymous mutual and batch authentication with location privacy of UAV in FANET,” Drones, vol. 6, no. 1, p. 14, 2022, doi: https://doi.org/10.3390/drones6010014.
A. Chen, K. Peng, Z. Sha, X. Zhou, Z. Yang, and G. Lu, “ToAM: a task-oriented authentication model for UAVs based on blockchain,” EURASIP J Wirel Commun Netw, vol. 2021, pp. 1–15, 2021, doi: https://doi.org/10.1186/s13638-021-02039-6.
D. Kwon et al., “Design of secure handover authentication scheme for urban air mobility environments,” IEEE Access, vol. 10, pp. 42529–42541, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3168843.
A. Al-Adhami, R. K. Hasoun, E. K. Gbashi, and S. Hassan, “A secure communication protocol for civil drones,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 27, no. 3, pp. 1490–1501, 2022, doi: http://doi.org/10.11591/ijeecs.v27.i3.pp1490-1501.
C. Tian, Q. Jiang, T. Li, J. Zhang, N. Xi, and J. Ma, “Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment,” Computer Networks, vol. 218, p. 109421, 2022, doi: https://doi.org/10.1016/j.comnet.2022.109421.
U. Khalid, M. Asim, T. Baker, P. C. K. Hung, M. A. Tariq, and L. Rafferty, “A decentralized lightweight blockchain-based authentication mechanism for IoT systems,” Cluster Comput, vol. 23, no. 3, pp. 2067–2087, 2020, doi: https://doi.org/10.1007/s10586-020-03058-6.
M. S. Rahman, I. Khalil, and M. Atiquzzaman, “Blockchain-powered policy enforcement for ensuring flight compliance in drone-based service systems,” IEEE Netw, vol. 35, no. 1, pp. 116–123, 2021, doi: https://doi.org/10.1109/MNET.011.2000219.
M. Singh, G. S. Aujla, and R. S. Bali, “Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem,” Cluster Comput, vol. 25, no. 3, pp. 2281–2302, 2022, doi: https://doi.org/10.1007/s10586-021-03497-9.
L. Kong, B. Chen, and F. Hu, “Blockchain-Assisted Adaptive Reconfiguration Method for Trusted UAV Network,” Electronics (Basel), vol. 11, no. 16, p. 2549, 2022, doi: https://doi.org/10.3390/electronics11162549.
L. Kong, B. Chen, F. Hu, and J. Zhang, “Lightweight Mutual Authentication Scheme Enabled by Stateless Blockchain for UAV Networks,” Security and Communication Networks, vol. 2022, 2022, doi: 10.1155/2022/2330052.
G. S. Aujla, S. Vashisht, S. Garg, N. Kumar, and G. Kaddoum, “Leveraging blockchain for secure drone-to-everything communications,” IEEE Communications Standards Magazine, vol. 5, no. 4, pp. 80–87, 2021, doi: https://doi.org/10.1109/MCOMSTD.0001.2100012.
M. Golam, R. Akter, E. A. Tuli, D.-S. Kim, and J.-M. Lee, “Lightweight Blockchain Assisted Unauthorized UAV Access Prevention in the Internet of Military Things,” in 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), IEEE, 2022, pp. 890–894. doi: https://doi.org/10.1109/ICTC55196.2022.9953024.
P. Han, A. Sui, and J. Wu, “Identity Management and Authentication of a UAV Swarm Based on a Blockchain,” Applied Sciences, vol. 12, no. 20, p. 10524, 2022, doi: https://doi.org/10.3390/app122010524.
S. Javed et al., “An efficient authentication scheme using blockchain as a certificate authority for the internet of drones,” Drones, vol. 6, no. 10, p. 264, 2022, doi: https://doi.org/10.3390/drones6100264.
N. Andola, Raghav, V. K. Yadav, S. Venkatesan, and S. Verma, “SpyChain: A lightweight blockchain for authentication and anonymous authorization in IoD,” Wirel Pers Commun, vol. 119, pp. 343–362, 2021, doi: https://doi.org/10.1007/s11277-021-08214-8.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.