Security analysis and enhancements of UAS architecture

Bilal Akhtar, A. Masood
{"title":"Security analysis and enhancements of UAS architecture","authors":"Bilal Akhtar, A. Masood","doi":"10.1080/19393555.2021.1977873","DOIUrl":null,"url":null,"abstract":"ABSTRACT Unmanned Aerial Vehicles, known as UAVs, are controlled by the autopilot system remotely and autonomously. It is a component of Unmanned Aerial System (UAS) which contains a UAV, a Ground Control System (GCS), and Air link. They are used vastly in all applications; however, over a period of time, a number of security flaws have surfaced in UASs. While considerable research has been undertaken to propose secure solutions for UAS, the prior work on the subject fails to consider a holistic treatment of the security issues. Thereby, keeping in view the lack of a structured approach for UAS security, we have proposed an ISO 18028 standard-based framework for defining security architecture of UAS. ISO standard provides generic guidelines for the security architecture of a network; yet, the same has been extended in this work to propose a holistic security architecture for UASs, which effectively mitigates all the associated risks. Furthermore, the architecture has been used to evaluate two case studies: Commercial UAS based on Cube and Commercial UAS based on DJI A3. The appraisal undertaken in the case studies indicated a number of security limitations in the considered commercial solutions, thus leading to corresponding recommendations for security enhancements.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Journal: A Global Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393555.2021.1977873","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

ABSTRACT Unmanned Aerial Vehicles, known as UAVs, are controlled by the autopilot system remotely and autonomously. It is a component of Unmanned Aerial System (UAS) which contains a UAV, a Ground Control System (GCS), and Air link. They are used vastly in all applications; however, over a period of time, a number of security flaws have surfaced in UASs. While considerable research has been undertaken to propose secure solutions for UAS, the prior work on the subject fails to consider a holistic treatment of the security issues. Thereby, keeping in view the lack of a structured approach for UAS security, we have proposed an ISO 18028 standard-based framework for defining security architecture of UAS. ISO standard provides generic guidelines for the security architecture of a network; yet, the same has been extended in this work to propose a holistic security architecture for UASs, which effectively mitigates all the associated risks. Furthermore, the architecture has been used to evaluate two case studies: Commercial UAS based on Cube and Commercial UAS based on DJI A3. The appraisal undertaken in the case studies indicated a number of security limitations in the considered commercial solutions, thus leading to corresponding recommendations for security enhancements.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
UAS体系结构的安全性分析和增强
无人驾驶飞行器(uav)是一种由自动驾驶系统远程自主控制的飞行器。它是无人机系统(UAS)的一个组成部分,该系统包含无人机、地面控制系统(GCS)和空中链路。它们在所有应用中被广泛使用;然而,在一段时间内,UASs出现了一些安全漏洞。虽然已经进行了相当多的研究,以提出安全的解决方案的无人机,在这个问题上的先前工作未能考虑安全问题的整体处理。因此,考虑到无人机系统安全缺乏结构化的方法,我们提出了一个基于ISO 18028标准的框架来定义无人机系统的安全架构。ISO标准为网络的安全体系结构提供了通用准则;然而,在这项工作中,同样的内容得到了扩展,为UASs提出了一个整体的安全架构,有效地减轻了所有相关的风险。此外,该体系结构还用于评估两个案例研究:基于Cube的商业UAS和基于DJI A3的商业UAS。在案例研究中进行的评估表明,所考虑的商业解决办法存在一些安全限制,因此提出了相应的加强安全的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
“The pull to do nothing would be strong”: limitations & opportunities in reporting insider threats Prevention of DDoS attacks: a comprehensive review and future directions Towards improving the security of wireless networks using secured session keys Evaluating the status of information security management in faculty libraries: a case study of Allameh Tabatabai University Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1