Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique

Heorhii Zemlianko, Vyacheslav Kharchenko

Abstract


The subject of this study is to ensure the cybersecurity of systems of multifunctional UAV fleets (SMF UAV). The purpose of this study is to identify and analyze the risks associated with the cybersecurity of multi-functional UAV fleets, develop models of threats, vulnerabilities, and attacks, and conduct IMECA analysis of cyber-attacks. Tasks: 1) analyze threats that may affect the security of multifunctional UAV fleets; 2) identify system vulnerabilities and their possible consequences in case of exploitation; 3) develop models of the system infrastructure and threats, vulnerabilities, and attacks, considering the specifics of the functionality and communication between system elements; 4) perform a risk-based analysis, identifying and classifying potential threats and their impact. The following results were obtained. The following results were obtained. 1. Cybersecurity threats to multifunctional UAV fleets are described and classified. 2. Identified and analyzed system vulnerabilities and their potential consequences. 3. Developed models of threats, vulnerabilities, and cyberattacks, considering the specifics of the UAV fleet. 4. Conducted a risk-based analysis, determined the level of threat, and developed recommendations for improving the cybersecurity of the UAV fleet based on the results of the IMECA analysis. Conclusions. The research emphasizes the importance of the developed model and tool for the detection and analysis of cyber threats to the SMF UAV. This allows increasing the cybersecurity and reliability of the system and ensuring timely response to cyber threats. Areas for further research: development of a model and method to consider the specifics of cyber threats and the technological characteristics of the SMF infrastructure; development and implementation of proactive protection tools in the context of combined cyber-attacks; and expansion of the scope of these tools in various industries, including smart cities.

Keywords


cybersecurity; multifunctional UAV fleets; threats; vulnerabilities; attack modeling; risk-based analysis; system security; IMECA

Full Text:

PDF

References


Gupta, A., & Gupta, S. K. A survey on green unmanned aerial vehicles‐based fog computing: Challenges and future perspective. Transactions on Emerging Telecommunications Technologies, 2022, vol. 33, iss. 11, pp. 1-29. DOI: 10.1002/ett.4603.

Coppola, M., McGuire, K. N., De Wagter, C., & de Croon, G. C. H. E. A Survey on Swarming with Micro Air Vehicles: Fundamental Challenges and Constraints. Frontiers in Robotics and AI, 2020, vol. 7, pp. 1-26. DOI: 10.3389/frobt.2020.00018.

Deng, H., Huang, J., Liu, Q., Zhao, T., Zhou, C., & Gao, J. A Distributed Collaborative Allocation Method of Reconnaissance and Strike Tasks for Heterogeneous UAVs. Drones, 2023, vol. 7, no. 2, pp. 138-160. DOI: 10.3390/drones7020138.

Chen, Y., Jiao, Y., Wu, M., Ma, H., & Lu, Z. Group Target Tracking for Highly Maneuverable Unmanned Aerial Vehicles Swarms: A Perspective. Sensors, 2023, vol. 23, no. 9, pp. 4465-4484. DOI: 10.3390/s23094465.

Hammoud, B., & Wehn, N. Recent Advances in Oil-Spill Monitoring Using Drone-Based Radar Remote Sensing. Environmental Sciences. IntechOpen, 2022, no. 24, pp. 4090-4110. DOI: 10.5772/intechopen.106942.

Falorca, J. F., Miraldes, J. P. N. D., & Lanzinha, J. C. G. New trends in visual inspection of buildings and structures: Study for the use of drones. Open Engineering, 2021, vol. 11, no. 1, pp. 734-743. DOI: 10.1515/eng-2021-0071.

Ahmad, H., Farhan, M., & Farooq, U. Computer Vision Techniques for Military Surveillance Drones. Wasit Journal of Computer and Mathematics Science, 2023, vol. 2, no. 2, pp. 56-63. DOI: 10.31185/wjcms.148.

Abdulhae, O. T., Mandeep, J. S., & Islam, M. Cluster-Based Routing Protocols for Flying Ad Hoc Networks (FANETs). IEEE Access, 2022, no. 10, pp. 32981-33004. DOI: 10.1109/access.2022.3161446.

Al-Bkree, M. Managing the cyber-physical security for unmanned aerial vehicles used in perimeter surveillance. International Journal of Innovative Research and Scientific Studies, 2023, vol. 6, no. 1, pp. 164-173. DOI: 10.53894/ijirss.v6i1.1173.

AL-Dosari, K., Hunaiti, Z., & Balachandran, W. Systematic Review on Civilian Drones in Safety and Security Applications. Drones, 2023, vol. 7, no. 3, pp. 210-222. DOI: 10.3390/drones7030210.

Omolara, A. E., Alawida, M., & Abiodun, O. I. Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey. Neural Computing and Applications, 2023, vol. 35, no. 31, pp. 1-39. DOI: 10.1007/s00521-023-08857-7.

McEnroe, P., Wang, S., & Liyanage, M. A Survey on the Convergence of Edge Computing and AI for UAVs: Opportunities and Challenges. IEEE Internet of Things Journal, 2022, vol. 9, no. 17, pp. 15435-15459. DOI: 10.1109/jiot.2022.3176400.

Yang, W., Wang, S., Yin, X., Wang, X., & Hu, J. A Review on Security Issues and Solutions of the Internet of Drones. IEEE Open Journal of the Computer Society, 2022, vol. 3, pp. 96-110. DOI: 10.1109/ojcs.2022.3183003.

Subbarayalu, V., & Vensuslaus, M. A. An Intrusion Detection System for Drone Swarming Utilizing Timed Probabilistic Automata. Drones, 2023, vol. 7, no. 4, pp. 248-267. DOI: 10.3390/drones7040248.

Gladence, L. M., Anu, V. M., Anderson, A., Stanley, I., Fernando J., J. A., & Revathy, S. Swarm Intelligence in Disaster Recovery. 5th International Conference on Intelligent Computing and Control Systems (ICICCS), May 6-8, 2021, Madurai, India. IEEE, 2021, pp. 1-8. DOI: 10.1109/iciccs51141.2021.9432146.

Jeon, C., Ko, H., Ha, J., Lee, B., & Ryu, B. SwarmSense: Effective and Resilient Drone Swarming and Search for Disaster Response and Management Application. Wireless Innovation Forum, WInnComm 2019 Proceedings. Available at: Presentation – https://www.wirelessinnovation.org/assets/Proceedings/2019/TS6.2%20Jeon%20presentation.pdf; Paper – https://www.wirelessinnovation.org/assets/Proceedings/2019/TS6.2%20Jeon%20paper.pdf (accessed 18.08.2023).

Torianyk, V., Kharchenko, V., & Zemlianko, H. IMECA Based Assessment of Internet of Drones Systems Cyber Security Considering Radio Frequency Vulnerabilities. 2nd International Workshop on Intelligent Information Technologies and Systems of Information Security (IntelITSIS’2021), March 24–26, 2021, Khmelnytskyi, Ukraine, 2021, vol. 2853, pp. 460–470. Available at: https://ceur-ws.org/Vol-2853/paper50.pdf (accessed 10.08.2023).

Niyonsaba, S., Konate, K., & Soidridine, M. M. A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions. International Journal of Computer Networks and Applications, 2023, vol. 10, no. 5, pp. 688-701. DOI: 10.22247/ijcna/2023/223417.

Arshad, I., Alsamhi, S. H., Qiao, Y., Lee, B., & Ye, Y. A Novel Framework for Smart Cyber Defence: A Deep-Dive Into Deep Learning Attacks and Defences. IEEE Access, 2023, no. 11, pp. 88527-88548. DOI: 10.1109/access.2023.3306333.

Shafik, W., Mojtaba Matinkhah, S., & Shokoor, F. Cybersecurity in Unmanned Aerial Vehicles: a Review. International Journal on Smart Sensing and Intelligent Systems, 2023, vol. 16, no. 1, pp. 1-10. DOI: 10.2478/ijssis-2023-0012.

Omolara, A. E., Alawida, M., & Abiodun, O. I. Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey. Neural Computing and Applications, 2023, vol. 35, no. 31, pp. 1-39. DOI: 10.1007/s00521-023-08857-7.

Altaweel, A., Mukkath, H., & Kamel, I. GPS Spoofing Attacks in FANETs: A Systematic Literature Review. IEEE Access: The Multidisciplinary Open Access Journal, 2023, vol. 11, pp. 55233-55280. DOI: 10.1109/access.2023.3281731.

Babeshko, I., Illiashenko, O., Kharchenko, V., & Leontiev, K. Towards Trustworthy Safety Assessment by Providing Expert and Tool-Based XMECA Techniques. Mathematics, 2022, vol. 10, article no. 2297. DOI: 10.3390/math10132297.

Illiashenko, O., Kharchenko, V., Babeshko, I., Fesenko, H., & Di Giandomenico, F. Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. Entropy, 2023, vol. 25, article no. 1123. DOI: 10.3390/e25081123.

ISO/IEC/IEEE 21839:2019 Systems and software engineering – System of systems (SoS) considerations in life cycle stages of a system. ISO. Available at: https://www.iso.org/ru/standard/71955.html. (accessed 05.08.2023).

ISO/IEC/IEEE 21840:2019 Systems and software engineering – Guidelines for the utilization of ISO/IEC/IEEE 15288 in the context of system of systems (SoS). Available at: https://www.iso.org/ru/standard/71956.html. (accessed 05.09.2023).

Zahal'ni polozhennya shchodo zakhystu informatsiyi v komp"yuternykh systemakh vid nesanktsionovanoho dostupu: Norm. dok. systemy tekhn. zakh. informatsiyi vid 28.05.1999 r. № ND TZI 1.1-002-99: stanom na 28 hrud. 2012 r. [General provisions on the protection of information in computer systems against unauthorized access: Norm. dock. technical systems west information dated 05/28/1999 № ND TZI 1.1-002-99: as of December 28 2012]. Available at: https://tzi.com.ua/downloads/1.1-002-99.pdf (accessed 03.09.2023). (In Ukrainian).

Terminolohiya v haluzi zakhystu informatsiyi v komp"yuternykh systemakh vid nesanktsionovanoho dostupu: Norm. dok. systemy tekhn. zakh. informatsiyi vid 28.05.1999 r. № ND TZI 1.1-003-99 [Terminology in the field of information protection in computer systems against unauthorized access: Norm. dock. technical systems west information dated 05/28/1999 № ND TZI 1.1-003-99]. Available at: https://tzi.ua/assets/files/1.1_003_99.pdf (accessed 03.09.2023) (In Ukrainian).

Pevnev, V., Tsuranov, M., Zemlianko, H., & Amelina, O. Conceptual Model of Information Security. У: Lecture Notes in Networks and Systems. Cham: Springer International Publishing, 2021, vol. 188, pp. 158–168. DOI: 10.1007/978-3-030-66717-7_14.

ISO/IEC 27001:2022. Information security, cybersecurity and privacy protection. To replace EN ISO/IEC 27001:2017; ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015; valid from 2022-12-28. Kind. officer 3, 2022. 19 p. Available at: https://www.iso.org/ru/standard/27001 (accessed 03.09.2023).

DSTU 7371:2020. Tekhnika aviatsiyna derzhavnoyi aviatsiyi. Aparaty lital'ni bezpilotni. Osnovni terminy ta vyznachennya ponyat'. Klasyfikatsiya. Na zaminu DSTU V 7371:2013; chynnyy vid 2021-07-01. Nakaz pro pryynyattya ND: 2020-05-06 № 88. Vyd. ofits. Ukrayina: DP «UkrNDNTs» [DSTU 7371:2020. Aviation equipment of state aviation. Unmanned aerial vehicles. Basic terms and definitions. Classification. To replace DSTU B 7371:2013; valid from 2021-07-01. Order on the adoption of the ND: 2020-05-06 № 88. Ed. officer Ukraine: SE "UkrNDNC"]. 2020. 21 p. (In Ukrainian).

Kryteriyi otsinky zakhyshchenosti informatsiyi v komp"yuternykh systemakh vid nesanktsionovanoho dostupu: Norm. dok. systemy tekhn. zakh. informatsiyi vid 28.05.1999 r. № ND TZI 2.5-004-99: stanom na 28 hrud. 2012 r. [Criteria for evaluating the security of information in computer systems against unauthorized access: Norm. dock. technical systems west information dated 05/28/1999 No. ND TZI 2.5-004-99: as of December 28 2012]. Available at: https://tzi.com.ua/downloads/2.5-004-99.pdf (accessed 03.09.2023). (In Ukrainian).

Zakon Ukrayiny # 2952-IX vid 24.02.2023 «Pro natsional'nu bezpeku Ukrayiny». Verkhovna Rada Ukrayiny [On the national security of Ukraine: Law of Ukraine dated 24.02.2023 No. 2952-IX. Verkhovna Rada of Ukraine]. Available at: https://zakon.rada.gov.ua/go/2469-19 (accessed 03.09.2023). (In Ukrainian).

Pevnev, V. Ya., Toryanyk, V. V., & Kharchenko, V. S. Kiberbezpeka bezprovodovykh smart-system: kanaly vtruchanʹ ta radiochastotni vrazlyvosti [Cyber security of wireless smart systems: interference channels and radio frequency vulnerabilitis]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, no. 4, pp. 79-92. DOI: 10.32620/reks.2020.4.07. (In Ukrainian).

Pevnev, V., Frolov, A., Tsuranov, M., & Zemlianko, H. Ensuring the Data Integrity in Infocommunication Systems. International Journal of Computing, 2022, vol. 21, no. 2, pp. 228-233. DOI: 10.47839/ijc.21.2.2591.




DOI: https://doi.org/10.32620/reks.2023.4.11

Refbacks

  • There are currently no refbacks.