Model Checking Based Unmanned Aerial Vehicle (UAV) Security Analysis

Author(s):  
Eman Shaikh ◽  
Nazeeruddin Mohammad ◽  
Shahabuddin Muhammad
2020 ◽  
Vol 4 (1) ◽  
pp. 546
Author(s):  
Alfian Djafar ◽  
Gad Gunawan ◽  
Doddy Suanggana ◽  
Chandra Suryani Rahendaputri

ABSTRAKAngka kriminalitas yang meningkat menjadi salah satu permasalahan pembangunan di kota Balikpapan. Tindakan kriminalitas seperti pencurian, penculikan anak, tindakan asusila terhadap perempuan dan sebagainya sangat meresahkan warga. Tidak terkecuali untuk warga perumahan Griya Wiyata Asri (GWA) III, RT 19, Kelurahan Karang Joang, Balikpapan. Sejauh ini, pelaksanaan Siskamling terbukti efektif dalam meminimalisir terjadinya tindak kejahatan di perumahan GWA III, terutama pada malam hari. Namun, permasalahan terjadi pada siang hari karena mayoritas warga perumahan masuk dalam kategori produktif, bekerja sehingga berada di luar perumahan, bahkan ada yang di luar kota. Suasana perumahan sangat sepi, sehingga meninggalkan celah tindakan kriminalitas bisa terjadi pada siang hari. Oleh karena itu, dibutuhkan upaya penanggulan atau pencegahan tindak kriminalitas. Untuk membantu upaya pencegahan tindak kriminalitas, dirakitlah sebuah Unmanned Aerial Vehicle (UAV). UAV ini digunakan untuk memantau kondisi di perumahan GWA III. Metode evaluasi dari pengabdian masyarakat tahap awal ini adalah sebatas melalui  observasi hasil pemantauan udara. Dari hasil foto, kejernihan foto dan kondisi perumahan yang dapat diobservasi secara jelas per bingkai foto udara, maka UAV ini berpotensi untuk digunakan sebagai penunjang siskamling dengan permasalahan kurangnya sumber daya manusia pada siang hari di perumahan GWA III ini.     Kata kunci: UAV; siskamling; keamanan. ABSTRACTBalikpapan, a city of oil. Despite this predicate, it suffer from high criminal level. This incude robbery, child kidnapping, female abuse that have been a great concern in many residential in Balikpapan. One of this residence is Griya Wiyata Asri III Residence. In this residence, a neigbourhood security system has been made. In this system, the resident of this residence have a shift to do a night watching. This system have been effective in the night, but in the daylight, because most of the people are in productive age, most of them working outside of this residential, make this residential empty, thus, making an opportunity for criminal to occur. To answer this probem, an unmanned aerial vehicle was built to monitor the condition of the neighbourhood. The evaluation of this preliminary stage of this community service was done merely from the results of the aerial view. This aerial view, it is so clear and can capture well the activity done in the neighbourhood in a one frame. So, this UAV have a potential to be used as aid to the neighbourhood security system which have a problem on lacking some human resources in the daylight. Keywords: UAV; security; neighbourhood.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Jingyi Li ◽  
Yujue Wang ◽  
Yong Ding ◽  
Wanqing Wu ◽  
Chunhai Li ◽  
...  

In unmanned aerial vehicle networks (UAVNs), unmanned aerial vehicles with restricted computing and communication capabilities can perform tasks in collaborative manner. However, communications in UAVN confront many security issues, for example, malicious entities may launch impersonate attacks. In UAVN, the command center (CMC) needs to perform mutual authentication with unmanned aerial vehicles in clusters. The aggregator (AGT) can verify the authenticity of authentication request from CMC; then, the attested authentication request is broadcasted to the reconnaissance unmanned aerial vehicle (UAV) in the same cluster. The authentication responses from UAVs can be verified and aggregated by AGT before being sent to CMC for validation. Also, existing solutions cannot resist malicious key generation center (KGC). To address these issues, this paper proposes a pairing-free authentication scheme (CLAS) for UAVNs based on the certificateless signature technology, which supports batch verification at both AGT and CMC sides so that the verification efficiency can be improved greatly. Security analysis shows that our CLAS scheme can guarantee the unforgeability for (attested) authentication request and (aggregate) responses in all phases. Performance analysis indicates that our CLAS scheme enjoys practical efficiency.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Xinyu Huang ◽  
Yunzhe Tian ◽  
Yifei He ◽  
Endong Tong ◽  
Wenjia Niu ◽  
...  

With the rapid development of wireless communication technology and intelligent mobile devices, unmanned aerial vehicle (UAV) cluster is becoming increasingly popular in both civilian and military applications. Recently, a swarm intelligence-based UAV cluster study, aiming to enable efficient and autonomous collaboration, has drawn lots of interest. However, new security problems may be introduced with such swarm intelligence. In this work, we perform the first detailed security analysis to a kind of flocking-based UAV cluster with 5 policies, an upgrade version of the well-known Boids model. Targeting a realistic threat in a source-to-destination flying task, we design a data spoofing strategy and further perform complete vulnerability analysis. We reveal that such design and implementation are highly vulnerable. After breaking through the authentication of ad hoc on-demand distance vector (AODV) routing protocol by rushing attack, an attacker can masquerade as the first-arrival UAV within a specific scope of destination and generate data spoofing of arrival status to the following UAVs, so as to interfere with their normal flying paths of destination arrival and cause unexpected arrival delays amid urgent tasks. Experiments with detailed analysis from the 5-UAV cluster to the 10-UAV cluster are conducted to show specific feature composition-based attack effect and corresponding average delay. We also discuss promising defense suggestions leveraging the insights from our analysis.


2020 ◽  
Vol 20 (4) ◽  
pp. 332-342
Author(s):  
Hyung Jun Park ◽  
Seong Hee Cho ◽  
Kyung-Hwan Jang ◽  
Jin-Woon Seol ◽  
Byung-Gi Kwon ◽  
...  

2018 ◽  
pp. 7-13
Author(s):  
Anton M. Mishchenko ◽  
Sergei S. Rachkovsky ◽  
Vladimir A. Smolin ◽  
Igor V . Yakimenko

Results of experimental studying radiation spatial structure of atmosphere background nonuniformities and of an unmanned aerial vehicle being the detection object are presented. The question on a possibility of its detection using optoelectronic systems against the background of a cloudy field in the near IR wavelength range is also considered.


Author(s):  
Amir Birjandi ◽  
◽  
Valentin Guerry ◽  
Eric Bibeau ◽  
Hamidreza Bolandhemmat ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document