Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network

Authors

  • Serhii Voitenko
  • Volodymyr Druzhynin
  • Hanna Martyniuk
  • Tetiana Meleshko

DOI:

https://doi.org/10.47839/ijc.21.3.2695

Keywords:

unmanned aerial vehicles, violator model, threat model, 4G network, WiMAX and LTE, HetNet, confidentiality, availability, integrity, observability, UAV scouts, shock UAV, UAV-EW

Abstract

This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.

References

J.C.O. Koh, M. Hayden, H. Daetwyler, et al., “Estimation of crop plant density at early mixed growth stages using UAV imagery,” Plant Methods, vol. 15, article 64, 2019. https://doi.org/10.1186/s13007-019-0449-1.

A. Gurnik, S. Valuiskyi, “The use of intelligent sensor technology for monitoring and search and rescue,” East European Journal of Advanced Technology. Management Information Systems, no. 3/9 (63), pp. 27-32, 2013.

M. Półka, S. Ptak, Ł. Kuziora, “The use of UAV's for search and rescue operations,” Procedia Engineering, vol. 192, pp. 748-752, 2017. https://doi.org/10.1016/j.proeng.2017.06.129.

S. W. Cho, H. J. Park, H. Lee, D. H. Shim, S.-Y. Kim, “Coverage path planning for multiple unmanned aerial vehicles in maritime search and rescue operations,” Computers & Industrial Engineering, vol. 161, article 107612, 2021. https://doi.org/10.1016/j.cie.2021.107612.

O. Vodchyts, S. Voitenko, “The Orlan-10 complex as an element of the automated command and control system,” Weapons and military equipment, no. 2, pp. 33-38, 2015. (in Ukrainian)

S. Borg, “Below the radar. Examining a small state’s usage of tactical unmanned aerial vehicles,” Defence Studies, vol. 20, pp. 185-201, 2020. https://doi.org/10.1080/14702436.2020.1787159.

M. Silvagni, et al., “Multipurpose UAV for search and rescue operations in mountain avalanche events,” Geomatics, Natural Hazards and Risk, vol. 8, issue 1, pp. 18-33, 2017. https://doi.org/10.1080/19475705.2016.1238852.

K. Hartmann and K. Giles, “UAV exploitation: A new domain for cyber power,” Proceedings of the 2016 8th IEEE International Conference on Cyber Conflict (CyCon), 2016, pp. 205-221. https://doi.org/10.1109/CYCON.2016.7529436.

“5 ways drones could come to your rescue,” Popular Mechanics. November 14, 2017. [Online]. Available at: https://www.popularmechanics.com/military/g1437/5-ways-dronescould-come-toyour-rescue/.

C. Yu, B. Zhu and Z. Zuo, “Three-dimensional optimal guidance with lyapunov redesign for UAV interception,” Guidance, Navigation and Control, vol. 01, no. 04, 2140004-1–2140004-19, 2021. https://doi.org/10.1142/S2737480721400045.

D. Rudinskas, Z. Goraj, J. Stankūnas, “Security analysis of UAV radio communication system,” Aviation, vol. 13, issue 4, pp. 116-121, 2009. https://doi.org/10.3846/1648-7788.2009.13.116-121.

F. Al-Turjman, R. Salama, “Chapter 3 - Cyber security in mobile social networks,” Security in IoT Social Networks, Intelligent Data-Centric Systems, 2021, pp. 55-81. https://doi.org/10.1016/B978-0-12-821599-9.00003-0.

M. Yeo, “Electronic warfare in the land domain - The threats continue to increase,” Asia-Pacific Defence Reporter, vol. 45, issue 7, pp. 20–22, 2019. https://doi.org/10.5604/01.3001.0012.7224.

P. Smith, “Russian electronic warfare: A growing threat to U.S.”, Battlefield Supremacy. American Security Project, 2020.

R. Vasicek, A. Oulehlova, “Cyber and electromagnetic activities and their relevance in modern military operations,” Proceedings of the 31th European Safety and Reliability Conference, 2021, pp. 512-519. https://doi.org/10.3850/978-981-18-2016-8_231-cd.

N. Neji, T. Mostfa and Y. B. Sebbane, “Technology assessment for radio communication between UAV and ground: Qualitative study and applications,” Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 2019, pp. 1-6, https://doi.org/10.1109/VTCSpring.2019.8746306.

A. Sharma, P. Vanjani, N. Paliwal, C. M. W. Basnayaka, D. N. K. Jayakody, H.-C. Wang, P. Muthuchidambaranthane, “Communication and networking technologies for UAVs: A survey,” Journal of Network and Computer Applications, volume 168, 102739, 2020. https://doi.org/10.1016/j.jnca.2020.102739.

G. Yang, X. Lin, Y. Li, H. Cui, M. Xu, D. Wu, H. Rydén, S. B. Redhwan, “A telecom perspective on the internet of drones: From LTE-advanced to 5G,” Computer Science, Networking and Internet Architecture, arXiv:1803.11048, 2018.

R. Miura, M. Maruyama, M. Suzuki, H. Tsuji, M. Oodo and Y. Nishi, “Experiment of telecom/broadcasting mission using a high-altitude solar-powered aerial vehicle Pathfinder Plus,” Proceedings of the 5th International Symposium on Wireless Personal Multimedia Communications, 2002, vol. 2, pp. 469-473. https://doi.org/10.1109/WPMC.2002.1088218.

S. K. Khan, “Mathematical framework for 5G-UAV relay,” Trans Emerging Tel Tech, 32:e4194, 2021. https://doi.org/10.1002/ett.4194.

V. L. Thing, & J. Wu, “Autonomous vehicle security: A taxonomy of attacks and defences,” Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2016, pp. 164-170. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.52.

A. Fotouhi et al., “Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3417-3442, 2019. https://doi.org/10.1109/COMST.2019.2906228.

T. Gu, and Y. Chen, “Design of effectiveness evaluation system for shipborne unmanned reconnaissance aircraft,” Journal of Coastal Research, vol. 83, pp. 565-570, 2018. https://doi.org/10.2112/SI83-093.1.

H.-J. Schmidt, “A fresh start of conventional arms control in Europe will face many structural problems,” vol. 151, DEU, 2017.

J. Kjellèn, Drone-based jamming (REB-N). Russian Electronic Warfare. The role of Electronic Warfare in the Russian Armed, Swedish Defence Research Agency, 2018, p. 105.

M. Rumney. IMT-Advanced: 4G Wireless Takes Shape in an Olympic Year, Agilent Measurement Journal, 2000, 10 p.

M. Abdulla, On the Fundamentals of Stochastic Spatial Modeling and Analysis of Wireless Networks and its Impact to Channel Losses, Ph.D. Thesis, 2012, 126 p.

X. Ji, and Y. Zhao, “Architecture design for unmanned aerial vehicle mission planning system,” Proceedings of the 2019 International Conference on Modeling, Simulation and Big Data Analysis (MSBDA 2019), Atlantis Press, 2019, pp. 419-424. https://doi.org/10.2991/msbda-19.2019.66.

H. A. Kayani, Q. Gueuning, N. Goreux, D. Vanhoenacker-Janvier, C. Oestges and C. Craeye, “Reconfigurable cellular base station antenna consisting of parasitic radiators,” IEEE Transactions on Industrial Electronics, vol. 67, no. 8, pp. 7083-7093, 2020, https://doi.org/10.1109/TIE.2019.2935991.

ND TZI 2.5-004-99 Criteria for assessing the security of information in computer systems from unauthorized access, 1999. (in Ukrainian)

I. M. Kliushnikov, H. V. Fesenko, V. S. Kharchenko, “Scheduling UAV fleets for the persistent operation of uav-enabled wireless networks during NPP monitoring,” Radioelectronic and Computer Systems, no. 1, 2020. https://doi.org/10.32620/reks.2020.1.03.

Z. Hu, R. Odarchenko, S. Gnatyuk, M. Zaliskyi, A. Chaplits, S. Bondar, V. Borovik, “Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior,” International Journal of Computer Network and Information Security (IJCNIS), vol. 12, no.6, pp. 1-13, 2020. https://doi.org/10.5815/ijcnis.2020.06.01.

V. Vishnevskii, C. Portnoi, I. Shakhovich, WiMax Encyclopedia. Way to 4G, Tekhnosfera, Moscow, 2009, 472 p.

http://www.ukraviaforum.com/index.php

Downloads

Published

2022-09-30

How to Cite

Voitenko, S., Druzhynin, V., Martyniuk, H., & Meleshko, T. (2022). Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network. International Journal of Computing, 21(3), 377-382. https://doi.org/10.47839/ijc.21.3.2695

Issue

Section

Articles