Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network
DOI:
https://doi.org/10.47839/ijc.21.3.2695Keywords:
unmanned aerial vehicles, violator model, threat model, 4G network, WiMAX and LTE, HetNet, confidentiality, availability, integrity, observability, UAV scouts, shock UAV, UAV-EWAbstract
This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.
References
J.C.O. Koh, M. Hayden, H. Daetwyler, et al., “Estimation of crop plant density at early mixed growth stages using UAV imagery,” Plant Methods, vol. 15, article 64, 2019. https://doi.org/10.1186/s13007-019-0449-1.
A. Gurnik, S. Valuiskyi, “The use of intelligent sensor technology for monitoring and search and rescue,” East European Journal of Advanced Technology. Management Information Systems, no. 3/9 (63), pp. 27-32, 2013.
M. Półka, S. Ptak, Ł. Kuziora, “The use of UAV's for search and rescue operations,” Procedia Engineering, vol. 192, pp. 748-752, 2017. https://doi.org/10.1016/j.proeng.2017.06.129.
S. W. Cho, H. J. Park, H. Lee, D. H. Shim, S.-Y. Kim, “Coverage path planning for multiple unmanned aerial vehicles in maritime search and rescue operations,” Computers & Industrial Engineering, vol. 161, article 107612, 2021. https://doi.org/10.1016/j.cie.2021.107612.
O. Vodchyts, S. Voitenko, “The Orlan-10 complex as an element of the automated command and control system,” Weapons and military equipment, no. 2, pp. 33-38, 2015. (in Ukrainian)
S. Borg, “Below the radar. Examining a small state’s usage of tactical unmanned aerial vehicles,” Defence Studies, vol. 20, pp. 185-201, 2020. https://doi.org/10.1080/14702436.2020.1787159.
M. Silvagni, et al., “Multipurpose UAV for search and rescue operations in mountain avalanche events,” Geomatics, Natural Hazards and Risk, vol. 8, issue 1, pp. 18-33, 2017. https://doi.org/10.1080/19475705.2016.1238852.
K. Hartmann and K. Giles, “UAV exploitation: A new domain for cyber power,” Proceedings of the 2016 8th IEEE International Conference on Cyber Conflict (CyCon), 2016, pp. 205-221. https://doi.org/10.1109/CYCON.2016.7529436.
“5 ways drones could come to your rescue,” Popular Mechanics. November 14, 2017. [Online]. Available at: https://www.popularmechanics.com/military/g1437/5-ways-dronescould-come-toyour-rescue/.
C. Yu, B. Zhu and Z. Zuo, “Three-dimensional optimal guidance with lyapunov redesign for UAV interception,” Guidance, Navigation and Control, vol. 01, no. 04, 2140004-1–2140004-19, 2021. https://doi.org/10.1142/S2737480721400045.
D. Rudinskas, Z. Goraj, J. Stankūnas, “Security analysis of UAV radio communication system,” Aviation, vol. 13, issue 4, pp. 116-121, 2009. https://doi.org/10.3846/1648-7788.2009.13.116-121.
F. Al-Turjman, R. Salama, “Chapter 3 - Cyber security in mobile social networks,” Security in IoT Social Networks, Intelligent Data-Centric Systems, 2021, pp. 55-81. https://doi.org/10.1016/B978-0-12-821599-9.00003-0.
M. Yeo, “Electronic warfare in the land domain - The threats continue to increase,” Asia-Pacific Defence Reporter, vol. 45, issue 7, pp. 20–22, 2019. https://doi.org/10.5604/01.3001.0012.7224.
P. Smith, “Russian electronic warfare: A growing threat to U.S.”, Battlefield Supremacy. American Security Project, 2020.
R. Vasicek, A. Oulehlova, “Cyber and electromagnetic activities and their relevance in modern military operations,” Proceedings of the 31th European Safety and Reliability Conference, 2021, pp. 512-519. https://doi.org/10.3850/978-981-18-2016-8_231-cd.
N. Neji, T. Mostfa and Y. B. Sebbane, “Technology assessment for radio communication between UAV and ground: Qualitative study and applications,” Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 2019, pp. 1-6, https://doi.org/10.1109/VTCSpring.2019.8746306.
A. Sharma, P. Vanjani, N. Paliwal, C. M. W. Basnayaka, D. N. K. Jayakody, H.-C. Wang, P. Muthuchidambaranthane, “Communication and networking technologies for UAVs: A survey,” Journal of Network and Computer Applications, volume 168, 102739, 2020. https://doi.org/10.1016/j.jnca.2020.102739.
G. Yang, X. Lin, Y. Li, H. Cui, M. Xu, D. Wu, H. Rydén, S. B. Redhwan, “A telecom perspective on the internet of drones: From LTE-advanced to 5G,” Computer Science, Networking and Internet Architecture, arXiv:1803.11048, 2018.
R. Miura, M. Maruyama, M. Suzuki, H. Tsuji, M. Oodo and Y. Nishi, “Experiment of telecom/broadcasting mission using a high-altitude solar-powered aerial vehicle Pathfinder Plus,” Proceedings of the 5th International Symposium on Wireless Personal Multimedia Communications, 2002, vol. 2, pp. 469-473. https://doi.org/10.1109/WPMC.2002.1088218.
S. K. Khan, “Mathematical framework for 5G-UAV relay,” Trans Emerging Tel Tech, 32:e4194, 2021. https://doi.org/10.1002/ett.4194.
V. L. Thing, & J. Wu, “Autonomous vehicle security: A taxonomy of attacks and defences,” Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2016, pp. 164-170. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.52.
A. Fotouhi et al., “Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3417-3442, 2019. https://doi.org/10.1109/COMST.2019.2906228.
T. Gu, and Y. Chen, “Design of effectiveness evaluation system for shipborne unmanned reconnaissance aircraft,” Journal of Coastal Research, vol. 83, pp. 565-570, 2018. https://doi.org/10.2112/SI83-093.1.
H.-J. Schmidt, “A fresh start of conventional arms control in Europe will face many structural problems,” vol. 151, DEU, 2017.
J. Kjellèn, Drone-based jamming (REB-N). Russian Electronic Warfare. The role of Electronic Warfare in the Russian Armed, Swedish Defence Research Agency, 2018, p. 105.
M. Rumney. IMT-Advanced: 4G Wireless Takes Shape in an Olympic Year, Agilent Measurement Journal, 2000, 10 p.
M. Abdulla, On the Fundamentals of Stochastic Spatial Modeling and Analysis of Wireless Networks and its Impact to Channel Losses, Ph.D. Thesis, 2012, 126 p.
X. Ji, and Y. Zhao, “Architecture design for unmanned aerial vehicle mission planning system,” Proceedings of the 2019 International Conference on Modeling, Simulation and Big Data Analysis (MSBDA 2019), Atlantis Press, 2019, pp. 419-424. https://doi.org/10.2991/msbda-19.2019.66.
H. A. Kayani, Q. Gueuning, N. Goreux, D. Vanhoenacker-Janvier, C. Oestges and C. Craeye, “Reconfigurable cellular base station antenna consisting of parasitic radiators,” IEEE Transactions on Industrial Electronics, vol. 67, no. 8, pp. 7083-7093, 2020, https://doi.org/10.1109/TIE.2019.2935991.
ND TZI 2.5-004-99 Criteria for assessing the security of information in computer systems from unauthorized access, 1999. (in Ukrainian)
I. M. Kliushnikov, H. V. Fesenko, V. S. Kharchenko, “Scheduling UAV fleets for the persistent operation of uav-enabled wireless networks during NPP monitoring,” Radioelectronic and Computer Systems, no. 1, 2020. https://doi.org/10.32620/reks.2020.1.03.
Z. Hu, R. Odarchenko, S. Gnatyuk, M. Zaliskyi, A. Chaplits, S. Bondar, V. Borovik, “Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior,” International Journal of Computer Network and Information Security (IJCNIS), vol. 12, no.6, pp. 1-13, 2020. https://doi.org/10.5815/ijcnis.2020.06.01.
V. Vishnevskii, C. Portnoi, I. Shakhovich, WiMax Encyclopedia. Way to 4G, Tekhnosfera, Moscow, 2009, 472 p.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.