Browse > Article
http://dx.doi.org/10.6109/jkiice.2019.23.4.477

MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network  

Leem, Sungmin (Department. of Military Digital Convergence, Ajou University)
Lee, Minwoo (Department. of Military Digital Convergence, Ajou University)
Lim, Jaesung (Department. of Military Digital Convergence, Ajou University)
Abstract
As the drones industry evolved, the security of the drone network has been important. In this paper, MTD (Moving Target Detection) technique is applied to the drone network for improving security. The existing MTD scheme has a risk that the hash value is exposed during the wireless communication process, and it is restricted to apply the one-to-many network. Therefore, we proposed PHT (Preposition Hash Table) scheme to prevent exposure of hash values during wireless communication. By reducing the risk of cryptographic key exposure, the use time of the cryptographic key can be extended and the security of the drone network will be improved. In addition, the cryptographic key exchange is not performed during flight, it is advantageous to apply PHT for a swarm drone network. Through simulation, we confirmed that the proposed scheme can contribute to the security of the drone network.
Keywords
Drone; Network; Security; Hash; MTD;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. B. Luo, B. S. Wang, X. F. Wang, X. F. Hu, and G. L. Cai, "RPAH: Random port and address hopping for thwarting internal and external adversaries," Trustcom/Big-DataSE/ISPA, vol. 1, 2015.
2 G. Badishi, A. Herzberg, and K. Idit, "Keeping Denial-of-Service Attackers in the Dark," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 3, pp. 191-204, Aug. 2007.   DOI
3 K. Hartmann, and C. Steup, "The Vulnerability of UAVs to Cyber Attacks -An Approach to the Risk Assessment," 5th International Conference on Cyber Conflict, 2013.
4 M. S. Hyun, K. H. Choi, and J. H. Kim, "Development of Simulation and Test-Bed for Searching Missing People Using Multi-Drone Simulator and LoRa Sensor Network," The Journal of Korean Institute of Communications and Information Sciences, vol. 43, no. 11, pp. 1941-1951, Nov. 2018.   DOI
5 N. Jadeja, and V. Parmar, "Implementation and Mitigation of Various Tools for Pass the Hash Attack," Procedia Computer Science, vol. 79, pp. 755-764, Mar. 2016.   DOI
6 C. Gudla, S. Rana, and A. H. Sung, "Defense Techniques Against Cyber Attacks on Unmanned Aerial Vehicles," International Conference Embedded Systems, Cyber-Physical Systms & Applications. New York, Oct. 2018.
7 K. Driscoll, "Lightweight crypto for lightweight unmanned arial systems," Integrated Communications, Navigation, Surveillance Conference (ICNS), 2018.
8 G. C. Wang, B. S. Lee, K. J. Lim, and J. Y. Ahn, "Technical Trends on Security of Control and Non-Payload Communications Network for Unmanned Aircraft Systems," Electronics and Telecommunications Trends, ETRI, 2017.
9 H. Lee, and V. Thing, "Port Hopping for Resilient Networks," 60th IEEE Vehicular Technology Conference, pp. 3291- 3295, Sept. 2004.
10 H. Okhravi, T. Hobson, D. Bigelow, and W. Streilein, "Finding focus in the blur of moving-target techniques," IEEE Security & Privacy, pp. 16-26, Nov. 2013.
11 M. Dunlop, S. Groat, W. Urbanski, R. Marchany, and J. Tront, "MT6D: A Moving Target IPv6 Defense," IEEE Military Communications Conference, pp. 1321-1326, Nov. 2011.