Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.1.57

Design of Context-Aware-Based Drone Control Mechanism by Using Two-Factor  

Oh, Yoon-Seok (Hanyang University)
Kim, Aeyoung (Hanyang University)
Seo, Seung-Hyun (Hanyang University)
Abstract
Drones, which are used in various fields, are vulnerable to various security threats such as physical deodorization attacks and information leakage attacks because they operate in an unmanned environment and use wireless communication with weak security. In particular, research is needed to prevent damages such as leakage of stored information and unauthorized use due to illegal drone deodorization. In this paper, we propose a context - aware drone control mechanism that protects stored internal information and prevents unauthorized use when the drones are illegally deactivated. We also demonstrated the feasibility of the proposed mechanism as a prototype implementation and experiment.
Keywords
Drone; Drone Control Mechanism; Two-Factor; Context-Aware; IoT Security; Anti-Hijacking;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dooho Choi, Seung-Hyun Seo, Yoon-Seok Oh, and Yousung Kang, "Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security," IEEE Internet of Things Journal(in press), May 2018.
2 R. Chien, "Cyclic decoding procedures for Bose-Chaudhuri-Hocquenghem codes," IEEE Transactions on Information Theory, vol. 10, no. 4, pp. 357-363, Oct. 1964.   DOI
3 N. Otsu, "A threshold selection method from gray-level histograms," IEEE transactions on systems, man, and cybernetics, vol. 9, no. 1, pp.62-66, Jan. 1979.   DOI
4 R. Maes, V. Leest, E. Sluis, and F. Willems, "Secure key generation from biased PUFs: extended version," Journal of Cryptographic Engineering, vol. 6, no. 2, pp. 121-137, Mar. 2016.   DOI
5 The ScienceTimes, "How vulnerable is the drones to hacking?" https://www.sciencetimes.co.kr/?news=%EB%93%9C%EB%A1%A0%EC%9D%80-%ED%95%B4%ED%82%B9%EC%97%90-%EC%96%BC%EB%A7%88%EB%82%98-%EC%B7%A8%EC%95%BD%ED%95%A0%EA%B9%8C, accessed Aug. 12, 2018.
6 F. Samland, J. Fruth, M Hildebrandt, T. Hoppe, and J. Dittmann, "AR. Drone: security threat analysis and exemplary attack to track persons," Proceedings of Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, International Society for Optics and Photonics, pp. 83010G, Jan. 2012.
7 A. Shoufan, H.M. Al-Angari, M.F.A. Sheikh, and E. Damiani, "Drone Pilot Identification by Classifying Radio-Control Signals," IEEE Transactions on Information Forensics and Security, vol. 10, no. 13, pp. 2439-2447, Mar. 2018.
8 Seung-Jin Kim, Seung-Hwan Kim, and Tae-Kyung Cho, "Drone password cracking through deauthorization and Hacking Drones Image Data," Proceedings of 2017 Annual Conference of the KIEE, pp. 143-150, Nov. 2017
9 G. Trujano, B. Chan, G. Beams, and R. Rivera, Security analysis of dji phantom 3 standard, Massachusetts Institute of Technology, May 2016.
10 R. Altawy and A.M. Youssef, "Security, privacy, and safety aspects of civilian drones: A survey," ACM Transactions on Cyber-Physical Systems, vol. 1, no. 2:7, Feb. 2017.
11 Jin-Seok Song, Eun-Joon Kim, Seung-Hyun Seo, "Design of a Secure Drone Control Protocol using AllJoyn," KIISC Summer Conference, 26(1), pp.216-218, June 2016
12 A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proceedings of ACM conference on Computer and Communications Security, pp. 28-36, Nov. 1999.
13 Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Springer, Berlin, Heidelberg, pp. 523-540, 2004.
14 A. Juels and M. Sudan, "A fuzzy vault scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, Feb. 2006.   DOI
15 A.B.J. Teoh and J. Kim, "Secure biometric template protection in fuzzy commitment scheme," IEICE Electronics Express vol. 4, no. 23, pp. 724-730, Apr. 2007.   DOI
16 E. Maiorana and P. Campisi, "Fuzzy commitment for function based signature template protection," IEEE Signal Processing Letters, vol. 17, no. 3, pp. 249-252, Mar. 2010.   DOI
17 M. Sandhya and M. Prasad, "Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme," International Journal of Pattern Recognition and Artificial Intelligence, vol. 31, no. 4, Apr. 2017.