Browse > Article
http://dx.doi.org/10.13089/JKIISC.2022.32.3.591

A Study of Security Evaluation Criteria for Reconnaissance Drone  

Gu, Do-hyung (Korea University)
Kim, Seung-joo (Korea University)
Lee, Sang-jin (Korea University)
Abstract
As drones are widely used, attack attempts using drone vulnerabilities are increasing, and drone security is growing in importance. This paper derives security requirements for reconnaissance drone delivered to government office through threat modeling. Threats are analyzed by the data flow of the drone and collecting possible vulnerabilities. Attack tree is built by analyzed threats. The security requirements were derived from the attack tree and compared with the security requirements suggested by national organizations. Utilizing the security requirements derived from this paper will help in the development and evaluation of secure drones.
Keywords
Drone; Security Requirement; STRIDE Threat Modeling;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 M. robbinson, "Knocking my neighbors kids cruddy drone offline," Defcon 23, 2015.
2 B Nassi, A Shabtai, R Masuoka, Y Elovici. "Sok - security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps." ArXiv abs/1903.05155, 2019.
3 Daegeon Kim, Huy Kang Kim, "Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications," arXiv, 2019.
4 C. Hennebert, "A first Step towards a Protection Profile for the Security Evaluation of Consensus Mechanisms," 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1-6, 2020, doi: 10.1109/IOTSMS52051.2020.9340216.   DOI
5 Ji-soo Park, Seung-joo Kim. "Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria". KIPS Transactions on Computer and Communication Systems, vol. 6, pp.121-134, 2017.   DOI
6 Shevchenko, Nataliya, "Threat Modeling: a Summary of Available Methods," Jul. 2018.
7 A. Shostack, "Threat Modeling: Designing for Security," Wiley, 2014.
8 R. Khan, K. McLaughlin, D. Laverty and S. Sezer, "STRIDE-based threat modeling for cyber-physical systems," 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), pp. 1-6, 2017, doi: 10.1109/ISGTEurope.2017.8260283.   DOI
9 In-Kyung Oh, Jae-Wan Seo, Min-Kyu Lee, Tae-Hoon Lee, Yu-Na Han, Ui-Seong Park, Han-Byeol Ji , Jong-Ho Lee, Kyu-Hyung Cho, Kyoung-gon Kim, "Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling," Journal of the Korea Institute of Information Security & Cryptology, vol. 30, no. 2, pp. 213-230, 2020.   DOI
10 R. Scandariato, K. Wuyts, W. Joosen, "A descriptive study of Microsoft's threat modeling technique," Requirements Engineering, vol. 20, no. 2, pp. 163-180, Jun. 2015.   DOI
11 Seung-hoon Park, "The CHAOS (ChibiOS based High Assurance Operating System) Project," https://github.com/HackProof/CHAOS
12 E.Deligne, "ARDrone corruption," Journal in Computer Virology, vol.8, no. 1-2, pp. 55-27, May. 2012.   DOI
13 A.J. Kerns, D.P. Shepard, A.B. Jahshan and T.E. Humphreys, "Unmanned Aircraft Capture and Control Via GPS Spoofing," Journal of Field Robotics vol. 31, pp. 617-636, 2014.   DOI
14 Seung bae Sim,Hun yeong Kwon, Ho sang Jung, "A study on Utilization of Drone for Public Sector by Analysis of Drone Industry," Journal of Information Technology Service, vol. 15, no. 4, pp. 25-39. Dec. 2016.   DOI
15 D. He, S. Chan and M. Guizani, "Drone-Assisted Public Safety Networks: The Security Aspect," in IEEE Communications Magazine, vol. 55, no. 8, pp. 218-223, Aug. 2017.   DOI
16 Korea Internet & Security Agency, Cyber security guide for drone, Dec. 2020.
17 N. Shevchenko, T.A. Chick, P. O'Riordan, T.P. Scanlon and C. Woody, "Threat Modeling: A Summary of Available Methods," AD1084024, Software Engineering Institute, Carnegie Melon University, Jul. 2018.
18 S. Myagmar, A.J. Lee and W. Yurcik, "Threat Modeling as a Basis for Security Requirements," National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, 2005.
19 S. Kamkar, "Skyjack," https://github.com/samyk/skyjack, Dec. 2013.
20 J. Yaacoub, H. Noura, O. Salman, A. Chehab, "Security analysis of drones systems: Attacks, limitations, and recommendations", Internet of Things, vol. 11, Sep. 2020.
21 I. Astaburuaga, A. Lombardi, B. La Torre, C. Hughes and S. Sengupta, "Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System," 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0666-0672, 2019.
22 N. M. Rodday, "Hacking a Professional Drone," blackhat asia, 2016.
23 A. Luo, "Drones hijacking - multi-dimensional attack vectors and countermeasures," Defcon 24, 2016.
24 K. Highnam, K. Angstadt, K. Leach, W. Weimer, A. Paulos and P. Hurley, "An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture," 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), pp. 222-225, 2016, doi: 10.1109/DSN-W.2016.63.   DOI
25 Dae-geon Kim, "Security Enhancement of Drone Considering the Characteristics of Data Transmitted between Wireless Channel," Journal of Defense and Security, vol. 3, no. 1, pp. 51-70, 2021.
26 T. Trippel, O. Weisse, W. Xu, P. Honeyman and K. Fu, "WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks," 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017, pp. 3-18, doi: 10.1109/EuroSP.2017.42.   DOI
27 C. Rani, H. Modares, R. Sriram, D. Mikulski, FL. Lewis, "Security of unmanned aerial vehicle systems against cyber-physical attacks", The Journal of Defense Modeling and Simulation, vol. 13, no. 3, pp. 331-342, 2016.   DOI
28 N. M. Rodday, R. d. O. Schmidt and A. Pras, "Exploring security vulnerabilities of unmanned aerial vehicles," NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, pp. 993-994, 2016, doi: 10.1109/NOMS.2016.7502939.   DOI
29 T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O'Hanlon, P.M. Kintner and Jr, "Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer," Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS), Savannah, GA, pp. 2314-2325, Sep 2008.
30 A. Vervisch-Picois, N. Samama and T. Taillandier-Loize, "Influence of GNSS spoofing on drone in automatic flight mode, " International Symposium of Navigation and Timing 4th, Toulouse, France. pp. 1-9, Nov. 2017.
31 D. He et al., "A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles," in IEEE Network, vol. 33, no. 2, pp. 146-151, Apr. 2019, doi: 10.1109/MNET.2018.1800065.   DOI
32 Seong-Hun Seo, Byung-Hyun Lee, Sung-Hyuck Im, Gyu-In Jee, "Effect of Spoofing on Unmanned Aerial Vehicle using Counterfeited GPS Signal," Journal of Positioning, Navigation, and Timing, vol. 4, no. 2, pp. 57-65, June 2015.   DOI
33 J. Farlik, M. Kratky and J. Casar, "Detectability and jamming of small UAVs by commercially available low-cost means," 2016 International Conference on Communications (COMM), 2016, pp. 327-330, doi: 10.1109/ICComm.2016.7528287.   DOI
34 J. Gordon, V. Kraj, J. H. Hwang and A. Raja, "A Security Assessment for Consumer WiFi Drones," 2019 IEEE International Conference on Industrial Internet (ICII), 2019, pp. 1-5, doi: 10.1109/ICII.2019.00011.   DOI
35 Paul Hong, Yejun Kim, Kwangsoo Cho, Seungjoo Kim, "A study on Security Requirements for 5G Base Station", Journal of The Korea Institute of Information Security &Cryptology, vol. 31, no. 5, Oct. 2021.
36 Yun-mok Son, Ho-cheol Shin, Dong-kwan Kim, Young-seok Park, Ju-hwan Noh, Ki-bum Choi, Jung-woo Choi, and Yong-dae Kim, "Rocking drones with intentional sound noise on gyroscopic sensors," 24th USENIX Conference on Security Symposium(SEC'15), pp. 881-896, 2015.
37 B. Nassi, R. Bitton, R. Masuoka, A. Shabtai and Y. Elovici, "Sok: security and privacy in the age of commercial drones," 2021 IEEE Symp. on Security and Privacy (SP), pp. 1434-1451, 2021.