Browse > Article
http://dx.doi.org/10.13089/JKIISC.2022.32.5.737

A Study On Performance Evaluation of Cryptographic Module and Security Functional Requirements of Secure UAV  

Kim, Yongdae (The Attached Institute of ETRI)
Kim, Deokjin (The Attached Institute of ETRI)
Yi, Eunkyoung (The Attached Institute of ETRI)
Lee, Sangwook (The Attached Institute of ETRI)
Abstract
The demands of Unmanned Aerial Vehicles (UAVs) are growing very rapidly with the era of the 4th industrial revolution. As the technology of the UAV improved with the development of artificial intelligence and semiconductor technology, it began to be used in various civilian fields such as hobbies, bridge inspections, etc from being used for special purposes such as military use. MAVLink (Macro Air Vehicle Link), which started as an open source project, is the most widely used communication protocol between UAV and ground control station. However, MAVLink does not include any security features such as encryption/decryption mechanism, so it is vulnerable to various security threats. Therefore, in this study, the block cipher is implemented in UAV to ensure confidentiality, and the results of the encryption and decryption performance evaluation in the UAV according to various implementation methods are analyzed. In addition, we proposed the security requirements in accordance with Common Criteria, which is an international recognized ISO standard.
Keywords
Block Cipher; UAV; Common Criteria; MAVLink;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 D. Hong, J.-K. Lee, D.-C. Kim, D.Kwon, K. H. Ryu, and D.-G. Lee,"LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," Lect Notes Comput Sc,pp. 3-27, 2014
2 Kwon, D., Kim, J., Park, S., Sung, S.H., Sohn, Y., Song, J. H., ... and Hong, J. "New block cipher: ARIA". InInternational conference oninformation security and cryptologypp. 432-445, 2003
3 Guillen-Perez, A., Sanchez-Iborra, R.,Cano, M.D., Sanchez-Aarnoutse, and J.C.,Garcia-Haro, J., "Wifi networkson drones" In: 2016 ITU Kaleidoscope:ICTs for a Sustainable World(ITUWT). pp. 1-8, 2016
4 Khan, N.A., Jhanjhi, N.Z., Brohi, S.N., and Nayyar, A., "Emerging use of uav's: secure communication protocol issues and challenges" In: Drones in smart-cities, pp. 37-55, 2020
5 Iqbal, S., "A study on uav operatingsystem security and future researchchallenges" In: 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). pp. 0759-0765,2021
6 Koubaa, A., Allouch, A., Alajlan, M., Javed, Y., Belghith, A., and Khalgui, M., "Micro air vehicle link (mavlink) in a nutshell" A survey. IEEE Access 7, pp. 87658-87680, 2019   DOI
7 Hassija, V., Chamola, V., Agrawal, A., Goyal, A., Luong, N.C., Niyato, D., Yu, F.R., Guizani, and M., "Fast, reliable, and secure drone communication" A comprehensive survey. IEEE Communications Surveys & Tutorials, 2021
8 Marty, J.A., "Vulnerability analysisof the mavlink protocol for commandand control of unmanned aircraft" Tech. rep. (2013)
9 Dey, V., Pudi, V., Chattopadhyay, A.,and Elovici, Y., "Security vulnerabilities of unmannedaerial vehicles and countermeasures: An experimental study" In: 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID). pp. 398-403, 2018
10 Son, Y., Shin, H., Kim, D., Park, Y.,Noh, J., Choi, K., Choi, J., and Kim,Y., "Rocking drones with intentional sound noise on gyroscopic sensors" In:24th USENIX Security Symposium(USENIX Security 15). pp. 881-896,2015
11 Kwon, Y.M., Yu, J., Cho, B.M., Eun, Y., and Park, K.J. "Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles" IEEE Access 6, 43203-43212, 2018   DOI
12 PX4 github. Website. [Online]https://github.com/PX4/PX4-Autopilot.git, accessed: 2022-03
13 Dworkin, M. J., Barker, B.,Nechvatal, J. R., Foti, J., Bassham,L. E., Roback, E., and Dray Jr, J.(2001). "Advanced EncryptionStandard (AES)", NIST FIPS-197.
14 Common Criteria for Information Technology Security Evaluation, version 3.1, revision 5. part 2:Functional Security Components. 2017
15 Shoufan, A., AlNoon, H., and Baek,J., "Secure communication incivil drones" In: International Conferenceon Information Systems Security and Privacy. pp. 177-195, 2015
16 Hartmann, K., and Steup, C., "Thevulnerability of uavs to cyberattacks-an approach to the riskassessment" In: 2013 5th international conference on cyber conflict (CYCON2013). pp. 1-23, 2013
17 Arteaga, S.P., Hernandez, L.A.M.,Perez, G.S., Orozco, A.L.S., and Villalba, L.J.G., "Analysis of the gps spoofing vulnerability in the drone 3dr solo" IEEE Access 7, 51782-51789, 2019   DOI
18 Atoev, S., Kwon, O.J., Kim, C.Y., Lee, S.H., Choi, Y.R., and Kwon, K.R. "The secure uav communication link based on otp encryption technique" In: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN). pp. 1-3, 2019
19 Domin, K., Symeonidis, I., and Marin, E., "Security analysis of the drone communication protocol" Fuzzing the mavlink protocol, 2016
20 Jeong, S., Park, E., Seo, K.U., Do Yoo, J., and Kim, H.K., "Muvids: False mavlink injection attack detection in communication for unmanned vehicles" In: Workshop on Automotive and Autonomous Vehicle Security (AutoSec). vol. 2021, pp. 25, 2021
21 TTAS.KO-12.0004/R1, "128-bit BlockCipher SEED", 2005
22 Allouch, A., Cheikhrouhou, O., Koubaa, A., Khalgui, M., and Abbes, T., "Mavsec: Securing the mavlink protocol for ardupilot/px4 unmanned aerial systems" In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). pp. 621-628, 2019
23 Rani, C., Modares, H., Sriram, R.,Mikulski, D., Lewis, F.L., "Security of unmanned aerial vehicle systemsagainst cyber-physical attacks" TheJournal of Defense Modeling and Simulation 13(3), 331-342 (2016)   DOI