Browse > Article
http://dx.doi.org/10.33778/kcsa.2019.19.4.097

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle  

Kang, Dongwoo (성균관대학교 전자전기컴퓨터공학과)
Won, Dongho (성균관대학교 소프트웨어학과)
Lee, Youngsook (호원대학교 사이버보안학과)
Publication Information
Abstract
With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.
Keywords
Unmanned Aerial Vehicle; Security Functional Requirement;
Citations & Related Records
연도 인용수 순위
  • Reference
1 이영욱. "4 차 산업혁명시대 우리나라 드론의 발전 방향." 융합보안논문지 18.5 (2018): 3-10.
2 박근석, 천상필, 김성표, & 엄정호. (2018). 전장에서 드론을 활용한 보안 위협과 시나리오. 융합보안논문지, 18(4), 73-79.
3 Low Cost and Portable Jammer, Phrack issue 0x3c(60), article 13. Dec. 28, 2002
4 J. Warner and R. Johnston, "A Simple Demonstration That the Global Positioning System (GPS) is Vulnerable to Spoofing," J. Security Administration, vol. 25, 2002. pp. 5-8.
5 Rodday, N. M., Schmidt, R. D. O., and Pras, A., "Exploring security vulnerabilities of unmanned aerial vehicles." Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, pp.993-994, 2016.
6 Potter, Bruce. "Microsoft SDL threat modelling tool." Network Security 2009.1 (2009): 15-18.   DOI
7 국토교통부훈령 제872호 2017.6.5. 타법개정, 무인항공기 비행안전 제고를 위한 입법.정책 과제
8 https://www.commoncriteriaportal.org/pps/Protection Profiles CCV files
9 Shostack, Adam. Threat modeling: Designing for security. John Wiley & Sons, 2014.
10 Shostack, Adam. "Experiences Threat Modeling at Microsoft." MODSEC@ MoDELS. 2008.
11 DoDI 8500.2, February 6, 2003