Adaptive Cyber-Defense for Unmanned Aerial Vehicles: A Modular Simulation Model with Dynamic Performance Management

Authors

  • Gregorius Airlangga Universitas Katolik Indonesia Atma Jaya

DOI:

https://doi.org/10.12928/biste.v5i4.9415

Keywords:

UAV, Cyber Security, Modular System, Monolithic, Multi UAV

Abstract

In light of escalating cyber threats, this study tackles the cybersecurity challenges in UAV systems, underscoring the limitations of static defense mechanisms. Traditional security approaches fall short against the sophisticated and evolving nature of cyber-attacks, particularly for UAVs that depend on real-time autonomy. Addressing this deficiency, we introduce an adaptive modular security system tailored for UAVs, enhancing resilience through real-time defensive adaptability. This system integrates scalable, modular components and employs machine learning techniques—specifically, neural networks and anomaly detection algorithm to improve threat prediction and response. Our approach marks a significant leap in UAV cybersecurity, departing from static defenses to a dynamic, context-aware strategy. By employing this system, UAV stakeholders gain the flexibility needed to counteract multifaceted cyber risks in diverse operational scenarios. The paper delves into the system's design and operational efficacy, juxtaposing it with conventional strategies. Experimental evaluations, using varied UAV scenarios, measure defense success rates, computational efficiency, and resource utilization. Findings reveal that our system surpasses traditional models in defense success and computational speed, albeit with a slight increase in resource usage a consideration for deployment in resource-constrained contexts. In closing, this research underscores the imperative for dynamic, adaptable cybersecurity solutions in UAV operations, presenting an innovative and proactive defense framework. It not only illustrates the immediate benefits of such adaptive systems but also paves the way for ongoing enhancements in UAV cyber defense mechanisms.

References

K. Chávez and O. Swed, "The proliferation of drones to violent nonstate actors," Defence Studies, vol. 21, no. 1, pp. 1-24, 2021, https://doi.org/10.1080/14702436.2020.1848426.

G. Markarian and A. Staniforth. Countermeasures for aerial drones. Artech House. 2020. https://books.google.co.id/books?hl=id&lr=&id=In0qEAAAQBAJ.

A. Al-Dhaqm, R. A. Ikuesan, V. R. Kebande, S. Razak, and F. M. Ghabban, "Research challenges and opportunities in drone forensics models," Electronics, vol. 10, no. 13, no. 1519, 2021, https://doi.org/10.3390/electronics10131519.

V. Kharchenko and V. Torianyk, "Cybersecurity of the Internet of Drones: Vulnerabilities analysis and IMECA based assessment," 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), pp. 364-369, 2018, https://doi.org/10.1109/DESSERT.2018.8409160.

K. M. Giannoutakis et al., "A Blockchain Solution for Enhancing Cybersecurity Defence of IoT," 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, 2020, pp. 490-495, 2020, https://doi.org/10.1109/Blockchain50366.2020.00071.

J.-H. Cho et al., "Toward proactive, adaptive defense: A survey on moving target defense," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 709-745, 2020, https://doi.org/10.1109/COMST.2019.2963791.

A. Kenyon, L. Deka, and D. Elizondo, "Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasets," Computers & Security, vol. 99, no. 102022, 2020, https://doi.org/10.1016/j.cose.2020.102022.

T. Sobb, B. Turnbull, and N. Moustafa, "Supply chain 4.0: A survey of cyber security challenges, solutions and future directions," Electronics, vol. 9, no. 11, no. 1864, 2020, https://doi.org/10.3390/electronics9111864.

A. Sabella, R. Irons-Mclean, and M. Yannuzzi. Orchestrating and automating security for the internet of things: Delivering advanced security capabilities from edge to cloud for IoT. Cisco Press. 2018. https://books.google.co.id/books?hl=id&lr=&id=SjFbDwAAQBAJ.

T. Rains. Cybersecurity Threats, Malware Trends, and Strategies: Learn to mitigate exploits, malware, phishing, and other social engineering attacks. Packt Publishing Ltd. 2020. https://books.google.co.id/books?hl=id&lr=&id=8YLoDwAAQBAJ.

N. Kaloudi and J. Li, "The AI-based cyber threat landscape: A survey," ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1-34, 2020, https://doi.org/10.1145/3372823.

E. C. K. Cheng and T. Wang, "Institutional strategies for cybersecurity in higher education institutions," Information, vol. 13, no. 4, no. 192, 2022, https://doi.org/10.3390/info13040192.

W. Hoffman, “Is Cyber Strategy Possible?,” The Washington Quarterly, vol. 42, no. 1, pp. 131-152, 2019, https://doi.org/10.1080/0163660X.2019.1593665.

R. Walters and M. Novak, “Artificial Intelligence and Law,” In Cyber Security, Artificial Intelligence, Data Protection & the Law, pp. 39-69, 2021, https://doi.org/10.1007/978-981-16-1665-5_3.

E. Schrom et al., "Challenges in cybersecurity: Lessons from biological defense systems," Mathematical Biosciences, no. 109024, 2023, https://doi.org/10.1016/j.mbs.2023.109024.

S. Garg, A. Singh, S. Batra, N. Kumar, and L. T. Yang, "UAV-empowered edge computing environment for cyber-threat detection in smart vehicles," IEEE Network, vol. 32, no. 3, pp. 42-51, 2018, https://doi.org/10.1109/MNET.2018.1700286.

H. Hildmann and E. Kovacs, "Using unmanned aerial vehicles (UAVs) as mobile sensing platforms (MSPs) for disaster response, civil security and public safety," Drones, vol. 3, no. 3, no. 59, 2019, https://doi.org/10.3390/drones3030059.

M. Yahuza et al., "Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges," in IEEE Access, vol. 9, pp. 57243-57270, 2021, https://doi.org/10.1109/ACCESS.2021.3072030.

R. Bonatti et al., "Autonomous aerial cinematography in unstructured environments with learned artistic decision‐making," Journal of Field Robotics, vol. 37, no. 4, pp. 606-641, 2020, https://doi.org/10.1002/rob.21931.

C. Stevens, "Assembling cybersecurity: The politics and materiality of technical malware reports and the case of Stuxnet," Contemporary Security Policy, vol. 41, no. 1, pp. 129-152, 2020, https://doi.org/10.1080/13523260.2019.1675258.

S. Jamshidi, A. Nikanjam, M. A. Hamdaqa, and F. Khomh, "Attack Detection by Using Deep Learning for Cyber-Physical System," in Artificial Intelligence for Cyber-Physical Systems Hardening, Cham: Springer International Publishing, pp. 155-179, 2022, https://doi.org/10.1007/978-3-031-16237-4_7.

G. Aceto, V. Persico, and A. Pescapé, "A survey on information and communication technologies for industry 4.0: State-of-the-art, taxonomies, perspectives, and challenges," IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3467-3501, 2019, https://doi.org/10.1109/COMST.2019.2938259.

L. Da Xu, E. L. Xu, and L. Li, "Industry 4.0: state of the art and future trends," International Journal of Production Research, vol. 56, no. 8, pp. 2941-2962, 2018, https://doi.org/10.1080/00207543.2018.1444806.

S. Zhang and D. Zhu, "Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities," Computer Networks, vol. 183, Art. no. 107556, 2020, https://doi.org/10.1016/j.comnet.2020.107556.

Y.-x. Xie, L.-x. Ji, L.-s. Li, Z. Guo, and T. Baker, "An adaptive defense mechanism to prevent advanced persistent threats," Connection Science, vol. 33, no. 2, pp. 359-379, 2021, https://doi.org/10.1080/09540091.2020.1832960.

A. Srivastava, V. Parmar, S. Patel, and A. Chaturvedi, "Adaptive Cyber Defense: Leveraging Neuromorphic Computing for Advanced Threat Detection and Response," in Proc. 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), pp. 1557-1562, 2023, https://doi.org/10.1109/ICSCSS57650.2023.10169393.

J. L. Cremer and G. Strbac, "A machine-learning based probabilistic perspective on dynamic security assessment," International Journal of Electrical Power & Energy Systems, vol. 128, no. 106571, 2021, https://doi.org/10.1016/j.ijepes.2020.106571.

K. Al-Dosari and N. Fetais, "A new shift in implementing unmanned aerial vehicles (UAVs) in the safety and security of smart cities: a systematic literature review," Safety, vol. 9, no. 3, no. 64, 2023, https://doi.org/10.3390/safety9030064.

J.-H. Cho et al., "Toward proactive, adaptive defense: A survey on moving target defense," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 709-745, 2020, https://doi.org/10.1109/COMST.2019.2963791.

S. K. Shandilya, S. Upadhyay, A. Kumar, and A. K. Nagar, "AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis," Future Generation Computer Systems, vol. 127, pp. 297-308, 2022, https://doi.org/10.1016/j.future.2021.09.018.

M. R. Rahman, R. Mahdavi Hezaveh, and L. Williams, "What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey," ACM Computing Surveys, vol. 55, no. 12, pp. 1-36, 2023, https://doi.org/10.1145/3571726.

N. Chowdhury, S. Katsikas, and V. Gkioulos, "Modeling effective cybersecurity training frameworks: A delphi method-based study," Computers & Security, vol. 113, no. 102551, 2022, https://doi.org/10.1016/j.cose.2021.102551.

O. Yurekten and M. Demirci, "SDN-based cyber defense: A survey," Future Generation Computer Systems, vol. 115, pp. 126-149, 2021, https://doi.org/10.1016/j.future.2020.09.006.

K.-Y. Tsao, T. Girdler, and V. G. Vassilakis, "A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks," Ad Hoc Networks, vol. 133, Art. no. 102894, 2022, https://doi.org/10.1016/j.adhoc.2022.102894.

H. Sedjelmaci, A. Boudguiga, I. Ben Jemaa, and S. M. Senouci, "An efficient cyber defense framework for UAV-Edge computing network," Ad Hoc Networks, vol. 94, no. 101970, 2019, https://doi.org/10.1016/j.adhoc.2019.101970.

G. Lykou, D. Moustakas, and D. Gritzalis, "Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies," Sensors, vol. 20, no. 12, no. 3537, 2020, https://doi.org/10.3390/s20123537.

Y. Tan, J. Wang, J. Liu and Y. Zhang, "Unmanned Systems Security: Models, Challenges, and Future Directions," in IEEE Network, vol. 34, no. 4, pp. 291-297, 2020, https://doi.org/10.1109/MNET.001.1900546.

Z. Amiri, A. Heidari, N. J. Navimipour, and M. Unal, "Resilient and dependability management in distributed environments: A systematic and comprehensive literature review," Cluster Computing, vol. 26, no. 2, pp. 1565-1600, 2023, https://doi.org/10.1007/s10586-022-03738-5.

Downloads

Published

2023-12-07

How to Cite

[1]
G. Airlangga, “Adaptive Cyber-Defense for Unmanned Aerial Vehicles: A Modular Simulation Model with Dynamic Performance Management”, Buletin Ilmiah Sarjana Teknik Elektro, vol. 5, no. 4, pp. 505–514, Dec. 2023.

Issue

Section

Artikel