Awareness of National Cyber Security Weaknesses Due to Cyber-Attacks Through the Use of UAV

  • Muhammad Quazy Bin Razali Jabatan Imigresen Malaysia, Negeri Sarawak, Aras 1, Bangunan Sultan Iskandar, Jalan Simpang Tiga, 93550 Kuching, Sarawak, Malaysia
  • Adnan Shahid Khan Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, 94300 Kota Samarahan, Sarawak, Malaysia
  • Shalin Binti Shaheezam Khan Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, 94300 Kota Samarahan, Sarawak, Malaysia
  • Aruen Anak Manggau Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, 94300 Kota Samarahan, Sarawak, Malaysia
Keywords: Awareness, Unmanned Aerial Vehicle, Cyber Security, Threats, Responsibilities

Abstract

Unmanned Aerial Vehicle (UAV) is a utility tool created to provide a simple task and provide an important impact in matters of national defence, especially on the military side to monitor terrorists in camp areas and also on the borders of the country, to preserve the well-being and prosperity of the people in our country is always guaranteed. However, UAVs have been misused by certain parties to fulfil their interests. This lack of integrity in the use of UAV equipment should be curbed so that it does not continue with proper disclosure and understanding. Every day, various issues arise due to the misuse of technology, which will affect society and the country. Therefore, the government is making every effort to deal with the problem because the limited awareness of the use of UAVs is very worrying, especially the monitoring from the authorities. The authorities should also play an important role in enacting regulations and laws against those who misuse these UAV devices.

References

Abhishek, N. V., Aman, M. N., Lim, T. J., & Sikdar, B. (2022a). PIC: Preserving Data Integrity in UAV-Assisted Communication. IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). https://doi.org/10.1109/infocomwkshps54753.2022.9798213

Abhishek, N. V., Aman, M. N., Lim, T. J., & Sikdar, B. (2022b). MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test. ICC 2022 - IEEE International Conference on Communications. https://doi.org/10.1109/icc45855.2022.9838465

Abo Mosali, N., Shamsudin, S. S., Alfandi, O., Omar, R., & Al-Fadhali, N. (2022). Twin Delayed Deep Deterministic Policy Gradient-Based Target Tracking for Unmanned Aerial Vehicle With Achievement Rewarding and Multistage Training. IEEE Access, 10, 23545–23559. https://doi.org/10.1109/access.2022.3154388

Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). https://doi.org/10.1002/ett.4150

Al-Khafaji, M., & Elwiya, L. (2022). ML/AI Empowered 5G and beyond Networks. 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). https://doi.org/10.1109/hora55278.2022.9799813

Alrefaei, F., Alzahrani, A., Song, H., & Alrefaei, S. (2022). A Survey on the Jamming and Spoofing attacks on the Unmanned Aerial Vehicle Networks. 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). https://doi.org/10.1109/iemtronics55184.2022.9795809

Alsamhi, S., Afghah, F., Sahal, R., Hawbani, A., Al-qaness, M. A., Lee, B., & Guizani, M. (2021). Green internet of things using UAVs in B5G networks: A review of applications and strategies. Ad Hoc Networks, 117, 102505. https://doi.org/10.1016/j.adhoc.2021.102505

Asghar Khan, M., Ullah, I., Alkhalifah, A., Ur Rehman, S., Ali Shah, J., Uddin, I., Alsharif, M. H., & Algarni, F. (2022). A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems. IEEE Transactions on Industrial Informatics, 18(5), 3416–3425. https://doi.org/10.1109/tii.2021.3101651

Asim, J., Khan, A. S., Saqib, R. M., Abdullah, J., Ahmad, Z., Honey, S., Afzal, S., Alqahtani, M. S., & Abbas, M. (2022). Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review. Applied Sciences, 12(7), 3551. https://doi.org/10.3390/app12073551

Chaari, L., Chahbani, S., & Rezgui, J. (2020). Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems. 2020 International Symposium on Networks, Computers and Communications (ISNCC). https://doi.org/10.1109/isncc49221.2020.9297293

Durfey, N., & Sajal, S. (2022). A Comprehensive Survey: Cybersecurity Challenges and Futures of Autonomous Drones. 2022 Intermountain Engineering, Technology and Computing (IETC). https://doi.org/10.1109/ietc54973.2022.9796881

Gromada, K. A., & Stecz, W. M. (2021). Designing a Reliable UAV Architecture Operating in a Real Environment. Applied Sciences, 12(1), 294. https://doi.org/10.3390/app12010294

Haider, M., Ahmed, I., & Rawat, D. B. (2022). Cyber Threats and Cybersecurity Reassessed in UAV-assisted Cyber Physical Systems. 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN). https://doi.org/10.1109/icufn55119.2022.9829584

Heo, G., Chae, K., & Doh, I. (2022). Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing. IEEE Access, 10, 27990–28003. https://doi.org/10.1109/access.2022.3157753

Khan, A. S., Ahmad, Z., Abdullah, J., & Ahmad, F. (2021). A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network. IEEE Access, 9, 87079–87093. https://doi.org/10.1109/access.2021.3088149

Khan, A. S., Balan, K., Javed, Y., Tarmizi, S., & Abdullah, J. (2019). Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET. Sensors, 19(22), 4954. https://doi.org/10.3390/s19224954

Khan, A. S., Javed, Y., Abdullah, J., & Zen, K. (2021). Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS). Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-02968-6

Khan, A. S., Javed, Y., Saqib, R. M., Ahmad, Z., Abdullah, J., Zen, K., Abbasi, I. A., & Khan, N. A. (2022). Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks. IEEE Access, 10, 31273–31288. https://doi.org/10.1109/access.2022.3159686

Khoei, T. T., Gasimova, A., Ahajjam, M. A., Shamaileh, K. A., Devabhaktuni, V., & Kaabouch, N. (2022). A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVs. 2022 IEEE International Conference on Electro Information Technology (EIT). https://doi.org/10.1109/eit53891.2022.9813826

Li, T., Hong, Z., Cai, Q., Yu, L., Wen, Z., & Yang, R. (2021). BISSIAM: Bispectrum Siamese Network Based Contrastive Learning for UAV Anomaly Detection. IEEE Transactions on Knowledge and Data Engineering, 1–1. https://doi.org/10.1109/tkde.2021.3118727

Lu, X., Xiao, L., Niu, G., Ji, X., & Wang, Q. (2022). Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. IEEE Transactions on Information Forensics and Security, 17, 732–743. https://doi.org/10.1109/tifs.2022.3149396

Ma, X., Su, Z., Xu, Q., & Ying, B. (2022). Edge Computing and UAV Swarm Cooperative Task Offloading in Vehicular Networks. 2022 International Wireless Communications and Mobile Computing (IWCMC). https://doi.org/10.1109/iwcmc55113.2022.9824275

Na, Z., Ji, C., Lin, B., & Zhang, N. (2022). Joint Optimization of Trajectory and Resource Allocation in Secure UAV Relaying Communications for Internet of Things. IEEE Internet of Things Journal, 9(17), 16284–16296. https://doi.org/10.1109/jiot.2022.3151105

Pan, X., Jin, Y., Wang, Z., & Li, F. (2022). A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles. IEEE Internet of Things Journal, 9(19), 19426–19437. https://doi.org/10.1109/jiot.2022.3167102

Pu, C., Wall, A., Ahmed, I., & Choo, K. K. R. (2022). SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones. 2022 23rd IEEE International Conference on Mobile Data Management (MDM). https://doi.org/10.1109/mdm55031.2022.00033

Qiu, J., Grace, D., Ding, G., Yao, J., & Wu, Q. (2020). Blockchain-Based Secure Spectrum Trading for Unmanned-Aerial-Vehicle-Assisted Cellular Networks: An Operator’s Perspective. IEEE Internet of Things Journal, 7(1), 451–466. https://doi.org/10.1109/jiot.2019.2944213

Romesburg, H., Wang, J., Jiang, Y., Wang, H., & Song, H. (2021). Software Defined Radio based Security Analysis For Unmanned Aircraft Systems. 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC). https://doi.org/10.1109/ipccc51483.2021.9679408

Maikol, S. O., Khan, A. S., Javed, Y., Bunsu, A. L., Petrus, C., George, H. & Jau, S. (2021). A Novel Authentication and Key Agreement Scheme for Countering MITM and Impersonation Attack in Medical Facilities. The International Journal of Integrated Engineering, 13(2), 127–135. https://doi.org/10.30880/ijie.2021.13.02.015

Sun, G., Li, J., Wang, A., Wu, Q., Sun, Z., & Liu, Y. (2022). Secure and Energy-Efficient UAV Relay Communications Exploiting Collaborative Beamforming. IEEE Transactions on Communications, 70(8), 5401–5416. https://doi.org/10.1109/tcomm.2022.3184160

Tan, Y., Wang, J., Liu, J., & Kato, N. (2022). Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles. IEEE Internet of Things Journal, 9(18), 16928–16940. https://doi.org/10.1109/jiot.2022.3142251

Tiu, Y. L., & Zolkipli, M. F. (2021). Study on Prevention and Solution of Ransomware Attack. Journal of IT in Asia, 9(1), 133–139. https://doi.org/10.33736/jita.3402.2021

Tomaszewski, L., Kołakowski, R., Dybiec, P., & Kukliński, S. (2022). Mobile Networks’ Support for Large-Scale UAV Services. Energies, 15(14), 4974. https://doi.org/10.3390/en15144974

Wang, H., Zhao, H., Zhang, J., Ma, D., Li, J., & Wei, J. (2020). Survey on Unmanned Aerial Vehicle Networks: A Cyber Physical System Perspective. IEEE Communications Surveys &Amp; Tutorials, 22(2), 1027–1070. https://doi.org/10.1109/comst.2019.2962207

Wu, J., Guo, J., & Lv, Z. (2022). Deep Learning Driven Security in Digital Twins of Drone Network. ICC 2022 - IEEE International Conference on Communications. https://doi.org/10.1109/icc45855.2022.9838734

Xing, R., Su, Z., Luan, T. H., Xu, Q., Wang, Y., & Li, R. (2022). UAVs-Aided Delay-Tolerant Blockchain Secure Offline Transactions in Post-Disaster Vehicular Networks. IEEE Transactions on Vehicular Technology, 71(11), 12030–12043. https://doi.org/10.1109/tvt.2022.3184965

Yang, W., Wang, S., Yin, X., Wang, X., & Hu, J. (2022). A Review on Security Issues and Solutions of the Internet of Drones. IEEE Open Journal of the Computer Society, 3, 96–110. https://doi.org/10.1109/ojcs.2022.3183003

Yin, Z., Jia, M., Cheng, N., Wang, W., Lyu, F., Guo, Q., & Shen, X. (2022). UAV-Assisted Physical Layer Security in Multi-Beam Satellite-Enabled Vehicle Communications. IEEE Transactions on Intelligent Transportation Systems, 23(3), 2739–2751. https://doi.org/10.1109/tits.2021.3090017

Ying, X., Mazer, J., Bernieri, G., Conti, M., Bushnell, L., & Poovendran, R. (2019). Detecting ADS-B Spoofing Attacks Using Deep Neural Networks. 2019 IEEE Conference on Communications and Network Security (CNS). https://doi.org/10.1109/cns.2019.8802732

Published
2023-04-06
How to Cite
Muhammad Quazy Bin Razali, Adnan Shahid Khan, Shalin Binti Shaheezam Khan, & Aruen Anak Manggau. (2023). Awareness of National Cyber Security Weaknesses Due to Cyber-Attacks Through the Use of UAV. Journal of Computing and Social Informatics, 2(1), 13-20. https://doi.org/10.33736/jcsi.4973.2023