Awareness of National Cyber Security Weaknesses Due to Cyber-Attacks Through the Use of UAV
DOI:
https://doi.org/10.33736/jcsi.4973.2023Keywords:
Awareness, Unmanned Aerial Vehicle, Cyber Security, Threats, ResponsibilitiesAbstract
Unmanned Aerial Vehicle (UAV) is a utility tool created to provide a simple task and provide an important impact in matters of national defence, especially on the military side to monitor terrorists in camp areas and also on the borders of the country, to preserve the well-being and prosperity of the people in our country is always guaranteed. However, UAVs have been misused by certain parties to fulfil their interests. This lack of integrity in the use of UAV equipment should be curbed so that it does not continue with proper disclosure and understanding. Every day, various issues arise due to the misuse of technology, which will affect society and the country. Therefore, the government is making every effort to deal with the problem because the limited awareness of the use of UAVs is very worrying, especially the monitoring from the authorities. The authorities should also play an important role in enacting regulations and laws against those who misuse these UAV devices.
References
Abhishek, N. V., Aman, M. N., Lim, T. J., & Sikdar, B. (2022a). PIC: Preserving Data Integrity in UAV-Assisted Communication. IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). https://doi.org/10.1109/infocomwkshps54753.2022.9798213
Abhishek, N. V., Aman, M. N., Lim, T. J., & Sikdar, B. (2022b). MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test. ICC 2022 - IEEE International Conference on Communications. https://doi.org/10.1109/icc45855.2022.9838465
Abo Mosali, N., Shamsudin, S. S., Alfandi, O., Omar, R., & Al-Fadhali, N. (2022). Twin Delayed Deep Deterministic Policy Gradient-Based Target Tracking for Unmanned Aerial Vehicle With Achievement Rewarding and Multistage Training. IEEE Access, 10, 23545–23559. https://doi.org/10.1109/access.2022.3154388
Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). https://doi.org/10.1002/ett.4150
Al-Khafaji, M., & Elwiya, L. (2022). ML/AI Empowered 5G and beyond Networks. 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). https://doi.org/10.1109/hora55278.2022.9799813
Alrefaei, F., Alzahrani, A., Song, H., & Alrefaei, S. (2022). A Survey on the Jamming and Spoofing attacks on the Unmanned Aerial Vehicle Networks. 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). https://doi.org/10.1109/iemtronics55184.2022.9795809
Alsamhi, S., Afghah, F., Sahal, R., Hawbani, A., Al-qaness, M. A., Lee, B., & Guizani, M. (2021). Green internet of things using UAVs in B5G networks: A review of applications and strategies. Ad Hoc Networks, 117, 102505. https://doi.org/10.1016/j.adhoc.2021.102505
Asghar Khan, M., Ullah, I., Alkhalifah, A., Ur Rehman, S., Ali Shah, J., Uddin, I., Alsharif, M. H., & Algarni, F. (2022). A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems. IEEE Transactions on Industrial Informatics, 18(5), 3416–3425. https://doi.org/10.1109/tii.2021.3101651
Asim, J., Khan, A. S., Saqib, R. M., Abdullah, J., Ahmad, Z., Honey, S., Afzal, S., Alqahtani, M. S., & Abbas, M. (2022). Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review. Applied Sciences, 12(7), 3551. https://doi.org/10.3390/app12073551
Chaari, L., Chahbani, S., & Rezgui, J. (2020). Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems. 2020 International Symposium on Networks, Computers and Communications (ISNCC). https://doi.org/10.1109/isncc49221.2020.9297293
Durfey, N., & Sajal, S. (2022). A Comprehensive Survey: Cybersecurity Challenges and Futures of Autonomous Drones. 2022 Intermountain Engineering, Technology and Computing (IETC). https://doi.org/10.1109/ietc54973.2022.9796881
Gromada, K. A., & Stecz, W. M. (2021). Designing a Reliable UAV Architecture Operating in a Real Environment. Applied Sciences, 12(1), 294. https://doi.org/10.3390/app12010294
Haider, M., Ahmed, I., & Rawat, D. B. (2022). Cyber Threats and Cybersecurity Reassessed in UAV-assisted Cyber Physical Systems. 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN). https://doi.org/10.1109/icufn55119.2022.9829584
Heo, G., Chae, K., & Doh, I. (2022). Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing. IEEE Access, 10, 27990–28003. https://doi.org/10.1109/access.2022.3157753
Khan, A. S., Ahmad, Z., Abdullah, J., & Ahmad, F. (2021). A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network. IEEE Access, 9, 87079–87093. https://doi.org/10.1109/access.2021.3088149
Khan, A. S., Balan, K., Javed, Y., Tarmizi, S., & Abdullah, J. (2019). Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET. Sensors, 19(22), 4954. https://doi.org/10.3390/s19224954
Khan, A. S., Javed, Y., Abdullah, J., & Zen, K. (2021). Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS). Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-02968-6
Khan, A. S., Javed, Y., Saqib, R. M., Ahmad, Z., Abdullah, J., Zen, K., Abbasi, I. A., & Khan, N. A. (2022). Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks. IEEE Access, 10, 31273–31288. https://doi.org/10.1109/access.2022.3159686
Khoei, T. T., Gasimova, A., Ahajjam, M. A., Shamaileh, K. A., Devabhaktuni, V., & Kaabouch, N. (2022). A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVs. 2022 IEEE International Conference on Electro Information Technology (EIT). https://doi.org/10.1109/eit53891.2022.9813826
Li, T., Hong, Z., Cai, Q., Yu, L., Wen, Z., & Yang, R. (2021). BISSIAM: Bispectrum Siamese Network Based Contrastive Learning for UAV Anomaly Detection. IEEE Transactions on Knowledge and Data Engineering, 1–1. https://doi.org/10.1109/tkde.2021.3118727
Lu, X., Xiao, L., Niu, G., Ji, X., & Wang, Q. (2022). Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. IEEE Transactions on Information Forensics and Security, 17, 732–743. https://doi.org/10.1109/tifs.2022.3149396
Ma, X., Su, Z., Xu, Q., & Ying, B. (2022). Edge Computing and UAV Swarm Cooperative Task Offloading in Vehicular Networks. 2022 International Wireless Communications and Mobile Computing (IWCMC). https://doi.org/10.1109/iwcmc55113.2022.9824275
Na, Z., Ji, C., Lin, B., & Zhang, N. (2022). Joint Optimization of Trajectory and Resource Allocation in Secure UAV Relaying Communications for Internet of Things. IEEE Internet of Things Journal, 9(17), 16284–16296. https://doi.org/10.1109/jiot.2022.3151105
Pan, X., Jin, Y., Wang, Z., & Li, F. (2022). A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles. IEEE Internet of Things Journal, 9(19), 19426–19437. https://doi.org/10.1109/jiot.2022.3167102
Pu, C., Wall, A., Ahmed, I., & Choo, K. K. R. (2022). SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones. 2022 23rd IEEE International Conference on Mobile Data Management (MDM). https://doi.org/10.1109/mdm55031.2022.00033
Qiu, J., Grace, D., Ding, G., Yao, J., & Wu, Q. (2020). Blockchain-Based Secure Spectrum Trading for Unmanned-Aerial-Vehicle-Assisted Cellular Networks: An Operator’s Perspective. IEEE Internet of Things Journal, 7(1), 451–466. https://doi.org/10.1109/jiot.2019.2944213
Romesburg, H., Wang, J., Jiang, Y., Wang, H., & Song, H. (2021). Software Defined Radio based Security Analysis For Unmanned Aircraft Systems. 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC). https://doi.org/10.1109/ipccc51483.2021.9679408
Maikol, S. O., Khan, A. S., Javed, Y., Bunsu, A. L., Petrus, C., George, H. & Jau, S. (2021). A Novel Authentication and Key Agreement Scheme for Countering MITM and Impersonation Attack in Medical Facilities. The International Journal of Integrated Engineering, 13(2), 127–135. https://doi.org/10.30880/ijie.2021.13.02.015
Sun, G., Li, J., Wang, A., Wu, Q., Sun, Z., & Liu, Y. (2022). Secure and Energy-Efficient UAV Relay Communications Exploiting Collaborative Beamforming. IEEE Transactions on Communications, 70(8), 5401–5416. https://doi.org/10.1109/tcomm.2022.3184160
Tan, Y., Wang, J., Liu, J., & Kato, N. (2022). Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles. IEEE Internet of Things Journal, 9(18), 16928–16940. https://doi.org/10.1109/jiot.2022.3142251
Tiu, Y. L., & Zolkipli, M. F. (2021). Study on Prevention and Solution of Ransomware Attack. Journal of IT in Asia, 9(1), 133–139. https://doi.org/10.33736/jita.3402.2021
Tomaszewski, L., Kołakowski, R., Dybiec, P., & Kukliński, S. (2022). Mobile Networks’ Support for Large-Scale UAV Services. Energies, 15(14), 4974. https://doi.org/10.3390/en15144974
Wang, H., Zhao, H., Zhang, J., Ma, D., Li, J., & Wei, J. (2020). Survey on Unmanned Aerial Vehicle Networks: A Cyber Physical System Perspective. IEEE Communications Surveys &Amp; Tutorials, 22(2), 1027–1070. https://doi.org/10.1109/comst.2019.2962207
Wu, J., Guo, J., & Lv, Z. (2022). Deep Learning Driven Security in Digital Twins of Drone Network. ICC 2022 - IEEE International Conference on Communications. https://doi.org/10.1109/icc45855.2022.9838734
Xing, R., Su, Z., Luan, T. H., Xu, Q., Wang, Y., & Li, R. (2022). UAVs-Aided Delay-Tolerant Blockchain Secure Offline Transactions in Post-Disaster Vehicular Networks. IEEE Transactions on Vehicular Technology, 71(11), 12030–12043. https://doi.org/10.1109/tvt.2022.3184965
Yang, W., Wang, S., Yin, X., Wang, X., & Hu, J. (2022). A Review on Security Issues and Solutions of the Internet of Drones. IEEE Open Journal of the Computer Society, 3, 96–110. https://doi.org/10.1109/ojcs.2022.3183003
Yin, Z., Jia, M., Cheng, N., Wang, W., Lyu, F., Guo, Q., & Shen, X. (2022). UAV-Assisted Physical Layer Security in Multi-Beam Satellite-Enabled Vehicle Communications. IEEE Transactions on Intelligent Transportation Systems, 23(3), 2739–2751. https://doi.org/10.1109/tits.2021.3090017
Ying, X., Mazer, J., Bernieri, G., Conti, M., Bushnell, L., & Poovendran, R. (2019). Detecting ADS-B Spoofing Attacks Using Deep Neural Networks. 2019 IEEE Conference on Communications and Network Security (CNS). https://doi.org/10.1109/cns.2019.8802732
Downloads
Published
How to Cite
Issue
Section
License
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarise, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.