计算机科学 ›› 2024, Vol. 51 ›› Issue (4): 366-372.doi: 10.11896/jsjkx.230200135

• 信息安全 • 上一篇    下一篇

基于属性访问控制策略的无人机飞控安全方案

庞宇翔, 陈泽茂   

  1. 武汉大学国家网络安全学院空天信息安全与可信计算教育部重点实验室 武汉430072
  • 收稿日期:2023-02-17 修回日期:2023-05-11 出版日期:2024-04-15 发布日期:2024-04-10
  • 通讯作者: 陈泽茂(chenzemao@whu.edu.cn)
  • 作者简介:(benedict@whu.edu.cn)
  • 基金资助:
    国家自然科学基金面上项目(61872430);国家优秀青年科学基金(42122025)

Security Scheme of UAV Flight Control Based on Attribute Access Control Policy

PANG Yuxiang, CHEN Zemao   

  1. Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China
  • Received:2023-02-17 Revised:2023-05-11 Online:2024-04-15 Published:2024-04-10
  • Supported by:
    National Natural Science Foundation of China(61872430) and National Science Foundation for Outstanding Young Scholars(42122025).

摘要: 飞控系统是无人机的核心部件,对无人机的功能和性能起着决定性作用,是无人机信息安全防护的重点对象。文中针对PX4飞控系统面临的恶意代码植入、内部交互数据篡改等安全风险,设计了一种面向位置环境的基于属性的访问控制策略(LE-ABAC),该策略基于访问控制实体属性和无人机外部位置环境信息制定访问控制规则,可以实现对无人机内的数据交互过程进行细粒度控制,保护关键交换数据的机密性与完整性。文中在PX4软件仿真平台上对所提方案进行了攻击仿真实验,结果表明该模型能够在不显著降低无人机飞控效率的前提下,有效保护飞控系统内部交互数据不被窃取和篡改。

关键词: 无人机, 飞控系统, 基于属性的访问控制, 信息安全

Abstract: The flight control system is the core component of unmanned aerial vehicles(UAVs),which plays a decisive role in the function and performance,and it is a crucial target for information security protection.In this paper,a location-and-environment oriented attribute-based access control(LE-ABAC) policy is designed to deal with the security risks of malicious code injection and internal interactive data tampering faced by PX4 flight control system.The access control policy,based on object entity attri-butes and external location environment information of the UAV,formulates corresponding rules that enable fine-grained control of the data exchange process within the UAV,protecting the confidentiality and integrity of crucial data exchanges.In the study,attack simulation experiments are conducted on the PX4 software simulation platform to verify the proposed scheme.Finally,the results show that the model can effectively protect the interactive data of the flight control system from theft and tampering without significantly reducing the efficiency of UAV flight control execution.

Key words: Unmanned aerial vehicle, Flight control system, ABAC, Information security

中图分类号: 

  • TP309
[1]LI G.Current Status and Trends of Unmanned Aerial Vehicles[J].Modern Industrial Economy and Informationization,2021,11(3):12-13,16.
[2]HE D J,DU XIAO,QIAO Y R,et al.Review of Unmanned Aircraft Information Security[J].Chinese Journal of Computers,2019,42(5):1076-1094.
[3]AHMED F,MOHANTA J C,KESHARI A,et al.Recent Advances in Unmanned Aerial Vehicles:A Review[J].Arabian Journal for Science and Engineering,2022,47(7):7963-7984.
[4]IQBAL S.A study on UAV operating system security and future research challenges[C]//2021 IEEE 11th Annual Computing and Communication Workshop and Conference(CCWC).IEEE,2021:759-765.
[5]KERNS A J,SHEPARD D P,BHATTI J A,et al.Unmanned Aircraft Capture and Control Via GPS Spoofing[J].Journal of Field Robotics,2014,31(4):617-636.
[6]KIM A,WAMPLER B,GOPPERT J,et al.Cyber attack vulne-rabilities analysis for unmanned aerial vehicles[M].Infotech@ Aerospace 2012.2012:2438.
[7]SON Y,SHIN H,KIM D,et al.Rocking drones with intentional sound noise on gyroscopic sensors[C]//24th USENIX Security Symposium(USENIX Security 15).2015:881-896.
[8]QUINONEZ R,GIRALDO J,SALAZAR L,et al.SAVIOR:Securing autonomous vehicles with robust physical invariants[C]//Usenix Security.2020.
[9]SHEN J,WON J Y,CHEN Z,et al.Drift with devil:Security of multi-sensor fusion based localization in high-level autonomous driving under GPS spoofing[C]//Proceedings of the 29th USENIX Conference on Security Symposium.2020:931-948.
[10]MUNIRAJ D,FARHOOD M.A framework for detection ofsensor attacks on small unmanned aircraft systems[C]//2017 International Conference on Unmanned Aircraft Systems(ICUAS).IEEE,2017:1189-1198.
[11]ZHANG L H,WANG S,ZHOU H,et al.Secure communication scheme for UAS based on MAVLink protocol[J].Journal of Computer Applications,2020,40(8):2286-2292.
[12]HARTMANN K,STEUP C.The vulnerability of UAVs to cyber attacks-An approach to the risk assessment[C]//2013 5th international Conference on Cyber Conflict(CYCON 2013).IEEE,2013:1-23.
[13]JAVAID A Y,SUN W,DEVABHAKTUNI V K,et al.Cyber security threat analysis and modeling of an unmanned aerial vehicle system[C]//2012 IEEE Conference on Technologies for Homeland Security(HST).IEEE,2012:585-590.
[14]TSAO K Y,GIRDLER T,VASSILAKIS V G.A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks[J].Ad Hoc Networks,2022,133:102894.
[15]CHOI H,LEE W C,AAFER Y,et al.Detecting attacks against robotic vehicles:A control invariant approach[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:801-816.
[16]YOON M K,LIU B,HOVAKIMYAN N,et al.Virtualdrone:virtual sensing,actuation,and communication for attack-resilient unmanned aerial systems[C]//Proceedings of the 8th International Conference on Cyber-physical Systems.2017:143-154.
[17]HASAN M,MOHAN S.Protecting actuators in safety-critical IoT systems from control spoofing attacks[C]//Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things.2019:8-14.
[18]BHATT S,SANDHU R.Abac-cc:Attribute-based access control and communication control for internet of things[C]//Proceedings of the 25th ACM Symposium on Access Control Mo-dels and Technologies.2020:203-212.
[19]GUPTA M,BENSON J,PATWA F,et al.Dynamic groups and attribute-based access control for next-generation smart cars[C]//Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy.2019:61-72.
[20]KIM H,KIM D K,ALAERJAN A.ABAC-based security model for DDS[J].IEEE Transactions on Dependable and Secure Computing,2021,19(5):3113-3124.
[21]YANG X C,LIU G,WANG Y T,et al.Overview of OpenSource Flight Control Project and Its Aeronautical Application Prospect[J].Aerodynamic Missile Journal,2018(4):25-32.
[22]MEIER L,HONEGGER D,POLLEFEYS M.PX4:A node-based multithreaded open source robotics framework for deeply embedded platforms[C]//2015 IEEE International Conference on Robotics and Automation(ICRA).IEEE,2015:6235-6240.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!