Computer Science ›› 2024, Vol. 51 ›› Issue (4): 366-372.doi: 10.11896/jsjkx.230200135

• Information Security • Previous Articles     Next Articles

Security Scheme of UAV Flight Control Based on Attribute Access Control Policy

PANG Yuxiang, CHEN Zemao   

  1. Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China
  • Received:2023-02-17 Revised:2023-05-11 Online:2024-04-15 Published:2024-04-10
  • Supported by:
    National Natural Science Foundation of China(61872430) and National Science Foundation for Outstanding Young Scholars(42122025).

Abstract: The flight control system is the core component of unmanned aerial vehicles(UAVs),which plays a decisive role in the function and performance,and it is a crucial target for information security protection.In this paper,a location-and-environment oriented attribute-based access control(LE-ABAC) policy is designed to deal with the security risks of malicious code injection and internal interactive data tampering faced by PX4 flight control system.The access control policy,based on object entity attri-butes and external location environment information of the UAV,formulates corresponding rules that enable fine-grained control of the data exchange process within the UAV,protecting the confidentiality and integrity of crucial data exchanges.In the study,attack simulation experiments are conducted on the PX4 software simulation platform to verify the proposed scheme.Finally,the results show that the model can effectively protect the interactive data of the flight control system from theft and tampering without significantly reducing the efficiency of UAV flight control execution.

Key words: Unmanned aerial vehicle, Flight control system, ABAC, Information security

CLC Number: 

  • TP309
[1]LI G.Current Status and Trends of Unmanned Aerial Vehicles[J].Modern Industrial Economy and Informationization,2021,11(3):12-13,16.
[2]HE D J,DU XIAO,QIAO Y R,et al.Review of Unmanned Aircraft Information Security[J].Chinese Journal of Computers,2019,42(5):1076-1094.
[3]AHMED F,MOHANTA J C,KESHARI A,et al.Recent Advances in Unmanned Aerial Vehicles:A Review[J].Arabian Journal for Science and Engineering,2022,47(7):7963-7984.
[4]IQBAL S.A study on UAV operating system security and future research challenges[C]//2021 IEEE 11th Annual Computing and Communication Workshop and Conference(CCWC).IEEE,2021:759-765.
[5]KERNS A J,SHEPARD D P,BHATTI J A,et al.Unmanned Aircraft Capture and Control Via GPS Spoofing[J].Journal of Field Robotics,2014,31(4):617-636.
[6]KIM A,WAMPLER B,GOPPERT J,et al.Cyber attack vulne-rabilities analysis for unmanned aerial vehicles[M].Infotech@ Aerospace 2012.2012:2438.
[7]SON Y,SHIN H,KIM D,et al.Rocking drones with intentional sound noise on gyroscopic sensors[C]//24th USENIX Security Symposium(USENIX Security 15).2015:881-896.
[8]QUINONEZ R,GIRALDO J,SALAZAR L,et al.SAVIOR:Securing autonomous vehicles with robust physical invariants[C]//Usenix Security.2020.
[9]SHEN J,WON J Y,CHEN Z,et al.Drift with devil:Security of multi-sensor fusion based localization in high-level autonomous driving under GPS spoofing[C]//Proceedings of the 29th USENIX Conference on Security Symposium.2020:931-948.
[10]MUNIRAJ D,FARHOOD M.A framework for detection ofsensor attacks on small unmanned aircraft systems[C]//2017 International Conference on Unmanned Aircraft Systems(ICUAS).IEEE,2017:1189-1198.
[11]ZHANG L H,WANG S,ZHOU H,et al.Secure communication scheme for UAS based on MAVLink protocol[J].Journal of Computer Applications,2020,40(8):2286-2292.
[12]HARTMANN K,STEUP C.The vulnerability of UAVs to cyber attacks-An approach to the risk assessment[C]//2013 5th international Conference on Cyber Conflict(CYCON 2013).IEEE,2013:1-23.
[13]JAVAID A Y,SUN W,DEVABHAKTUNI V K,et al.Cyber security threat analysis and modeling of an unmanned aerial vehicle system[C]//2012 IEEE Conference on Technologies for Homeland Security(HST).IEEE,2012:585-590.
[14]TSAO K Y,GIRDLER T,VASSILAKIS V G.A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks[J].Ad Hoc Networks,2022,133:102894.
[15]CHOI H,LEE W C,AAFER Y,et al.Detecting attacks against robotic vehicles:A control invariant approach[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:801-816.
[16]YOON M K,LIU B,HOVAKIMYAN N,et al.Virtualdrone:virtual sensing,actuation,and communication for attack-resilient unmanned aerial systems[C]//Proceedings of the 8th International Conference on Cyber-physical Systems.2017:143-154.
[17]HASAN M,MOHAN S.Protecting actuators in safety-critical IoT systems from control spoofing attacks[C]//Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things.2019:8-14.
[18]BHATT S,SANDHU R.Abac-cc:Attribute-based access control and communication control for internet of things[C]//Proceedings of the 25th ACM Symposium on Access Control Mo-dels and Technologies.2020:203-212.
[19]GUPTA M,BENSON J,PATWA F,et al.Dynamic groups and attribute-based access control for next-generation smart cars[C]//Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy.2019:61-72.
[20]KIM H,KIM D K,ALAERJAN A.ABAC-based security model for DDS[J].IEEE Transactions on Dependable and Secure Computing,2021,19(5):3113-3124.
[21]YANG X C,LIU G,WANG Y T,et al.Overview of OpenSource Flight Control Project and Its Aeronautical Application Prospect[J].Aerodynamic Missile Journal,2018(4):25-32.
[22]MEIER L,HONEGGER D,POLLEFEYS M.PX4:A node-based multithreaded open source robotics framework for deeply embedded platforms[C]//2015 IEEE International Conference on Robotics and Automation(ICRA).IEEE,2015:6235-6240.
[1] LU Yanfeng, WU Tao, LIU Chunsheng, YAN Kang, QU Yuben. Survey of UAV-assisted Energy-Efficient Edge Federated Learning [J]. Computer Science, 2024, 51(4): 270-279.
[2] WANG Xinlong, LIN Bing, CHEN Xing. Computation Offloading with Wardrop Routing Game in Multi-UAV-aided MEC Environment [J]. Computer Science, 2024, 51(3): 309-316.
[3] LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9.
[4] ZHENG Hongqiang, ZHANG Jianshan, CHEN Xing. Deployment Optimization and Computing Offloading of Space-Air-Ground Integrated Mobile Edge Computing System [J]. Computer Science, 2023, 50(2): 69-79.
[5] LIN Zeyang, LAI Jun, CHEN Xiliang, WANG Jun. UAV Anti-tank Policy Training Model Based on Curriculum Reinforcement Learning [J]. Computer Science, 2023, 50(10): 214-222.
[6] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[7] LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627.
[8] XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11.
[9] SHI Dian-xi, LIU Cong, SHE Fu-jiang, ZHANG Yong-jun. Cooperation Localization Method Based on Location Confidence of Multi-UAV in GPS-deniedEnvironment [J]. Computer Science, 2022, 49(4): 302-311.
[10] YUAN Xin-wang, XIE Zhi-dong, TAN Xin. Survey of Resource Management Optimization of UAV Edge Computing [J]. Computer Science, 2022, 49(11): 234-241.
[11] CHENG Zhao-wei, SHEN Hang, WANG Yue, WANG Min, BAI Guang-wei. Deep Reinforcement Learning Based UAV Assisted SVC Video Multicast [J]. Computer Science, 2021, 48(9): 271-277.
[12] XU Hao, LIU Yue-lei. UAV Sound Recognition Algorithm Based on Deep Learning [J]. Computer Science, 2021, 48(7): 225-232.
[13] GU Shuang-jia, LIU Wan-ping, HUANG Dong. Application of Express Information Encryption Based on AES and QR [J]. Computer Science, 2021, 48(11A): 588-591.
[14] YANG Zhang-lin, XIE Jun, ZHANG Geng-qiang. Review of Directional Routing Protocols for Flying Ad-Hoc Networks Based on Directional Antennas [J]. Computer Science, 2021, 48(11): 334-344.
[15] LI Bin, ZHOU Qing-lei, SI Xue-ming, CHEN Xiao-jie. Optimized Implementation of Office Password Recovery Based on FPGA Cluster [J]. Computer Science, 2020, 47(11): 32-41.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!