PROTECTION AGAINST THE EFFECT OF DIFFERENT CLASSES OF ATTACKS ON UAV CONTROL CHANNELS
Keywords:unmanned aerial vehicles, control channels, security, opposition, cyber attack
Background. Protecting the data link of an unmanned aerial vehicle (UAV) is a top priority for countering attacks on UAVs. In this case, it should be taken into account that even the use of the most protected from the effects of deliberate interference types of modulation with spectrum spread does not guarantee the protection of such a channel.
Objective. The vulnerability of UAVs using cyber-attacks on a wireless channel is quite large, its study remains relevant, and therefore further development of complex effective means of countering such cyber-attacks is necessary, which is the purpose of this work. Moreover, the countermeasures presented in the work are based on the use of architectural solutions for building a UAV communication channel, which is different from traditional ones.
Methods. Structural-functional methods for constructing a secure wireless system of UAV communication channels are being investigated.
Results. A block diagram of the organization of UAV electronic countermeasures has been developed, which shows the data transmission channel from the UAV ground control station, the organization of the jamming channel, and the structure of the signal at the receiver input with all distortions and interference.
Interferences that can act as a signal of intentional interference from an electronic warfare station are presented and analysed.
An architectural solution is proposed using two channels in different frequency bands for the UAV control channel. A schematic structure of the organization of such a communication channel is presented. An expression is given for the margin of safety of a communication channel against a specific intentional interference. It is shown that the proposed architectural solution will have a similar effect when exposed to structured interference on the communication channel. In the case of the impact of imitation interference, the situation will be ambiguous, so it is very important to correctly determine the channel that is affected by intentional interference.
It is shown that to determine the presence of intentional interference, it is necessary to have at least one more degree of freedom, which is necessary for classifying such interference and effectively counteracting it. Such a degree of freedom can be achieved by additional dimensions or architectural solutions for building a communication system.
Conclusions. The types of intentional interference that can affect the UAV communication channel, the features of their application, and characteristics to ensure effective electronic protection are presented. Scenarios for counteracting the influence of attacks on UAV control channels are proposed. Scenarios with qualitative estimates are given, on the basis of which algorithms for detecting intentional interference and algorithms for counteracting the influence of such interference on the UAV communication channel can be built. It is assumed that the algorithms use averaged parameters, the length of the averaging interval is chosen as a multiple of the length of one data frame, which makes it possible to exclude from consideration fast fading in the communication channel that occurs in the case of frequency selective channels.
S.O. Kravchuk, I.M. Kravchuk, “Using RFID technology at operating a drone swarms in communication system mode”, Information and telecommunication sciences: international research journal, Vol. 11, N. 2 (21), pp. 16-23, (2020), https://doi.org/10.20535/2411-2976.22020.16-23.
S. Kravchuk, L. Afanasieva, “Formation of a wireless communication system based on a swarm of unmanned aerial vehicles”, Information and Telecommunication Sciences, No 1, pp. 11-18 (2019), https://doi.org/10.20535/2411-2976.12019.11-18
M. Ilchenko, S. Kravchuk, Mobile infocommunication systems, Information and Telecommunication Sciences, Vol. 11, Nо 1, рр. 11-19 (2020), https://doi.org/10.20535/2411-2976.12020.11-19
J.-P. Yaacoub, H. Noura, O. Salman, A. Chehab, “Security analysis of drones systems: Attacks, limitations, and recommendations”, Internet of Things, 11 (2020), https://doi.org/10.1016/j.iot.2020.100218
A. Kim, B. Wampler, J. Goppert, I. Hwang, H. Aldridge, “Cyber-attack vulnerabilities analysis for unmanned aerial vehicles”, Infotech Aerospace, 9 June 2012 - 21 June 2012, Garden Grove, California (2012), https://doi.org/10.2514/6.2012-2438.
C.G. L. Krishna, R.R. Murphy, "A review on cybersecurity vulnerabilities for unmanned aerial vehicles", 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR), 2017, pp. 194-199, https://doi.org/10.1109/SSRR.2017.8088163.
S. Walters, “The updated list of vulnerable drones & attack tools”, [online] (2021), https://medium.com/@swalters/how-can-drones-be-hacked-the-updated-list-of-vulnerable-drones-attack-tools-dd2e006d6809.
Iran-U.S. RQ-170 incident, Wikipedia - the free encyclopedia [online] (2015), https://en.wikipedia.org/wiki/Iran%E2%80%93U.S._RQ-170_incident
S. Kamkar, “SkyJack”, [online] (2015) http://www.samy.pl/skyjack/
M. Song, T. Allison, “Frequency hopping pattern recognition algorithms for wireless sensor networks”, In: ISCA., pp. 264–269 (2005), https://www.semanticscholar.org/paper/Frequency-Hopping-Pattern-Recognition-Algorithms-Song-Allison/44726f65e6f65ad16c98ee8ca694094636e83712
H. Shin, K. Choi, Y. Park, J. Choi, Y. Kim, “Security Analysis of FHSS-type Drone Controller”, in: Kim H., Choi D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science, vol 9503. Springer, Cham. (2016), https://doi.org/10.1007/978-3-319-31875-2_20
M.M. Kaidenko, D.V. Roskoshnyi, “Software Defined Radio in Communications”, in: Ilchenko M., Uryvsky L., Globa L. (eds) Advances in Information and Communication Technologies. UKRMICO 2018. Lecture Notes in Electrical Engineering, vol 560. Springer, Cham (2019), https://doi.org/10.1007/978-3-030-16770-7_11, Print ISBN 978-3-030-16769-1
M. Stahlberg, “Radio jamming attacks against two popular mobile networks”, Tik-110.501 “Seminar on Network Security”, Vol. 3 (2000), http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.108.7211&rep=rep1&type=pdf
J. Dofe, J. Frey, H. Pahlevanzadeh, Q. Yu, “Strengthening SIMON Implementation Against Intelligent Fault Attacks”, IEEE Embedded Systems Letters, 7(4), p. 113-116, (2015), https://doi.org/10.1109/LES.2015.2477273
B. Wang, L. Liu, C. Deng, M. Zhu, S. Yin, S. Wei, “Against Double Fault Attacks: Injection Effort Model, Space and Time Randomization Based Countermeasures for Reconfigurable Array Architecture”, IEEE Transactions on Information Forensics and Security 11(6):1-1(2016), http://dx.doi.org/10.1109/TIFS.2016.2518130
M. Kaidenko, S. Kravchuk, “Autonomous Unmanned Aerial Vehicles Communications on the Base of Software-Defined Radio”, In: Ilchenko M., Uryvsky L., Globa L. (eds) Advances in Information and Communication Technology and Systems. MCT 2019. Lecture Notes in Networks and Systems, vol 152. Springer, Cham. (2021), https://doi.org/10.1007/978-3-030-58359-0_16
M.M. Kaidenko, S.O. Kravchuk, "Anti-Jamming System for Small Unmanned Aerial Vehicles", 2021 IEEE 6th International Conference on Actual Problems of Unmanned Aerial Vehicles Development (APUAVD), 19-21 Oct. 2021, Kyiv, Ukraine (2021), https://doi.org/10.1109/APUAVD53804.2021.9615403.
M. Kaidenko, S. Kravchuk, "Creation of communication system for unmanned aerial vehicles using SDR and SOC technologies," 2019 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), Odessa, Ukraine, 2019, pp. 1-4, https://doi.org/10.1109/UkrMiCo47782.2019.9165422.
"Groza-S" counter-UAV electronic warfare station (mounted onto military vehicles), https://www.armour.gr/catalogues/pdf/Groza-S.pdf
REX-2 [online], https://zala-aero.com/production/means-of-ew/rex-2/
HSMC ARRadio Daughter Card [online], https://www.terasic.com.tw/cgi-bin/page/archive.pl?Language=English&No=946
ADALM-PLUTO. Software-Defined Radio Active Learning Module [online], https://www.analog.com/en/design-center/evaluation-hardware-and-software/evaluation-boards-kits/adalm-pluto.html#eb-overview
S.O. Kravchuk, M.M. Kaidenko, I.M. Kravchuk, “Experimental Development of Communication Services Scenario for Centralized and Distributed Construction of a Collective Control Network for Drone Swarm”, 2021 IEEE 6th International Conference on Actual Problems of Unmanned Aerial Vehicles Development (APUAVD), 19-21 Oct. 2021, Kyiv, Ukraine (2021), https://doi.org/10.1109/APUAVD53804.2021.9615433
B. Sklar, Digital Communications: Fundamentals and Applications, Second Edition, Prentice-Hall, Upper Saddle River, NJ, 2001.
A. Wiesel, J. Goldberg, H. Messer-Yaron, "SNR estimation in time-varying fading channels", in IEEE Transactions on Communications, vol. 54, no. 5, pp. 841-848, May 2006, http://dx.doi.org/10.1109/TCOMM.2006.873995.
Z. Sun, X. Gong, F. Lu, “A non-data-aided SNR estimator based on maximum likelihood method for communication between orbiters”, J Wireless Com Network, 123 (2020). https://doi.org/10.1186/s13638-020-01730-4
D. R. Pauluzzi, N. C. Beaulieu, “A comparison of SNR estimation techniques for the AWGN channel”, IEEE Transactions on Communications, Vol. 48, No. 10, p.1681-1691 (2000).
F. Harris, C. Dick, “SNR estimation techniques for low SNR signals”, 15 th International Symposium on Wireless Personal Multimedia Communications (WPMC), Taipei, Taiwan, 24-27 Sept. 2012, p.276-280 (2012), https://ieeexplore.ieee.org/abstract/document/6398797
This work is licensed under a Creative Commons Attribution 4.0 International License.