A Secure Communication Protocol for Unmanned Aerial Vehicles using IoT Protocols

Main Article Content

Jayantkumar . Dorave
Ritesh . Sadiwala

Abstract

IOT_MQTT is an open-source communication system for Unmanned Aerial Vehicles that is lightweight and extensively utilized. It is supported by a number of UAVs and autopilot systems, and it allows bidirectional communication. The findings demonstrate that our approach can encrypt IOT packets while maintaining performance and efficiency. The findings are confirmed in terms of transfer speed, performance, and efficiency when compared to other solutions in the literature such as smart dust and benchmarked against the original IoT-MQTT protocol.

Downloads

Download data is not yet available.

Article Details

How to Cite
Dorave, J., & Sadiwala, R. (2022). A Secure Communication Protocol for Unmanned Aerial Vehicles using IoT Protocols. SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 14(04), 79-88. https://doi.org/10.18090/samriddhi.v14i04.13
Section
Research Article

References

[1] Y. Zeng, R. Zhang and T. J. Lim, “Wireless communications with unmanned aerial vehicles: Opportu- nities and challenges,” IEEE Communications Magazine, vol. 54, no. 5, pp. 36–42, 2016.
[2] J. Janousek and P. Marcon, “Precision landing options in unmanned aerial vehicles,” in 2018 Int. Interdisciplinary PhD Workshop, Poland, pp. 58–60, 2018.
[3] N. A. Khan, S. N. Brohi and N. Z. Jhanjhi, “UAV’s applications, architecture, security issues and attack scenarios: A survey,” in Intelligent Computing and Innovation on Data Science. Berlin, Germany: Springer, pp. 753–760, 2020.
[4] M. H. Choi, B. Shirinzadeh and R. Porter, “System identificationbased sliding mode control for small- scaled autonomous aerial vehicles with unknown aerodynamics derivatives,” IIEEE/ASME Transactions on Mechatronics, vol. 21, no. 6, pp. 2944–2952, 2016.
[5] B. G. Maciel-Pearson, S. Akçay, A. Atapour-Abarghouei, C. Holder and T. P. Breckon, “Multi-task regression-based learning for autonomous unmanned aerial vehicle flight control within unstructured outdoor environments,” IEEE Robotics and
Automation Letters, vol. 4, no. 4, pp. 4116–4123, 2019.
[6] W. Kwon, J. H. Park, M. Lee, J. Her, S.-H. Kim et al., “Robust autonomous navigation of unmanned aerial vehicles (UAVs) for warehouses’ inventory application,” IEEE Robotics and Automation Letters, vol. 5, no. 1, pp. 243–249, 2019.
[7] T. Samad, J. S. Bay and D. Godbole, “Network-centric systems for military operations in urban terrain: The role of UAVs,” Proc.
of the IEEE, vol. 95, no. 1, pp. 92–107, 2007.
[8] V. Roberge, M. Tarbouchi and G. Labonté, “Fast genetic algorithm path planner for fixed-wing military UAV using GPU,” IEEE Transactions on Aerospace and Electronic Systems, vol. 54, no. 5, pp. 2105–2117, 2018.
[9] D. Orfanus, E. P. de Freitas and F. Eliassen, “Self-organization as a supporting paradigm for military UAV relay networks,” IEEE Communications Letters, vol. 20, no. 4, pp. 804–807, 2016.
[10] M. Saleh, N. Jhanjhi and A. Abdullah, “Proposing a privacy protection model in case of civilian drone,” in Proc. 2020 22nd Int. Conf. on Advanced Communication Technology, Phoenix Park, South Korea, pp. 596–602, 2020.
[11] G. Quiroz and S. J. Kim, “A confetti drone: Exploring drone entertainment,” in Proc. 2017 IEEE Int. Conf. on Consumer Electronics, Las Vegas, USA, pp. 378–381, 2017.
[12] D. Murugan, A. Garg and D. Singh, “Development of an adaptive approach for precision agriculture monitoring with drone and satellite data,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 10, no. 12, pp.
5322–5328, 2017.
[13] A. M. Jawad, H. M. Jawad, R. Nordin, S. K. Gharghan, N. F.
Abdullah et al., “Wireless power transfer with magnetic resonator coupling and sleep/active strategy for a drone charging station in smart agriculture,” IEEE Access, vol. 7, no. 1, pp. 139839–139851, 2019.
[14] I. Bor-Yaliniz, S. S. Szyszkowicz and H. Yanikomeroglu, “Environment-aware drone-base-station place- ments in
modern metropolitans,” IEEE Wireless Communications Letters, vol. 7, no. 3, pp. 372–375, 2017.
[15] A. N. Chaves, P. S. Cugnasca and J. Jose, “Adaptive search control applied to search and rescue operations using unmanned aerial vehicles (UAVs),” IEEE Latin America Transactions, vol. 12, no. 7, pp. 1278–1283, 2014.
[16] N. A. Khan, N. Z. Jhanjhi, S. N. Brohi, R. S. A. Usmani and A.
Nayyar, “Smart traffic monitoring system using unmanned aerial vehicles (UAVs),” Computer Communications, vol. 157, no. 1, pp. 434– 443, 2020.
[17] D. Wang, P. Hu, J. Du, P. Zhou, T. Deng et al., “Routing and scheduling for hybrid truck-drone col- laborative parcel delivery with independent and truck-carried drones,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10483–10495, 2019.
[18] A. Tariq, S. M. Osama and A. Gillani, “Development of a low cost and light weight UAV for photogrammetry and precision land mapping using aerial imagery,” in Proc. 2016 Int. Conf. on Frontiers of Information Technology, Islamabad, Pakistan, pp.
360–364, 2016.
[19] A. Gurtner, D. G. Greer, R. Glassock, L. Mejias, R. A. Walker et al., “Investigation of fish-eye lenses for small-UAV aerial photography,” IEEE Transactions on Geoscience and Remote Sensing, vol. 47, no. 3, pp. 709–721, 2009.
[20] I. Mademlis, V. Mygdalis, N. Nikolaidis, M. Montagnuolo, F.
Negro et al., “High-level multiple-UAV cinematography tools for covering outdoor events,” IEEE Transactions on Broadcasting, vol. 65, no. 3, pp. 627–635, 2019.
[21] E. Natalizio, N. R. Zema, E. Yanmaz, L. D. P. Pugliese and F.
Guerriero, “Take the field from your smartphone: Leveraging UAVs for event filming,” IEEE Transactions on Mobile Computing, vol. 19, no. 8, pp. 1971–1983, 2019.
[22] G. D. Georgiev, G. Hristov, P. Zahariev and D. Kinaneva, “Forest monitoring system for early fire detection based on convolutional neural network and UAV imagery,” in Proc. 2020 28th National Conf. with International Participation, Sofia, Bulgaria, pp. 57–60, 2020.
[23] C. Chen, C. Grier, A. Malfa, M. Booen, C. Xia et al., “Highspeed optical links for UAV applications,” in Free-Space Laser Communication and Atmospheric Propagation XXIX. vol. 10096.
California, United States, 1009615–1009626, 2017.
[24] J. Russell, “Facebook is reportedly testing solar-powered internet drones again—this time with Air- bus, techcrunch.com,” 2019. [Online]. Available: https://techcrunch.com/2019/01/21/ facebook-airbus- solar-drones-internet-program/ (Accessed Feb. 28, 2021).
[25] E. Salamí, C. Barrado and E. Pastor, “UAV flight experiments applied to the remote sensing of vegetated areas,” Remote Sensing, vol. 6, no. 11, pp. 11051–11081, 2014.
[26] S. Berrahal, J.-H. Kim, S. Rekhis, N. Boudriga, D. Wilkins et al., “Border surveillance monitoring using quadcopter UAVaided wireless sensor networks,” Journal of Communications
Software and Systems, vol. 12, no. 1, pp. 67–82, 2016.
[27] L. Krichen, M. Fourati and L. C. Fourati, “Communication architecture for unmanned aerial vehicle system,” in Int. Conf.
on Ad-Hoc Networks and Wireless, pp. 213–225, 1st ed., Chap.
1, Sec. 1. USA, Cham, Springer, 2018.
[28] J. Gertler, “US unmanned aerial systems,” Library of Congress Washington DC Congressional Research Service, vol. 1, no. 1, pp. 1–10, 2012.
[29] N. A. Khan, N. Jhanjhi, S. N. Brohi and A. Nayyar, “Emerging use of UAV’s: Secure communication protocol issues and challenges,” in Drones in Smart-cities: Security and Performance, 1st ed., vol.
1. pp. 37–55, Chap. 3, Sec. 1. Turkey: Elsevier, 2020.
[30] U. development Team, “UAVCAN Communication Protocol,” 2014. [Online]. Available: https://uavcan. org/Specification/1._ Introduction/ (Accessed Aug. 28, 2019).
*31+ V. Kriz and P. Gabrlik, “Uranuslink-communication protocol for uav with small overhead and encryption ability,” IFACPapersOnLine, vol. 48, no. 4, pp. 474–479, 2015.
[32] Y.-M. Kwon, “Vulnerability analysis of the IOT_MQTT protocol for Unmanned Aerial Vehicles,” Ph.D. dissertation. Univerity of Daegu Gyeongbuk Institute of Science and Technology (DGIST), 2018.
[33] S. Atoev, K.-R. Kwon, S.-H. Lee and K.-S. Moon, “Data analysis of the IOT_MQTT communication protocol,” in Proc. 2017 Int. Conf.
on Information Science and Communications Technologies, Tashkent, Uzbekistan, pp. 1–3, 2017.
[34] S. Veena, S. Vaitheeswaran and H. Lokesha, “Towards the development of secure mavs,” in Proc. ICRAMAV-2014 (3rd Int.
Conf.), India, pp. 1–10, 2014.
[35] A. Koubâa and B. Qureshi, “Dronetrack: Cloud-based realtime object tracking using unmanned aerial vehicles over the internet,” IEEE Access, vol. 6, no. 1, pp. 13810–13824, 2018.
[36] AD Team, “Ardupilot project,” 2009. *Online+. Available: https:// ardupilot.org/index.php/about (Accessed Feb. 28, 2021).
[37] A. Allouch, O. Cheikhrouhou, A. Koubaa, M. Khalgui and T. Abbes, “MAVSec: Securing the IOT_MQTT protocol for
ardupilot/PX4 unmanned aerial systems,” in Proc. 2019 15th Int.
Wireless Communications & Mobile Computing Conf., Tangier, Morocco, pp. 1–9, 2019.
[38] PD Team, “PX4 Autopilot,” 2012. [Online]. Available: https://px4.
io/ (Accessed Feb. 28, 2021).
[39] A. Tridgell and L. Meier, “IOT_MQTT 2.0 packet signing proposal,” Scientific report, 2015. *Online+. Available: https:// lists.linuxfoundation.org/pipermail/dronecode-tsc/2015October/000171.html.
[40] G. William, B. Elizabeth, B. Mike, S. Daniel, S. Ryan et al., “Challenges of securing and defending unmanned aerial
vehicles,” in National Cyber Summit (NCS) Research Track, 1st ed., vol. 1. New York, USA: Springer, pp. 119–138, 2020.
[41] N. Hoque, D. K. Bhattacharyya and J. K. Kalita, “Botnet in DDoS attacks: Trends and challenges,”
[42] IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp.
2242–2270, 2015.
[43] G. Vasconcelos, G. Carrijo, R. Miani, J. Souza and V. Guizilini, “The impact of DoS attacks on the AR. Drone 2.0,” in Proc. 2016 XIII Latin American Robotics Symp. and IV Brazilian Robotics Symp., Recife, Brazil, pp. 127–132, 2016.
[44] J. Whelan, A. Almehmadi, J. Braverman and K. El-Khatib, “Threat Analysis of a long range autonomous unmanned aerial system,” in Proc. 2020 Int. Conf. on Computing and Information Technology, Tabuk, Saudi Arabia, pp. 1–5, 2020.
[45] K. Yoon, D. Park, Y. Yim, K. Kim, S. K. Yang et al., “Security authentication system using encrypted channel on UAV
network,” in Proc. 2017 First IEEE Int. Conf. on Robotic Computing, Taichung, Taiwan, pp. 393–398, 2017.
[46] A. Shoufan, H. AlNoon and J. Baek, “Secure communication in civil drones,” in Int. Conf. on Information Systems Security and Privacy, cham, Springer, pp. 177–195, 2015.
[47] B. S. Rajatha, C. M. Ananda and S. Nagaraj, “Authentication of MAV communication using Cae- sar Cipher cryptography,” in 2015 Int. Conf. on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials, Avadi, India, pp. 58–63, 2015.
[48] J. A. Marty, “Vulnerability analysis of the IOT_MQTT protocol for command and control of unmanned aircraft,” MS dessertation, Air Force Institute of Technology, 2013.
[49] R. Hamsavahini, S. Varun and S. Narayana, “Development of light weight algorithms in a customized communication protocol for micro air vehicles,” International Journal Of Latest Research In Science And Technology, vol. 1, no. 1, pp. 73–79, 2016.
[50] N. Butcher, A. Stewart and S. Biaz, Securing the IOT_MQTT communication protocol for unmanned aircraft systems. in Technical Report # CSSE 1402 (2014). USA: Appalach State University. Auburn University, 2013.
[51] Satish Kumar Nalluri, Venkata Krishna Bharadwaj Parasaram, Varun Teja Bathini. (2020). Secure Automation Frameworks for Smart Manufacturing Using Blockchain-Assisted Traceability.
International Journal of Research & Technology, 8(2), 47–53.
Retrieved from https://ijrt.org/j/article/view/879
[52] J. Bian, R. Seker and M. Xie, “A secure communication framework for large-scale unmanned aircraft systems,” in Proc. 2013 Integrated Communications, Navigation and Surveillance Conf., Herndon, VA, USA, pp. 1–12, 2013.
[53] R. Altawy and A. M. Youssef , “Security, privacy, and safety aspects of civilian drones: A survey,”
[54] ACM Transactions on Cyber-Physical Systems, vol. 1, no. 2, pp.
7, 2017.
[54] A. Koubaa, A. Allouch, M. Alajlan, Y. Javed, A. Belghith et al., “Micro air vehicle link (IOT_MQTT) in a nutshell: A Survey,” IEEE Access, vol. 7, no. 1, pp. 87658– 87680, 2019.
[55] F. T. AL-Dhief, N. Sabir, N. M. A.Latif, N. N. N. A. Malik, M. A. A.
Albader et al., “Performance comparison between Tcp And Udp protocols in different simulation scenarios,” International Journal of Engineering & Technology, vol. 7, no. 4.36, pp. 172– 176, 2018.
[56] W. Goralski, “The illustrated network: How TCP/IP works in a modern network,” in The Illustrated Network: How TCP/IP Works in a Modern Network Morgan Kaufmann, 2 ed., Chennai, India: Elsevier, 2017.
[57] Anis Koubaa, “MAVSec: Securing the IOT_MQTT protocol for ardupilot and PX4 unmanned aerial systems,” 2019. *Online+.
Available: https://www.slideshare.net/AnisKoubaa/mavsecsecuringthe-IOT_MQTT- protocol-for-ardupilot-and-px4-
unmanned-aerial-systems (Accessed Mar. 17, 2021).