Journal
SECURITY AND COMMUNICATION NETWORKS
Volume 2020, Issue -, Pages -Publisher
WILEY-HINDAWI
DOI: 10.1155/2020/8889122
Keywords
-
Funding
- National Natural Science Foundation of China [61972025, 61802389, 61672092, U1811264, 61966009]
- Fundamental Research Funds for the Central Universities of China [2018JBZ103, 2019RC008]
- Science and Technology on Information Assurance Laboratory [614200103011711]
- Guangxi Key Laboratory of Trusted Software [KX201902]
Ask authors/readers for more resources
With the rapid development of wireless communication technology and intelligent mobile devices, unmanned aerial vehicle (UAV) cluster is becoming increasingly popular in both civilian and military applications. Recently, a swarm intelligence-based UAV cluster study, aiming to enable efficient and autonomous collaboration, has drawn lots of interest. However, new security problems may be introduced with such swarm intelligence. In this work, we perform the first detailed security analysis to a kind of flocking-based UAV cluster with 5 policies, an upgrade version of the well-known Boids model. Targeting a realistic threat in a source-to-destination flying task, we design a data spoofing strategy and further perform complete vulnerability analysis. We reveal that such design and implementation are highly vulnerable. After breaking through the authentication of ad hoc on-demand distance vector (AODV) routing protocol by rushing attack, an attacker can masquerade as the first-arrival UAV within a specific scope of destination and generate data spoofing of arrival status to the following UAVs, so as to interfere with their normal flying paths of destination arrival and cause unexpected arrival delays amid urgent tasks. Experiments with detailed analysis from the 5-UAV cluster to the 10-UAV cluster are conducted to show specific feature composition-based attack effect and corresponding average delay. We also discuss promising defense suggestions leveraging the insights from our analysis.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available