CYBER SECURITY SYSTEMS OF HIGHLY FUNCTIONAL UAV FLEETS FOR MONITORING CRITICAL INFRASTRUCTURE: ANALYSIS OF DISRUPTIONS, ATTACKS AND COUNTERAPPROACHES

H. Zemlianko, V. Kharchenko

Èlektron. model. 2024, 46(1):41-54

https://doi.org/10.15407/emodel.46.01.041

ABSTRACT

The modern world is becoming increasingly dependent on the security of critical infrastructure facilities (CIF), which is monitored by UAVs, their fleets and multifunctional fleet systems (MFS UAVs). The UAV MFS have a complex digital infrastructure (DIS). The DIS is based on new information technologies that have certain security deficiencies and create new cyber threats, in particular, due to specific vulnerabilities that can be exploited externally. The provision of cyber security of the CIS of the MBF of UAVs has been studied thanks to the development of a sequence of analysis of cyber threats using the IMECA procedure. An overview of existing cyber security assessment methods and their limitations was conducted; developed models of the OKI monitoring system based on the UAV MBF; analyzed cyber threats to its CIS; the criticality of cyber attacks and the impact of countermeasures; formulated recommendations for ensuring cyber security and general conclusions based on research results. A method of ensuring cyber security of the CIS of the MBF UAV was created, which consists of determining its specific features as an object of cyber threats, analyzing violators, vulnerabilities, risks of critical violations and choosing countermeasures, the use of which allows you to increase the level of cyber security and reliability of the monitoring system and ensure a temporary response to cyber threats.

KEYWORDS

cyber threats, unmanned aerial vehicles, cybersecurity assessment, monitoring of critical infrastructures, UAV fleets, selection of countermeasures.

REFERENCES

  1. Allianz Rise of the drones. (б. д.). Allianz.com. https://www.allianz.com/en/press/news/stud ies/160914-rise-of-the-drones.html.
  2. Torianyk, V., Kharchenko, V., Zemlianko, H. (2021, March). IMECA Based Assessment of Internet of Drones Systems Cyber SecurityConsidering Radio Frequency Vulnerabilities. In IntelITSIS, pp. 460-470.
  3. Niyonsaba, S., Konate, K., & Soidridine, M.M. (2023). A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions. International Journal of Computer Networks and Applications, 10(5), 688. 
    https://doi.org/10.22247/ijcna/2023/223417
  4. Arshad, I., Alsamhi, S.H., Qiao, Y., Lee, B., & Ye, Y. (2023). A Novel Framework for Smart Cyber Defence: A Deep-Dive Into Deep Learning Attacks and Defences. IEEE Access11, 88527-
    https://doi.org/10.1109/ACCESS.2023.3306333
  5. Shafik, W., Mojtaba Matinkhah, S., & Shokoor, F. (2023). Cybersecurity in Unmanned Aerial Vehicles: a Review. International Journal on Smart Sensing and Intelligent Systems16(1). 
    https://doi.org/10.2478/ijssis-2023-0012
  6. Omolara, A.E., Alawida, M., & Abiodun, O.I. (2023). Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey. Neural Computing and Applications.
    https://doi.org/10.1007/s00521-023-08857-7
  7. Altaweel, A., Mukkath, H., & Kamel, I. (2023). GPS Spoofing Attacks in FANETs: A Systematic Literature Review. IEEE Access, 1. 
    https://doi.org/10.1109/ACCESS.2023.3281731
  8. The "Menatir" system is an automated, richly functional girder system for monitoring an additional UAV. (б. д.). MENATIR. https://menatir.com/uk/.
  9. Zemlianko, H., & Kharchenko, V. (2023). Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique. Radioelectronic and Computer Systems, (4), 152-
    https://doi.org/10.32620/reks.2023.4.11
  10. Halahan, S., Muzychenko, I., Kovalyov, V., & Sluisarenko, A. (2023). Feature Supplication and Classification Maritime Unmanned Surface Vessels in Ukraine Naval For­ces. Випробування та сертифікація, (1(1)), 31-
    https://doi.org/10.37701/ts.01.2023.04
  11. Shao, G., Ma, Y., Malekian, R., Yan, X., & Li, Z. (2019). A Novel Cooperative Platform Design for Coupled USV-UAV Systems. IEEE Transactions on Industrial Informa­tics15(9), 4913-
    https://doi.org/10.1109/TII.2019.2912024
  12. On the national security of Ukraine, the Law of Ukraine № 2469-VIII (2023) (Ukraine). https://zakon.rada.gov.ua/laws/show/2469-19#Text.
  13. On the main principles of ensuring cyber security of Ukraine, Law of Ukraine № 2163-VIII (2022) (Ukraine). https://zakon.rada.gov.ua/laws/show/2163-19#Text.
  14. Implementing a Zero Trust Architecture | NCCoE. (б. д.). NCCoE. https://www.nccoe. nist.gov/projects/implementing-zero-trust-architecture.
  15. Pevnev, V., Frolov, A., Tsuranov, M., & Zemlianko, H. (2022). Ensuring the Data Integrity in Infocommunication Systems. International Journal of Computing, 228-
    https://doi.org/10.47839/ijc.21.2.2591
  16. Chen, D., Shi, S., & Gu, X. (2023). Chaos detection scheme for multiple variable-frequency signals with overlapping frequencies. EURASIP Journal on Advances in Signal Processing2023(1).
    https://doi.org/10.1186/s13634-023-01050-x
  17. Adil, M., Song, H., Mastorakis, S., Abulkasim, H., Farouk, A., & Jin, Z. (2023). UAV-Assisted IoT Applications, Cybersecurity Threats, AI-Enabled Solutions, Open Challenges with Future Research Directions. IEEE Transactions on Intelligent Vehicles, 1-21.
    https://doi.org/10.1109/TIV.2023.3309548

Full text: PDF