Abstract

To perform advanced operations with unmanned aerial vehicles (UAVs), it is crucial that components other than the existing ones such as flight controller, network devices, and ground control station (GCS) are also used. The inevitable addition of hardware and software to accomplish UAV operations may lead to security vulnerabilities through various vectors. Hence, we propose a security framework in this study to improve the security of an unmanned aerial system (UAS). The proposed framework operates in the robot operating system (ROS) and is designed to focus on several perspectives, such as overhead arising from additional security elements and security issues essential for flight missions. The UAS is operated in a nonnative and native ROS environment. The performance of the proposed framework in both environments is verified through experiments.

Highlights

  • Unmanned aerial vehicles (UAVs), commonly known as drones, have been recently deployed in various environments to perform numerous tasks [1,2,3,4]

  • The /sensor node present in the external sensor publishes the message to the /process node in the offboard computer using /topic. /Process nodes deliver command messages for UAV control to /MAVROS node based on sensor data. /MAVROS node forwards the data to the flight controller via MAVLink

  • We demonstrate through experiments that UAV with these security frameworks have no impact on existing methods of attack Figure 15 shows the state of the UAV during an attack in the same scenario as the above

Read more

Summary

Introduction

Unmanned aerial vehicles (UAVs), commonly known as drones, have been recently deployed in various environments to perform numerous tasks [1,2,3,4]. A CPS can be seen as the integration of computational, networking, and physical processes It is a system in which information and software technologies combine with mechanical components to deliver and exchange data as well as monitor or control its subject by infrastructure such as the Internet in real time. Sensors 2021, 21, 1369 decision making, to final execution, and it can be referred to as a CPS In these CPSs, studies on system vulnerabilities, one of which is vulnerability in the network, are actively underway [6,7,8,9,10]. Section describes the framework proposed posed for vulnerabilities in ROS. A low overhead head security solution is proposed that can address vulnerabilities in ROS. Section describes scribes the proposed security framework with actual implementation and verification.

Background
Rosbridge
Safety Tool of ROS
Model of ROS-Based UAS
Vulnerability of ROS-Based
System
Related Work
Proposed Method
Registration
Signature with HMAC
Encryption Overhead
Message Verification Performance
Experiment Environment of UAS
Experiment on Nonnative
Experiments show that security
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call