Secure Drone Communications using MQTT protocol

Authors

  • Sushma Polasi Department of Computer Science and Engineering (Cyber Security), Vignana Bharathi Institute of Technology Aushapur, Ghatkesar, Telangana, India
  • Hara Gopal Venkata Vajjha

DOI:

https://doi.org/10.22399/ijcesen.685

Keywords:

Encryption algorithm, MQTT protocol, Drones security, Cyber security, UAV secure communications

Abstract

With the revolutionary change in emerging technologies, the usage of drones or unmanned aerial vehicles (UAV) has exponentially increased in different sectors like Industry, healthcare, military, agriculture, real estate, manufacturing, logistics, energy and many more utilities. This rapid growth creates a concern for the secure communication between the internal communication modules and the ground based computer system used for controlling the UAV. Intruder can hack into the device and attack the internal communication device with the injection of the malicious code which can lead to the malfunction of the aircraft. Security issues related to the communication between the internal modules of the drone and the ground based computer system is of major concern and is crucial. UAVs have to operate in constrained networks with limited bandwidth. In such a constrained environment MQTT protocol can be an excellent protocol. No cryptographic techniques are used to retain the simplicity and the light weight of the MQTT protocol. This contributes for the large scope for emerging with new solutions in the protection issues of MQTT communications. This paper mainly focuses on Armstrong number encryption standard algorithm for providing a computationally simple yet a secure and strong algorithm for UAVs encryption and decryption process on the communication links using MQTT protocol.

References

Gupta SG, Ghonge D, Jawandhiya PM (2013). Review of unmanned aircraft system (UAS). International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2;4. http://dx.doi.org/10.2139/ssrn.3451039

Hiebert B, Nouvet E, Jeyabalan V, Donelle L. (2020). The application of drones in healthcare and health-related services in north america: A scoping review. Drones. 4(3):30.

Tomic T, Schmid K, Lutz P, Domel A, Kassecker M, Mair E, Grixa IL, Ruess F, Suppa M, Burschka D. (2012). Toward a fully autonomous UAV: Research platform for indoor and outdoor urban search and rescue. IEEE robotics & automation magazine. 19(3);46-56. DOI: 10.1109/MRA.2012.2206473

Hartmann K, Steup C. (2013). The vulnerability of UAVs to cyber attacks-An approach to the risk assessment. 5th international conference on cyber conflict (CYCON 2013) (pp. 1-23).

Snead J, Seibler JM, Inserra D. (2018). Establishing a legal framework for counter-drone technologies. Heritage Foundation; 3305 http://report.heritage.org/bg3305

Zeng Y, Wu Q, Zhang R. (2019). Accessing from the sky: A tutorial on UAV communications for 5G and beyond. Proceedings of the IEEE. 107(12):2327-75.

Vergouw B, Nagel H, Bondt G, Custers B. (2016). Drone technology: Types, payloads, applications, frequency spectrum issues and future developments. InThe future of drone use (pp. 21-45). TMC Asser Press, The Hague.

Yağdereli E, Gemci C, Aktaş AZ. (2015). A study on cyber-security of autonomous and unmanned vehicles. The Journal of DefenseModeling and Simulation. 12(4):369-81. https://doi.org/10.1177/1548512915575803

Khan N, Abdullah J, Khan AS. (2017). Defending malicious script attacks using machine learning classifiers. Wireless Communications and Mobile Computing. 2017;5360472, 9 pages https://doi.org/10.1155/2017/5360472

Alqarni AA, Alsharif N, Khan NA, Georgieva L, Pardade E, Alzahrani MY (2022). MNN-XSS: Modular neural network based approach for XSS attack detection. Computers, Materials and Continua. 70(2):4075-85.

Rugo A, Ardagna CA, Ioini NE. (2022). A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis. ACM Computing Surveys (CSUR). 55(1);1-35. https://doi.org/10.1145/3485272

Yousuf H, Lahzi M, Salloum SA, Shaalan K. (2021). Systematic review on fully homomorphic encryption scheme and its application. Recent Advances in Intelligent Systems and Smart Applications. 537-551. DOI:10.1007/978-3-030-47411-9_29

Brakerski Z, Döttling N, Garg S, Malavolta G. (2020) Candidate iO from homomorphic encryption schemes. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques Springer, Cham. (pp. 79-109).

Alladi T, Bansal G, Chamola V, Guizani M. (2020) Secauthuav: A novel authentication scheme for uav-ground station and uav-uav communication. IEEE Transactions on Vehicular Technology. 69(12):15068-77

Chaari L, Chahbani S, Rezgui J. (2020). MAV-DTLS toward security enhancement of the uav-gcs communication. In2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall).

Islam N, Rashid MM, Pasandideh F, Ray B, Moore S, Kadel R. (2021). A review of applications and communication technologies for internet of things (IoT) and unmanned aerial vehicle (uav) based sustainable smart farming. Sustainability. 13(4);1821 https://doi.org/10.3390/su13041821

Chamola V, Kotesh P, Agarwal A, Gupta N, Guizani M. (2021) A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques. Ad hoc networks. 111;102324 doi: 10.1016/j.adhoc.2020.102324.

LakewYihunie F, Singh AK, Bhatia S. (2020) Assessing and exploiting security vulnerabilities of unmanned aerial vehicles. InSmart systems and IoT: innovations in computing Springer, Singapore. 141;701-710. https://doi.org/10.1007/978-981-13-8406-6_66

Fotohi R. (2020) Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system. Reliability Engineering & System Safety. 193:106675.

Sushma, P. (2024). Smart Devices Security with Armstrong Number Encryption Standard Algorithm using MQTT Protocol-An IoT Application. International Journal of Intelligent Systems and Applications in Engineering, 12(10s), 45–51. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4348

Thomas A, Sharma VK, Singhal G. (2015). Secure link establishment method to prevent jelly fish attack in MANET. In2015 International Conference on Computational Intelligence and Communication Networks (CICN). (pp. 1153-1158)

Y. Li and L. Cai, (2017). UAV-Assisted Dynamic Coverage in a Heterogeneous Cellular System, in IEEE Network, 31(4);56-61, doi: 10.1109/MNET.2017.1600280.

Steinmann JA, Babiceanu RF, Seker R. (2016) UAS security: Encryption key negotiation for partitioned data. In2016 Integrated Communications Navigation and Surveillance (ICNS) (pp. 1E4-1).

Samland F, Fruth J, Hildebrandt M, Hoppe T, Dittmann J. AR. (2012). Drone: security threat analysis and exemplary attack to track persons. InIntelligent Robots and Computer Vision XXIX: Algorithms and Techniques International Society for Optics and Photonics. 8301; 83010G)

Płotka M, Malanowski M, Samczyński P, Kulpa K, Abratkiewicz K. Al-Turjman F, Abujubbeh M, Malekloo A, Mostarda L. (2020) UAVs assessment in software-defined IoT networks: An overview. Computer Communications. 150;519-536.

P. Kalpana, K. Malleboina, M. Nikhitha, P. Saikiran and S. N. Kumar, (2024). Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithm. 2024 International Conference on Data Science and Network Security (ICDSNS), Tiptur, India, pp. 1-7, https://doi.org/10.1109/ICDSNS62112.2024.10691297.

Lin C, He D, Kumar N, Choo KK, Vinel A, Huang X. (2018). Security and privacy for the internet of drones: Challenges and solutions. IEEE Communications Magazine. 56(1);64-69 DOI: 10.1109/MCOM.2017.1700390

Viji D, Saravanan K, Hemavathi D. (2017) A journey on privacy protection strategies in big data. In2017 international conference on intelligent computing and control systems (ICICCS) IEEE. pp. 1344-1347.

Gahi Y, Guennoun M, El-Khatib K. (2015). A secure database system using homomorphic encryption schemes. arXiv preprint arXiv:1512.03498.

Kalpana, P., Anandan, R. (2023). A capsule attention network for plant disease classification. Traitement du Signal, 40(5);2051-2062. https://doi.org/10.18280/ts.400523

Kerns AJ, Shepard DP, Bhatti JA, Humphreys TE. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics. 31(4);617-636

Chen J, Feng Z, Wen JY, Liu B, Sha L. (2019). A container-based DoS attack-resilient control framework for real-time UAV systems. In 2019 Design, Automation & Test in Europe Conference & Exhibition. IEEE. pp. 1222-1227.

P. Kalpana, P. Srilatha, G. S. Krishna, A. Alkhayyat and D. Mazumder, (2024). Denial of Service (DoS) Attack Detection Using Feed Forward Neural Network in Cloud Environment, 2024 International Conference on Data Science and Network Security (ICDSNS), Tiptur, India, 2024, pp. 1-4, https://doi.org/10.1109/ICDSNS62112.2024.10691181

Khan N, Abdullah J, Khan AS. (2017) A dynamic method of detecting malicious scripts using classifiers. Journal of Computational and Theoretical Nanoscience 23(6);5352-5355 DOI:10.1166/asl.2017.7374

M. Pan, C. Chen, X. Yin and Z. Huang, (2022). UAV-Aided Emergency Environmental Monitoring in Infrastructure-Less Areas: LoRa Mesh Networking Approach, in IEEE Internet of Things Journal, 9(4);2918-2932,doi: 10.1109/JIOT.2021.3095494

Schmittner C, Ma Z, Schoitsch E, Gruber T. (2015). A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security. (pp. 69-80)

Liu CH, Chen Z, Tang J, Xu J, Piao C. (2018). Energy-efficient UAV control for effective and fair communication coverage: A deep reinforcement learning approach. IEEE Journal on Selected Areas in Communications. 36(9):2059-2070 DOI: 10.1109/JSAC.2018.2864373

Benzekki K, El Fergougui A, Elbelrhiti EA. (2016). A secure cloud computing architecture using homomorphic encryption. International Journal of Advanced Computer Science and Applications. 7(2):293-298. DOI:10.14569/IJACSA.2016.070241

Mittal D, Kaur D, Aggarwal A. (2014). Secure data mining in cloud using homomorphic encryption. In2014 IEEE international conference on cloud computing in emerging markets (CCEM). (pp. 1-7)

Bocu R, Costache C. (2018). A homomorphic encryption-based system for securely managing personal health metrics data. IBM Journal of Research and Development. 25;62(1):1-10. doi: 10.1147/JRD.2017.2755524.

Acar A, Aksu H, Uluagac AS, Conti M. (2018) A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (Csur). 51(4);1 – 35 https://doi.org/10.1145/321430

Cominetti EL, Simplicio MA. (2020). Fast additive partially homomorphic encryption from the approximate common divisor problem. IEEE Transactions on Information Forensics and Security. 15;2988-2998.

P. Kalpana, M. Almusawi, Y. Chanti, V. Sunil Kumar and M. Varaprasad Rao, (2024). A Deep Reinforcement Learning-Based Task Offloading Framework for Edge-Cloud Computing, 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, India, pp. 1-5, https://doi.org/10.1109/ICICACS60521.2024.10498232.

Sharma T. (2016). E-voting using homomorphic encryption scheme. International Journal of Computer Applications. 141(13):14-6.

Paillier P. (1999). Public-key cryptosystems based on composite degree residuosity classes. International conference on the theory and applications of cryptographic techniques Springer, Berlin, Heidelberg. (pp. 223-238)

AVENS, Aerial Vehicle Network Simulator, Available online: https://omnetpp.org/download-items/AVENS.html

Talaei Khoei, Tala & Ghribi, Elias & Prakash, Ranganathan & Kaabouch, Naima. (2021). A Performance Comparison of Encryption/Decryption Algorithms for UAV Swarm Communications. DOI:10.13140/RG.2.2.17379.48160

Goldin, C. D., & Katz, L. F. (2008). The race between education and technology. Belknap Press of Harvard University Press.

Auster, P. (2007). The Brooklyn follies. http://www.barnesandnoble.com/

Akkurt I. (2022, October 28–31). Title of presented work [Conference presentation abstract]. 9th International Conference on Computational and Experimental Science and Engineering (ICCESEN 2022), Antalya-Turkey. http://www.iccesen.org

Austerlitz, S. (2015). How long can a spinoff like ‘Better Call Saul’ last? FiveThirtyEight. http://fivethirtyeight.com/features/how-long-can-a-spinoff-like-better-call-saul-last/

guven, mesut. (2024). Dynamic Malware Analysis Using a Sandbox Environment, Network Traffic Logs, and Artificial Intelligence. International Journal of Computational and Experimental Science and Engineering, 10(3);480-490. https://doi.org/10.22399/ijcesen.460

Venkatraman Umbalacheri Ramasamy. (2024). Overview of Anomaly Detection Techniques across Different Domains: A Systematic Review. International Journal of Computational and Experimental Science and Engineering, 10(4);898-910. https://doi.org/10.22399/ijcesen.522

R, U. M., P, R. S., Gokul Chandrasekaran, & K, M. (2024). Assessment of Cybersecurity Risks in Digital Twin Deployments in Smart Cities. International Journal of Computational and Experimental Science and Engineering, 10(4);695-700. https://doi.org/10.22399/ijcesen.494

Prasada, P., & Prasad, D. S. (2024). Blockchain-Enhanced Machine Learning for Robust Detection of APT Injection Attacks in the Cyber-Physical Systems. International Journal of Computational and Experimental Science and Engineering, 10(4);799-810. https://doi.org/10.22399/ijcesen.539

Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4);1041-1049. https://doi.org/10.22399/ijcesen.417

C, A., K, S., N, N. S., & S, P. (2024). Secured Cyber-Internet Security in Intrusion Detection with Machine Learning Techniques. International Journal of Computational and Experimental Science and Engineering, 10(4);663-670. https://doi.org/10.22399/ijcesen.491

Guven, M. (2024). A Comprehensive Review of Large Language Models in Cyber Security. International Journal of Computational and Experimental Science and Engineering, 10(3);507-516. https://doi.org/10.22399/ijcesen.469

Downloads

Published

2024-12-07

How to Cite

Sushma Polasi, & Hara Gopal Venkata Vajjha. (2024). Secure Drone Communications using MQTT protocol. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.685

Issue

Section

Research Article