=Paper=
{{Paper
|id=Vol-3047/paper3
|storemode=property
|title=Analysis of Communication Channels for the Organization of Control and Interaction of UAVs from the Security Viewpoint
|pdfUrl=https://ceur-ws.org/Vol-3047/paper3.pdf
|volume=Vol-3047
|authors=Elena Basan,Olga Peskova,Maria Lapina
}}
==Analysis of Communication Channels for the Organization of Control and Interaction of UAVs from the Security Viewpoint==
Analysis of Communication Channels for the Organization of Control and Interaction of UAVs from the Security Viewpoint Elena Basan1, Olga Peskova1 and Maria Lapina2 1 Southern Federal University, Chekhov St., 2, Taganrog, 347922, Russia 2 North Caucasus Federal University, Pushkina St., 1, Stavropol, 355017, Russia Abstract This article considers the issues of increasing the level of security of wireless communication channels between UAVs. The topic is quite relevant, since UAVs can be used to solve critical tasks, such as search operations, reconnaissance, and relaying communications. At the same time, wireless communication channels are not physically protected, and their security can easily be compromised. The article also discusses the main vulnerabilities of communication channels for UAVs, attacks, and threats to information security. Possibilities of increasing the level of security of UAV communication channels are considered. The methods and developments suggested on this topic by the authors are briefly presented. Keywords 1 UAVs, vulnerabilities, threats, attacks, cryptography, attack detection, communication channels, modulation 1. Introduction Recent years can be characterized by an active expansion of the application areas of unmanned aerial vehicles (UAVs) both for military and civil purposes; therefore, information security issues are becoming more and more urgent, and above all, no less urgent are the problems of the protection of the most vulnerable components of UAVs, and data transmission channels. The main goal of the study is to analyze the technologies used to organize communication channels of various types, as well as to analyze the information security problems typical for them. 2. Analysis of UAV control methods As a rule, any architecture using a UAV includes three control elements [1]: The UAV itself, and, in particular, the flight controller, which is defined as the central processor; Ground control station (GCS) which provides operators with the necessary capabilities to control and/or monitor the UAV; Data transmission channels, i.e. wireless channels used to control the information flow between UAVs and GCSs. Accordingly, the organization of communication channels can be divided into 4 main types: 1. UAV - UAV (D2D). This type of communication is not standardized [2]. In most cases, D2D communications can be modeled as Peer-to-Peer (P2P) communications, which makes such communications vulnerable to various types of attacks typical of P2P, including noise, distributed denial of service (D-DoS), and Sibyl attack. SibDATA 2021: The 2nd Siberian Scientific Workshop on Data Analysis Technologies with Applications 2021, June 25, 2021, Krasnoyarsk, Russia EMAIL: ele-barannik (E. Basan) ORCID: 0000-0001-6127-4484 (E. Basan); 0000-0001-8117-9142 (M. Lapina) © 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 2. UAV - GCS (D2GS). This type of communication is based on the already known and standardized industrial protocols based on wireless communication such as Bluetooth and Wi-Fi 802.11. However, most ground-to-ground connections are public and insecure, especially when using single-factor authentication, which can be easily attacked, making them vulnerable to passive (traffic interception, infrastructure analysis) and active (man-in-the-middle, denial of service) attacks. 3. UAV - UAV group (D2N). This type of communication already allows one to select a network based on the required level of security. It can also include cellular communication, which means using 3GHz, 4GHz, 4G (LTE), and 5GHz. 4. UAV - Satellite (D2S). This is the type of communication required to send coordinates in real-time via the Global Positioning System (GPS), allowing any UAV to return to its original station in the case when it goes out of the line of sight. Satellite communications are considered relatively safe, although vulnerable to attacks such as GPS signal spoofing, etc. Control over UAVs can be carried out in three main ways [3]: using a remote control, where all decisions are made by a remote operator; remote controlled control: with the ability to start and execute the given autonomy, at the same time allowing human intervention if necessary; complete autonomous control: UAVs can make all necessary decisions without the need for any human intervention. On the one hand, UAVs must exchange critical information with various entities, such as operators, nearby aircraft and air traffic controllers to ensure safe, reliable, and efficient flight operations. This type of communication is known as Controlled and Non-Payload Communication (CNPC) [4]. On the other hand, depending on the mission, it may be necessary to transmit and/or receive mission-related data in a timely manner, such as aerial photographs, high-speed video, and data packets for relaying to/from various ground objects such as UAV operators, final users or ground gateways. For this, communication with the payload is used. Specific communication and spectrum requirements are generally different for CNPC and for payload transmission. The 3rd Generation Partnership Project (3GPP) consortium defined the communication requirements for these two types of channels [5]. CNPC usually has a low data transfer rate but rather stringent requirements for high reliability and low latency. Since the loss of a CNPC channel can lead to catastrophic consequences, the International Civil Aviation Organization ICAO states that CNPC channels for UAVs must operate in a protected aviation spectrum [6]. In [7] two methodologies for estimating the spectrum requirements for CNPC are presented. For both UA density methodologies, a terrestrial line-of-sight (LOS) spectrum requirement of 34 MHz is determined. For a non-line-of-sight (BLOS) satellite, the spectrum requirement ranges from 46 MHz to 56 MHz, depending on the type of the satellite system used (spot beam or regional beam). Depending on the functions performed by the UAV, communication can be organized in two ways to improve reliability. As a rule, at least two communication systems are located onboard the UAV: duplex / half-duplex equipment for transmitting command-telemetric information and a simplex system for transmitting payload information. At the same time, on the one hand, an increase in the data transmission channels increases the reliability and resilience of the communication lines, but on the other hand, it provides a potential adversary with more opportunities to make attacks. Let us consider, in particular, the features of using of satellite communications for the organization of communication between GCS and UAV. Satellites can be used to relay communications if the UAVs and GCSs are separated by significant distances, for example, if the UAV is over the ocean or in remote areas where the coverage of the terrestrial network is absent. In addition, satellite signals can also be used to navigate and localize UAVs. WRC 2015 approved the conditional use of satellite frequencies in the Ku/Ka-band to connect UAVs to satellites, and some satellite companies, such as Inmarsat, have launched satellite communication services for unmanned aerial vehicles [8]. Nevertheless, there are several problems which arise in the case of organizing satellite communication between GCS and the UAV. First, the loss and delay of the signal is very significant due to large distances between the satellite and the UAV / ground stations, which are located at low altitudes, which is unacceptable for the transmission of control and telemetry data. Second, unmanned aerial vehicles usually have strict size, weight, and power constraints, and may not be able to carry heavy, bulky, and energy-intensive satellite communication equipment. Third, high operating costs of satellite communications also make it difficult to use it widely for large groups of UAVs. Figure 1 shows a picture of possible control and communication channels with a UAV. Figure 1: UAV communication and control channels The next way of organizing communication, which can serve both for communication between GCS and the UAV and for communication between the UAV and the UAV, is an ad-hoc network, i.e. a decentralized wireless network with no permanent structure. Its variation in the Mobile ad-hoc network (MANET) is a dynamically self-organizing network which does not have a permanent infrastructure, which implements peer-to-peer communication between mobile devices through wireless communication lines, using, for example, IEEE 802.11 a / b / g / n. Each device in MANET can move randomly in time; as a result, its communication conditions with other devices may change frequently. In addition, in order to support communication between two remote sites, some other sites between them must help to forward data through relaying, resulting in higher power consumption, low spectrum efficiency, and long end-to-end latency. Flying ad hoc network (FANET) is a variant of MANET for supporting communication between unmanned aerial vehicles in 3D networks [9]. The topology or configuration of FANET for a UAV can take a different form: full mesh, ring, star, or even bus, depending on the application scenario. In [10], the issue of organizing a communication channel between several UAVs and a ground control point is considered. In this topology, each slave UAV transmits its data to the leader of the UAV group, and the latter transmits the information to the ground control panel. According to the research results, it is noted that the statistics of errors in wireless channels between UAVs change depending on changes in the distance between UAVs. While FANET is a robust and flexible architecture to support UAV communications in a small network, it cannot generally provide a scalable solution for large UAVs deployed over a large area due to the complexities associated with implementing a robust routing protocol and it has a number of features in terms of radio wave propagation. Recently, interest has increased in the use of the existing cellular communication networks, as well as future generation networks to ensure the possibility of terrestrial communication of UAVs [11], due to almost ubiquitous coverage of the cellular network throughout the world, as well as its high- speed optical backhaul and advanced communication technologies, which can potentially meet the requirements of both CNPC and payload, regardless of the density of the UAVs and their distance from the corresponding ground nodes. In [12] the authors discuss the issues of building a UAV network using LTE (Long Term Evolution) technology, a standard for wireless high-speed data transmission in the networks of mobile operators. At the same time, an unmanned aerial system is considered, which includes a UAV, an antenna-feeder facility, and a ground control point. The authors consider the problem of defining upper layer protocol sets for the Radio Monitoring and Non-Payload Communication (CNPC) Standard, which is being developed within the Radio Technical Commission for Aeronautics (RTCA) [13, 14]. This standard only describes the radio frequency (RF) transmission methods and the physical layer; therefore, it is necessary to select and configure the upper layer protocols and define the network architecture of CNPC. The US National Space Agency (NASA) is considering IEEE 802.16 based upper-layer protocols and the CNPC network architecture, but the authors of the article consider the application of the upper layer protocols and the LTE based CNPC network architecture [15, 16]. The frequency for CNPC was discussed at the World Radio Conference (WRC) of the International Telecommunication Union, Radiocommunication (ITU-R), and the frequency band 5 030-5 091 MHz was allocated to CNPC at WRC-12 [17, 18]. The LTE upper-layer protocols for the wireless interface consist of Medium Access Control (MAC), Radio Link Control (RLC), Packet Data Convergence Protocol (PDCP), and Radio Resource Control (RRC). To ensure the security of this type of connection, VPN (Virtual Private Network) technologies and a group of IPSec protocols can be used. However, the LTE standard is characterized by many vulnerabilities which can be revealed through the following attacks: interception of personal user identifiers MSISDN, IMSI; location determination; man-in-the-middle attacks for unencrypted traffic (interception of access to unprotected mail, visited sites, etc.); interception of SMS messages; listening to VoLTE calls by intercepting packets; creating a session on behalf of the subscriber for the purpose of fraud. denial of service attacks on the subscriber, which cause the loss of user data transmission, and for VoLTE networks - interruption of calls; denial of service attacks on equipment which result in network outages. The disadvantages of using open communication protocols are: low information security of the communication channel (cryptographic strength); low imitation resistance (resistance to imitation noise, which has the same structure as a useful signal, which makes it difficult for detection); lack of hidden and noise-immune modes of operation. Thus, the study defines the main architectures which can be used to build communication networks with UAVs. The collected data will be used to achieve the following goals: development of a UAV detection system, development of a system for creating false images of a UAV group. 3. UAV Control and communication vulnerabilities Many unmanned aerial vehicles have serious design flaws, and most of them are designed without wireless protection and encryption of transmitted data [19]. Spoofing vulnerability: The analysis of the configuration of multi-rotor UAVs and flight controllers revealed many deficiencies. They are associated with telemetry streaming channels over serial ports, especially due to the lack of encryption [20, 21]. Our experiments show that using GPS spoofing, information can easily be captured or altered. This vulnerability in the data link allows data to be intercepted and tampered with, giving full control over the UAV. Vulnerability to malware infection: Communication protocols are used when establishing a control channel with a UAV for enabling remote control of unmanned aerial vehicles. However, their use turned out to be unsafe [22,23]. A potential adversary can create a TCP payload, inject it into the UAV's memory, which makes it possible to covertly install malware into systems operating at ground stations. Vulnerability to interference with the communication channel and data interception: Telemetry data transmission channels are used to monitor the environment and objects and implemented through a wireless data transmission medium [24], which makes them vulnerable to various threats. These include data interception, malicious data injection, and alteration of predefined flight paths. This makes it possible to inject and deploy many infected digital files (video, images) from a UAV to the ground station [25]. Another vulnerability was discovered and related to the UAV communication module, which uses wireless communication to exchange data and commands with the ground station [26]. 4. Experiments The members of our team working on the UAV security project carried out a number of experiments to identify vulnerabilities in the communication and control channels of the UAV. The study and analysis of the scenarios of active, passive, and multi-stage attacks for an intelligent group control system for UAVs were carried out, and based on them a template for describing attacks and general scenarios for influencing the information system of a UAV was proposed, and probable attacks through communication channels (deauthentication and connection, eavesdropping, Blueprinting, Replay, Interception of "handshake", brute-force and others) were described [27]. The analysis and study of the algorithms and methods of influencing the UAV information system through communication channels were performed, including the study of the Data Distribution Service, Micro Air Vehicle Link, MAVLink protocols. Field experiments were carried out on the UAV navigation system, built using the GPS technology. During these experiments various types of attacks were implemented, leading to misinformation, return or forced landing of the UAV. The studies were also carried out on the required power, and requirements for the content of the generated signal. The characteristics of determining the fact of an ongoing GPS spoofing attack were also proposed [28]. A system for the formation of a false idea of a UAV based on the use of a radio frequency channel is proposed, which is based on imitating the presence of a large group of UAVs around a trusted UAV object, which simulates communication over a wireless communication channel and at the same time deliberately uses weak security measures (weak passwords, cryptographic keys), which is necessary to draw the enemy's attention to false UAVs instead of the trusted ones [29]. 5. Conclusion Thus, in the course of the study, a detailed analysis of the UAV control methods was made, various technologies used to ensure communication and control of UAVs in various interaction schemes were presented, their vulnerabilities and possible attacks were considered. The experiments carried out during the research were described which showed the real threat from the vulnerabilities. This can make it possible to develop an integrated UAV protection system both in single and group versions. 6. References [1] M. Marshall, R. K. Barnhart, S. B. Hottman, E. Shappee, M. T. Most, Introduction to unmanned aircraft systems. 1st edit. CRC Press. Boca Raton 2016, doi:10.1201/b11202. [2] M. Chen, U. Challita, W. Saad, C. Yin, M. Debbah,Artificial Neural Networks-Based Machine Learning for Wireless Networks, in: IEEE Communications Surveys & Tutorials, volume 21(4), 2019, pp. 3039–3071. doi: 10.1109/COMST.2019.2926625. [3] J. Eggers, M. Draper, Multi-UAV control for tactical reconnaissance and close air support missions: operator perspectives and design challenges, in: Proceedings NATO RTO Human Factors and Medicine Symp, Biarritz, France, 2006, pp. 2006–2011. [4] D.C. Iannicca, J. A. Ishac, K. Shalkhauser, Research Center. Control and Non-Payload Communications (CNPC) Prototype Radio – Generation 2 Security Flight Test Report. National Aeronautics and Space Administration Glenn Research Center Cleveland, Ohio, 2015. [5] Technical specification group radio access network: study on enhanced LTE support for aerial vehicles, volume 15.0.0, 2017, URL: https://standards.aw-drones.eu/standard/652, last accessed 2021/03/21. [6] R. J. Kerczewski, J. D. Wilson, W. D. Bishop Frequency spectrum for integration of unmanned aircraft, in: 32nd Digital Avionics Systems Conference (DASC), IEEE, East Syracuse, NY, USA, 2013, pp. 651–659. doi: 10.1109/DASC.2013.6712625. [7] Characteristics of unmanned aircraft systems and spectrum requirements to support their safe operation in non-segregated airspace. International Telecommunication Union, Tech. Rep. M.2171, M Series Mobile, radiodetermination, amateur and related satellites services. Electronic Publication Geneva, 2010. [8] Launch of Inmarsat swift broadband unmanned aerial vehicle service to provide operational capability boos, URL: https://www.inmarsat.com/press-release/launch-inmarsat-swiftbroadband- unmanned-aerial-vehicle-service-provide-operational-capability-boost/. [9] I. Bekmezci, O. Sahingoz, S.Temel,: Flying Ad-Hoc Networks (FANETs): A Survey, Ad Hoc Networks 11(3) (2013) 1254–1270. doi: 10.1016/j.adhoc.2012.12.004. [10] Y. Zhou, J. Li, L. Lamont, C. Rabbath, Modeling of packet dropout for UAV wireless communications, in: International Conference on Computing, Networking and Communications (ICNC), IEEE, Maui, HI, USA, 2012, pp. 677–682. [11] Y. Zeng, J. Lyu, R.Zhang, Cellular-connected UAV: potentials, challenges, and promising technologies, Wireless Communications 26(1) (2019) pp. 120–127. [12] T. Hong, K. Kang, K. Lim, J. Ahn, Network architecture for control and non-payload communication of UAV, in I 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), 2016, pp. 762–764. [13] Minimum Operational Performance Standards (MOPS) For Unmanned Aircraft Systems (UAS). Control and Non-Payload Communications Terrestrial Link Radio Systems, RTCA, 163- 20/PMC-2034, 2020, URL: https://www.rtca.org/wp-content/uploads/2020/08/sc- 228_tor_rev_10_approved_06-11-2020.pdf. [14] R. Kerczewski, R. Griner, Control and Non-Payload Communications Links for Integrated Unmanned Aircraft Operations, in: 18th Ka and Broadband Conference, pp. 1-8. NASA, Ottawa, Canada, 2012. [15] J. Griner, Unmanned aircraft systems (UAS) integration in the National Airspace System (NAS) project: UAS Control and Non-Payload Communication (CNPC) System Development and Testing, in: Integrated Communications, Navigation and Surveillance Conference (ICNS) Conference Proceedings, IEEE, Herndon, VA, USA, 2014, pp. 1–24. doi: 10.1109/ICNSurv.2014.6820072. [16] S. I. Toufik, M. Baker, LTE The UMTS Long Term Evolution: From Theory to Practice. John Wiley & Sons Ltd, 2009. [17] K. J. Matheou, et al. Analysis of at-Altitude LTE Power Spectra for Small Unmanned Aircraft System C2 Communications. In: Integrated Communications, Navigation and Surveillance Conference (ICNS), IEEE, Herndon, VA, USA, 2019, pp. 1–12. doi: 10.1109/ICNSURV.2019.8735287. [18] R. A. Clothier, B. P.W illiams, N. L. Fulton, Structuring the safety case for unmanned aircraft system operations in non-segregated airspace, Safety Science 79 (1) (2015) 213–228. [19] H. Menouar, I. Guvenc, K. Akkaya, A. S. Uluagac, A. Kadri, A. Tuncer, UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges, Communications Magazine 55(3) (2017) 22-28. doi: 10.1109/MCOM.2017.1600238CM. [20] Y. Zeng, R. Zhang, T.J. Lim, Wireless communications with unmanned aerial vehicles: opportunities and challenges, Communications Magazine, 54(5) (2016) 36–42. doi: 10.1109/MCOM.2016.7470933. [21] D. Rudinskas, Z. Goraj, J. Stankūnas, Security analysis of UAV radio communication system, Aviation 13 (2009) 116-121. doi: 10.3846/1648-7788.2009.13.116–121. [22] A. Kim et al., Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles. In: Infotech Aerospace Conference, pp. 2438. California, USA, 2012. [23] N. Shashok, Analysis of vulnerabilities in modern unmanned aircraft systems,Review of the Air Force Academy 2(42) (2017) 17–26. [24] X. Lin, et al. Mobile networks connected drones: field trials, simulations, and design insights. Vehicular Technology Magazine 14(3) (2019) 115-125. doi: 10.1109/MVT.2019.2917363. [25] A. Abdallah, M. Z. Ali, J. Mišić, V. B. Mišić, Efficient Security Scheme for Disaster Surveillance UAV Communication Networks, Information 10(43) (2019) 1–22. doi: 10.3390/info10020043. [26] C. Rani, H. Modares, R. Sriram, D. Mikulski, F. L. Lewis, Security of unmanned aerial vehicle systems against cyber-physical attacks, J. Defense Model. Simul.: Appl. Methodol. Technol. 13(3) (2015) 331–342. [27] E. Basan, M. Lapina, N. Mudruk, E.Abramov, Intelligent Intrusion Detection System for a Group of UAVs, in: Advances in Swarm Intelligence. ICSI 2021. Lecture Notes in Computer Science, volume 12690. Springer, Cham., 2021. doi:10.1007/978-3-030-78811-7_22. [28] E. Basan, A. Basan, A. Nekrasov, C. Fidge, J. Gamec, M. A. Gamcová, Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes, Sensors 509 (2021) 1-17 https://doi.org/10.3390/s21020509. [29] N. Proshkin, E. Basan, ,M. Lapina: Radio Frequency Method for Emulating Multiple UAVs, in: International Conference on Intelligent Environments (IE), 2021, pp. doi: 10.1109/IE51775.2021.9486599.