OceanofPDF.com Wireless Networks - Hamid Jahankhani
OceanofPDF.com Wireless Networks - Hamid Jahankhani
Security Applications
Editor-in-Chief
Anthony J. Masys
Associate Professor, Director of Global Disaster Management,
Humanitarian Assistance and Homeland Security, University of South
Florida, Tampa, USA
Advisory Editors
Gisela Bichler
California State University, San Bernardino, CA, USA
Thirimachos Bourlai
Lane Department of Computer Science and Electrical Engineering,
Multispectral Imagery Lab (MILab), West Virginia University, Morgantown,
WV, USA
Chris Johnson
University of Glasgow, Glasgow, UK
Panagiotis Karampelas
Hellenic Air Force Academy, Attica, Greece
Christian Leuprecht
Royal Military College of Canada, Kingston, ON, Canada
Edward C. Morse
University of California, Berkeley, CA, USA
David Skillicorn
Queen’s University, Kingston, ON, Canada
Yoshiki Yamagata
National Institute for Environmental Studies, Tsukuba, Ibaraki, Japan
Indexed by SCOPUS
The series Advanced Sciences and Technologies for Security
Applications comprises interdisciplinary research covering the theory,
foundations and domain-specific topics pertaining to security. Publications
within the series are peer-reviewed monographs and edited works in the
areas of:
biological and chemical threat recognition and detection (e.g., biosensors,
aerosols, forensics)
crisis and disaster management
terrorism
cyber security and secure information systems (e.g., encryption, optical
and photonic systems)
traditional and non-traditional security
energy, food and resource security
economic security and securitization (including associated
infrastructures)
transnational crime
human security and health security
social, political and psychological aspects of security
recognition and identification (e.g., optical imaging, biometrics,
authentication and verification)
smart surveillance systems
applications of theoretical frameworks and methodologies (e.g.,
grounded theory, complexity, network sciences, modelling and
simulation)
Together, the high-quality contributions to this series provide a cross-
disciplinary overview of forefront research endeavours aiming to make the
world a safer place.
The editors encourage prospective authors to correspond with them in
advance of submitting a manuscript. Submission of manuscripts should be
made to the Editor-in-Chief or one of the Editors.
Editors
Hamid Jahankhani and Ayman El Hajjar
Wireless Networks
Cyber Security Threats and Countermeasures
Editors
Hamid Jahankhani
Department of Information Security and Cyber Criminology, Northumbria
University London, London, UK
Ayman El Hajjar
Department of Computer Science and Engineering, University of
Westminster, London, UK
© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2023
This work is subject to copyright. All rights are solely and exclusively
licensed by the Publisher, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any
other physical way, and transmission or information storage and retrieval,
electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The publisher, the authors, and the editors are safe to assume that the advice
and information in this book are believed to be true and accurate at the date
of publication. Neither the publisher nor the authors or the editors give a
warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The
publisher remains neutral with regard to jurisdictional claims in published
maps and institutional affiliations.
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_1
Ayman El Hajjar
Email: A.ElHajjar@westminster.ac.uk
Abstract
The Internet of Things is the next evolution of the Internet which will
substantially affect human life. IoT is important because it is the first of its
kind that is propelling an evolution of the Internet and smart environment;
It is clear that secure communication between IoT devices is essential and
the threats and risks for having an insecure IoT are a lot bigger than for
conventional Internet connected devices. The motivation behind this
chapter is to set variables needed to investigate the performance of both the
probabilistic scheme or the deterministic scheme approaches and to find a
reliable and efficient mechanism for nodes within the IoT and to establish
trust by securing end-to-end communication by having a certain pre
distributed key scheme that will enable such communication by the use of a
Key Pre-distribution scheme KPS.
3 Internet of Things
Internet of Things (IoT) is the next evolution of the Internet which will
substantially affect human life. IoT is important because it is the first of its
kind that is propelling an evolution of the Internet and smart environment—
an evolution that will lead to innovative applications that have the ability to
revolutionize our lives and our surroundings.
The vision of having a variety of physical elements “Objects” and
“things” connected to the Internet is what forms the IoT. In the conventional
Internet, most of the devices connected to the Internet were used directly by
humans and needed a direct interaction from a human being to be able to
generate data. The IoT vision enabled objects and things to interact with an
external entity and send data without the interference of a human. No
human participation is needed and objects are able to take decisions based
on data received, sent or generated.
Thus the term of the Internet of Things explained in [41] is now
considered as a global network which allows the communication between
human-to-human, human-to-things and things-to-things that is anything in
the world by providing a unique digital identity to each and every object.
The idea is that all objects connected to the IoT will contain embedded
technology, allowing them to interact with internal states or an external
environment. Those objects will be able to sense and communicate thus
changing how and where decisions are made and who makes them [42].
The IoT is an emerging technology closely related to other research
areas like Peer to Peer Networking, Mobile computing, Pervasive or
Ubiquitous computing, Wireless Sensor Networks, Cyber Physical Systems,
Real Time Analytics, etc. Technologies like ZigBee and Wi-Fi Direct can be
widely deployed to achieve the notion of smart cities, eventually achieving
a globally integrated smart world. However, there are ongoing issues like
architecture design, hardware design, cost accountability, identity, privacy,
and security issues for building new ices and solutions in IoT [43].
The applications and usage of the Internet are multifaceted and
expanding on a daily basis. The Internet of Things (loT), Internet of
Everything (loE) and Internet of Nano Things are new approaches for
incorporating the Internet into the generality of personal, professional and
societal life [44].
Applications of IoT encompasses medical implants, alarm clocks,
wearable systems, automotives, washing machines, traffic lights, and the
energy grid. It is expected that 50 billion devices will be interconnected by
2030. Having this huge Global Network will result in the generation of a
huge unprecedented amount of data.
Internet protocols have always been considered too heavy for sensor
networks and thus the 6LoWPAN protocol stacks were created [45].
6LoWPAN concept originated from the idea that “the Internet Protocol
could and should be applied even to the smallest devices” and that low-
power devices with limited processing capabilities should be able to
participate in the Internet of Things [4].
4 6LoWPAN
To achieve the vision of the Internet of Things, a review of the currently
used Internet protocols and standards was needed. The Internet Protocol
(IP) was always considered a protocol for Local Area Networks, Wide Area
Networks, PCs and servers. The IP protocol was not intended to be used
with Wireless sensor networks, Personal Area Networks and the sensor
itself. The main reason why it was not intended to be used is that the IP is
too heavy for those applications. Sensor networks are meant to be
lightweight resource constraints devices.
However, recently there has been a rethinking of the many
misconceptions about the IP. The main discussion was to answer this
question “why invent a new protocol when we already have IP” thus the
development and standardization of 6LoWPAN (IPv6 over Low Power
Wireless Personal Area Networks) was carried out. A simple 6LoWPAN
architecture is shown in Fig. 3 and outlines the basic concept of connecting
low power devices in a 6LoWPAN network with a conventional IPv4/v6
network by using an edge router.
Fig. 3 The 6LoWPAN simple architecture comprises the IoT network layer, the edger router and the
connection to the Internet where the data collected from lower layers are analysed and processed [45]
6LoWPAN technology realizes the IPv6 packet transmission in the
IEEE 802.15.4 based WSN. And 6LoWPAN is regarded as one of the ideal
technologies to realize the interconnection between WSN and Internet
which is the key to build the IoT [46].
6LoWPAN defines how to layer, transmit and deal with data using IPv6
over low data rate, low power, and small footprint radio networks
6LoWPAN as identified by IEEE 802.15.4 radio. 6LoWPAN protocols
resides between the data link layer and the network layer. The adaptation of
the full IP format and the 6LoWPAN in performed by the edge router that
translates conventional IP traffic to 6LoWPAN traffic as is shown in Fig. 4
in relation to an IPv6 stack.
Fig. 4 IP and 6LoWPAN protocol stacks as presented in 6LoWPAN the wireless embedded Internet
by Shelby and Bormann [45]. The representation of each layer in the 6LoWPAN shows how the
logical communication between the layers at the same level can be interpreted, i.e. communication
between the IP network layer and IPv6
Using IP protocols in Sensor networks simplify the connectivity model,
as the hierarchy of the devices in the network can be flattened. This also
removes the complexity of having devices to translate between proprietary
protocols and standard Internet protocols [3].
IoT applications are implemented using a wide range of proprietary
technologies which are difficult to integrate with larger networks and
Internet-based services. Where as the 6LoWPAN approach is an IP based
one, these devices can be connected easily to other IP networks which
doesn’t require any translation gateways or proxies, and which can use the
existing network infrastructures [47].
It is normal to assume that using IP is too heavy in terms of code size,
protocol complexity, required configuration infrastructure or head and
protocol overhead. Implementation of 6LoWPAN can easily fit into 32 kb
flash memory parts which is suitable for the Internet of Things devices and
wireless Networks. 6LoWPAN uses the IPv6 thus the need for
configuration servers such as DHCP and NAT is not available as the IPv6
has the Zero Configure and Neighbour Discovery capabilities. The use of
IPv6 also allowed the protocol to define a unique stateless header
compression mechanism for the transmission of IPv6 packets in as few as
4 bytes.
A key attribute to 6LoWPAN is the IPv6 (Internet Protocol version 6)
stack, which has been a very important introduction in recent years to
enable the IoT. IPv6 provides a basic transport mechanism to produce
complex control systems and to communicate with devices in a cost-
effective manner via a low-power wireless network.
The challenges to develop Internet of Things applications using
6LoWPAN stack similarly but with more complexity and can be identified
specifically to routing and security of all nodes on the network.
5 Routing
Routing is a fundamental piece of the overall IPv6 architecture for the
Internet of Things. It became clear as intelligent devices were proliferating
into all aspects of life, that a new routing protocol would be required for
devices on the smart grid as well as other smart devices operating in harsh
environments such as smart grids, manufacturing plants, commercial
buildings, and on transportation networks. The networks in these
environments can be described as Low Power and Lossy Networks LLN,
meaning they often operate with significant constraints on processing
power, memory and energy translating into high data loss rates, low data
transfer rates and instability. Routing Protocol for Low-Power and Lossy
Networks RPL is a routing protocol on IPv6 that will translate the potential
of Internet of Things into reality.
As of 2011, RPL has been deemed ready by the IETF as a proposed
standard RFC. The objective of RPL is to target networks which comprise
of thousands of nodes where the majority of the nodes have very
constrained resources. RPL protocol consists of routing techniques that
organize networks in units called Directed Acyclic Graphs DAG. DAG is
structure where all nodes are connected but there is no available round trip
path from one node to another [48].
Each DAG structure is called Destination Oriented Directed Acyclic
Graph (DODAG). The DODAG starts at the root node or sink. The root
node is initially the only node that is a part of the DODAG, until it spreads
gradually to cover the whole IoT as DODAG Information Object DIOs are
received down in the network. In a converged IoT network, each RPL router
has identified a stable set of parents, each of which is a potential next hop
on a path towards the root of the DODAG as well as the calculated rank for
each preferred parent for each node.
When a router needs to decide on the preferred route to use and on the
preferred parent, it will emit DODAG Information Object (DIO) messages
using link local multicast thus indicating its respective rank in the DODAG
(usually the distance to the root is considered the metric “hop count”). All
routers will do the same and each router will receive several DIO messages.
Once it receives all DIO messages, it will calculate its own rank and select
its preferred parent and then itself start emitting DIO messages.
Since RPL is a Distance Vector routing protocol, it restricts the ability
for a router to change rank. A router can freely assume a lower rank but it
can assume a higher rank, it is restricted to avoid count to infinity problem.
For a router to assume a greater rank, it has to ask the root to trigger global
recalculation of the DODAG by increasing a sequence number DODAG
version in DIO messages. The protocol tries to avoid routing loops by
computing a node’s position relative to other nodes with respect to the
DODAG root. RPL is mostly communication between multipoint to point
routes from the sensors inside the LLN and towards the root. RPL by way
of the DIO generation provides this as upward routers.
Downward routes are only used by parents to issue Destination
Advertisement Object (DAO) messages, propagating as unicast via parents
towards the DODAG root. In RPL routers two modes exist one that is non
storing mode, where an RPL router originates DAO messages, advertising
one or more of its parents and unicast it to the DODAG root. The root once
it receives all DAOs from all routers, it can use source routing for reaching
advertised destinations inside the LLN. The second mode, the storing mode,
where each RPL router on the path and the root records a route to the
prefixes advertised in the DAO and the next hop.
A routing metric is a quantitative value used to find the cost of a path
and helps in making the routing decision in case there are different routes
available. In Low power Lossy Networks a metric is a scalar used to find
the best path according to the objective function.
Another important fact about the protocol’s design is the maintenance of
the topology. Since most of the devices in LLN and 6LoWPAN networks
are typically battery powered, it is crucial to limit the amount of sent
control messages over the network. To do that, a trickle timer algorithm is
used since the time for each router to send a DIO message is relevant to
how the network topology is changing. If the network topology keeps on
changing, which means if routers keep on finding in DIO message out dated
messages, it means the trickle timer for DIO messages needs to be smaller.
If routers keep on finding messages and information stored up to date
(similar) it means no need for DIO messages at this rate, the timer is made
bigger.
RPL messages are considered part of the data frame message and they
are sent in the payload of an 802.15.4 packet. Control of RPL and the order
for a root to form a DODAG and for a node to join a DODAG are shown
below:
1. DODAG Information Solicitation message (DIS) (Sect. 5.1.1)
The metric container shown in Table 2 takes 16 bytes from the IEEE
802.15.4 message. This consists of 2 bytes for “type and option length”,
6 bytes for “ETX metric object” and 6 bytes “ETX constraint object”.
2. Node Energy Object: The Node Energy Object is used as a metric when
it is desirable to avoid selecting a node with low energy. Power and
energy are clearly critical resources in most LLNs. Node Energy Object
is calculated by determining the node Energy Consumption needed for
each node [55].
3. Hop Count Object (HP): The Hop Count Object (HP) is used to report
the number of traversed nodes along the path. The HP object may be
used as a constraint or a metric. When used as a constraint, the DAG
root indicates the maximum number of hops that a path may traverse.
When that number is reached, no other node can join that path. When
used as a metric, each visited node simply increments the Hop Count
field.
2. Latency: The latency is the amount of time a packet takes to travel from
one point in the network to another. The latency object is calculated by
calculating the estimated actual latency. This is done when each node
report the range of latency that they allow in addition to the latency
they are suffering based on the power consumption.
3. The Link Quality Level Reliability Metric (LQL) [53]: The Link
Quality Level (LQL) object is used to quantify the link reliability using
a discrete value, from 0 to 7, where 0 indicates that the link quality
level is unknown and 1 reports the highest link quality level. The LQL
can be used either as a metric or a constraint. When used as a metric,
the LQL metric can only be recorded. For example, the DAG Metric
object may request all traversed nodes to record the LQL of their
incoming link into the LQL object. Each node can then use the LQL
record to select its parent based on some user defined rules.
where
5.3.2 The Minimum Rank with Hysteresis Objective Function
(MRHOF)
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a
distance vector IPv6 routing protocol designed for LLN networks. RPL is
designed for networks which comprise thousands of nodes where the
majority of the nodes have very constrained energy and/or channel capacity.
To conserve precious resources, a routing protocol must generate control
traffic sparingly [56]. However, this is at odds with the need to quickly
propagate any new routing information to resolve routing inconsistencies
quickly.
RPL organises its topology in a Directed Acyclic Graph (DAG). An
RPL DAG must have at least one RPL root and a Destination Oriented
DAG (DODAG) is constructed for each root. The root acts as a sink for the
topology by storing all routes to all nodes in the DODAG in the routing
table. The root may also act as a border router for the DODAG to allow
nodes that belong to different DODAGs to communicate [53].
For a DODAG to be constructed, the root will need first to broadcast a
DODAG Information Object (DIO) message, discussed in detail in
Sect. 5.1.2, to all its neighbours. This DIO message will propagate through
the network. Each node that receives a DIO message will consider the
sender node a preferred parent to reach the root node until it receives
another DIO message with better metrics to reach the root from another
node [53].
The DIO message contains the DAG Metric Container option that is
used to report metrics along the DODAG. The DAG metric Container may
contain one specific metric or various numbers of metrics and constraints as
chosen by the implementer [53]. Should multiple metrics and/or constraints
be present in the DAG Metric Container, their use to determine the “best”
path can be defined by an Objective Function (OF).
The Objective Function (OF) is identified by an Objective Code Point
(OCP) within the DIO Configuration option. An OF defines how nodes
translate one or more metrics and constraints, which are themselves defined
in [55], into a value called Rank, which approximates the node’s distance
from a DODAG root in term of the number of hops it needs to reach it. An
OF also defines how nodes select parents. When a new DIO is received, the
OF that corresponds to the Objective Code Point (OCP) in the DIO is
triggered with the content of the DIO. For example, OF0 explained in
Sect. 5.3.1, is identified by OCP 0 by the Internet assigned Numbers
Authority (IANA). The Minimum Rank with Hysteresis Objective Function
(MRHOF) explained in Sect. 5.3.2, is the other Objective Function defined
by IANA and given the identifier OCP 1.
Several Objective Functions were designed in order to fulfil specific
tasks. A Destination Advertisement Object (DAO) message, for each node
receiving the DIO message, will be sent to the candidate node (DIO
message origin) with values relevant to the OF and the decision of the
preferred parent.
This Objective Function describes the Minimum Rank with Hysteresis
Objective Function (MRHOF) [57], an Objective Function that selects
routes that minimise a metric, while using hysteresis to reduce lagging in
response to small metric changes. First, it finds the minimum cost path, i.e.,
path with the minimum Rank. Second, it switches to that minimum Rank
path only if it is shorter (in terms of path cost) than the current path by at
least a given threshold. This second mechanism is called “hysteresis”.
MRHOF works with additive metrics along a route, and the metrics it uses
are determined by the metrics that the RPL Destination Information Object
(DIO) messages advertise.
MRHOF uses current minimum path cost for the cost of the path from a
node through its preferred parent to the root computed at the last parent
selection. It also uses the following parameters
MAX LINK METRIC: Maximum allowed value for the selected link
metric for each link on the path.
MAX PATH COST: Maximum allowed value for the path metric of a
selected path.
PARENT SWITCH THRESHOLD: The difference between the cost of
the path through the preferred parent and the minimum cost path in order
to trigger the selection of a new preferred parent.
PARENT SET SIZE: The number of candidate parents including the
preferred parent, in the parent set.
ALLOW FLOATING ROOT: If set to 1, allows a node to become a
floating root. A node MAY declare itself as a Floating root, and hence
have no preferred parent, depending on system configuration.
The calculation of the ETX metric is given constant selected metrics
based on [58]. The metrics are:
MAX LINK METRIC: Disallow links with greater than 4 expected
transmission counts on the selected path (Set to 512).
MAX PATH COST: Disallow paths with greater than 256 expected
transmission counts (Set to 32,768).
PARENT SWITCH THRESHOLD: Switch to a new path only if it is
expected to require at least 1.5 fewer transmissions than the current path
(Set to 192).
PARENT SET SIZE: If the preferred parent is not available, two
candidate parents are still available without triggering a new round of
route discovery (Set to 3).
ALLOW FLOATING ROOT: Do not allow a node to become a floating
root (Set to 0). If FR is 0 and no neighbours are discovered, the node
does not have a preferred parent and must set the minimum path cost to
PS.
5.3.3 ETX
The expected transmission count ETX metric discuss is based on the
number of expected transmissions required to successfully transmit and
acknowledge a packet on a wireless link. The ETX metric is commonly
used in wireless routing to distinguish between paths that require a large
number of packet transmissions from those that require a smaller number of
packet transmissions for successful packet delivery and acknowledgement
however RPL uses this metric to establish preferred parent based on the
value of the ETX metric of the link as defined in [55, 59] and make it
available for route selection. This is called ETX Objective Function (ETX).
In ETX, ETX metric allows RPL to find a minimum-ETX path from the
nodes to a root in the DAG instance. This is the minimum ETX path
between a node and the DAG root is the path (among other paths between
the source and the destination) that requires the least number of packet
transmissions per packet delivery to the DAG root. Thus, minimum-ETX
paths are generally also the most energy-efficient paths in the network.
The ETX uses the ETX metric to find the path to be used to deliver
packets in a DAG instance with the minimum number of transmission
required by using the ETX link metric to compute an ETX path metric
based on the ETX link metric of each hop and choosing paths with smallest
path ETX.
At first, the root node set the parameters to identify the smallest ETX
path for each node:
: A variable that determines the ETX path metric of the
path from a node through its preferred parent to the root computed at the
last parent selection.
: A constant that defines the
maximum ETX value that can be considered for a node to be considered
for parent selection.
Each other node in the DAG (non root) computes the ETX path metric
for a path to the root through each candidate neighbour by using the two
parameters explained below:
: A variable that identifies the ETX metric
for the link to a candidate neighbour.
: A variable that assigns a value for each
neighbour and the minimum ETX path advertised by that neighbour.
A node computes the ETX path metric for the path by comparing all the
received for each candidate neighbour. If a
neighbour ETX metric cannot be computed, it is set to infinity to avoid
selecting it and potentially having high ETX paths.
A node SHOULD compute the ETX Path metric for the path through
each candidate neighbour reachable through all interfaces. If a node cannot
compute the ETX path metric for the path through a candidate neighbour,
the node MUST NOT make that candidate neighbor its preferred parent.
If the ETX metric of the link to a neighbour is not available, the ETX
Path metric for the path through that neighbour SHOULD be set to
INFINITY. This metric value will prevent this path from being considered
for path selection, hence avoiding potentially high ETX paths.
The ETX Path metric corresponding to a neighbour MUST be re-
computed each time the ETX metric of the link to the candidate neighbour
is updated or if the a node receives a new
advertisement from the candidate neighbour.
After computing the ETX path metric for all candidate neighbours
reachable for the current DAG instance, a node selects the preferred parent.
The selection process is based on the condition that the ETX path metric
corresponding to that neighbour is smaller than the ETX path metric of all
the other neighbours.
Once the preferred parent is selected, the node sets its
variable to ETX path metric of the preferred parent.
The vale of this variable is then carried in the metric container whenever
DIO messages are sent.
6 Security
Security is a major issue in the roadmap as explained in [64] to
implementing the Internet of things mainly because it is not possible to
directly apply existing Internet-centric security mechanisms due to the
intrinsic features of WSN (e.g. the capabilities of the nodes, the bandwidth
of the wireless channel).
The purpose of those readings was to understand the standards and
protocols that are becoming the driving force for securing a large network
of sensors and small devices that will form the Internet of Things. This
security involves securing the key establishment process and the routing
discovery and establishment process.
Like any other network, the primary goals of securing the Wireless
Sensor Network are the standard security goals such as confidentiality,
integrity, authentication and availability.
Confidentiality: the ability for a message to remain confidential but
concealing it from a passive attacker. For WSN, a sensor node should not
reveal its data to its neighbours.
Authentication: the ability to ensure that the message reliable by
confirming and identifying the source of this message (origin). Data
authentication can be achieved by verifying the identity of source
through symmetric or asymmetric mechanisms.
Integrity: the ability of nodes to ensure that the message was not
tampered and modified during transmission.
Availability: the ability to use the resources and retain them for the whole
duration of the communication of messages.
Other security goals such as data freshness, self-organization and secure
localization are also of importance. Data freshness is the ability to ensure
that the message received is the most recent one and that no newer
messages were relayed. Self-organization in a network is when a node is
able to self-organize and self-heal itself when it was compromised. Secure
localization is the ability to locate accurately a node in a network.
Security challenges for the IoT and its integration within the IoT is
studied as the challenges are tightly applicable to other relevant
technologies of the IoT such as embedded systems, mobile phones and
RFID. Security Threats for IoT based on the goals mentioned above are:
Confidentiality: threats for confidentiality in IoT involves an attacker
eavesdropping and overhearing critical information such as sensing data
and routing information. Based on this the adversary may cause severe
damage since they can use the sensing data for many illegal purposes [7].
Authentication: threats for authentication in IoT involves attacks on the
network that can alter the packets. It can also inject false packets.
Another threat for IoT, is a general threat for wireless networks. The
nature of the media and the unattended nature of wireless sensor
networks make it extremely challenging to ensure authentication.
Integrity: a malicious node present in the network can inject false data.
Instability of wireless channel can cause damage or loss of data.
Achieving a self-organizing and self-healing network in IoT is
considered challenging since there is no fixed infrastructure to manage
the network. This inherent feature brings another challenge as the
damage resulting from an attack can be devastating.
Localization in Wireless sensor network is essential as a compromised
node can result for the attacker to manipulate data sending wrong
location information by reporting false signal strengths and replaying
signal.
Wireless sensor network limitations/weaknesses:
Limited resources: for wireless sensor networks, the nodes will be limited
in terms of memory, energy and processing power. Any of the security
functions that will be applied on a WSN will need to take into
consideration those issues as most of the available protocols and
standards for encryption, decryption, data signatures, and signature
verification consume memory, energy and computational power.
Highly unreliable communication medium is another limitation for the
wireless sensor networks as the nature of the communication medium can
cause latency, multi-hop routing, network congestion or even conflicts
such as collision. Unreliable transfers is another limitation where packets
can become corrupted or even discarded which results in packet loss.
This will force nodes to allocate more resources to error handling.
On most wireless sensor networks applications, node will be left
unattended and this can cause serious issues and limitation especially
when nodes are exposed to physical attacks. The network is distributed
thus if the design is not adequate, it can leave a network that is hard to
manage, inefficient and fragile.
Fig. 10 Secure RPL control message as shown in [53]. The ICMPv6 information message with a
type of 155. The code identifies the type of the RPL control messages (DIO, DAO, DIS, etc.), and the
checksum computation field that is computed for each security message
Fig. 11 Security section as shown in [53]. The level of security of the algorithm in use are indicated
in the protocol message. The algorithm field specifies the encryption type, the MAC and signature
scheme the network uses. The counter is time T that is a timestamp of security
The security variants provide integrity and replay protection as well as
optional confidentiality and delay protection. The optional confidentiality
variant is not defined in [53] however a security algorithm is proposed to
specify the encryption algorithm to be used once keys are distributed.
The main security fields shown in Figs. 10 and 11 are the Message
Authentication Codes (MAC) and signatures provide authentication over
the entire unsecured ICMPv6 RPL control message, including the Security
section with all fields defined but with the ICMPv6 checksum temporarily
set to zero. Encryption algorithm provides confidentiality of the secured
RPL ICMPv6 message that includes the cryptographic fields (MAC,
signature, etc.). In other words, the security transformation itself (e.g., the
Signature and/or Algorithm in use) will detail how to incorporate the
cryptographic fields into the secured packet. The Security Algorithm field
specifies the encryption, MAC and the signature scheme the network uses.
The cryptographic mode of operation described in [53] (Algorithm = 0) is
based on CCM and the block-cipher AES-128 defined in [67]. This mode of
operation is widely supported by existing implementations.
7 Summary
In this chapter, we defined the differences between the Wireless Sensor
Networks WSN, the Distributed Sensor Networks DSN, and the Internet of
Things IoT. The differences are mainly related to the link availability
between nodes in the network since nodes between DSN and WSN are
between each node and all its neighbours in comparison with the IoT
networks where each node form a link only with one preferred neighbour
based on certain variables.
We introduced the IoT 6LoWPAN concept that defines how the Internet
Protocol can be used in the context of the Internet of Things and researched
the routing power for loss networks RPL and explained how it works and
the various objective functions that can be used and the security measures
that are incorporated within it.
We finally discussed the threats and vulnerabilities that IoT nodes and
networks are vulnerable to and researched different key distribution
schemes that are available and how each of them is used in the context of
the IoT.
References
1. Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In:
Proceedings of the 9th ACM CCS. ACM, New York, USA, pp 41–47
2.
Henry KJ (2015) Secure protocols for key pre-distribution, network discovery, and aggregation
in wireless sensor networks
3.
Mulligan G (2010) The 6LoWPAN architecture, p 78
4.
IEEE Computer Society (2011) 802.15.4 low rate wireless personal area networks (LR-WPANs)
5.
Siller M, Carlos-Mancilla M, López-Mellado E (2016) Wireless sensor networks formation:
approaches and techniques. J Sens 2016
6.
Bellavista P, Cardone G, Corradi A, Foschini L (2013) Convergence of MANET and WSN in IoT
urban scenarios. IEEE Sens J 13(10):3558–3567
[Crossref]
7.
Joby PP, Sengottuvelan P (2015) A survey on threats and security schemes in wireless sensor
networks
8.
Makhdoom I, Abolhasan M, Lipman J, Liu RP, Ni W (2019) Anatomy of threats to the internet of
things. IEEE Commun Surv Tutor 21(2):1636–1675
[Crossref]
9.
Grammatikis PIR, Sarigiannidis PG, Moscholios ID (2019) Securing the internet of things:
challenges, threats and solutions. Internet Things 5:41–70
10.
Borgohain T, Kumar U, Sanyal S (2015) Survey of security and privacy issues of internet of
things
11.
Poudel S (2016) Internet of things: underlying technologies, interoperability, and threats to
privacy and security. Berkeley Technol Law J 31(2):997–1022
12.
Drăgoi V, Richmond T, Bucerzan D, Legay A (2018) Survey on cryptanalysis of code-based
cryptography: from theoretical to physical attacks. In: 2018 7th international conference on
computers communications and control (ICCCC), pp 215–223
13.
Surendran S, Nassef A, Beheshti BD (2018) A survey of cryptographic algorithms for IoT
devices. In: 2018 IEEE long island systems, applications and technology conference (LISAT), pp
1–8
14.
Abomhara M, Køien GM (2014) Security and privacy in the internet of things: current status and
open issues. In: 2014 international conference on privacy and security in mobile systems
(PRISMS), pp 1–8
15.
Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun
Surv Tutor 11(2):52–73
[Crossref]
16.
Bysani LK, Turuk AK (2011) A survey on selective forwarding attack in wireless sensor
networks. In: 2011 international conference on devices and communications (ICDeCom), pp 1–5
17.
Choudhary S, Kesswani N (2018) Detection and prevention of routing attacks in internet of
things. In: 2018 17th IEEE international conference on trust, security and privacy in computing
and communications/12th IEEE international conference on big data science and engineering
(TrustCom/BigDataSE), pp 1537–1540
18.
Raoof A, Matrawy A, Lung C (2019) Secure routing in IoT: Evaluation of RPL’s secure mode
under attacks. In: 2019 IEEE global communications conference (GLOBECOM), pp 1–6
19.
Yang W, Wang Y, Lai Z, Wan Y, Cheng Z (2018) Security vulnerabilities and countermeasures in
the RPL-based internet of things. In: 2018 international conference on cyber-enabled distributed
computing and knowledge discovery (CyberC), pp 49–495
20.
Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based
internet of things. Int J Distrib Sens Netw 9(8):794326
[Crossref]
21.
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of
things. Int J Netw Secur 18(3):459–473
22.
Le A, Loo J, Lasebae A, Vinel A, Chen Y, Chai M (2013) The impact of rank attack on network
topology of routing protocol for low-power and lossy networks. IEEE Sens J 13(10):3685–3692
[Crossref]
23.
Rehman A, Khan MM, Lodhi MA, Hussain FB (2016) Rank attack using objective function in
RPL for low power and lossy networks. In: 2016 international conference on industrial
informatics and computer systems (CIICS), pp 1–5
24.
Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans
Emerg Top Comput 5(4):586–602
[Crossref]
25.
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-
of-things. IEEE Internet Things J 4(5):1250–1258
[Crossref]
26.
Nagrath P, Gupta B (2011) Wormhole attacks in wireless adhoc networks and their counter
measurements: a survey. In: 2011 3rd international conference on electronics computer
technology, vol 6, pp 245–250
27.
Perazzo P, Vallati C, Varano D, Anastasi G, Dini G (2018) Implementation of a wormhole attack
against a RPL network: challenges and effects. In: 2018 14th annual conference on wireless on-
demand network systems and services (WONS), pp 95–102
28.
Granjal J, Monteiro E, Sá Silva J (2015) Security for the internet of things: a survey of existing
protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312
29.
Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the
internet of things. Ad Hoc Netw 32:17–31. Internet of things security and privacy: design
methods and optimization
30.
Ahmed N, Sadiq A, Farooq A, Akram R (2017) Securing the neighbour discovery protocol in
IPv6 stateful address auto-configuration. In: 2017 IEEE trustcom/BigDataSE/ICESS, pp 96–103
31.
Ahmed ASAMS, Hassan R, Othman NE (2017) IPv6 neighbor discovery protocol specifications,
threats and countermeasures: a survey. IEEE Access 5:18187–18210
32.
Sudhakar, Aggarwal RK (2017) A survey on comparative analysis of tools for the detection of
ARP poisoning. In: 2017 2nd international conference on telecommunication and networks
(TEL-NET), pp 1–6
33.
Chen B, Ho DWC, Hu G, Yu L (2018) Secure fusion estimation for bandwidth constrained
cyber-physical systems under replay attacks. IEEE Trans Cybern 48(6):1862–1876
[Crossref]
34.
Hoehn A, Zhang P (2016) Detection of replay attacks in cyber-physical systems. In: 2016
American control conference (ACC), pp 290–295
35.
Hu Q, Hancke GP (2017) A session hijacking attack on physical layer key generation agreement.
In: 2017 IEEE international conference on industrial technology (ICIT), pp 1418–1423
36.
Lu Z, Chen F, Cheng G, Li S (2017) The best defense strategy against session hijacking using
security game in SDN. In: 2017 IEEE 19th international conference on high performance
computing and communications; IEEE 15th international conference on smart city; IEEE 3rd
international conference on data science and systems (HPCC/SmartCity/DSS), pp 419–426
37.
Celebucki D, Lin MA, Graham S (2018) A security evaluation of popular internet of things
protocols for manufacturers. In: 2018 IEEE international conference on consumer electronics
(ICCE), pp 1–6
38.
John R, Cherian JP, Kizhakkethottam JJ (2015) A survey of techniques to prevent Sybil attacks.
In: 2015 international conference on soft-computing and networks security (ICSNS), pp 1–6
39.
Zhang K, Liang X, Lu R, Shen X (2014) Sybil attacks and their defenses in the internet of things.
IEEE Internet Things J 1(5):372–383
[Crossref]
40.
Genkin D, Valenta L, Yarom Y (2017) May the fourth be with you: a microarchitectural side
channel attack on several real-world applications of curve25519. In: Proceedings of the 2017
ACM SIGSAC conference on computer and communications security, CCS’17. Association for
Computing Machinery, New York, NY, USA, pp 845–858
41.
Aggarwal R, Lal Das M (2012) RFID security in the context of “internet of things”, pp 51–56
42.
Special issue on “security and identity architecture for the future internet” (2013) Comput Netw
57(10):2215–2217
43.
Ahmadi P, Islam K, Maco T, Katam M (2018) A survey on internet of things security issues and
applications. In: 2018 international conference on computational science and computational
intelligence (CSCI), pp 925–934
44.
Miraz MH, Ali M, Excell PS, Picking R (2015) A review on internet of things (IoT), internet of
everything (IoE) and internet of nano things (IoNT). In: 2015 internet technologies and
applications (ITA), pp 219–224
45.
Shelby Z, Bormann C (2007) 6LoWPAN: the wireless embedded internet, 1st edn. Wiley
46.
Honggang Z, Chen S, Leyu Z (2018) Design and implementation of lightweight 6LoWPAN
gateway based on contiki. In: 2018 IEEE international conference on signal processing,
communications and computing (ICSPCC), pp 1–5
47.
Kamma PK, Palla CR, Nelakuditi UR, Yarrabothu RS (2016) Design and implementation of
6LoWPAN border router. In: 2016 thirteenth international conference on wireless and optical
communications networks (WOCN), pp 1–5
48.
Janicijević N, Lukić M, Mezei I (2011) Routing protocol for low-power and lossy wireless
sensor networks. In: 2011 19th telecommunications forum (TELFOR) proceedings of papers, pp
234–237
49.
Montenegro G, Kushalnagar N et al (2007) Transmission of IPv6 packets over IEEE 802.15.4
networks. RFC 4944, Sept 2007
50.
Conta A, Deering S, Gupta M (2006) Internet control message protocol (ICMPv6) for the
internet protocol version 6 (IPv6) specification. RFC 4443
51.
Deering SE, Hinden RM (1998) Internet protocol, version 6 (IPv6) specification. RFC 2460, Dec
1998
52.
Hui J, Thubert P (2011) Compression format for IPv6 datagrams over IEEE 802.15.4-based
networks. RFC 6282, Sept 2011
53.
Winter T, Thubert P et al (2012) RPL: IPv6 routing protocol for low-power and lossy networks.
RFC 6550, Mar 2012
54.
Thubert P (2012) Objective function zero for the routing protocol for low-power and lossy
networks (RPL). RFC 6552, Mar 2012
55.
Vasseur JP, Kim M et al (2012) Routing metrics used for path calculation in low-power and lossy
networks. RFC 6551, Mar 2012
56.
Kushalnagar N, Montenegro G, Schumacher C (2007) IPv6 over low-power wireless personal
area networks (6LoWPANs): overview, assumptions, problem statement, and goals. RFC 4919,
Aug 2007
57.
Gnawali O, Levis P (2012) The minimum rank with hysteresis objective function. RFC 6719,
Sept 2012
58.
Hui JW et al (2008) IP is dead, long live IP for wireless sensor networks. In: Proceedings of the
6th ACM conference SenSys. ACM, New York, USA, pp 15–28
59.
Gnawali O, Levis P (2010) The ETX objective function for RPL. RFC 6719, May 2010
60.
Qasem M, Al-Dubai A, Romdhani I, Ghaleb B, Gharibi W (2017) Load balancing objective
function in RPL. Draft IETF
61.
Qasem M, Al-Dubai A, Romdhani I, Ghaleb B, Gharibi W (2016) A new efficient objective
function for routing in internet of things paradigm. In: 2016 IEEE conference on standards for
communications and networking (CSCN), pp 1–6
62.
Papadopoulos G, Dujovne D, Montavont N, Koutsiamanis R (2018) Traffic-aware objective
function. Draft IETF
63.
Ji C, Koutsiamanis R, Montavont N, Chatzimisios P, Dujovne D, Papadopoulos GZ (2018)
TAOF: traffic aware objective function for RPL-based networks. In: 2018 global information
infrastructure and networking symposium (GIIS), pp 1–5
64.
Roman R, Lopez J (2009) Integrating wireless sensor networks and the internet: a security
analysis. Internet Res 19:246–259
65.
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of
things. Int J Netw Secur 18(3):459–473
66.
Tsao T, Alexander R, Dohler M, Daza V, Lozano A, Richardson M (2015) A security threat
analysis for the routing protocol for low-power and lossy networks (RPLs). RFC 7416, Jan 2015
67.
Housley R, Ferguson N, Whiting D (2003) Counter with CBC-MAC (CCM). RFC 3610, Sept
2003
68.
Chan H, Perrig A, Song D (2004) Key distribution techniques for sensor networks. Springer US,
Boston, MA, pp 277–303
69.
Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In:
2003 symposium on security and privacy, 2003, pp 197–213
70.
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in
distributed internet of things. Comput Netw 57(10):2266–2279
[Crossref]
71.
Raza S, Duquennoy S, Höglund J, Roedig U, Voigt T (2014) Secure communication for the
internet of things—a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun
Netw 7(12):2654–2668
[Crossref]
72.
Varadarajan P, Crosby G (2014) Implementing IPsec in wireless sensor networks. In: 2014 6th
international conference on new technologies, mobility and security (NTMS), pp 1–5
73.
Healy M, Newe T, Lewis E (2008) Analysis of hardware encryption versus software encryption
on wireless sensor network motes. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 3–14
74.
Liu D, Ning P, Du W (2008) Group-based key pre-distribution in wireless sensor networks. ACM
Trans Sens Netw (TOSN) 4(2):11–20
75.
El Mouaatamid O, Lahmer M, Belkasmi M (2021) A review on key pre-distribution schemes
based on combinatorial designs for internet of things security. Int J Eng Appl Phys 1(1):1–8
76.
Camtepe SA, Yener B (2007) Combinatorial design of key distribution mechanisms for wireless
sensor networks. IEEE/ACM Trans Netw 15(2):346–358
[Crossref][zbMATH]
77.
Huang Q, Cukier J, Kobayashi H, Liu B, Zhang J (2003) Fast authenticated key establishment
protocols for self-organizing sensor networks. In: Proceedings of the 2nd ACM international
conference on wireless sensor networks and applications, WSNA’03. Association for Computing
Machinery, New York, NY, USA, pp 141–150
78.
Lee J, Stinson DR (2005) Deterministic key predistribution schemes for distributed sensor
networks. In: Handschuh H, Hasan MA (eds) Selected areas in cryptography. Springer Berlin
Heidelberg, Berlin, Heidelberg, pp 294–307
79.
Liu D, Ning P (2004) Multilevel tesla: broadcast authentication for distributed sensor networks.
ACM Trans Embed Comput Syst 3(4):800–836
[Crossref]
80.
Paterson MB, Stinson DR (2011) A unified approach to combinatorial key predistribution
schemes for sensor networks. Cryptology ePrint archive, report 2011/076
81.
Yener B, Camtepe SA (2005) Key distribution mechanisms for wireless sensor networks: a
survey. Technical report TR-05-07
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_2
Hamid Jahankhani
Email: Hamid.jahankhani@northumbria.ac.uk
Abstract
The proliferation of technology is now exponential. Developments in
technology, the increase in computer power and the reduction of cost, has
allowed for greater accessibility, use and implementation of this technology
in all sectors and industries. The evolution of smart and autonomous
technologies, such as artificial intelligence and machine learning, has
enabled traditionally labour intensive data analytical tasks to be conducted,
quickly and efficiently. Multiple datasets and data lakes that have been
siloed, are now being utilised and interconnected. Digital twin, AI,
metaverse, virtual technologies are being immersed into all sectors and
more importantly merged into humans where the line between reality and
virtual are seeming to be the same. However, in order to succeed utilising
these amazing and emerging technologies, it means that there has to be an
incredible backbone and capacity to carry data; and instantaneously
delivery at high speed and securely. 5G is already in its rollout and has to
achieve its objectives in order for 6G to be fully onboarded and
implemented in a methodical manner. The European Commission has 5G
objectives and is applying funding for strategic initiatives, such as Horizon
2020. There are huge benefits for all with 5G/6G but only if they are
implemented in a manner that decreases the risk they can pose to security,
privacy and trust, which are core pillars that must be maintained. Smart
cities will mean the data that is being collected can be analysed and in the
wrong hands it poses security risks to the data/individual/nation. With such
an intertwining of technologies interacting with humans and the abundance
of IoT and eIoT in smart cities, there has to be a clear governance plan in
place and way to manage 5G/6G to ensure success. This chapter explains
the 5G/6G background, risks, benefits and highlights the need for robust
governance.
1 Introduction
It is imperative that with a foreseen utilisation and implementation of smart
and automated systems within infrastructure and services, that consideration
is taken to ensure the privacy and technology of these mechanisms and
systems. Smart technologies, automated systems, and IoT are all dependant
on data utilisation and with 5G/6G as the backbone of their functionality
and being the carrier of the data. Securing both the communications
mechanisms and the technologies themselves are key to their safe and
secure implementation. It is also critical that such methodology, privacy and
security frameworks are utilised to enable and instil trust in the use of these
technologies, which whilst it will be critical in smart infrastructure, will
also be pervasive in both nature and scope of use.
5G Technology
5G is designed to be a cutting-edge technology and needed if the systems
are to be smart enabled and undertake the range of emerging technologies.
It is designed to allow long-distance coverage and stable connections as
well as rapid data download and upload. As a result of 5G’s wireless-based
technology, the data migration enables a speed of 20 Gbps (Gigabyte per
second) through wireless broadband connections, which simplifies the
management of excessive data transmission via 5G.
However, the aspect of security and the overall intelligent connectivity
system presents questions around social, technical and legal aspects. As a
result, it is essential for the 5G/6G network to become a reliable and a well-
developed technology, to assure safety against vicious cyberattacks and
misuse of any kind.
One of the core parts of 5G networks is millimeter wave communication
technology and offers wireless data transfer by settling for a higher
bandwidth. However, the issue which arises from this technological concept
is that the transmission distance of this particular wave is known to be
limited to 100 m into the atmosphere, with regards to its deterioration,
while the transmission is in progress. Ultimately, millimeter waves show a
disadvantage in comparison to other wave types, which results in a fair
transmission coverage.
The selection of frequency is essential in the sense that previous mobile
technologies mainly used the lower frequency band. Therefore, 5G is
expected to use higher frequencies within the frequency bands. However,
higher frequencies decay faster than lower frequency and is comparatively
more sensitive to signal losses.
If both, a lower frequency antenna and a higher frequency (HF) antenna
were to transmit data at the same power/speed/data rate, the HF antenna
would have a low area coverage, whereas lower frequency has not. As a
result, users get higher data rates if the cell size is small. One essential part
of 5G’s architecture are small cells. Small cells are defined as “low-power
wireless access points that operate in licensed spectrum” ([1], p. 64).
In order to serve high-dense urban locations with characteristic
properties, such as number of users demanding high data rate capacities,
small cells represent an alternative solution resulting in complementing the
existing mobile network and densifying the network in crowded areas, such
as hotspots (IZMF, n.d.). Also, Edfors et al. [3], support the general idea of
deploying small cells to promote network densification, by overlooking
numerous isolated base stations (BS) and achieve a non-homogeneous
network architecture.
As a result, small cells are considered to satisfy the architectural
requirements for the 5G cellular network. Ge et al. [4] state that in order for
the 5G mobile network to be significantly reliant, the number of 5G base
stations (BS) need to increase between 40 and 50 base stations per km2, that
is when Ge et al. ([4], p. 72) call 5G an “ultra-dense cellular network”.
Rodriguez [1] concluded that small cells offer an improvement in many
applicative fields, such as in urban and rural areas and in applications for
companies and homes, as well as an enrichment of provision in cellular
capacity and coverage.
6G Technology
6G networks are the next generation of mobile communication technology,
and will bring about significant improvements in terms of speed, capacity,
and coverage, as well as a host of new capabilities such as immersive
virtual and augmented reality experiences and ultra-reliable low-latency
communication. But it also brings new challenges related to trust, security,
and privacy. Trust is essential for ensuring the safety of the intertwined
physical and digital worlds in 6G networks. Security is also crucial as the
economy and society become more dependent on IT and networks. Privacy
is a major concern as there is currently no way to determine when linked
data becomes personally identifiable. These challenges are
multidisciplinary, requiring solutions in technology, regulation, and ethics.
Addressing these challenges are essential for the successful deployment and
adoption of 6G networks [5]. Hence, a solid governance wide approach
should be catered for both 5G and 6G.
The development of 6G technology also presents a number of technical
challenges that need to be addressed in order to make it a reality. The
following explains some of these key aspects of 6G technology:
5 Conclusion
Since the introduction of mobile/wireless communications, internet, devices
and IoT, the need for 5G/6G adoption and its roll-out in a safe and secure
manner, is becoming increasingly important. Humans are now experiencing
very high levels of interaction with technology that has not been seen
before and it is only set to increase and be further connected; in a way that
presents more humanoid interconnected interactions. Both organisations
and individuals know that data is extremely important and safeguarding it
needs to have very disciplined controls and governance that has the
monitoring and checks that would be expected. Whilst the use of AI, digital
twin, virtual reality and other tools are there to assist and support analysing
these huge data sets, they also have the capacity to allow data to fall into the
wrong hands or be passed onto third parties that may make prejudgements
on individuals without their knowledge. It can be further complicated with
recent acceleration of satellite communications, technologies and its
interaction with all other traditional systems (of which 5G/^G will be part
of). What was once more military/government controlled launching of
satellites into high earth orbit (HEO) is now experiencing thousands of
satellites being launched by commercial companies into low earth orbit
(LEO). That raises very concerning questions on how these will interact
with 6G networks, and where the data will be located. If we consider what
governance method is being applied here, and presents a rather large
question mark on where the control, access, monitoring and security
responsibilities lie.
Clearly the acceleration of emerging technologies is needed as to help
support humans living now and in the future, with increasing population
size and diminishing resources. We will need these ‘smart’ technologies and
its computational power. But what is also needed is that sense of traditional
discipline and governance frameworks that encompasses end-to-end the
activity on 6G networks and how the data is treated and ensure it is secure,
respect its privacy but not hinder the advancement of the benefits 6G will
bring to all. A difficult balance to maintain, but necessary.
References
1. Rodriguez J (2015) Fundamentals of 5G mobile networks, 1st edn. Wiley, Chichester/West
Sussex
[Crossref]
2.
Al-Dulaimi A, Chih-Lin I, Wang X (2018) 5G networks: fundamental requirements, enabling
technologies, and operations management. 1st edn. New Jersey: Wiley
3.
Edfors O, Larsson E-G, Marzetta T-L, Tufvesson F (2014) Massive MIMO for next generation
wireless systems. IEEE Commun Mag, pp 186–195
4.
Ge X, Mao G, Han T, Tu S, Wang C-X (2016) 5G ultra-dense cellular networks. In: IEEE
wireless communications. 23(1):72–79
5.
Ylianttila M et al 6g white paper: research challenges for trust, security and privacy. arXiv:2004.
11665
6.
Shlezinger N et al (2021) Dynamic metasurface antennas for 6G extreme massive MIMO
communications. IEEE Wirel Commun 28(2):106–113
7.
Rajatheva et al (2020) White paper on broadband connectivity in 6G.
arXiv:2004.14247v1[eess.SP]. https://arxiv.org/abs/2004.14247
8.
Chen M et al (2019) Artificial neural networks-based machine learning for wireless networks: a
tutorial. IEEE Commun Surv Tutorials 21(4):3039–3071
9.
Khan LU et al (2020) Network slicing: recent advances, taxonomy, requirements, and open
research challenges. IEEE Access 8:36009–36028. https://doi.org/10.1109/ACCESS.2020.
2975072
10.
Giordani M et al (2020) Toward 6G networks: use cases and technologies. In: IEEE
communications magazine 58(3):55–61. https://doi.org/10.1109/MCOM.001.1900411
11.
Nayak S, Patgiri R (2020) 6G communication: envisioning the key issues and challenges. arXiv:
2004.04024
12.
Jagannath A, Jagannath J, Melodia T (2021) Redefining wireless communication for 6G: signal
processing meets deep learning with deep unfolding. IEEE Trans Artif Intell 2(6):528–536.
https://doi.org/10.1109/TAI.2021.3108129
13.
Yue C et al (2022) Efficient decoders for short block length codes in 6G URLLC. arXiv:2206.
09572
14.
European Commission (2021) Shaping Europe’s digital future: 5G. https://digital-strategy.ec.
europa.eu/en/policies/5g. Accessed 19 Jan 2023
15.
IEEE (2018) IEEE standards association: IEEE standards activities in 5G”. Available at https://
standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/5G.pdf. Accessed
18 Aug 2019
16.
GSMA (2019) Intelligent connectivity: how the combination of 5G, AI, big data and IoT is set to
change everything. Available at https://www.gsma.com/IC/wp-content/uploads/2019/02/22209-
Intelligent-connectivity-report.pdf. Accessed 19 Jan 2023
17.
Seeburn K (2019) 5G and AI: a potentially potent combination. Available at http://www.isaca.
org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=1146#Comments. Accessed 20 Jan 2023
18.
Drechsler et al (2020) At the crossroads between digital innovation and digital transformation.
https://www.researchgate.net/publication/341412594_At_the_Crossroads_between_Digital_
Innovation_and_Digital_Transformation. Accessed 20 Jan 2023
19.
Kokolek et al (2019) Data protection in the EU. https://commission.europa.eu/law/law-topic/
data-protection/data-protection-eu_en https://commission.europa.eu/law/law-topic/data-
protection/data-protection-eu_en
20.
Forradellas R, Gallastegui L (2021) Digital transformation and artificial intelligence applied to
business: legal regulations, economic impact and perspective. https://www.mdpi.com/2075-
471X/10/3/70. Accessed 19 Jan 2023
21.
Fedrecheski G et al (2020) Self-sovereign identity for IoT environments: a perspective. In: 2020
global internet of things summit (GIoTS). IEEE
22.
Harper KE, Ganz C, Malakuti S (2019) Digital twin architecture and standards. IIC J Innov
12(2019):72–83
23.
Bhowmik D, Feng T (2017) The multimedia blockchain: a distributed and tamper-proof media
transaction framework. In: 2017 22nd international conference on digital signal processing
(DSP). IEEE
24.
Bakre A, Patil N, Gupta S (2017) Implementing decentralized digital identity using blockchain.
Int J Eng Technol Sci Res 4(10):379–385
25.
Yaqoob I et al (2020) Blockchain for digital twins: recent advances and future research
challenges. IEEE Netw 34(5):290–298
26.
Vast R et al (2021) Artificial intelligence based security orchestration, automation and response
system. In: 2021 6th international conference for convergence in technology (I2CT). IEEE
27.
Ahmad I, Gurtov A, Kumar T, Liyanage M, Okwuibe J, Ylianttila M (2017) [online] Available at
http://jultika.oulu.fi/files/nbnfi-fe201902124647.pdf. Accessed 23 Jan 2023
28.
Yesuf AS (2017) A review of risk identification approaches in the telecommunication domain.
https://www.researchgate.net/publication/314392917_A_Review_of_Risk_Identification_
Approaches_in_the_Telecommunication_Domain [PDF] In: Conference paper. Conference: the
3rd international conference on information systems security and privacy—ICISSP. Accessed 20
Jan 2023
29.
Reuters (2017) Cyberattack hits 200,000 in at least 150 countries: Europol https://www.reuters.
com/article/us-cyber-attack-europol-idUSKCN18A0FX. Accessed 20 Jan 2023
30.
Brewster T (2017) How hackers broke equifax: exploiting a patchable vulnerability. forbes.
https://www.forbes.com/sites/thomasbrewster/2017/09/14/equifax-hack-the-result-of-patched-
vulnerability/?s h=ce0ddce5cda4. Accessed 20 Jan 2023
31.
Wang A (2018) ‘I’m in your baby’s room’: a hacker took over a baby monitor and broadcast
threats, parents say. Washington Post. https://www.washingtonpost.com/technology/2018/12/20/
nest-cam-baby-monitor-hacked-kidnap-threat-came-device-parents-say/
32.
Shu X et al (2017) Breaking the target: an analysis of target data breach and lessons learned.
arXiv preprint. https://arxiv.org/pdf/1701.04940.pdf. Accessed 20 Jan 2023
33.
Gara T, Warzel C (2014) A look through the sony pictures data hack: this is as bad as it gets.
BuzzfeedNews. https://www.docketalarm.com/cases/PTAB/CBM2015-00030/Covered_
Business_Method_Patent_Review_of_U.S._Pat._6321201/03-10-2015-Patent_Owner/Exhibit-
2002-Exhibit_2002___A_Look_Through_The_Sony_Pictures_Data_Hack___BuzzFeed_News/
34.
SDxCentral (2019) What are the top 5G security. Challenges”. Available at https://www.
sdxcentral.com/5g/definitions/top-5g-security-challenges/. Accessed 17 Aug 2019
35.
Zhang Y (2018) Network function virtualization concepts and applicability in 5G networks, 1st
edn. Wiley, New Jersey
[Crossref]
36.
Condoluci M, Mahmoodi T (2018) Softwarization and virtualization in 5G mobile networks:
benefits, trends and challenges. Comput Netw 146(1):65–84
[Crossref]
37.
Huawei (2018) 5G security: forward thinking Huawei white paper. Available at https://www.
huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf. Accessed 19 Jan 2023
38.
Calder A, Watkins S (2015) IT governance: an international guide to data security and
ISO27001/ISO27002, 6th edn. Kogan Page, London
39.
Miller L (2016) IoT security for dummies, inside secure edition, 1st edn. John Wiley & Sons,
Chichester/West Sussex
40.
Blum JJ, Lawson-Jenkins K, Hoffman L-J (2006) Trust beyond security: An expanded trust
model. Commun ACM 49(7):95–101
41.
Fogg BJ, Tseng S (1999) Credibility and computing technology. Commun ACM 42(5):39–44
[Crossref]
42.
GOV.UK (2022) Cyber Security Breaches Survey 2022. https://www.gov.uk/government/
statistics/cyber-security-breaches-survey-2022/cyber-security-breaches-survey-2022#chapter-5-
incidence-and-impact-of-breaches-or-attacks https://www.ncsc.gov.uk/news/data-breach-500m-
yahoo-accounts https://hoteltechreport.com/news/marriott-data-breach. Accessed 19 Jan 2023
43.
Confessore N (2018) Cambridge analytica and facebook: the scandal and the fallout so far
https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html.
Accessed 19 Jan 2023
44.
Aïmeur E, Schőnfeld D (2011) The ultimate invasion of privacy: identity theft. In: 2011 ninth
annual international conference on privacy, security and trust. IEEE. https://www.nytimes.com/
2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html Accessed 23 Jan 2023
45.
Privacy International (2017) 101: data protection. https://privacyinternational.org/explainer/41/
101-data-protection. Accessed 23 Jan 2023
46.
Masombuka M, Grobler M, Watson B (2018) Towards an artificial intelligence framework to
actively defend cyberspace. In: European conference on cyber warfare and security. Academic
conferences international limited. https://search.proquest.com/openview/f6ccddd62973bd89
da756a6c4f7272f0/1?pq-origsite=gscholar&cbl=396497&casa_token=fefF24OzjlcAAAAA:
lW8TZptX9KGeshqbVXXBk1MBmrm0zyKHj5mmY62oPWdizJiYTe0WcDk4RMFtG2P0
ZsuzdvAtZBo
47.
Babiceanu RF, Seker R (2023) Big data and virtualization for manufacturing cyber-physical
systems: a survey of the current status and future outlook. Computers in industry 81:128–137.
https://www.sciencedirect.com/science/article/pii/S0166361516300471?casa_token=
S59wxZXqps8AAAAA:SudkZGNExVlneS0cwzOiJPq3T6peQI63_K3I1fFNKuIkNz4hh
laAt4IKbxWnjFT9WBwX37vxlII. Accessed 22 Jan 2023
48.
Hicks A et al (2019) Global mapping of citizen science projects for disaster risk reduction.
Frontiers Earth Sci 7:226. https://doi.org/10.3389/feart.2019.00226/full. Accessed 19 Jan 2023
49.
ISO/IEC (2022) https://www.iso.org/standard/82875.html
50.
NIST (2018) https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
51.
ISO (2019) https://www.iso.org/standard/75106.html
52.
BS (2007) https://knowledge.bsigroup.com/products/business-continuity-management-
specification-1/standard
53.
Schlehahn E (2020) Cybersecurity and the state. The ethics of cybersecurity. Springer, Cham,
205–225
54.
Eltringham M (2017) UK organisations remain unprepared to deal with effects of cyber attack.
UK organisations remain unprepared to deal with effects of cyber attack—Workplace Insight.
Accessed 19 Jan 2023
55.
Caulkins B, Marlowe T, Reardon A (2018) Cybersecurity skills to address today’s threats. In:
Ahram T, Nicholson D (eds) Advances in human factors in cybersecurity, AHFE 2018. Advances
in intelligent systems and computing, pp 782–788. https://doi.org/10.1007/978-3-319-94782-2_
18
56.
Panda A, Bower A (2020) Cyber security and the disaster resilience framework. Int J Disaster
Resilience Built Environ 11(4):507–518
[Crossref]
57.
Goodwin C et al (2015) A framework for cybersecurity information sharing and risk reduction.
Microsoft
58.
Landry BJL, Koger MS (2006) Dispelling 10 common disaster recovery myths: Lessons learned
from hurricane katrina and other disasters. J Educ Resour Comput (JERIC) 6(4):6-es
59.
Hyslop M (2007) Comments on standards in information security, disaster recovery, business
continuity and business resilience. Crit Inf Infrastruct Resilience Prot (2007):94–144
60.
Schmidt CG, Wagner SM (2019) Blockchain and supply chain relations: a transaction cost theory
perspective. J Purch Supply Manag 25(4):100552
[Crossref]
61.
Pickles J, Zhu S (2013) The California transparency in supply chains act. SSRN Electron J.
https://doi.org/10.2139/ssrn.2237437
[Crossref]
62.
Cheung K-F, Bell MGH, Bhattacharjya J (2021) Cybersecurity in logistics and supply chain
management: an overview and future research directions. Transp Res Part E Logistics Transp
Rev 146:102217. https://doi.org/10.1016/j.tre.2020.102217
[Crossref]
63.
Kendzierskyj et al (2021) Cyber security and supply chain management, pp 147–174. https://doi.
org/10.1142/9789811233128_0007. Accessed 22 Jan 2023
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_3
Sufian Yousef
Email: Sufian.Yousef@aru.ac.uk
Abstract
This paper aim to establish gesture control of robotic arm utilizing long
range (LoRa) technology to enhance the signal’s range while facilitating
low power consumption which is achievable because the device is in
continuous sleep mode and only activates when it needs to send a message.
This paper was carried out by constructing a hand sensing glove with
sensors and accelerometer to send signals to the robotic arm, incorporating
the LoRa technology as the transmission module for transferring the signal
and programming a microcontroller that processes sensor data and direct
robotics arm movement. This technology has been adopted in IoT
applications and found relevance when facilitating long range, low power
consumption, and low cost. Notwithstanding, the shortcomings of this
technology is discussed briefly in this paper. The goal of this study is to
build gesture control of a robotic arm using long range (LoRa) technology
to increase signal range while allowing for low power consumption, which
is possible because the device is in continuous sleep mode and only
activates when a message needs to be sent. This paper was completed by
building a hand sensing glove with sensors and an accelerometer to deliver
signals to a robotic arm, using LoRa technology as the signal transmission
module, and developing a microcontroller that interprets sensor data and
directs robotic arm movement. This technology has been used in IoT
applications and has proven useful in enabling extended range, low power
consumption, and low cost. Nonetheless, the drawbacks of this technique
are briefly highlighted in this paper.
1 Introduction
The human way of doing things has been made simpler by technological
advancements, which has greatly accelerated and improved productivity.
The creation of the robotic arm is one instance where this has been
demonstrated to be true. Robotic arms have been utilized extensively to
accomplish more work in a given amount of time or in circumstances where
human life may be at danger [31].
One method of controlling a robotic arm is by using gestures [7]. A
gesture controlled robotic arm is a type of robot that works based on signals
supplied by human hand gestures. It moves and executes a task based on
human hand gestures, thus mimicking the motion of the human hand [31,
37]. Gesture controlled robotic arms are currently being used in military
operations and industrial processes. With the development of IoT, they have
found use in the medical field, allowing surgeons to do procedures from a
distance by wirelessly directing a robotic arm [34, 39].
A transceiver system, which allows a transmitter from the human
operator end to transmit a signal and a receiver linked to the robotic arm to
receive it, is used to control a robotic arm via gestures. At the transmitting
end, the human operator dons a sensor glove equipped with an
accelerometer that picks up the hand’s pattern of motion and sends the
signals to the robotic arm’s receiver. Depending on the user's motion, a
microprocessor at the receiving end interprets the transmitted sensors
signals from the glove and instructs the servos on the robotic arm to
respond appropriately [37]. Wireless communication is utilised in the
exchange of information between the transmitting and receiving systems.
Several wireless transmission technologies have been utilized to enable
transmission and reception of information between the transmitting and
receiving systems in order to achieve gesture control of a robotic arm. For
instance, wireless communication technologies like infrared, Bluetooth,
WiFi, and Zigbee have been used. However, these communication
technologies are limited to short-range communication, with their
maximum range being less than 100 m [21, 25, 33]. They also require
considerable amount of power to be able to operate (within the range of 10–
100 mW) [25]. But there are some operations that involve long-range
activities requiring a significantly wider range of control. Activities such as
bomb defusing, painting and welding in hazardous environments and rescue
operation from disastrous occurrences (e.g. fire, collapsed buildings, natural
disasters, floods, etc.) require more distance between the operator and the
robotic arm to ensure safety. There are also certain operations that require
long-range transmission in areas where consistent access to power will not
be possible and in areas with no power supply. Therefore, how can long-
range communication be carried out with minimal power consumption in
such situations?
The LoRa transceiver is a system that incorporates a wireless
transmission with a longer range spanning over 15 km in the countryside
and up to 5 km in the city than the aforementioned communication
technologies and requires very minimal power consumption. As a result, it
is a great choice for long-distance activities [3], Semtech [28, 35]. A typical
LoRa transceiver requires a maximum transmitting power of + 14 dBm
[25]. Hence, the LoRa technology will be very useful in situations that
require a long-range transmission with a limited power supply.
2 Literature Review
2.1 Gesture Control of Robotic Arm Using Infrared
On the subject of “Controlling a Robotic Arm via gesture using Leap
Motion,” [20] published an article in the “Indian Journal of Science and
Technology.” To detect the movement of a human hand, the device uses a
leap motion controller. The sensor, leap motion can recognize a human hand
within a 1 mm range in 300 s using 3D coordinates (X, Y, and Z). Two
monochromatic infrared (IR) cameras that detect heat emitted by human
hands and three IR LEDs that identify the hand’s structure were used by the
authors to build their system. The three IR LEDs emit light with an 850 nm
wavelength as soon as human hand movements are detected. The data that
was received from the leap mot on is then transmitted to a controller, which
transforms the data into coordinates that may be used to move the robotic
ar.m. The range of a common jump motion controller is 1 m, while the
maximum line-of-sight distance for IR transmission is roughly 5 m [19].
2.9.3 Motivation
After comparing the characteristics of IR, Bluetooth, Zigbee, 433 MHz RF,
WiFi, and LoRa technologies for wireless communication, LoRa has shown
to be the optimal solution for implementing gesture control of a robotic arm
because of its low power usage and extensive range of communication as
seen in the works of [3, 25], Semtech [28, 35]. Hence, this paper work
focuses on the use of the LoRa technology to achieve gesture control of a
robotic arm as it will be very useful in situations that require a long-range
transmission with a limited power supply.
3 Flex Sensors
3.1 What is a Flex Sensor?
Flex sensors measures how much deflection or bending has occurred.
Materials like plastic and carbon can be used to build this sensor. The
sensor's resistance will change as the plastic strip holding the carbon surface
is flipped aside. The amount of turn can be directly proportional to its
fluctuating resistance [15]. A typical flex sensor is shown in Fig. 4.
Fig. 4 A typical flex sensor [15]
5 System Design
The system involves two parts: Hardware design and Software design. The
hardware is the physical part of the system while the software part consists
of codes written to control the operation of the system and the components
required for the efficient functioning of this systems are as follows:
5.1 Microcontroller
The ESP32 microcontroller is used both in the transmitter and the receiver
end. This is the heartbeat of the system and serves as the platform to which
other sensors (LoRa Module, Gyroscope, Flex sensor etc.) necessary for
this system is interfaced.
The pin connection of the LoRa transceiver to the ESP32 MCU is:
DI00 – GPIO 2
RESET – GPIO 4
NSS – GPIO 14
SCK – GPIO 18
MOSI – GPIO 23
MISO – GPIO 19
Fig. 23 Breadboard simulation of the LoRa (transmitter and receiver) interfaced with mpu6050
accelerometer and gyroscope
Fig. 31 Block diagram of the microelectronic unit and the servo motors embedded in the robotic
arm
7 Conclusion
This study investigates a LoRa-based gesture control of a robotic arm
created and developed for remote robot control. This approach has proven
beneficial in terms of cost, range, and battery longevity in low- and lower-
middle-income countries where internet connectivity is still patchy,
particularly in rural areas with no power supply. It was observed that for
LoRa to work effectively, the transmitter and receiver antennas must
communicate at a line of sight. For the antennas to communicate over a
long distance, their frequencies must match or be in sync with the frequency
of the LoRa module. One of the problems encountered during the course of
this project was “latency”. LoRa has a very tiny data bandwidth, allowing
only very short data transfers, and because of its low bit rate, LoRa will
function more efficiently in transmitting data to a node or end point with a
long time interval, as it cannot be utilised for real-time applications. This
limitations of LoRa should be addressed and considered to match various
use cases for LoRa before it can be adopted and if LoRa must be used, then
a very high clocking microcontroller must be used to minimise latency as
much as possible. Hence, a high frequency microcontroller is needed to
handle it such as a 32–64 bit architecture with a high processor. The
MPU6050 accelerometer and gyroscope used in this paper has a very high
clock rating with a baud rate of 11,520 bits per seconds which needs a
microcontroller with a high processing speed hence the choice of ESP32
which has a processing speed is 240 MHz. LoRa would function better in
battery operated systems and thus the choice of LoRa in any wireless
communication should be carefully selected in along with 4G, 5G, and
other wireless modules that can transmit at a larger bandwidth and bitrate.
References
1. Ahmad KA, Segaran JD, Hashim FR, Jusoh MT (2018) LoRa propagation at 433 MHz in
tropical climate environment. J Fund Appl Sci 9(3S):384–394. https://doi.org/10.4314/jfas.v9i3s.
31
[Crossref]
2.
Aljundi L (2022) Using the Arduino software (IDE). [online] Available at: https://docs.arduino.
cc/learn/starting-guide/the-arduino-software-ide [Accessed 1 Sep 2022]
3.
Andrade RO, Yoo SG (2019) A comprehensive study of the use of LoRa in the development of
smart cities. Appl Sci 9(22):4753. https://doi.org/10.3390/app9224753
[Crossref]
4.
Augustin A, Yi J, Clausen TH, Townsley WM (2016) A study of LoRa: long range & low power
networks for the internet of things. Sensors MDPI 16(9):1466–1483
[Crossref]
5.
Babiuch M, Foltynek P, Smutny P (2019) Using the ESP32 microcontroller for data processing.
In: Proceedings of 20th international carpathian control conference (ICCC) 2019. Krakow –
Wieliczka, Poland, pp 88–93. https://doi.org/10.1109/carpathiancc.2019.8765944
6.
Bahashwan AA, Anbar M, Abdullah N, Al-Hadhrami T, Hanshi SM (2020) Review on common
IoT communication technologies for both long-range network (LPWAN) and short-range
network. In: Saeed F et al (eds) Advances in Intelligent Systems and Computing. Springer,
Singapore, pp 341–353
7.
Bouteraa Y, Ben Abdallah I (2017) A gesture-based telemanipulation control for a robotic arm
with biofeedback-based grasp. Indust Rob: Int J 44(5):575–587. https://doi.org/10.1108/ir-12-
2016-0356
[Crossref]
8.
Brink H, van den (2019) Low power IoT devices and the possible use case in the grid. [online]
Medium. Available at: https://harmvandenbrink.medium.com/low-power-iot-devices-and-the-
possible-use-case-in-the-grid-4c3261527afb [Accessed 6 Jan 2023]
9.
Chanda P, Mukherjee PK, Modak S, Nath A (2016) Gesture controlled robot using Arduino and
Android. Int J Adv Res Comput Sci Softw Eng 6(6):227–234
10.
Circuits Today (2016) Proteus PCB design and simulation software – introduction. [online]
Available at: https://www.circuitstoday.com/proteus-software-introduction [Accessed 1 Sep
2022]
11.
Components101 (2018) Flex sensor. [online] Available at: https://components101.com/sensors/
flex-sensor-working-circuit-datasheet [Accessed 19 Jul. 2022]
12.
Daud S, Yang TS, Romli MA, Ahmad ZA, Mahrom N, Raof RAA (2018) Performance
evaluation of low cost LoRa modules in IoT applications. IOP Conf Ser: Mater Sci Eng
318(012053):1–11. https://doi.org/10.1088/1757-899x/318/1/012053
[Crossref]
13.
Electrical4U (2020) What is a Servomotor? [online] Available at: https://www.electrical4u.com/
what-is-servo-motor/[Accessed 22 Jul 2022]
14.
Elektor Store (n.d.) RFM95 Ultra-long LoRa transceiver module (EU868). [online] Available at:
https://www.elektor.com/seeed-studio-rfm95-ultra-long-lora-transceiver-module-eu868
[Accessed 23 Jul. 2022]
15.
ElProCus (2019a) Flex sensor: pin configuration, working, types & its applications. [online]
Available at: https://www.elprocus.com/flex-sensor-working-and-its-applications/[Accessed 19
Jul. 2022]
16.
ElProCus (2019b) Gyroscope sensor-working, types & applications. [online] Available at: https://
www.elprocus.com/gyroscope-sensor/[Accessed 20 Jul 2022]
17.
Feng X, Yan F, Liu X (2019) Study of wireless communication technologies on internet of things
for precision agriculture. Wirel Pers Commun 108(3):1785–1802. https://doi.org/10.1007/
s11277-019-06496-7
[Crossref]
18.
Garg P, Patel M, Verma H (2022) Gesture controlled robot with robotic arm. Int J Res Appl Sci
Eng Technol 10(5):2139–2146. https://doi.org/10.22214/ijraset.2022.42767
[Crossref]
19.
Gunawardane H, Medagedara N, Madhusanka A (2017) Control of robot arm based on hand
gestures using leap motion sensor technology. Int J Rob Mech 3(1):7–14. https://doi.org/10.
21535/ijrm.v3i1.930
[Crossref]
20.
Hameed S, Ahson Khan M, Kumar B, Arain Z, Hasan M (2017) Gesture controlled robotic arm
using leap motion. Indian J Sci Technol 10(45):1–7. https://doi.org/10.17485/ijst/2017/v10i45/
120630
[Crossref]
21.
Kazeem OO, Akintade OO, Kehinde LO (2017) Comparative study of communication interfaces
for sensors and actuators in the cloud of internet of things. Int J Internet of Things 6(1):9–13.
https://doi.org/10.5923/j.ijit.20170601.02
[Crossref]
22.
Kedar SF, Abdullah Sudhindra F, Annarao SJ, Vani RM, Motgi BS (2017) Development of
Zigbee based tele operated multipurpose robotic arm with hand gesture recognition. Int J Mech
Eng Technol 8(8):1275–1286. [online] Available at: http://iaeme.com/Home/issue/IJMET?
Volume=8&Issue=8
23.
LoRa Alliance (2015) White Paper: a technical overview of Lora and Lorawan. San Ramon, CA,
USA: The LoRa Alliance
24.
Madaan A, Bansal S, Sahu A, Kidwai F (2020) Peer to peer communication in GUI interface
using Lora technology. Proc Comput Sci 173:299–304. https://doi.org/10.1016/j.procs.2020.06.
035
[Crossref]
25.
Mahmoud MS, Mohamad AAH (2016) A study of efficient power consumption wireless
communication techniques/modules for internet of things (IoT) applications. Adv Internet of
Things 06(02):19–29. https://doi.org/10.4236/ait.2016.62002
[Crossref]
26.
Meyer A (2020) Using gyroscopes to enhance motion detection. Valparaiso Univ College Eng
Student Trade J. [online] Available at: https://scholar.valpo.edu/cgi/viewcontent.cgi?article=
1013&context=stja [Accessed 20 Jul. 2022].
27.
Mohan A, Priyadarshinhini R (2020) Gesture controlled robot using accelerometer. Int J Eng
Adv Technol 9(5):1241–1245. https://doi.org/10.35940/ijeat.e1057.069520
[Crossref]
28.
Ould S, Bennett NS (2021) Energy performance analysis and modelling of LoRa prototyping
boards. Sensors 21(23):7992. https://doi.org/10.3390/s21237992
[Crossref]
29.
Passaro VMN, Cuccovillo A, Vaiani L, De Carlo M, Campanella CE (2017) Gyroscope
technology and applications: a review in the industrial perspective. Sensors 17(10):2284. [online]
https://doi.org/10.3390/s17102284
30.
Rakesh HK, Shivashankara BS (2016) Wireless robot control with robotic ARM using MEMS
and Zigbee. Int J Adv Netw Appl Spec Issue 205–209
31.
Rathika PD, Jai Gowtham S, Aravinth Kumar T, Shri Ram S (2021) Gesture based robot arm
control. Nat Volatiles Essent Oils 8(5):3133–3143. [online] Available at: https://www.nveo.org/
index.php/journal/article/view/893/819 [Accessed 17 Jun 2022]
32.
RF Wireless World. (n.d.) LoRa wireless transceiver. [online] Available at: https://www.
rfwireless-world.com/ApplicationNotes/LoRa-transceiver.html [Accessed 23 Jul 2022]
33.
Rogalski A (2019) Infrared and terahertz detectors, 3rd edn. CRC Press, Taylor & Francis Group,
Boca Raton, Fl, p 929
[Crossref]
34.
Satheeshkumar R (2020) Real time robotic arm control using human hand gesture measurement.
J Adv Res Dyn Control Syst 12(SP4):984–996. https://doi.org/10.5373/jardcs/v12sp4/20201571
[Crossref]
35.
Semtech Corporation (2019) LoRa® and LoRaWAN®: a Technical overview. [online] Semtech,
Camarillo, CA, USA: Semtech Corporation, pp 1–26. [online] Available at: https://lora-
developers.semtech.com/uploads/documents/files/LoRa_and_LoRaWAN-A_Tech_Overview-
Downloadable.pdf [Accessed 23 Jun 2022]
36.
Shifas PS, Sharmishta PK, Sravan Sankar PP, Shereena ER, Binish MC (2020) Gesture based
wireless mobile robotic arm using flux sensor. Int J Adv Res Innov Ideas Educ 6(3):243–247
37.
Sreeharsha D (2020) Gesture control robotic arm. Mech Eng Res 9(2):51. https://doi.org/10.
5539/mer.v9n2p51
[Crossref]
38.
Teja R (2021) Introduction to ESP32 microcontroller. [online] Available at: https://www.
electronicshub.org/getting-started-with-esp32/[Accessed 13 Aug 2022]
39.
Ugale A, Chandwadkar DM (2016) Overview on latest gesture controlled systems for robotic
arm. Int J Comput Appl 135(1):29–31. https://doi.org/10.5120/ijca2016908309
[Crossref]
40.
Yang (2019) How does lora sensor send and receive data. [online] Available at: https://www.
mokosmart.com/how-does-lora-sensor-send-and-receive-data/[Accessed 23 Jul 2022]
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_4
K. Hemalatha
Email: khemalatha.ece@kongu.edu
N. Ashok Kumar
Email: ashoknoc@gmail.com
Abstract
The use of drones has been steadily growing over the past few years, not
only in a variety of businesses and governmental organizations but also
among private individuals. This is due to the rapid deployment of drones for
a variety of applications, which can be accomplished by merely attaching
the application-specific devices to drones, which are typically controlled by
a remote or a smartphone. However, the breakthroughs that have been made
in the use of drones have also opened up security challenges. In many
applications, the orders that are sent to the drones and the data that is
transmitted from the drones are not encrypted. As a result of the fact that
drones are also used for illegal and criminal activities by bad actors, it is
necessary to add technology for attack detection, protection, and preventive
countermeasures in drones, in addition to regulation on the usage of drones
through law enforcement by the government agencies. In this chapter, we
will analyze the exploiting of drone vulnerabilities such as GPS spoofing,
Downlink intercept, and Data exploitation. Additionally, we will examine
how to neutralize threats and countermeasures that should be addressed for
the safety of the drones.
1 Introduction
UAVs Security Issues
When dealing with any form of digital technology, the most important thing
you can focus on is keeping yourself safe. To ensure the safety of the UAV
system, it is essential to perform the necessary preventative measures. UAV
systems are vulnerable to cyberattacks and the deterioration of their
functions, both of which have a direct impact on the key contributor.
Therefore, attacks on the system or failures in the system lead to significant
problems. Park et al. [2] discusses a variety of security concerns in further
detail. In these kinds of situations, the attacker causes disruption to the
availability, integrity, and confidentiality of the drone. Due to the fact that
private information has been revealed, it is now quite easy for a competitor
to establish the sensitive information that pertains to the UAV. In addition,
the authors in [3] demonstrated that UAV networks are vulnerable to attacks
and sensor flaws, proving that UAV networks are sensitive. It is possible for
the adversaries to gain access to the communication lines of the UAV,
which would then enable them to connect and take control of the UAV.
Canis [4] highlighted a variety of different kinds of attacks and categorized
them into two broad sectors based on the components of UAVs that were
targeted and the attack route. Canis [4] also highlighted a number of
different kinds of attacks. There are two types of vector attacks: those that
are carried out physically and those that are carried out remotely. A swarm
of unmanned aerial vehicles (UAVs) was disrupted during strikes staged at
Russia's Hmeimim airfield in 2019. This is only one example of the myriad
effects that might result from security flaws. 13 hostile fixed-wing
unmanned aerial vehicles (UAVs) were sent to attack the airbase itself. It
has expanded throughout a broad variety of areas in Syria, including the
Latakia Governorate, the town of Hmeimim, which is located close to
Latakia, and a range of 250 km. Despite this, the vulnerabilities that are
already there allow attackers the opportunity to become more skilled and
proactive in their activities.
Blackhole attack: The sort of attack that [14] falls under is referred to as a
denial of service attack, and it is classified as a form of lethal attack. In
order to get a route that will continue to flow to the target node, a malicious
node will pull all data packets by offering incorrect information in order to
gain the route. The information packets are sent to the black hole by the
source node, rather than being sent to the node that is designated as the
destination. If the nodes are given inaccurate information on the routing
data, the protocol for determining routes will be significantly disrupted. As
a consequence of this, the adversary will access these packets while the data
is being sent via the black hole. The attacker will advertise a large number
of false paths in the hope of attracting data traffic. During this specific
attack, a directed pull attack will be initiated, and all routing data will
undergo a full transformation.
Grey hole attack: The [15] may change their mindset from one of
authenticity to one of a sinkhole. A similar idea has been proposed for the
grey hole, in which malevolent nodes block the transit of data across the
network by broadcasting incorrect routing information. Because of this, it is
an expansion of the attack on the black hole. The node might function in
either a harmful or a regular state depending on how it was configured.
Fake information dissemination (FID) attack: This event [5] takes place
anytime the intruder sends out a bogus GPS signal in order to change the
course of the UAV and get data via impersonating. An attacker may carry
out a FID attack on a network by creating forged authentication messages
by making use of legitimate routing packets that have been obtained from
malicious devices. The malicious node's fake injection will result in the
destruction of the routing table used by the other nodes. As a direct result of
this, the nodes will suffer a loss of packets due to an error in the routing. In
addition to that, the pace at which packets are sent will slow down.
Additionally, it shortens the lifespan of the battery and causes harm to the
contributing unit. The unmanned aerial vehicle (UAV) was the victim of an
attack in [8], during which the attacker created bogus requests that caused
damage to the charging system. It led to a problem with an excessive
amount of energy as well as an excessive decrease in voltage. The charger
control unit could need to be tampered with, or the data sources might need
to be manipulated, in order to achieve this goal. For instance, [8] uncovered
a variety of charging system potential concerns, including as the WPT's
ineffective functioning. In addition, the authors investigate the attacks that
are designed to control the charging process in [19]. The malicious software
takes over and changes the software that is utilized by the rapid-charging
station when an unmanned aerial vehicle (UAV) is linked to the station. The
attack will transform the unmanned aerial vehicles into high-speed chargers
and will cause damage to the charging infrastructure. This malicious power
strike is sneaky and swift, with little warning or opportunity for resistance.
It has the potential to alter the configuration and add more work up to the
point where it causes harm to the whole system. As a result, any unmanned
aerial vehicle (UAV) that is attached to or linked to the charging station will
constitute a threat.
Attacks without physical contact: This first kind encompasses attacks that
do not need to have any kind of direct physical contact with the device.
These are examples of attacks against wireless channels. Recent attacks are
made up of two-channel kinds of energy crisis control systems each. They
are known as the control data transmission channel and the GPS data
transfer channel respectively. The transmission of GPS data is used in order
to ascertain the geographical position of the UAV. As a result, the GPS
channel is the focus of the attacker, who uses an Omni antenna to cause
interference. The purpose of the attack is to either prevent the signals from
reaching the receiving side entirely or to send them with incorrect locations.
Additionally, when the UAV gets many commands, it may travel in a
haphazard manner, which causes additional drain on the battery. The second
channel is used to synchronize instructions with the UAV. These
instructions may concern GPS data, network settings, or the overall state of
the UAV.
The drone is equipped with a variety of sensors that are capable of carrying
data and providing readings. Because of this, attackers see sensors as a
potential target for their activities. They are using them as the attack surface
in order to intercept from them. The data that is being delivered to these
sensors is being corrupted as a result of these attacks. “Sensor input
spoofing attack” was the name given by the intruders to the attack that they
developed in and carried out using sensors. This exemplified the efficacy of
attacks mounted against UAVs using the sensors. Additionally, Nichols et
al. suggested a method through which the adversary sends bogus data to the
drone by means of an onboard sensor in order to throw it off. In addition, in
[13], the adversary interferes physically with the UAV sensors in order to
disrupt their availability, and then they conduct a DDOS attack. Against the
other hand, there have been no recorded attacks on sensors in the form of
connected cameras to UAV [4]. However, research such as [11] has shown
that the sensor may be protected to protect the data transfer inside the
network.
MAVLink: A library for marshalling data that was developed with the
intention of establishing a lightweight message serialization mechanism. It
has the highest level of support among its contemporaries. In addition to the
fundamental ideas, this protocol suffers from a striking deficiency in the
presence of structured references. In spite of the fact that certain dangers are
there, there is no safeguard in place to ensure that the communications that
are sent are accurate. In addition, the security surrounding the transmission
of the communications is subpar. Because of this, it is necessary to
strengthen the security of the end-to-end connection between the GCS and
the UAVs.
In order for unmanned aerial vehicles (UAVs) that rely on GPS to operate
safely, the location information they receive must be precise, reliable, and
continuous. However, a number of studies have demonstrated that it is
possible to fake or disrupt GPS signals due to the inherent flaws and
weaknesses that are present in the system. It is simple to interfere with GPS
services by transmitting high-power jamming signals in the direction of the
victim platform due to the low signal strength, which is approximately −
130 dBm. Because the civil GPS services do not have encryption or
authentication mechanisms, it is simple to replicate or fabricate the satellite
signals, which can then be used for the launch of sophisticated GPS
spoofing attacks. This is because the signals can be easily replicated. In
addition to this, the civil GPS services do not have any authentication
mechanisms.
GPS spoofing is the process of recreating or falsifying the creation of
the GPS signals in order to trick a particular GPS device or receiver by
altering its Position, Velocity, and Timing (PVT) characteristics. This is
done in order to mislead the device or receiver. This is done with the
intention of tricking the GPS device or receiver that is in issue (Psiaki and
Humphreys 2016). As a result of the spread of low-cost, user-tunable
Software Defined Radios (SDRs) and online open source projects and
tutorials for hobbyists and newcomers, it is now possible to launch GPS
spoofing attacks against UAVs. This begs for more robust spoof-resilient
safeguards to be included in from the beginning, especially for the sake of
the safety of mission-critical aerial applications (Huang and Yang 2015).
If an attempt to spoof a drone's GPS coordinates is successful, the attack
could result in the drone crashing or the flight path being altered, both of
which are potentially disastrous outcomes. According to the findings of a
number of studies, an adversary can force a GPS-guided drone to deviate
from its course or even hijack it if the adversary is aware of the drone's
current position and intended travel path (Noh et al. 2019). These findings
were reached by Seo et al. and Noh et al., respectively. By using spoofing, it
is possible to circumvent the safety feature known as “Geo-fencing,” and as
a result, the targeted drone may be coerced into flying in restricted airspace
(Schmidt 2015). This weakness may be used by drug smugglers and others
in order to violate regulated boundaries between prisons for the purpose of
selling drugs and conducting unlawful surveillance (US National PNT
Advisory Board 2018). If a military-grade unmanned aerial vehicle (UAV)
that is armed is somehow stolen and then utilized by a terrorist group, the
resulting devastation might be catastrophic (Fig. 1).
Fig. 1 GPS spoofing
The Department of Homeland Security (DHS) carried out an
unclassified test exercise on June 19, 2012 at White Sands Missile Range
(WSMR) under the codename “GYPSY”. This was the first time that it was
proven that civil GPS systems are susceptible to spoofing attacks, and it
was the first time that this vulnerability was demonstrated [25]. During that
particular exercise, a GPS spoofing attack was carried out at a height of
forty feet against the mini-drone known as “Hornet,” which resulted in the
manipulation of “Hornet's” perceived position and time. This attack was
carried out at a height of forty feet. When an American RQ-170 Sentinel
drone was successfully seized by the Iranian Army (Hartmann and Steup
2013), another significant GPS spoofing allegation was made against a
military-grade UAV by the Iranian Army. On the other hand, the veracity of
the allegation as well as the specifics of how the UAV was taken are not
confirmed and are a source of controversy. In 2016, it was claimed that
Mexican drug dealers and traffickers had deceived an unmanned aerial
vehicle (UAV) belonging to the United States Customs and Border
Protection agency via a spoofing attack on its GPS signal (Khan 2020).
Additionally, comparable GPS-based spoofing attacks have also been
proven in a number of other publications (Zheng and Sun 2020) against
Hornet Mini, DJI's Matrice 100.
6.
Rules-Based Intrusion Detection
2 Conclusion
In this study, we offered a detailed overview and in-depth analysis of
current attempts towards GPS spoofing. Specifically, we focused on how
these efforts may be improved. Particularly, location spoofing of unmanned
aerial vehicles (UAVs) was discussed in great depth. This was
accomplished by associating GPS reliance with the operating modes of
UAVs and assessing attack variants for static, limpet, and mobile (follower)
spoofers. With the use of well created faked GPS signals, an adversary
might misdirect, put in danger, destroy, or even hijack a spoofed unmanned
aerial vehicle (UAV). We also offered a unique taxonomy to identify attack
capabilities, location, stealthiness, and aims of multifarious spoofing
strategies, while also categorizing and discussing the existing literature
according to the definitions of our taxonomy. This was done when spoofing
techniques are used. In addition to this, the report discussed some of the
unresolved issues that might stimulate additional research in certain fields.
In light of the many GPS spoofing attacks that have been carried out against
aerial platforms, surface vehicles, and other statics services, it is imperative
that security-aware and spoof-resistant GPS services be designed. On the
other side, GPS spoofing has also showed promising possibilities for
parametric defense to disable hostile drones. This is because of its ability to
fool GPS receivers.
References
1. Yaacoub JPA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2019)
Securing internet of medical things systems: limitations, issues and recommendations. Fut Gener
Comput Syst 105:581–606
[Crossref]
2.
Park J, Kim S, Suh K (2018) A comparative analysis of the environmental benefits of drone-
based delivery services in urban and rural areas. Sustainability 10(3):888
[Crossref]
3.
Humphreys T (2012) Statement on the vulnerability of civil unmanned aerial vehicles and other
systems to civil GPS spoofing. University Texas Austin, Austin
4.
Canis B (2015) Unmanned aircraft systems (UAS): commercial outlook for a new industry
5.
Stocker C, Bennett R, Nex F, Gerke M, Zevenbergen J (2017) Review of the current state of
UAV regulations. Remote Sens 9(5):459
[Crossref]
6.
Barfield F (2002) Autonomous collision avoidance: the technical requirements. In: Proceedings
of the IEEE national aerospace and electronics conference, pp 808–813
7.
Sharma R, Ghose D (2009) Collision avoidance between UAV clusters using swarm intelligence
techniques. Int J Syst Sci 40(5):521–538
[MathSciNet][Crossref][zbMATH]
8.
Johnson LK, Dorn AW, Webb S, Kreps S, Krieger W, Schwarz E, Shpiro S, Walsh PF, Wirtz JJ
(2017) An INS special forum: intelligence and drones/eyes in the sky for peacekeeping: the
emergence of UAVs in UN operations/the democratic deficit on drones/the German approach to
drone warfare/pursuing peace: the strategic limits of drone warfare/seeing but unseen:
intelligence drones in Israel/drone paramilitary operations against suspected global terrorists: us
and Australian perspectives/the ‘terminator conundrum’ and the future of drone warfare. Int Natl
Sec 32(4):411–440
9.
Thiels CA, Aho JM, Zietlow SP, Jenkins DH (2015) Use of unmanned aerial vehicles for medical
product transport. Air Med J 34(2):104–108
[Crossref]
10.
Rango A, Laliberte A, Steele C, Herrick JE, Bestelmeyer B, Schmugge T, Roanhorse A, Jenkins
V (2006) Using unmanned aerial vehicles for rangelands: current applications and future
potentials. Environ Pract 8(3):159–168
[Crossref]
11.
Sedjelmaci H, Senouci SM (2018) Cyber security methods for aerial vehicle networks:
taxonomy, challenges and solution. J Supercomput 57:1–17
12.
Mushtaq MF, Jamel S, Mohamad KM, Khalid SKA, Deris MM (2017) Key generation technique
based on triangular coordinate extraction for hybrid cubes. J Telecommun Electron Comput Eng
9(3–4):195–200
13.
Du H, Heldeweg MA (2017) Responsible design of drones and drone services: legal perspective
synthetic report
14.
Ueno S, Higuchi T (2011) Collision avoidance law using information amount. In: Numerical
analysis-theory and application. InTech, Allithurai
15.
Hamza A, Akram U, Samad A, Khosa SN, Fatima R, Mushtaq MF (2020) Unmaned aerial
vehicles threats and defence solutions. In: IEEE 23rd international multi-topic conference
(INMIC)
16.
Israelsen J, Beall M, Bareiss D, Stuart D, Keeney E, Berg J (2014) Automatic collision
avoidance for manually tele-operated unmanned aerial vehicles. In: IEEE international
conference on robotics and automation (ICRA), pp 6638–6643
17.
Boulos MNK, Geraghty EM (2020) Geographical tracking and mapping of coronavirus disease
covid-19/severe acute respiratory syndrome coronavirus 2 (sars-cov-2) epidemic and associated
events around the world: how 21st century GIS technologies are supporting the global fight
against outbreaks and epidemics. Int J Health Geogr 19:1–12
18.
Finn RL, Wright D (2012) Unmanned aircraft systems: surveillance, ethics and privacy in civil
applications. Comput Law Sec 28(2):184–194
[Crossref]
19.
Cavoukian A (2012) Privacy and drones: unmanned aerial vehicles. Information and Privacy
Commissioner of Ontario, Ontario
20.
Jumaat N, Ahmad B, Dutsenwai HS (2018) Land cover change mapping using high resolution
satellites and unmanned aerial vehicle. In: IOP conference series: earth and environmental
science
21.
Wackwitz K, Boedecker H (2015) Safety risk assessment for UAV operation. In: Drone industry
insights, safe airspace integration project, part one, Hamburg
22.
Finn RL, Wright D, Friedewald M (2013) Seven types of privacy. In: European data protection:
coming of age. Springer, New York
23.
Ramon Soria P, Bevec R, Arrue B, Ude A, Ollero A (2016) Extracting objects for aerial
manipulation on UAVs using low cost stereo sensors. Sensors 16(5):700
[Crossref]
24.
Clarke R (2014) The regulation of civilian drones’ impacts on behavioural privacy. Comput Law
Sec Rev 30(3):286–305
[Crossref]
25.
Shepard DP, Bhatti JA, Humphreys TE, Fansler AA (2012) Evaluation of smart grid and civilian
UAV vulnerability to GPS spoofing attacks. Proc ION GNSS Meet 3:3591–3605
26.
Yanmaz E, Kuschnig R, Quaritsch M, Bettstetter C, Rinner B (2011) On path planning strategies
for networked unmanned aerial vehicles. In: IEEE conference on computer communications
workshops (INFOCOM WKSHPS), pp 212–216
27.
Hernandez LH, Tsourdos A, Shin HS, Waldock A (2014) Multi-objective UAV routing. In: IEEE
international conference on unmanned aircraft systems (ICUAS), pp 534–542
28.
Vattapparamban E, Guvenc I, Yurekli AI, Akkaya K, Uluagac S (2016) Drones for smart cities:
issues in cybersecurity, privacy, and public safety. In: IEEE international wireless
communications and mobile computing conference (IWCMC), pp 216–221
29.
Carr EB (2014) Unmanned aerial vehicles: examining the safety, security, privacy and regulatory
issues of integration into us airspace. Natl Centre Policy Anal 23:2014
30.
Lin X, Wiren R, Euler S, Sadam A, Maattanen HL, Muruganathan SD, Gao S, Wang YPE,
Kauppi J, Zou Z (2018) Mobile networks connected drones: field trials, simulations, and design
insights. arXiv Preprint arXiv:1801.10508
31.
Abdallah A, Ali MZ, Misic J, Misi VB (2019) Efficient security scheme for disaster surveillance
UAV communication networks. Information 10(2):43
[Crossref]
32.
Kim SJ, Lim GJ, Cho J (2018) Drone flight scheduling under uncertainty on battery duration and
air temperature. Comput Ind Eng 117:291–302
[Crossref]
33.
Tseng CM, Chau CK, Elbassioni K, Khonji M (2017) Autonomous recharging and flight mission
planning for battery-operated autonomous drones. arXiv preprint arXiv:1703.10049
34.
Basan E, Basan A, Nekrasov A, Fidge C, Sushkin N, Peskova O (2022) GPS-spoofing attack
detection technology for UAVs based on Kullback-Leibler divergence. Drones 6:8. https://doi.
org/10.3390/drones6010008
[Crossref]
35.
Khan SZ, Mohsin M, Iqbal W (2021) On GPS spoofing of aerial platforms: a review of threats,
challenges, methodologies, and future research directions. PeerJComput Sci 7:e507. https://doi.
org/10.7717/peerj-cs.507
[Crossref]
36.
Chan K, Nirmal U, Cheaw W (2018) Progress on drone technology and their applications: a
comprehensive review. In: AIP conference proceedings, 2030. AIP Publishing, College Park, p
020308
37.
Liu Z, Li Z, Liu B, Fu X, Raptis I, Ren K (2015) Rise of mini-drones: applications and issues.
In: Proceedings of the 2015 workshop on privacy-aware mobile computing. ACM, New York, pp
7–12
38.
Altawy R, Youssef AM (2017) Security, privacy, and safety aspects of civilian drones: a survey.
ACM Trans Cyber Phys Syst 1(2):7
[Crossref]
39.
He D, Chan S, Guizani M (2017) Drone-assisted public safety networks: the security aspect.
IEEE Commun Mag 55(8):218–223
[Crossref]
40.
Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y, Sztipanovits J (2013) Taxonomy for
description of cross-domain attacks on CPS. In: Proceedings of the 2nd ACM international
conference on high confidence networked systems. ACM, New York, pp 135–142
41.
Guvenc I, Ozdemir O, Yapici Y, Mehrpouyan H, Matolak D (2017) Detection, localization, and
tracking of unauthorized UAS and jammers. In: Proceedings of the 2017 IEEE/AIAA 36th
digital avionics systems conference (DASC), IEEE, pp 1–10
42.
Sturdivant RL, Chong EK (2017) Systems engineering baseline concept of a multispectral drone
detection solution for airports. IEEE Access 5:7123–7138
[Crossref]
43.
Shi X, Yang C, Xie W, Liang C, Shi Z, Chen J (2018) Anti-drone system with multiple
surveillance technologies: architecture, implementation, and challenges. IEEE Commun Mag
56(4):68–74
[Crossref]
44.
Nassi B, Shabtai A, Masuoka R, Elovici T (2019) Sok-security and privacy in the age of drones:
threats, challenges, solution mechanisms, and scientific gaps. arXiv Preprint arXiv:1903.05155
45.
Atherton KD (2016) The FAA says there will be 7 million drones flying over America by 2020.
Popular Sci
46.
Vattapparamban E, Guvenc I, Yurekli AI, Akkaya K, Uluagac S (2016) Drones for smart cities:
issues in cybersecurity, privacy, and public safety. In: Wireless communications and mobile
computing conference (IWCMC), 2016 international, IEEE, pp 216–221
47.
Dalamagkidis K, Valavanis KP, Piegl LA (2012) Aviation history and unmanned flight. on
integrating unmanned aircraft systems into the national airspace system. Springer, New York, pp
11–42
[Crossref]
48.
Juul M (2015) Civil drones in the European Union, Eur. Parliament. Res. Serv. (ed.). Eur. Union
49.
Stopforth R (2017) Drone licenses-necessities and requirements. II. Ponte 73(1):149–156
[Crossref]
50.
Campos VS (2018) European union policies and civil drones. Ethics and civil drones. Springer,
Cham, pp 35–41
[Crossref]
51.
Miah A (2020) Regulating drones. In: Drones: the brilliant, the bad and the beautiful. Emerald
Publishing Limited, Bingley
52.
Wright S (2020) Ethical and safety implications of the growing use of civilian drone. UK
Parliament Website (Sci. Technol. Committee)
53.
Lowbridge C (2015) Are drones dangerous or harmless fun? BBC News, London. https://www.
bbc.com/news/uk-england-34269585. Accessed 07 Sept 2018
54.
Cress JJ, Sloan JL, Hutt ME (2011) Implementation of unmanned aircraft systems by the US
geological survey. Geocarto Int 26(2):133–140
[Crossref]
55.
Lipsitch M, Swerdlow DL, Finelli L (2020) Defining the epidemiology of covid-19—studies
needed. N Engl J Med 382(13):1194–1196
[Crossref]
56.
Jiang F, Deng L, Zhang L, Cai Y, Cheung CW, Xia Z (2020) Review of the clinical
characteristics of coronavirus disease 2019 (covid-19). J Gen Intern Med 35:1–5
[Crossref]
57.
Majeed R, Abdullah NA, Ashraf I, Zikria YB, Mushtaq MF, Umer M (2020) An intelligent,
secure, and smart home automation system. Sci Program 57:1–14
58.
Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles:
opportunities and challenges. arXiv preprintarXiv:1602.03602
59.
Rudinskas D, Goraj Z, Stankunas J (2009) Security analysis of UAV radio communication
system. Aviation 13(4):116–121
[Crossref]
60.
Kerns AJ, Shepard DP, Bhatti JA, Humphreys TE (2014) Unmanned aircraft capture and control
via GPS spoofing. J Field Rob 31(4):617–636
[Crossref]
61.
Seo SH, Lee BH, Im SH, Jee GI (2015) Effect of spoofing on unmanned aerial vehicle using
counterfeited GPS signal. J Posit Navig Timing 4(2):57–65
[Crossref]
62.
Shafique A, Mehmood A, Elhadef M (2021) Survey of security protocols and vulnerabilities in
unmanned aerial vehicles. IEEE Access 9:46927–46948. https://doi.org/10.1109/ACCESS.2021.
3066778
[Crossref]
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_5
Swagata Sarkar
Email: swagata.b.sarkar@gmail.com
Abstract
Civilian drones and military drones are the two primary classifications of
unmanned aerial vehicles (UAVs), which are commonly known as drones.
Drones are used for a wide range of tasks and are also referred to by their
other name, unmanned aerial vehicles. The deployment of unmanned aerial
vehicles for a broad range of tasks has shown phenomenal expansion over
the course of the previous decade. Recently, a new generation of small
unmanned aerial vehicles has been available for purchase, highlighting the
growing danger that these devices present. This article discusses the
potential threats to national security that unmanned aerial vehicles pose,
including but not limited to the following: terrorist attacks; unauthorized
surveillance and reconnaissance; smuggling; electronic eavesdropping;
mid-air collisions; and electronic eavesdropping. It also analyzes the
various forms of UAV incursions according to the objective for which they
were carried out and the amount of expertise possessed by the operator. In
the communication frameworks of the drones, several cryptographic
approaches have been included. These techniques include key agreement,
authentication, encryption and decryption, integrity, blockchain, and digital
signatures. Civilian drones and military drones are the two types that may
be differentiated based on the functions that they are designed to do.
1 Introduction
In this post-atomic age, the majority of applications for drone technology
may be found in the military and other defensive settings. The use of drone
technology in military settings is seeing tremendous expansion. These little
gadgets are now hovering around 200 feet above the earth in the air. This
height range varies from one gadget to the next as well as depending on the
intended use. This range may be measured in feet, meters, or kilometers,
depending on your preference. The amount of time that these intelligent
gadgets can remain airborne varies, too, depending on the device [1, 2].
Table 1 contains a discussion of the differences in frequency as well as their
attributes.
Table 1 Variations in frequency and their characteristics
When drones are in the air and communicating with a base station,
there are several opportunities for security breaches. In order to find a
solution to these kinds of issues, researchers came up with a system of
intrusion detection that can identify illicit activity. The techniques of
intrusion detection monitor network traffic in order to identify
suspicious activity. There are many different ways for detecting
intrusions, and these approaches are used to investigate abnormalities.
These approaches include methodologies such as rule-based detection,
signature-based detection, and anomaly-based detection.
B. Drone Information Safety
C. Scientific Resolutions
There are many uses and applications for drones and unmanned aerial
vehicles, and the list keeps growing as new technologies emerge. However,
some of them have restricted operational resources, while others raise a
variety of issues about safety, privacy, and security [3, 4]. It is
recommended that licensing, regularization, and a variety of procedures
(oversight) be implemented in order to place restrictions on the use of
superfluous and/or nefarious UAV-based photography. Authorities in every
region of the globe have to make it a top priority to enact laws and
guidelines that regulate surveillance practices and procedures. The network
coverage that is provided by a UAV cannot be compared to the network
coverage that is provided by any Wireless Sensor Network (WSN) or
Mobile Ad-hoc Network in terms of network security and risk assessment
[5]. This is because of limitations on the available resources, since the UAV-
based coverage is far larger and more extensive than that of WSN and
MANETs. The following recommendations pertaining to AAA
(Authorization Authentication Accounting) may be useful for unmanned
aerial vehicles:
Authorization: Providing the controller of the UAV with administrative
privileges in order to prevent any hostile takeovers with administrative
rights.
Authentication: In order to prevent unauthorized access and control,
unmanned aerial vehicles require a stringent authentication method.
Accounting: In the event that a UAV or drone is used to engage in illegal
activity, the owner can be identified and brought to justice. Due to the
ease of access, mischievous or criminal entities are able to use drones and
unmanned aerial vehicles to conduct illegal surveillance, launch
cyberattacks, and initiate privacy threats against individuals and
organizations. Drones and other unmanned aerial vehicles are having
their myriad mechanical and operational capabilities abused in order to
carry out malicious acts [10]. The efforts that are made to make
unmanned aerial vehicles and drones more secure and rigid also make
them more effective for engaging in malicious activities. These kinds of
events make the growth of UAVs and drones a double-edged sword.
Counter Details
measure
Wi-Fi Wi-Fi-based drone/UAV operates using a 2.4 GHz frequency. A conventional
jamming jammer can jam these frequencies within a limited range and can be used for
privacy purposes
Wi-Fi air Although it is an attacking method, it can be used to take control of any illegal or
crack privacy-invading UAV/drone
Three-way Although it is also an attacking method, it can be used to deauthorize or even jam
handshake communication between the UAV/drone and the controller
DoS Websploit Wi-Fi jammer can be an effective method to jam or de-authenticate UAV
from its controller. However, to conduct DoS based attack, some knowledge about
the communication channel is required
GPS spoofing Encryption of civilian-based equipment is very costly and making it vulnerable to
GPS spoofing attacks
Limitation Details
Availability UAV/drones are easily accessible for everyone to purchase. There is no owner
registration or license registration for purchasing a UAV/drone
Design issue Due to the absence of standardization, manufacturers are failing to comply
with necessary requirements i.e., safe design, factory authentication, etc.
Limitation Details
Policies Standardization and policies are absent for UAV/drone operations and
operators. In some countries, policies are defined for UAV/drones flying in
proximity of sensitive areas. However, a general set of operating policies for a
UAV/drone are still not available
Non-real-time Due to a lack of standardization for design and operational software, the
countermeasures current UAV/drones do not have real-time protection during flight. If a
UAV/drone is compromised during flight it cannot be retained by the original
owner
Limited testing Due to limited testing, the available control and communication units are
vulnerable to several types of attacks
Forensic limitations In case of a harmful event, the limited availability of forensic tools and
methods makes it difficult to identify the malicious operator of UAV/drones
involved in the dangerous act
Unreliable security Based on the hostile operational environment of UAV/drones, the default
security measures are not suitable. Due to the harsh operating environment of
UAV/drones, a robust security protocol is necessary. But due to design and
resource limitations, improving security measures is very challenging
Authentication Based on recent events as shown in Table 6, the currently employed
authentication method for UAV/drone can easily be compromised. Except for
the UAV/drones operated for defense purposes as they have trailered software
to cope with the requirements
Limited frequency The UAV/drones are being operated within a limited range of frequencies.
bands Making them an easy target for jamming-based attacks
Measure Description
Licensing Every UAV/drone should be registered and licensed. Such measures will make
it easy for the authorities to identify the owner of any harmful drone/UAV
Flying permit A flying permit similar to a driving license should be issued with a registered
drone/UAV. Such regulation would limit. UAV/drone-based illegal or harmful
activity
Education The public should be educated on the harmful or illegal use of UAV/drones
Laws Based on harmful and illegal events, laws should be introduced for the misuse
of UAV/drones
Restricted zones Areas that are classified or could pose a danger to drones/UAVs should be
marked. Map-based public applications should also indicate areas that are no-
fly zones for UAV/drones
Non-lethal Non-lethal tools to counter drones/UAVs should be publically available. Such
measures tools can play an important role in urban areas
Measure Description
Machine learning Security tools such as ML-based IDS can vastly improve the security
architecture of drones/UAVs
Multi-factor Rigid authentication methods can help in stopping several common security
authentication threats
Tables 5 and 6 provide many suggestions that might enhance the level of
privacy and protection afforded by UAVs and drones. There are some broad
suggestions included in Table 5 that might be of assistance in enhancing the
privacy and safety of UAVs. While Table 6 provides an inventory of the
most current blockchain-based technologies for protecting the privacy and
safety of UAVs, In addition, in order to address concerns relating to safety
and privacy, regulatory bodies and the industry as a whole need to work
together to regularize and standardize unmanned aerial vehicles and drones.
Blockchain technology has the potential to provide UAVs and drones
security that is both highly effective and significantly improved. The need
for more processing resources is the sole issue that has to be addressed
when considering blockchain-based solutions. On the other hand, the
improvement that blockchain brings in terms of security and privacy is
more than sufficient. This is due to the fact that blockchain may be
decentralized. The blockchain-based solution has the potential to be a
highly good choice for unmanned aerial vehicles that have been created
with military and government applications in mind.
Deauthentication attack
The majority of unmanned aerial vehicles (UAVs) on the market today are
developed with advanced features such as internet of things, sensor cloud,
and cloud. The attacker will utilize the UAVs that are equipped with cloud
capabilities to remotely store the data that has been compromised. This will
allow the attacker to retrieve the data at a time and place of his choice. In
most cases, the data packets that are created by a wireless network are
enormous, which necessitates the use of advanced processing in order to
extract important information. UAVs that just have little storage space and a
small amount of backup battery power are unable to complete these
sophisticated calculations. UAVs that are helped by the cloud may be used
so that data can be readily sent to the cloud with low drain on the battery.
This helps reduce the load of storage while also extending the life of the
battery (as shown in Fig. 3).
The evil twin assault, which is shown in Fig. 4, is similar to a DitM attack;
however, rather than the UAV inserting itself in the midst of a data stream,
the evil twin attack involves the UAV taking over as the receiver for the
BAN or IMD. The assault that comes from the evil twin is carried out in
two distinct stages. At first, the attacker will produce deauthentication
probes with the intention of deauthenticating clients that are connected to a
genuine access point. Next, the adversary will start a bogus access point,
spoofing the MAC address, reallocating the channels used by the original
AP, and broadcasting the SSID [36]. This will allow the adversary to
assume the identity of the legitimate AP. Last but not least, the clients are
compelled to go through another round of authentication with the UAV
playing the role of the AP.
Wifiphishing
Two separate tests are carried out as part of this study to illustrate the
cyberattack capabilities of UAVs. The first reveals how to get into
healthcare automation systems, while the second shows how to take over
and manipulate BAN healthcare equipment.
The term “smart hospital automation” refers to an automated hospital
control system that gives consumers the ability to operate a variety of
hospital appliances by means of Wi-Fi sensor devices [5]. Applications such
as this include the automated identification of patients and healthcare
professionals, the monitoring of hospital resources using RFID technology,
and the management of lighting, TVs, and other environmental systems like
as HVAC [10]. If an attacker is able to get into any one of the gateway
devices remotely at a wireless smart hospital, then it provides a channel for
the attacker to break into additional smart devices that are linked with the
compromised gateway device. A denial of service assault is used as an
example in this scenario to investigate how a UAV may hack into smart
hospital Wi-Fi routers and other wireless systems. The unmanned aerial
vehicles (UAVs) are built with the capability of disrupting the wireless
signal that runs between the device controllers and the gateway device.
After the signals are disrupted, the link between the UAVs and the hospital
control system will be severed, and the UAVs will assume control of the
whole hospital control system.
10 Conclusions
An age of autonomous aerial vehicles is about to begin as a direct result of
the current trend and exponential rise in the usage of unmanned aerial
vehicles and drones. The use of unmanned aerial vehicles and drones brings
a number of benefits to both the military and the civilian sectors. Despite
this, substantial issues over privacy and safety have arisen as a direct result
of the widespread usage and accessibility of the internet. These gadgets
have become particularly valuable instruments for deceitful actions as a
result of their adaptability, cheap cost, simplicity of deployment, and
mobility. These vehicles (UAV/drone) are still quite effective for carrying
out damaging acts, despite the availability of various defenses against the
malicious use of these vehicles. There are also extremely serious concerns
about privacy when it comes to UAVs and drones. In today’s technology
era, protecting one’s privacy is one of the most important concerns for both
people and businesses.
Because they are autonomous, flexible, and easy to use, as well as
having a low cost and energy consumption, drones and unmanned aerial
vehicles have ushered in a new era of aviation that features autonomous
aerial vehicles in both the civilian and military spheres. This has resulted in
a multitude of benefits, including economic, commercial, and industrial,
and it has led to a new era of aviation overall. However, the widespread
usage of these technologies has resulted in a multitude of safety, security,
and privacy concerns. These concerns have surfaced in the form of a variety
of cyber assaults, threats, and problems, all of which are described in this
article. This report included a complete analysis of these (security and
privacy) issues, which included an outline of the reasons that are driving
these concerns along with potential countermeasures. The study also
included a variety of suggestions, one of which was the use of already
available blockchain-based solutions. These technologies may offer
increased data integrity, authenticity, and accessibility to unmanned aerial
vehicles and drones. According to the findings of the UAV tests, there are
four potential security risk mitigation strategies that should be used to
protect medical BAN and IMD devices in addition to other Wi-Fi enabled
equipment in hospitals from being compromised by an external agent.
These four strategies for risk reduction are examples of the latter kind of
security approach and entail the addition of additional security features to
the device in question via the use of programming.
References
1. Bombe MK (2020) Unmanned aerial vehicle (UAV) market worth $21.8 billion by 2027- pre and
post COVID-19 market analysis report by Meticulous Research. Retrieved from https://www.
meticulousresearch.com/download-samplereport/cp_id=5086. Accessed on 18 Aug 2022
2.
Kumar R, Kumar P, Tripathi R, Gupta GP, Gadekallu TR, Srivastava G (2021) SP2F: a secured
privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Netw
187:107819
[Crossref]
3.
CyanogenMod (2017) CyanogenMod android operating system. Retrieved from https://github.
com/CyanogenMod
4.
Dinan S (2017) Mexican drug cartels using drones to smuggle heroin, meth, cocaine into U.S.—
Washington Times. Retrieved from https://www.washingtontimes.com/news/2017/aug/20/
mexican-drug-cartels-usingdrones-to-smuggle-heroi/
5.
DJI (2018) Phantom 3 Professional—specs, FAQ, tutorials, downloads and DJI GO—DJI.
Retrieved from https://www.dji.com/phantom-3-pro/info#specs
6.
Irizarry MJ, Gheisari B (2012) Walker, usability assessment of drone technology as safety
inspection tools. Electron J Inf Technol Constr 17:194–212
7.
Bowden M (2013) How the predator drone changed the character of war. Smithson Mag.
Retrieved from https://www.smithsonianmag.com/history/how-the-predatordrone-changed-the-
character-of-war-3794671/. Accessed on Nov 2022
8.
O’Donnell S (2017) Consortiq. Retrieved from https://consortiq.com/short-history-unmanned-
aerialvehicles-uavs/. Accessed on Nov 2022
9.
Chen R, Yang B, Zhang W (2020) Distributed and collaborative localization for swarming
UAVs. IEEE Internet Things J 8:5062–5074
[Crossref]
10.
Gartner (2018) Gartner says worldwide sales of smartphones recorded first ever decline during
the fourth quarter of 2017. Retrieved from https://www.gartner.com/newsroom/id/
3859963gnuplot.(2017).gnuplottool. Retrieved from http://www.gnuplot.info/download.html
11.
Rambling D (2017) Islamic state now using off-the-shelf drones I. Defense content from
Aviation Week. Retrieved from http://aviationweek.com/defense/islamicstate-s-new-weapon-
choice-shelf-drones
12.
Horsman G (2016) Unmanned aerial vehicles: a preliminary analysis of forensic challenges.
Digit Invest 16:1–11. https://doi.org/10.1016/J.DIIN.2015.11.002
13.
Jain U, Rogers M, Matson ET (2017) Drone forensic framework: sensor and data identification
and verification. In: 2017 IEEE sensors applications symposium (SAS). IEEE, pp 1–6. https://
doi.org/10.1109/SAS.2017.7894059
14.
Karlsson K-J, Glisson WB (2014) Android anti-forensics: modifying CyanogenMod. In: 2014
47th Hawaii international conference on system sciences. IEEE, pp 4828–4837. https://doi.org/
10.1109/HICSS.2014.593
15.
Kernel (2009) Linux_2_6_32—Linux Kernel Newbies. Retrieved from https://kernelnewbies.
org/Linux2_6_32
16.
de Croon GCHE, Groen MA, De Wagter C, Remes B, Ruijsink R, van Oudheusden BW (2012)
Design, aerodynamics and autonomy of the DelFly. Bioinspir Biomim 7:025003
[Crossref]
17.
Chan KW, Nirmal U, Cheaw WG (2018) Progress on drone technology and their applications: a
comprehensive review. AIP Conf Proc 2030:020308
[Crossref]
18.
Berg TR (2020) Air Space Mag. Retrieved from https://www.airspacemag.com/daily-planet/first-
map-compiledaerial-photographs-180973929/. Accessed on Nov 2022
19.
Ali BS, Saji S, Su MT (2022) An assessment of frameworks for heterogeneous aircraft
operations in low-altitude airspace. Int J Crit Infrastruct Prot 37:100528
[Crossref]
20.
Wright S (2019) Ethical and safety implications of the growing use of civilian drone. UK
Parliament website (science and technology committee)
21.
Coach U (2020) Master list of drone laws (organized by state and country). Retrieved from
https://uavcoach.com/drone-laws/. Accesses on Nov 2022
22.
Aljehani M, Inoue M, Watanbe A, Yokemura T, Ogyu F, Iida H (2020) UAV communication
system integrated into network traversal with mobility. SN Appl Sci 2:2749
[Crossref]
23.
Cheaw BH, Ho HW, Abu Bakar E (2019) Wing design, fabrication, and analysis for an X-wing
flapping-wing micro air vehicle. Drones 3:65
[Crossref]
24.
Teoh ZE, Fuller SB, Chirarattananon P, Prez-Arancibia NO, Greenberg JD, Wood RJ (2012) A
hovering flapping-wing microrobot with altitude control and passive upright stability. In:
Proceedings of the 2012 IEEE/RSJ international conference on intelligent robots and systems,
Vilamoura-Algarve, Portugal, pp 3209–3216
25.
Professionals, drones and remotely piloted aircraft (UAS/RPAS)-frequencies and radio licenses,
Traficom (2021). Retrieved from https://www.traficom.fi/en/transport/aviation/drones-and-
remotely-piloted-aircraft-uasrpasfrequenciesand-radio-licences. Accessed on Nov 2022
26.
Carnahan C (2014) ISO/TC 20/SC 16 unmanned aircraft systems. Retrieved from https://www.
iso.org/committee/5336224.html. Accessed on Nov 2022
27.
Luo A (2016) Drones hijacking. Dejean. Maarse M, Sangers L, Ginkel JV, Pouw M (2016)
Digital forensics on a DJI Phantom 2 Vision + UAV
28.
Majendie A, Chia K (2018) The future of flying is all about drones—Bloomberg. Retrieved from
https://www.bloomberg.com/news/articles/2018-02-08/in-the-global-game-of-hideand-seek-the-
drones-are-winning
29.
Parrot (2017) Quad copter AR drone 2.0 power edition I. Parrot Store Official. Retrieved from
https://www.parrot.com/uk/drones/parrot-ardrone-20-power-edition#parrot-ardrone-20-power-
edition-details
30.
Hartmann KSC (2013) The vulnerability of UAVs to cyber, in cyber conflict (CyCon). In:
Proceedings of the 2013 5th international conference, Tallinn, Estonia
31.
Abdullah, Q.A. Introduction to the Unmanned Aircraft Systems. Available online: https://www.
eeducation.psu.edu/geog892/node/643 (accessed on November2022).
32.
Mikelionis L (2018) Drug cartels using drones to smuggle drugs at border. Fox News. Moskwa
W (2016) World drone market seen nearing $127 billion in 2020. PwC Says—Bloomberg.
Retrieved from https://www.bloomberg.com/news/articles/2016-05-09/world-drone-market-
seennearing-127-billion-in-2020-pwc-says
33.
Pleban J-S, Band R, Creutzburg R (2014) Hacking and securing the AR drone 2.0 quadcopter:
investigations for improving the security of a toy
34.
Creutzburg R, Akopian D (eds) International society for optics and photonics, vol. 9030, p
90300L. 10.1117 / 12.2044868
35.
Pilot (2022) What’s the difference between drones, UAV, and UAS? Definitions and terms. Pilot
Institute. Retrieved from https://pilotinstitute.com/drones-vs-uav-vs-uas/. Accessed on Nov 2022
36.
Carrier B (2002) Open source digital forensics tools: the legal argument
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_6
Umair B. Chaudhry
Email: u.b.chaudhry@qmul.ac.uk
Abstract
Connected and Autonomous Vehicles (CAVs) are gaining more interest and
are growing steadily in recent years. They will surely become the backbone
of next generation intelligent vehicles offering safe travels, comfort,
reduced pollution, with many other beneficial features. However, with
CAVs being equipped with high levels of automation and connectivity also
opens several attack points or vulnerable points for adversaries to conduct
attacks. Such security issues need to be addressed before commercialising
CAVs. In this research paper, the focus is to develop a few machine learning
models using different machine learning algorithms and evaluate them
using defined evaluation criterions to identify and recommend the best
suitable model for detecting attacks in CAVs. In addition, this paper also
defines different terms related to CAVs such as CAV, CAV cyber security,
CAV architecture and different vulnerabilities and risks present in the CAN
bus. The paper then describes the different attacks possible on CAVs and
the corresponding mitigation methods and detection techniques.
Keywords Anomaly detection – Connected autonomous vehicle –
Controller area network bus – Cyber-attacks – Machine learning
1 Introduction
Connected and Autonomous Vehicles (CAVs) use both the Connected
Vehicle (CV) and Autonomous Vehicles (AV) technologies for navigation,
driving, communication, and to react to nearby environments in real-time
without any human intervention. CAVs help in reducing pollution, traffic
congestions, and road accidents by providing traffic management functions
and driving assistance which reduces human driving mistakes. Moreover,
the elderly and physically challenged people are greatly benefitted from
CAVs or completely self-driving vehicles [1].
Although CAVs provide many benefits, there exists several security and
privacy challenges. The security risks in CAVs are increasing rapidly as
these vehicles are connected and have access to the internet [2]. If an
adversary compromises a CAV, then they will be able to control the vehicle
remotely which will not only disrupt vehicle systems but also might cause
accidents and injuries to people inside or nearby the vehicle. For example,
two security engineers in 2015 were able to demonstrate that autonomous
vehicles such as Jeep Cherokee are vulnerable to many attacks and
successfully conducted attacks by exploiting a vulnerability found in the
vehicle’s radio system [3]. By entering the vehicles system through the
entertainment unit, they were able to control wind shield wipers, air-
conditioning, accelerator, brakes, and the steering wheel from a remote
place which creates a real danger to everyone in and around the vehicle, if
the attacks were conducted by a real attacker. Consequently, the vehicle
manufacturer recalled all their autonomous vehicles for manually installing
patches for this vulnerability. Before this incident, most of the automobile
manufacturers believed that it was not possible to perform distant attacks on
vehicles and this event has been a watershed for all of them [2].
Therefore, before deploying CAVs worldwide into the transportation
system, the potential cyber-security vulnerabilities and risks should be
addressed. Hence, there is a need to research how to define, evaluate, and
detect different types of cyber-attacks on CAVs.
2 Literature Review
In this era of fast paced development of technology, main interest of
automotive engineers has been on developing autonomous vehicles. The
development in this sector can be seen by the increasing number of
Electronic Control Units (ECU), applications, and sensors used in vehicles
which in turn helps in building a more reliable and efficient driving
experience [4]. Modern vehicles now are reported to contain hundred
million lines of code to provide drivers an easier and safer experience [5].
Even though CAVs are not yet commercialised, many of the CAV
software and applications are being installed and used in commercialised
modern vehicles [4]. To illustrate, most of the modern vehicles uses
Advanced Driving Assistant System (ADAS) which helps in the reduction
of accidents caused by human mistakes [6]. With massive development and
usage of wireless technologies in vehicles, such as Radio Frequency
Identification (RFID), it is now possible to automatically charge vehicles
passing through toll stations and parking lot exits without stopping and
thereby improves traffic efficiency [7].
CAVs have also received great interest from the public. Based on a 2015
survey carried out by Cetelem, 81% of the surveyed drivers claimed that
they wanted to own a fully autonomous vehicle by 2025 [8].
The autonomous vehicles market is booming and is expected to reach
around 34 billion pounds by 2025 [8]. Waymo exclusively for developing
autonomous vehicles and have completed around 4 million kilometres of
trial run [9]. Apollo, a free open-source platform for autonomous driving
which was designed to tackle all the concerns associated with precise
sensing and decision making [10]. Uber, have also created CAVs and
completed successful trial runs on public roads in Arizona [11]. Similar
projects and road tests are also conducted by different automotive
companies such as, Benz and Audi.
In USA, all the CAV relevant rules and regulations are carried out at
state level and 20 states had released guidelines related to autonomous
vehicle in 2016 [4]. The Chinese government have launched several CAV
projects and chosen Shanghai as the main test zone for CAVs [12]. In Japan,
a 10 mile field have been set up and used for CAV testing since 2017 [13].
However, most of these research, not much focus has been given to CAV
cyber security until last few years which is a significant part in its
development.
It is crucial that along with the development of modern connected and
autonomous vehicles, engineers should also focus on securing such vehicles
from outside threats and attack.
SOF: It is the starting bit of the frame and a ‘0’ is to inform other ECUs
that a CAN node plans to talk.
Identifier (ID): It is the next 11 bits and acts as the frame identifier. The
priority of a message increases from higher IDs to lower.
Remote Transmission Request (RTR): It is a 1-bit indicator which
indicates whether the ECU is sending or requesting data.
Control: It consists of 6 bits. The first 2 specifies whether the ID is
CAN 2.0A (11-bits) or CAN 2.0B (29 bits). The next 4-bits indicates the
length of transmitting data.
Data: the next 0–64 bit is the actual message to be transmitted.
Cyclic Redundancy Check (CRC): 16-bit code to ensure integrity.
Acknowledgment (ACK): 2-bit code to indicate whether the ECU have
received and acknowledged the data.
End of Frame (EOF): It consists of seven bits and denotes the end of
frame.
Their exists many vulnerabilities in CAN. There is no sender or receiver
address mentioned in CAN packets and all the ECUs that receive a packet
accepts or rejects it only based on the CAN ID [23]. Therefore, an ECU
cannot decide whether a packet they receive is designed for them, nor know
who send the packet and thus, ECUs in the CAN bus cannot verify the
legitimacy of the packets they receive. This is a very crucial vulnerability as
attackers can send messages from a compromised ECU and other ECUs
receiving the packets have no means to authenticate the packet origin and
will accept the packet without any issues [23].
Secondly, to send messages in the CAN bus, an attacker has to first
compromise and gain access to an ECU. ECUs in CAVs are connected to
the respective automobile manufacturer so that they can upload latest
patches and updates remotely. This connection is usually accomplished
using cellular base stations (BTS) which provide connectivity features in
mobile networks. An attacker can conduct man-in-the-middle attack by
setting up a rogue BTS and making the ECU transmit messages through it
[24]. Another weakness in ECUs is that most of them use Short Message
Service (SMS) for communications which are poorly encrypted and can
easily be cracked by the hackers and gain access to the message [24].
If an attacker is able to access and control a vehicle remotely, then this
might put the passengers and nearby people’s life at risk. Hence,
vulnerabilities and cyber security risks related to CAVs should be properly
addressed before deploying them for public use.
3 CAVs and AI
This section presents classification models trained for identifying spoofing,
fuzzy, and DoS attacks. Different models used are then evaluated and
compared based on accuracy, prediction time, model development time,
false negative, and false positive rates. Results are generated through
MATLAB on a dataset used for developing and testing the model was
generated using a real vehicle and made publicly available for future
research projects [66].
The initial stage in machine learning is to collect good reliable data. The
next step is to clean the data as most real-world data will contain missing,
unorganized, or noisy values. After processing the dataset, it needs to be
split to training and testing set.
The machine learning model is then developed and trained using the
training set. Moving further, five different classification models (kNN,
classification tree, naïve bayes, discriminant analysis, and neural network)
were trained to find the best possible model for the available dataset. The
trained model is then validated using the test set. The predictions made
from the test set are then compared with the actual output to compute false
positive rates and accuracy. If the accuracy is below a particular threshold
value, then the model is improved by modifying model specific parameters
until a satisfactory accuracy rate is obtained.
3.2 Car Hacking Dataset
Eunbi et al. generated the data set by recording CAN traffic through the On-
Board Diagnostics 2 (OBD-2) port while conducting different attacks
including DoS, fuzzy, spoofing the RPM gauge and drive gear on a real
vehicle. Each attack was conducted for three to five seconds with all four
datasets containing around thirty to forty minutes of CAN traffic. The
attacks were conducted as follows:
DoS Attack: Every 0.3 ms, message packets with CAN ID ‘0000’ were
injected into the CAN bus. CAN ID ‘0000’ is given the most priority in
CAN bus protocol and hence, the injected messages will be given access to
the bus before other normal messages.
Fuzzy Attack: Every 0.5 ms, messages with randomly generated data
values and CAN IDs were injected into the CAN bus.
Spoofing the gear/RPM Attack: Every 1 ms, messages with CAN ID’s
associated with gear and RPM ECUs were injected.
The amount of data generated for each of the attacks is shown in Table
2.
Table 2 Overview of datasets
In order to train the model, all the datasets were concatenated together
to create one single dataset containing all the attack types, which was
further partitioned as presented in Table 3, a 30% testing set and 70%
training set.
Table 3 Training and testing data
(1)
The input to ‘fitc’ function are the training dataset, output variable
which is the label column in this project that indicates whether the data is
an attack or not, hyperparameters and their values.
Hyperparameters can be optimized either manually or using automated
functions. MATLAB provides an automated optimize hyperparameter
option that automatically by default tries out 30 different combinations of
hyperparameter values and selects the one with the least model
classification error. The equation is shown in (2). Although the automated
model tries 30 different combinations, it wouldn’t be covering all the
possible combinations and models developed after automated optimizations
are often overfitted models. Hence, in this project, both manual and
automated optimization approach will be taken to develop models which
will be evaluated and compared to find the best fit with maximum accuracy.
(2)
All the models below are developed using the training set created and
validated using the test set.
(4)
where,
n is the dimension space, which is 1 for one dimension, 2 for two
dimension and so on.
ai and bi corresponds to the coordinates of the points a and b
respectively.
The Euclidean distance between those points is given by Dab.
Here, a new data point, P will be predicted depending on the class of
one of its shortest neighbors for the model with number of neighbors as 1
and for the model with number of neighbors as 5, prediction for P will
depend on the classes of 5 of its shortest neighbors.
All the developed models are then used to predict the outcomes of the
test set. The command for prediction is:
(5)
The predicted outcomes are then compared with the actual known
outcomes to evaluate the model performance.
3.5 Classification Trees
Classification Tree models are developed by identifying and learning the
features that help in classifying a data point into different classes. Contrary
to kNN algorithm, classification trees does not make any assumptions about
the data. They predict new data by passing it through a tree like structure
and are mainly made up of decision nodes and leaves. The decision nodes
divide the data according to its values, while the leaves specify the
outcome. Decision nodes mostly consist of yes or no questions. For
example, to predict whether a person got COVID based on information’s
such as fever, breathing problem, and age, the classification tree might look
like this (Fig. 10).
(7)
where,
The posterior probability of the target class C is given by P(c|x), given
predictor attributes, X.
The probability of predictor given class is P(X|C).
P(c) is the class probability before new data class is predicted.
The prior predictor probability is P(x).
In MATLAB, ‘fitcnb’ command is used to create naïve bayes models
and the optimum property settings can be found by using the
hyperparameter option. Kernel smooth density width is used with the kernel
distribution and defines the shape of the distribution. The output after
optimizing naïve bayes model (Fig. 12).
Fig. 12 Naive Bayes optimization summary
The model with kernel as distribution and its width as 0.00062723 was
found to best estimated model after optimization. Another model was
created using the Gaussian distribution.
(8)
where,
is the class predicted for the new data.
The total number of classes in the dataset is N.
is the posterior probability of a class n for a given observation
x.
C(y|n) is classification cost for classifying a data as y when n is its true
class.
The command for building discriminant analysis model in MATLAB is
‘fitdiscr’ and can be optimized similar to other models using the optimize
hyperparameters option. By default, optimize hyperparameter will optimize
gamma and delta values for linear models. The output after optimization is
shown in Fig. 13.
Fig. 13 Discriminant analysis optimization summary
Out of 30 different value combinations for gamma and delta for linear
models, 7 combinations were producing best results and the model with
values 2.0845e − 06 for delta and 0.28236 for gamma was found to be the
best estimated feasible point.
Four linear discriminant analysis models were developed manually with
gamma and delta values as shown in Table 5.
Table 5 Linear discriminant analysis hyperparameter values
Gamma Delta
0 0
0 0.5
0.5 0
1 0.5
Function Description (all the functions mentioned below are applied on every input element
in a layer)
‘relu’ (9)
‘sigmoid’ (10)
‘none’ (11)
‘tanh’ The tanh function is applied on each input element
(12)
where,
TN stands for true negatives, i.e., the data rightly predicted as normal
data.
where,
True Negatives (TN) is the number of data that are rightly predicted as
normal data.
True Positive (TP) is the number of data rightly predicted as an attack.
False Negative (FN) is the number of data predicted as ordinary attack-
free data when it is actually an attack data.
FP stands for false positives as mentioned in the Eq. 14.
Attack detection time or model runtime is very crucial in the evaluation
of different models due to the dynamic and real-world environment of
CAVs. The models should be able to correctly detect attacks in the least
time. The time taken to test the testing dataset is considered for this
purpose.
It can be seen that the three models highlighted in Table 7 have the
highest accuracy with 97.3, 97.39, and 97.51% and the least FP rates. While
model 5 have a slightly higher accuracy and lower FP rate compared to the
other two models, it is 0.2 s slower and model 4 is 0.3 s slower in testing
than model 2. To get a clearer distinction between the two models in 2 and
5, they are compared by the FP rate and accuracy in detecting different
attacks as shown in Table 8. M1 in Table 8 represents the model with
gamma 0.5 and delta 0, and M2 in table represents gamma 0.2824 and delta
2.048e − 06.
From Table 8, it can be observed that the model with gamma 0.2824 and
delta 2.048e − 06 only have a slightly higher accuracy rate for all the attack
types except fuzzy attacks. Even though this model have slightly higher
accuracy, the model with gamma 0.5 and delta 0 will be considered as the
best DA model since the runtime is 0.2 s faster and have lower FP rates
which are given more importance than an accuracy difference of 0.1%.
Table 8 Model comparison based on different attacks
Attack types M1 FP rate (%) M1 accuracy (%) M2 FP rate (%) M2 accuracy (%)
Normal 0.052 97.3 0.053 97.5
DoS 6.11e − 04 99.3 5.992e − 04 99.4
Fuzzy 2.01e − 06 99.2 2.068e − 06 99.1
Gear spoofing 7.150e − 4 99.31 6.33e − 04 99.39
Attack types M1 FP rate (%) M1 accuracy (%) M2 FP rate (%) M2 accuracy (%)
RPM spoofing 7.587e − 4 99.27 6.02e − 4 99.4
Classification tree and neural network model has the same accuracy of
99.99% but the tree model has lower FP rate with only 0.07 s slower than
neural network. The results after comparing those two models for their
performance in detecting the different attacks are shown in Table 10.
Table 10 Classification tree and neural network model performance comparison
Attack types Tree FP rate Tree accuracy Neural FP rate Neural accuracy
(%) (%) (%) (%)
Normal 4.214e − 07 99.99 3.088e − 05 99.98
DoS 0 100 2.085e − 08 99.99
Fuzzy 2.07e − 08 99.99 1.472e − 06 99.99
Gear spoofing 0 100 0 100
RPM 100 0 100
spoofing
It can be observed that except for DoS, both the models have similar FP
rates and accuracy in detecting all the other attacks. Tree model achieved
100% accuracy and 0% FP rate for detecting DoS attacks while neural
model achieved 99.99% accuracy and 2.085e − 08% FP rate.
Based on the comparisons in Tables 9 and 10, it can be said that
classification tree model and the neural model performed better than all the
other models. The tree model and neural model were able to detect a total of
699,419 and 699,206 attacks respectively from a dataset that contained
4,970,841 data in a very short time. Selecting one model over the other
depends on what evaluation metric is considered more critical. In this
experimentation, accuracy and FP rate are given a marginally higher
weightage than a small difference in time because falsely alarming a vehicle
may cause more issues than providing correct predictions with 0.07 s delay
and hence, the classification tree model is recommended. However, it is still
unclear how this model would perform on unknown attacks and requires
further research.
References
1. Brake (2021) Connected and autonomous vehicles. https://www.brake.org.uk/get-involved/take-
action/mybrake/knowledge-centre/vehicles/connected-and-autonomous-vehicles. Accessed 02
May 2022
2.
Sun X, Yu FR, Zhang P (2022) A survey on cyber-security of connected and autonomous
vehicles (CAVs). IEEE Trans Intell Transp Syst 23(7):6240–6259
[Crossref]
3.
Greenberg A (2015) Wireless communication between cars could be a security risk. Available at:
https://slate.com/technology/2015/10/wireless-communication-between-cars-could-be-asecurity-
risk.html (Accessed: 14 June 2023)
4.
He Q (2021) A machine learning-based anomaly detection framework for connected and
autonomous vehicles cyber security. Mathematics 8:1311
[Crossref]
5.
Chakraborty S et al (2016) Automotive cyber-physical systems: a tutorial introduction. IEEE Des
Test 33(4):92–108
[Crossref]
6.
Lyu N, Duan Z, Xie L, Wu C (2017) Driving experience on the effectiveness of advanced driving
assistant systems. In: Proceedings of the 4th international conference on transportation
information and safety, pp 987–992
7.
Tsiropoulou EE, Baras JS, Papavassiliou S, Sinha S (2017) Rfid-based smart parking
management system. Cyber Phys Syst 3(4):22–41
[Crossref]
8.
Anon (2014) Consommation en Europe: 2009–2014 Les Annees Qui Ont Tout Change. http://
observatoirecetelem.com
9.
Jones L (2017) Driverless cars: when and where? Automotive autonomous vehicles. Eng Technol
12(2):36–40
[Crossref]
10.
Fan H et al (2018) Baidu apollo em motion planner. http://arxiv.org/abs/1807.08048
11.
Cottam BJ (2018) Transportation planning for connected autonomous vehicles: how it all fits
together. Transp Res Rec 2672:12–19
[Crossref]
12.
Kuang X, Zhao F, Hao H, Liu Z (2018) Intelligent connected vehicles: the industrial practices
and impacts on automotive value-chains in china. Asia Pacif Bus Rev 24(1):1–21
[Crossref]
13.
Anon (2017) Japan plans test site for self-driving cars. http://asia.nikkei.com/Tech-Science/Tech/
Japan-plans-test-site-for-self-driving-cars. Accessed 21 June 2022
14.
Locke J (2020) What is connected vehicle technology and what are the use cases? https://www.
digi.com/blog/post/what-is-connected-vehicle-technology-and-use-cases. Accessed 18 June 2022
15.
Nikitas A, Michakopoulou K, Njoya ET, Karampatzakis D (2020) Artificial intelligence,
transport and the smart city: definitions and dimensions of a new mobility era. Sustainability
12(7):2789
[Crossref]
16.
Qayyum A, Usama M, Qadir J, Al Fuqaha A (2020) Securing connected and autonomous
vehicles: challenges posed by adversarial machine learning and the way forward. IEEE Commun
Surv Tutor 22(2):998–1026
[Crossref]
17.
Shladover SE, Nawakowski C, Lu XY, Ferlis R (2015) Cooperative adaptive cruise control:
definitions and operating concepts. Transp Res Rec 2489(1):145–152
[Crossref]
18.
Stazswezki R, Estl H (2013) Making cars safer through technology innovation, Dallas. Accessed
17 June 2022
19.
Jonsson E, Kleberger P, Olovsson T (2011) Security aspects of the in-vehicle network in the
connected car. In: IEEE intelligent vehicle symposium (IV), pp 528–533
20.
Koscher K, Czeskis A, et al. (2010) Experimental security analysis of a modern automobile. In:
IEEE symposium on security and privacy (SP), pp 447–462
21.
Martin (2022) CAN bus explained: a simple intro. https://www.csselectronics.com/pages/can-
bus-simple-intro-tutorial. Accessed 15 July 2022
22.
Bouzima S, Braham R (2019) An anomaly detector for CAN bus networks in autonomous cars
based on neural networks. In: Proceedings of the 2019 international conference on wireless and
mobile computing, networking and communications (WiMob), pp 1–6
23.
Carsten P, Andel TR, Yampolskiy M, McDonald JT (2015) In-vehicle networks: attacks,
vulnerabilities, and proposed solutions. In: CISR ‘15: proceedings of the 10th annual cyber and
information security research conference, vol 1, pp 1–8
24.
Knight A (2016) Understanding electronic control units (ECUs) in connected automobiles and
how they can be hacked. https://cybersecurity.att.com/blogs/security-essentials/understanding-
electronic-control-units-ecus-in-connected-automobiles-and-how-they-can-be-hacked. Accessed
13 July 2022
25.
GOV.UK (2017) The key principles of vehicle cyber security for connected and automated
vehicles. https://www.gov.uk/government/publications/principles-of-cyber-security-for-
connected-and-automated-vehicles. Accessed 13 July 2022
26.
ENISA (2019) Cyber security and resilience of smart cars. http://www.enisa.europa.eu/
publications/cyber-security-and-resilience-of-smart-cars. Accessed 17 July 2022
27.
NHTSA (2020) Cyber security best practices for the safety of modern vehicles. https://www.
nhtsa.gov/sites/nhtsa.gov/files/documents/vehicle_cybersecurity_best_practices_01072021.pdf.
Accessed 14 July 2022
28.
Huld A (2022) China internet of vehicles—new guidelines set framework for industry standards.
https://www.china-briefing.com/news/china-internet-of-vehicles-new-guidelines-set-framework-
for-industry-standards/. Accessed 13 July 2022
29.
Kumar S, Mann KS (2019) Prevention of DoS attacks by detection of multiple malicious nodes
in VANETs. In: Proceedings of the 2019 international conference on automation, computational
and technology management, pp 89–94
30.
Appathurai A, Mangoran G, Chilamkurti N (2018) Trusted FPGA-based transport traffic inject,
impersonate (I2) attacks beaconing in the internet of vehicles. IET Netw 8(2):106–115
31.
Mondal A, Jana M (2019) Detection of fabrication, replay and suppression attack in VANET-a
database approach. Proceed Conf Adv Comput Commun Elect Paradigm 1(18):38–42
32.
Verma A, Saha R, Kumar G, Kim TH (2021) The security perspectives of vehicular networks: A
taxonomical analysis of attacks and solutions, applied Sciences, 11(10):4682. https://doi.org/10.
3390/app11104682
33.
Albouq SS, Fredericks EM (2017) Lightweight detection and isolation of black hole attacks in
connected vehicles. In: Proceedings of the 2017 IEEE 37th international conference on
distributed computing systems workshops (ICDCSW), pp 97–104
34.
Purohit K, Dimri S, Jasola S (2017) Mitigation and performance analysis of routing protocols
under black-hole attack in vehicular ad-hoc network (VANET). Wireless Pers Commun
97:5099–5114
[Crossref]
35.
Shukla RM, Sengupta S (2018) Analysis and detection of outliers due to data falsification attacks
in vehicular traffic prediction application. In: Proceedings of the 2018 9th IEEE annual
ubiquitous computing, electronics and mobile communication conference (UEMCON), pp 688–
694
36.
Kamal M et al (2021) GPS location spoofing attack detection for enhancing the security of
autonomous vehicles. In: Proceedings of the 2021 IEEE 94th vehicular technology conference
(VTC2021-Fall), pp 1–7
37.
El-Rewini Z et al (2020) Cybersecurity attacks in vehicular sensors. IEEE Sens J 20(22):13752–
13767
[Crossref]
38.
Hill C (2022) A brief introduction to the SAE J1939 protocol. https://copperhilltech.com/a-brief-
introduction-to-the-sa-j1939-protocol/. Accessed 19 July 2022
39.
Brooks RR, Sander S, Deng J, Taiber J (2009) Automobile security concerns. IEEE Vehicul
Technol Mag 4(2):52–64
[Crossref]
40.
Higgins KJ (2009) Permanent denial-of-service attack sabotages hardware. https://www.
darkreading.com/permanent-denial-of-service-attack-sabotages-hardware/d/d-id/1129499.
Accessed 20 July 2022
41.
Jeong DR et al (2019) Razzer: finding kernel race bugs through fuzzing. In: Proceedings of the
2019 IEEE symposium on security and privacy (SP), pp 754–768
42.
Arif M, Wang G, Balas VE (2018) Secure VANETs: trusted communication scheme between
vehicles and infrastructure based on fog computing. Stud Inform Control 27(2):235–246
[Crossref]
43.
Liang W et al (2019) TBRS: a trust based recommendation scheme for vehicular CPS network.
Fut Gen Comput Syst 92:383–398
[Crossref]
44.
Wu Y et al (2018) Secrecy-driven resource management for vehicular computation offloading
networks. IEEE Netw 32(3):84–91
[Crossref]
45.
Luo YB, Wang BS, Cai GL (2014) Effectiveness of port hopping as a moving target defense, In:
2014 7th International Conference on Security Technology, Hainan, China, 7–10. https://doi.org/
10.1109/SecTech.2014.9
46.
Limbasiya T, Das D (2018) Secure and effective geo-data transmission scheme for vehicle-to-
vehicle communication. In: Proceedings of the 2018 IEEE SmartWorld, ubiquitous intelligence
and computing, advanced and trusted computing, scalable computing and communications, cloud
and big data computing, internet of people and smart city innovation, pp 389–396
47.
Hegde N, Manvi SS (2019) Hash based integrity verification for vehicular cloud environment.
In: Proceedings of the 2019 IEEE international conference on cloud computing in emerging
markets (CCEM), pp 75–79
48.
Sutrala AK et al (2020) On the design of conditional privacy preserving batch verification-based
authentication scheme for internet of vehicles deployment. IEEE Trans Vehicul Technol
69(5):5535–5548
[Crossref]
49.
Biron A, Merco R, Pisu P (2018) Replay attack detection in a platoon of connected vehicles with
cooperative adaptive cruise control. In: 2018 Annual American Control Conference (ACC), pp.
5582–5587
50.
Sánchez HS, Rotondo D, Vidal ML, Quevedo J (2019) Frequency-based detection of replay
attacks: application to a quadrotor UAV. In: Proceedings of the 2019 8th international conference
on systems and control (ICSC), pp 289–294
51.
Panda N, Pattanayak K (2018) Energy aware detection and prevention of black hole attack in
MANET. Int J Eng Technol 7(26):135–140
52.
Hassan Z, Mehmood A, Maple C, Khan MA, Aldegheishem A (2020) Intelligent detection of
black hole attacks for secure communication in autonomous and connected vehicles. IEEE
Access 8:199618–199628
[Crossref]
53.
Qiu Y, Liu Y, Li X, Chen J (2020) A novel location privacy-preserving approach based on
blockchain. Sensors 20(12):3519
[Crossref]
54.
Zhou Y, Zhang D (2019) Double mix-zone for location privacy in VANET. In: ICIT 2019:
proceedings of the 2019 7th international conference on information technology: IoT and Smart
City, pp 322–327
55.
Petit J, Stottelaar B, Feiri M (2015) Remote attacks on automated vehicles sensors: experiments
on camera and LiDAR. Black Hat Europe
56.
Parkinson S, Ward P, Wilson K, Miller J (2017) Cyber threats facing autonomous and connected
vehicles: future challenges. IEEE Trans Intell Transp Syst 18(11):2898–2915
[Crossref]
57.
Shao F, Wu Y (2018) The TPMS module in the vehicle positioning and safety warning system.
Int Conf Appl Techn Cyber Sec Intell 842:1307–1314
58.
Alam MSU, Iqbal S, Zulkernine M, Liem C (2019) Securing vehicle ECU communications and
stored data. In: Proceedings of the ICC 2019—2019 IEEE international conference on
communications (ICC), pp 1–6
59.
Lenard T, Bolboacă R, Genge B, Haller P (2020) MixCAN: mixed and backward-compatible
data authentication scheme for controller area networks. In: IFIP networking conference, pp
395–403
60.
Shenfield A, Day D, Ayesh A (2018) Intelligent intrusion detection systems using artificial neural
networks. ICT Express 4(2):95–99
[Crossref]
61.
Levi M, Allouche Y, Kontorovich A (2018) Advanced analytics for connected car cybersecurity.
In: Proceedings of the 2018 IEEE 87th vehicular technology conference (VTC Spring), pp 1–7
62.
Salman N, Bresch M (2017) Design and implementation of an intrusion detection system (IDS)
for in-vehicle networks. https://publications.lib.chalmers.se/records/fulltext/251871/251871.pdf.
Accessed 4 Oct 2022
63.
Song HM, Kim HR, Kim HK (2016) Intrusion detection system based on the analysis of time
intervals of CAN messages for in-vehicle network. In: Proceedings of the 2016 international
conference on information networking (ICOIN), pp 63–68
64.
Bi Z, Xu G, Xu G, Tian M, Jiang R, Zhang S (2022) Intrusion detection method for In-vehicle
CAN bus based on message and time transfer matrix, security and communication networks,
Article ID 2554280, 19. https://doi.org/10.1155/2022/2554280
65.
Rajbahadur GK, Malton AJ, Walenstein A, Hassan AE (2018) A survey of anomaly detection for
connected vehicle cybersecurity and safety. In: IEEE intelligent vehicles symposium (IV), pp
421–426
66.
Eunbi S, Song HM, Kim HK (2018) GIDS: GAN based intrusion detection system for in-vehicle
network. In: Proceedings of the 2018 16th annual conference on privacy, security and trust (PST)
67.
Anon (2013) Ann dependency (graph). https://commons.wikimedia.org/wiki/File:Ann_
dependency_(graph).svg. Accessed 12 Aug 2022
68.
Boeira F, Asplund M, Barcellos M (2019) Decentralized proof of location in vehicular Ad Hoc
networks, Comput Commun 147:98–110. Available at: https://doi.org/10.1016/J.COMCOM.
2019.07.024
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_7
Murat Kuzlu
Email: mkuzlu@odu.edu
Evren Catak
Email: evren.catak@ieee.org
Abstract
Next-generation communication networks (NextG or 5G and beyond) have
become more essential to be able to realize cutting-edge applications, such
as autonomous cars, mobile healthcare and education, metaverse, digital
twins, virtual reality, and many more. All those applications need high-
speed, low latency, and secure data transmission. Artificial intelligence (AI)
technologies are the main drivers and play a critical role because of their
significant contribution to all layers in NextG, i.e., from the physical to the
application layer. On the other hand, the security and privacy concerns for
applications using AI-based methods in next-generation networks have not
been fully investigated in terms of cyber vulnerabilities. This book chapter
focuses on the AI-enabled applications on the physical layer of NextG
networks, including multiple input multiple output (MIMO) beamforming,
channel estimation, spectrum sensing, and intelligent reflecting surfaces
(IRS), as well as provides a comprehensive analysis of the potential use
case, i.e., channel estimation, along with its vulnerability under adversarial
machine learning attacks with and without the defensive distillation
mitigation method. According to simulations outcomes, AI-enabled Next-G
applications are vulnerable to adversarial attacks, and the proposed
mitigation methods are able to improve the robustness and performance of
AI-enabled models under adversarial attacks.
1 Introduction
The next-generation networks, i.e., 5G and beyond, have been penetrated
into all sectors, including infrastructure, computing, security, and privacy.
The main goal of NextG networks is to realize cutting-edge applications,
including metaverse, mobile healthcare, and education, autonomous cars,
augmented reality (AR), virtual reality (VR), and others. It is expected that
NextG networks will support very high data transmission (more than 100
Gbps), ultra-low latency (milliseconds), and a high cellular traffic capacity
(10 million devices per square kilometer) [1–3]. Advanced communication
technologies are key drivers to achieve these goals, which include
millimeter wave (mmWave), massive multiple-input multiple-output
(massive MIMO), and artificial intelligence (AI). In the literature, advanced
communication technologies have been studied in [4–8]. In frequency
bands above 24 GHz, mmWave provides many advantages in terms of
throughput, capacity, and latency. The advanced version of MIMO, i.e.,
massive MIMO, can also significantly increase the quality throughput and
capacity of the radio link by using a group of antennas at both the
transmitter and receiver sides.
AI also plays an essential role in achieving these requirements to
improve network applications’ efficiency, latency, and reliability [9]. AI has
been applied to especially several NextG applications at the physical layer,
including beamforming, channel estimation, spectrum sensing, intelligent
reflecting surfaces (IRS), and others. The authors in [4] investigate the role
of AI-based solutions in deploying and optimizing 5G and beyond network
operations. They stressed that NextG networks are different from current
networks in terms of architecture, communication and computing
technologies, and applications. The study [10] emphasized the contribution
of AI-based solutions to NextG networks in terms of improving network
performance and provided an extensive review of NextG networks using
AI-based solutions, which focus on physical layer applications, including
reconfigurable intelligent surface (RIS), massive MIMO, and multi-carrier
(MC) waveform. These AI-based algorithms significantly improve the
overall system performance for NextG networks.
On the other hand, AI-based algorithms brings security and privacy
concerns. In the literature, there are several studies regarding this concern,
e.g., model poisoning in the wireless research community is studied [11–
16]. The authors in [17] proposed a robust framework to detect adversarial
attacks for industrial artificial intelligence systems (IAISs). According to
the results, the framework can detect several adversarial attacks, including
DeepFool and fast gradient signed method (FGSM), with high accuracy and
low delay. Since AI-enabled models could be vulnerable to adversarial
attacks, AI-enabled models should be evaluated in terms of risk assessment,
vulnerabilities, security and privacy concerns before deploying in the next-
generation wireless communication networks.
This book chapter provides a comprehensive review of security and
privacy concerns in the NextG network using AI-based solutions along with
a potential use case. It also provides a brief description of widely used
adversarial attacks and mitigation methods. The attacks include Fast Carlini
& Wagner (C & W), Basic Iterative Method (BIM), Momentum Iterative
Method (MIM), Projected Gradient Descent (PGD), and, Gradient Sign
Method (FGSM), while mitigation methods include adversarial machine
learning and defensive distillation. It also implements a potential use case,
i.e., channel estimation, along with its vulnerability under adversarial
attacks with and without the mitigation method.
Fig. 2 Cyber kill chain for AI-based applications of 6G wireless communication networks
(ii) The weaponization phase occurs when the attacker utilizes the
information collected during the reconnaissance phase to develop the
tools they need to successfully make an attack against the
organization. The adversary will use the information collected during
the previous stage to choose the best delivery instrument to get the
information it wants to deliver to the organization’s IT infrastructure.
The adversary can then concentrate on the delivery phase, using the
same tools to provide information or files to the organization’s IT
infrastructure.
(iii) The attacker must make use of a vulnerability in the organization’s
network once the information has been provided. The information
gathered during the reconnaissance phase can be used to identify the
software operated by the organization, operating systems, and
applications running on the organization’s systems.
(iv) After the adversary has gathered information about the target
organization during the reconnaissance phase, they will use this
information to exploit the organization’s network during the
exploitation phase. The adversary will identify the best software,
operating systems, and applications to exploit to install malicious
software on the organization’s systems. This malicious software will
allow the adversary to manipulate or listen in the organization’s
network.
(v) The command and control phase refers to when the attacker uses the
malicious program installed during the exploitation phase to place
further malicious software on the organization’s systems. This allows
them to control the organization’s systems.
(vi) The attacker may utilize the malicious program placed in the course
of the exploitation phase to reach the organization’s systems and loot
information during the actions on objectives phase. They may also
interfere with the organization’s network.
The cyber kill chain is a process that details the steps an adversary takes
to launch a successful cyberattack. Once the adversary has completed all
the process steps, the organization’s ability to employ its network can be
affected.
3.3 Adversarial Machine Learning Attacks
There are two main types of adversarial machine learning models: the
attacker’s and the user’s models. The attacker’s goal is to manipulate the
output of the user’s model so that the attacker can benefit from the user’s
perspective [20]. Adversarial machine learning attacks are effective if the
attacker accesses the training data. However, the proposed scheme is robust
to the perturbations of the adversarial samples of the training data, which in
turn makes the proposed scheme robust to adversarial machine learning
attacks.
For example, to attack a deep learning model that predicts beamforming
vectors, the attacker first needs to find a noise vector that will
maximize the loss function output. The attacker then uses the lowest
possible budget to corrupt the inputs, which increases the distance (i.e.,
mean squared error (MSE)) between the model’s prediction and the real
beam vector. Therefore, is calculated as
(1)
where is the label (i.e., beamforming vectors), and p is the norm
value, and it can be .
There are two primary methods of constructing adversarial examples:
content-based and gradient-based [21]. Gradient-based attacks were chosen
due to their simplicity and variety. Gradient-based attacks use the gradient
of the loss function to generate adversarial examples, which are then
incorrectly labeled.
(i) Fast Gradient Sign Method (FGSM): FGSM tries to fool a neural
network by changing the data given a little bit. The idea is to add
noise to the data in the same direction as the loss function. The noise
is controlled by a small number, epsilon. This makes the data look
slightly different to the neural network, but enough to fool it.
(2)
(ii) Basic Iterative Method (BIM): The BIM attack is a variation of the
FGSM single-step attack. It works by iteratively updating adversarial
examples multiple times, with each value calculated in the
neighborhood of the original input. The selected input with a smaller
step size is manipulated by BIM iteratively. FGSM is applied
multiple times to a small step size alpha instead of taking one
significant step, i.e., epsilon/alpha. By doing this, BIM creates less
distortion while still fooling the neural network. However, this
increases the computing cost and complexity. The BIM can be
explained using the following equation.
(3)
(iii) Projected Gradient Descent (PGD): PGD creates adversarial
examples by starting the search at random points in a specified region
and running several iterations to find an example that maximizes loss,
which will be similar to a real input but different enough to trip up the
ML model. PGD can generate more powerful attacks than BIM and
FGSM. However, the size of the perturbation is kept smaller than a
specified value, referred to as epsilon, so that the adversarial example
is still realistic and isn’t just a random input.
where is the probability of i-th class and are the logits. The teacher
model is used to predict each sample to acquire the training data’s soft
labels which are used to train the student model. Figure 4 shows the overall
steps for this technique.
(6)
Fig. 6 MSE comparison for defended channel estimation model under adversarial attacks
Defended Undefended
BIM FGSM MIM PGD BIM FGSM MIM PGD
0.1 1.510613 1.121487 1.223872 1.513761 1.517611 1.123785 1.236382 1.534755
0.2 1.508010 1.121527 1.140600 1.468598 1.582042 1.123365 1.171341 1.566335
0.5 1.277997 1.121636 1.221769 1.646010 1.575610 1.122185 1.319650 2.164850
0.8 1.520606 1.031109 1.062509 1.520017 2.553312 1.029960 1.143569 2.482308
1.0 1.146857 1.109705 1.206056 1.617474 2.340146 1.108166 1.388278 2.982269
Defended Undefended
BIM FGSM MIM PGD BIM FGSM MIM PGD
1.1 1.458215 1.031218 1.139865 1.580210 3.158410 1.029011 1.291160 3.105877
1.4 1.254450 1.121870 1.279377 1.603026 3.444848 1.119346 1.567613 3.878579
1.7 1.562587 1.124703 1.360767 1.563201 4.917432 1.121440 1.695858 4.451830
2.0 1.424730 1.160261 1.351300 1.744564 5.372514 1.156977 1.569844 5.602715
2.3 1.538028 1.122384 1.544590 1.869615 6.512692 1.117764 1.955341 6.778334
2.6 1.679046 1.125183 1.597183 2.076902 7.816463 1.120118 1.830526 7.618081
2.9 1.834858 1.032794 1.741633 2.342456 9.272282 1.026461 1.961652 9.940795
3.0 2.105044 1.032966 1.791616 2.264387 10.693936 1.026504 2.031071 9.321798
Table 2 shows the impact of attack power ( ) on undefended and
defended models’ performance, i.e., MSE, for each adversarial attack in
detail. The value of ranges from 0.1 to 3.0. The higher value of means a
powerful attack. The lowest MSE value is 1.12 (under FGSM attack), and
the highest MSE value is 10.69 (under BIM attack) for defended models.
On the other hand, the lowest MSE value is 1.12 (under FGSM attack), and
the highest MSE value is 2.26 (under PGD attack). MSE values
dramatically go down from 10.69/9.32 to 2.10/2.26 for BIM/PGD after the
mitigation method is applied. It is clear that the mitigation method
significantly improves the model’s robustness, especially BIM and PGD.
However, it cannot be said for FGSM and MIM attacks. According to
Table 2, MSE values do not change as expected; they look closely to
undefended and defended models, e.g., MSE values are 1.02 and 1.03 for
undefended and defended models under an FGSM attack.
5.3 Observations
This study investigates undefended and defended AI-powered channel
estimation models in NextG networks in terms of their vulnerabilities
against adversarial attacks, i.e., FGSM, MIM, BIM, and PGD. Defensive
distillation, as the migration method, is applied to the defended models. The
overall results show that AI-powered models are vulnerable to adversarial
attacks, and models’ vulnerabilities can be significantly reduced for some
types of attacks, i.e., to be improved the models’ robustness. Observations
can be given as follows:
1: AI-powered channel estimation models are vulnerable to adversarial
attacks, especially, under a high attack power ( ) for BIM and PDG.
2: The attack power ( ) has no impact on some adversarial attacks,
i.e., FGSM and MIM.
3: The selected mitigation method can significantly increase the model
robustness, especially for BIM and PGD.
4: The strongest attack is BIM, while the weakest is FGSM for
undefended models.
5: The strongest attack is PDG, while the weakest is FGSM for
defended models.
(ii)
(ii)
(7)
7 Summary
The NextG projects have been initiated to support a wide range of diverse
applications, from AR/VR, metaverse, mobile healthcare, autonomous cars
to digital twins and many more, by both the academia and the industry
integrated with advanced cloud communication and data, computing, AI
technologies in recent years. It has no doubt that AI is the most important
tool in terms of significant contribution to all layers in NextG, i.e., from the
physical to the application layer. On the other hand, the security and privacy
concerns for NextG applications using AI-enabled solutions have not been
fully addressed due to its complexity and multidisciplinary. This book
chapter focuses on the AI-enabled applications on the physical layer of
NextG networks, including beamforming, channel estimation, spectrum
sensing, and IRS, and intends to investigate the vulnerability of AI-enabled
channel estimation models under the selected adversarial attacks, such as
FGSM, MIM, BIM, and PGD, with and without the selected mitigation
(defensive distillation). According to the results, the AI-enabled channel
estimation model is vulnerable to adversarial attacks. On the other hand,
mitigation methods can significantly improve the performance and
robustness of AI-enabled models under adversarial attacks.
References
1. Agiwal M, Roy A, Saxena N (2016) Next generation 5G wireless networks: a comprehensive
survey. IEEE Commun Surv Tutorials 18(3):1617–1655. https://doi.org/10.1109/COMST.2016.
2532458
[Crossref]
2.
Ziegler V, Yrjola S (2020) 6G indicators of value and performance. In: 2020 2nd 6G wireless
summit (6G SUMMIT), pp 1–5. https://doi.org/10.1109/6GSUMMIT49458.2020.9083885
3.
Johansson NA, Wang Y-PE, Eriksson E, Hessler M (2015) Radio access for ultra-reliable and
low-latency 5G communications. In: IEEE international conference on communication workshop
(ICCW), pp 1184–1189. https://doi.org/10.1109/ICCW.2015.7247338
4.
Letaief KB, Chen W, Shi Y, Zhang J, Zhang Y-JA (2019) The roadmap to 6G: AI empowered
wireless networks. IEEE Commun Mag 57(8):84–90. https://doi.org/10.1109/MCOM.2019.
1900271
[Crossref]
5.
Kaur J, Khan MA, Iftikhar M, Imran M, Haq QEU (2021) Machine learning techniques for 5G
and beyond. IEEE Access 9:23472–23488
[Crossref]
6.
Wilhelmi F, Carrascosa M, Cano C, Jonsson A, Ram V, Bellalta B (2021) Usage of network
simulators in machine-learning-assisted 5G/6G networks. IEEE Wireless Commun 28(1):160–
166
[Crossref]
7.
Khan S, Hussain A, Nazir S, Khan F, Oad A, Alshehri MD (2022) Efficient and reliable hybrid
deep learning-enabled model for congestion control in 5G/6G networks. Comput Commun
182:31–40
[Crossref]
8.
Piran MJ, Suh DY (2019) Learning-driven wireless communications, towards 6G. In: 2019
international conference on computing, electronics & communications engineering (ICCECE).
IEEE, pp 219–224
9.
Morocho Cayamcela ME, Lim W (2018) Artificial intelligence in 5G technology: a survey. In:
2018 international conference on information and communication technology convergence
(ICTC), pp 860–865. https://doi.org/10.1109/ICTC.2018.8539642
10.
Ozpoyraz B, Dogukan AT, Gevez Y, Altun U, Basar E (2022) Deep learning-aided 6G wireless
networks: a comprehensive survey of revolutionary PHY architectures. arXiv:2201.03866
11.
Dang S, Amin O, Shihada B, Alouini M-S (2020) What should 6G be? Nat Electron 3(1):20–29
[Crossref]
12.
Kuzlu M, Fair C, Guler O (2021) Role of artificial intelligence in the internet of things (IoT)
cybersecurity. Discov Internet Things 1(1):1–14
[Crossref]
13.
Porambage P, Gür G, Osorio DPM, Liyanage M, Ylianttila M (2021) 6G security challenges and
potential solutions. In: Proceedings of IEEE joint European conference on networks and
communications (EuCNC) 6G Summit, pp 1–6
14.
Siriwardhana Y, Porambage P, Liyanage M, Ylianttila M (2021) AI and 6G security:
opportunities and challenges. In: Proceedings of IEEE joint European conference on networks
and communications (EuCNC) 6G Summit, pp 1–6
15.
Catak FO, Kuzlu M, Catak E, Cali U, Unal D (2022) Security concerns on machine learning
solutions for 6G networks in mmwave beam prediction. Phys Commun 52:101626. https://doi.
org/10.1016/j.phycom.2022.101626
16.
Catak E, Catak FO, Moldsvor A (2021) Adversarial machine learning security problems for 6G:
mmwave beam prediction use-case. In: IEEE international Black Sea conference on
communications and networking (BlackSeaCom), pp 1–6. https://doi.org/10.1109/
BlackSeaCom52164.2021.9527756
17.
Li G, Ota K, Dong M, Wu J, Li J (2020) Desvig: decentralized swift vigilance against adversarial
attacks in industrial artificial intelligence systems. IEEE Trans Ind Inf 16(5):3267–3277. https://
doi.org/10.1109/TII.2019.2951766
[Crossref]
18.
Yastrebova A, Kirichek R, Koucheryavy Y, Borodin A, Koucheryavy A (2018) Future networks
2030: architecture & requirements. In: 10th international congress on ultra modern
telecommunications and control systems and workshops (ICUMT). IEEE, pp 1–8
19.
Liu G, Huang Y, Li N, Dong J, Jin J, Wang Q, Li N (2020) Vision, requirements and network
architecture of 6G mobile network beyond 2030. China Commun 17(9):92–104. https://doi.org/
10.23919/JCC.2020.09.008
20.
Faruk Tuna O, Ozgur Catak F, Taner Eskil M (2021) Exploiting epistemic uncertainty of the deep
learning models to generate adversarial samples, arXiv e-prints arXiv:2102.04150
21.
Vardhan R (2021) An ensemble approach for explanation-based adversarial detection, Ph.D.
thesis
22.
Fostiropoulos I, Shbita B, Marmarelis M. Robust defense against L p-norm-based attacks by
learning robust representations
23.
Papernot N, McDaniel P, Wu X, Jha S, Swami A (2016) Distillation as a defense to adversarial
perturbations against deep neural networks. arXiv:1511.04508
24.
Ma J, Li GY, Juang BH (2009) Signal processing in cognitive radio. Proc IEEE 97(5):805–823
[Crossref]
25.
Develi I et al (2020) Spectrum sensing in cognitive radio networks: threshold optimization and
analysis. EURASIP J Wireless Commun Netw 2020(1):1–19
26.
Mitola J, Maguire GQ (1999) Cognitive radio: making software radios more personal. IEEE
Personal Commun 6(4):13–18
27.
Yucek T, Arslan H (2009) A survey of spectrum sensing algorithms for cognitive radio
applications. IEEE Commun Surv Tutorials 11(1):116–130
28.
Zeng Y, Liang Y-C, Hoang AT, Zhang R (2010) A review on spectrum sensing for cognitive
radio: challenges and solutions. EURASIP J Adv Signal Process 1–15
29.
Sarp S, Tang H, Zhao Y (2021) Use of intelligent reflecting surfaces for and against wireless
communication security. In: IEEE 4th 5G World Forum (5GWF). IEEE, pp 374–377
30.
Rusek F, Persson D, Lau BK, Larsson EG, Marzetta TL, Edfors O, Tufvesson F (2012) Scaling
up mimo: opportunities and challenges with very large arrays. IEEE Signal Process Mag
30(1):40–60
[Crossref]
31.
5G Simularion Software, Network Simulation Tools. https://se.mathworks.com/products/5g.html
32.
Matlab 5G Toolbox. https://www.mathworks.com/products/5g.html. Accessed 30 Sept 2021
33.
Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-
first annual ACM symposium on theory of computing, STOC ’09, Association for Computing
Machinery, New York, NY, USA, 2009, pp 169–178. https://doi.org/10.1145/1536414.1536440
34.
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In:
Stern J (ed) Advances in cryptology—EUROCRYPT ’99. Springer, Heidelberg, pp 223–238
[Crossref]
35.
Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete
logarithms. IEEE Trans Inf Theor 31(4):469–472. https://doi.org/10.1109/TIT.1985.1057074
[MathSciNet][Crossref][zbMATH]
36.
Goldwasser S, Micali S (1982) Probabilistic encryption amp; how to play mental poker keeping
secret all partial information. In: Proceedings of the fourteenth annual ACM symposium on
theory of computing, STOC ’82, Association for Computing Machinery, New York, NY, USA,
1982, pp 365–377. https://doi.org/10.1145/800070.802212
37.
Boneh D, DeMillo RA, Lipton RJ (1997) On the importance of checking cryptographic protocols
for faults. In: Fumy W (ed) Advances in cryptology—EUROCRYPT ’97. Springer, Heidelberg,
pp 37–51
[Crossref]
38.
Rivest RL, Dertouzos ML (1978) On data banks and privacy homomorphisms
39.
Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring-LWE and
security for key dependent messages. In: Rogaway P (ed) Advances in cryptology—CRYPTO
2011. Springer, Heidelberg, pp 505–524
[Crossref]
40.
McMahan HB, Moore E, Ramage D, Hampson S, Arcas BA (2047) Communication-efficient
learning of deep networks from decentralized data. In: International conference on artificial
intelligence and statistics
41.
Konečný J, McMahan HB, Yu FX, Richtarik P, Suresh AT, Bacon D (2016) Federated learning:
strategies for improving communication efficiency. In: NIPS workshop on private multi-party
machine learning. arXiv:1610.05492
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_8
A Blockchain-Enabled Approach
for Secure Data Sharing in 6G-based
Internet of Things Networks
Hussein El Ghor1 and Bilal Nakhal1
(1) CyberVision Lab, Department of Mathematics and Computer Science,
Beirut Arab University, Beirut, Lebanon
Bilal Nakhal
Email: b.nakhal@bau.edu.lb
Abstract
The 6th generation of wireless networks (6G) promises to provide ultra-
reliable, high-speed, and low-latency communication for Internet of Things
(IoT) devices. However, securing data transmission and storage in these
networks is a critical challenge due to potential security threats. Blockchain
technology provides a solution to enhance security in IoT networks by
enabling secure, decentralized, and tamper-proof data sharing. In this paper,
we proposed a novel solution for securing data sharing and storage in 6G-
based IoT networks using blockchain technology, hybrid encryption, and
IPFS. The proposed approach consists of four algorithms that enhance the
security of the system: a user authentication algorithm, a data access
algorithm, a data storage algorithm, and a secure data sharing algorithm. The
secure data sharing algorithm enables secure, tamper-proof data sharing
among authorized devices using a permissioned blockchain. These
algorithms are implemented using hybrid encryption, which ensures data
confidentiality, and have been evaluated for their effectiveness in enhancing
security in 6G-based IoT networks. Our work contributes to the growing
body of research on blockchain-enabled solutions for securing data in IoT
networks and provides insights into the potential of blockchain technology,
hybrid encryption, and IPFS to enhance security in 6G-based IoT networks.
The proposed approach using these algorithms provides secure and tamper-
proof data sharing, making the system more secure and reliable. We
presented the technical details of our approach and evaluate its effectiveness
in terms of security, with a particular focus on the role of hybrid encryption
and IPFS in enhancing the security and reliability of the system. Our results
demonstrate that the proposed approach enhances data security in 6G-based
IoT networks by providing secure and tamper-proof data sharing. The use of
hybrid encryption and IPFS makes the system more secure and reliable, with
hybrid encryption ensuring data confidentiality and IPFS providing
decentralized and fault-tolerant storage.
1 Introduction
The emergence of the Internet of Things (IoT) has led to the proliferation of
connected devices and generated massive amounts of data [1]. IoT has
become a key component of our daily lives, with billions of interconnected
devices generating and transmitting data across the network. With the advent
of the 6th generation of wireless networks (6G), IoT devices are expected to
transmit and process data with ultra-reliable, high-speed, and low-latency
communication. The 6th Generation (6G) of mobile communication
technology is currently under development and is expected to provide a new
level of connectivity to the Internet of Things (IoT) devices. 6G-based IoT
networks are characterized by ultra-low latency, high bandwidth, and
massive device connectivity, which will enable new applications and
services that are not possible with the current 5G networks.
The architecture of 6G-based IoT networks is expected to be based on a
distributed and decentralized architecture, which will enable devices to
communicate with each other directly, without the need for central servers.
This architecture will enable new use cases such as peer-to-peer
communication, real-time collaboration, and edge computing.
Currently, data sharing in IoT networks is done using centralized
approaches, where data is collected and processed by central servers. This
approach has several limitations, including high latency, lack of scalability,
and vulnerability to cyber-attacks. Additionally, centralized approaches are
not suitable for applications that require real-time data processing, such as
autonomous driving and remote surgery.
However, the distributed and decentralized architecture of 6G-based IoT
networks also poses several challenges related to security and privacy. One
of the key challenges is how to enable secure data sharing among the devices
in the network. Data sharing is essential in IoT networks for enabling
applications such as smart homes, smart cities, and smart transportation.
To overcome these limitations, new approaches for data sharing in 6G-
based IoT networks are needed. One promising approach is the use of
blockchain technology, which provides a decentralized and secure way of
storing and sharing data. Blockchain technology enables data to be shared
directly between devices, without the need for central servers, while
ensuring the integrity and confidentiality of the data.
In summary, 6G-based IoT networks offer new opportunities for
connectivity and innovation, but also pose several challenges related to
security and privacy. Centralized approaches to data sharing are not suitable
for these networks, and new approaches such as blockchain technology are
needed to enable secure and efficient data sharing.
Additionally, the rapid growth of IoT networks has also created
significant security challenges, particularly when it comes to data sharing
between devices [2]. Hence, securing data transmission and storage in these
networks is a critical challenge due to potential security threats, such as
unauthorized access, data breaches, and data tampering [3, 4]. One possible
solution to this problem is the use of blockchain technology, which has the
potential to enable secure and trusted data sharing in IoT networks [5].
Blockchain technology has gained significant attention in recent years as
a potential solution to enhance security in IoT networks. By enabling secure,
decentralized, and tamper-proof data sharing, blockchain technology offers a
promising approach to address the security challenges associated with IoT
networks [6]. It provides a tamper-proof record of all transactions, making it
an ideal platform for secure data sharing in IoT networks [7]. Additionally,
blockchain can help to address some of the key challenges facing IoT
networks, such as data privacy, security, and authenticity [8].
One of the promising tools that can be used with blockchain for secure
data sharing is the InterPlanetary File System (IPFS). IPFS is a peer-to-peer
network that allows users to store and share files in a decentralized manner
[9]. By using IPFS with blockchain, users can store and access data in a
secure and distributed manner, without relying on centralized servers. In this
paper, we propose a blockchain-enabled approach for secure data sharing in
6G-based IoT networks, leveraging hybrid encryption and IPFS as
decentralized storage.
Secure data sharing is crucial in IoT networks because it allows
authorized devices to access and share data securely and efficiently [10]. The
proposed solution aims to enhance data security in 6G-based IoT networks
by providing secure and tamper-proof data sharing through the use of
blockchain technology, hybrid encryption, and IPFS. The permissioned
blockchain ensures that only authorized devices can participate in the
network and access data [11]. Hybrid encryption ensures data confidentiality,
while IPFS provides decentralized and fault-tolerant storage [12].
This paper aims to propose a novel solution for securing data sharing and
storage in 6G-based IoT networks using blockchain technology, hybrid
encryption, and IPFS. The paper’s contributions include the proposal of four
algorithms that enhance the security of the system: a user authentication
algorithm, a data access algorithm, a data storage algorithm, and a secure
data sharing algorithm.
The user authentication algorithm ensures that only authorized devices
can participate in the network and share data securely. The data access
algorithm ensures that authorized devices can access only the data they are
authorized to access. The data storage algorithm provides a decentralized
and fault-tolerant storage solution using IPFS. The secure data sharing
algorithm enables secure, tamper-proof data sharing among authorized
devices using a permissioned blockchain.
The paper highlights the use of hybrid encryption to ensure data
confidentiality and IPFS to provide decentralized and fault-tolerant storage.
The effectiveness of the proposed approach in terms of security has been
evaluated, and the results demonstrate that the proposed approach enhances
data security in 6G-based IoT networks by providing secure and tamper-
proof data sharing.
Overall, the paper’s contributions are in the area of enhancing security in
6G-based IoT networks using blockchain technology, hybrid encryption, and
IPFS. The proposed algorithms aim to address the critical challenge of
securing data transmission and storage in these networks and provide a more
secure and reliable solution.
The remainder of this paper is organized as follows. In Sect. 2, we
provide a literature review of blockchain-based approaches for securing data
sharing in IoT networks. In Sect. 3, we present the design methodology of
our proposed solution. In Sect. 4, we evaluate the effectiveness of our
proposed approach in terms of security. Finally, we conclude the paper in
Sect. 5 and highlight potential future work.
2 Related Work
Blockchain technology has been widely explored for secure data sharing in
6G-based IoT networks. In recent years, there has been growing interest in
the use of blockchain technology for secure data sharing in IoT networks.
Researchers have proposed various approaches to leverage the benefits of
blockchain technology, such as decentralization, immutability, and
transparency, for secure data sharing in IoT networks. In this section, we
provide an overview of some recent papers that are related to our proposed
approach for secure data sharing in 6G-based IoT networks using blockchain
and IPFS and highlight the advantages and limitations of each approach.
Lu et al. [13] proposed a secure data sharing platform using blockchain
and IPFS for Industry 4.0. Their approach uses blockchain to maintain an
immutable and transparent record of transactions, and IPFS to store and
share data in a decentralized manner. The authors evaluated their approach in
a case study involving a smart factory, and demonstrated its effectiveness in
terms of security, privacy, and efficiency.
Zhang et al. [14] proposed a blockchain-enabled efficient distributed
attribute-based access control (ABAC) for healthcare IoT. Their approach
uses blockchain to maintain a trusted and decentralized access control
policy, and enables secure and efficient data sharing among different
healthcare organizations. The authors evaluated their approach using a real-
world dataset, and demonstrated its effectiveness in terms of security,
efficiency, and scalability.
Feng et al. [15] proposed an efficient and secure data sharing approach
for 5G flying drones using blockchain. Their approach uses blockchain to
maintain a secure and decentralized record of transactions, and enables
efficient data sharing among different drones. The authors evaluated their
approach using a real-world dataset, and demonstrated its effectiveness in
terms of security, efficiency, and scalability.
Eltayeb et al. [16] proposed a blockchain platform for user data sharing,
ensuring user control and ownership. Their approach uses blockchain to
maintain a decentralized and transparent record of transactions, and enables
users to control and own their data. The authors evaluated their approach
using a real-world dataset, and demonstrated its effectiveness in terms of
security, privacy, and transparency.
Al-Fuqaha et al. [17] proposed a blockchain-enabled K-harmonic
framework for industrial IoT data sharing. Their approach uses blockchain to
maintain a secure and decentralized record of transactions, and enables
secure and efficient data sharing among different industrial IoT devices. The
authors evaluated their approach using a real-world dataset, and
demonstrated its effectiveness in terms of security, efficiency, and scalability.
Table 1 compares the previous works mentioned earlier, outlining details
such as the title of the paper, authors, main subject matter, notable
contributions, as well as the strengths and weaknesses of each.
Table 1 Comparison of the previous work
3 Design Methodology
3.1 Data Requester (User) Authentication
The User Authentication Model Design Framework is a set of principles and
guidelines for creating secure and reliable user authentication systems. The
model is intended to be used by designers, developers, and security
professionals to create effective authentication solutions for their
applications.
The User Authentication Model is designed to be flexible and adaptable,
allowing 6G based iot devices to implement user authentication solutions
that meet their specific needs and requirements. The framework includes
several key components, including user authentication methods, security
controls, and risk management processes.
The authentication model involves five main components: data requester
(user), IoT devices, blockchain network, IPFS network, and smart contract.
Users: The user is the data requester or entity who is trying to access the
system and needs to be authenticated. They provide their login credentials,
which are encrypted and sent to the IoT device for further processing.
IoT Device: The IoT device is responsible for encrypting the user’s login
credentials using AES and then encrypting the symmetrical key K using
the user’s public key ( ). It also stores this hybrid encrypted
credentials on the IPFS network and creates a user authentication request
containing the IPFS address, hybrid encrypted credentials, and metadata.
Finally, it sends the authentication request to the blockchain network.
Blockchain: The blockchain network is used to store and share the user
authentication request with other nodes on the network. It also deploys a
smart contract to handle user authentication and receives the user’s
authentication request, which is then sent to the smart contract.
Smart Contract: The smart contract is deployed on the blockchain network
and receives the user’s authentication request. It retrieves the hybrid
encrypted credentials from the IPFS network and decrypts them using the
user’s private key ( ). The smart contract then verifies the user’s
credentials and generates a signed authentication token if the credentials
are valid. If the credentials are not valid, the smart contract rejects the
authentication request.
IPFS: IPFS is used to store the encrypted encrypted credentials generated
by the IoT device. The IPFS network stores the encrypted credentials at a
specific IPFS address, which is included in the user authentication request
sent to the blockchain network.
In summary, this algorithm uses a combination of encryption,
blockchain, IPFS, and smart contracts to securely authenticate users and
grant them access to the system.
The proposed authentication model is as follows (Fig. 1):
The user enters their login credentials (
). The user’s
credentials are now encrypted using AES by the function
.
The encrypted credentials are then sent to the IoT device (
)
The IoT device encrypts the encrypted credentials using the user’s
public key ( ) by the function
. The user authentication request is now shared with the blockchain network
thanks to the function .
A smart contract is deployed on the blockchain network to handle
user authentication and the user’s
authentication request is sent to the smart contract
.
The smart contract retrieves the hybrid encrypted credentials from
the IPFS network using the provided address
.
The smart contract decrypts the encrypted credentials using the user’s
private key ( )
Step 2: Data owner encrypts the sensitive data D using the symmetric
key K and uploads it to IPFS platform:
Encrypt the data using AES encryption with the symmetric key (
).
Generate public and private keys ( ) for RSA encryption (
).
Encrypt the AES symmetric key using RSA encryption with the public
key
Step 3: Data owner creates a smart contract on the blockchain with the
and access control rules.
Step 4: Data owner signs the smart contract with his/her private key
to verify ownership.
Step 5: Data requester sends an access request to the smart contract with
an access token T.
Step 6: Smart contract verifies the access request and grants access to the
requester.
Step 8: Data requester sends the access token to the smart contract to
gain access to the data on the IPFS platform.
Step 9: Smart contract verifies the access token and grants access to the
data on the IPFS platform.
Step 10: Data requester downloads the encrypted data from the secure
storage platform and decrypts it using the symmetric key.
Step 11: Data requester performs operations on the decrypted data and
then uploads any changes to the secure storage platform.
Step 12: Data requester sends the encrypted symmetric key to the device
owner with their public key so the device owner can decrypt the changes.
Step 13: Device owner decrypts the symmetric key with their private key
and then decrypts the changes made by the data requester.
Step 14: Device owner can revoke access to the data by removing the
data from the secure storage platform and destroying the smart contract.
The secure data sharing algorithm has the ability to prevent and detect
different types of cyber attacks, such as hacking, phishing, and social
engineering, due to several security measures that are implemented within
the algorithm.
Firstly, the algorithm can prevent hacking attacks by implementing
strong encryption techniques that protect the data from unauthorized access.
This makes it difficult for hackers to gain access to the data even if they
manage to breach the system.
Secondly, the algorithm can detect phishing attacks by implementing
access control mechanisms that verify the identity of the user before granting
access to the data. This prevents unauthorized users from accessing the data
and reduces the risk of phishing attacks.
Thirdly, the algorithm can detect and prevent social engineering attacks
by implementing user awareness training programs that educate users on
how to recognize and respond to social engineering attacks. This reduces the
chances of users falling for social engineering attacks and providing access
to the data.
In addition to these measures, the algorithm can also implement other
security mechanisms such as firewalls, intrusion detection systems, and
antivirus software that can detect and prevent different types of cyber
attacks.
Overall, the secure data sharing algorithm has the ability to prevent and
detect different types of cyber attacks due to the multiple layers of security
measures that are implemented within the algorithm. By implementing these
measures, the algorithm ensures that the data is protected from unauthorized
access and that the users can securely share the data without any security
risks.
4 Performance Evaluation
In order to evaluate the effectiveness of our proposed approach for securing
data sharing and storage in 6G-based IoT networks using blockchain
technology, hybrid encryption, and IPFS, we conducted a simulation study.
The simulation study allowed us to assess the performance and security of
our proposed approach under a variety of conditions and scenarios. In this
section, we describe the simulation methodology and parameters used in our
study.
These results found that smaller data sizes offer the best overall
performance and security for your proposed approach, while larger data
sizes have a negative impact on performance and security. Specifically, the
small data size had the lowest latency and highest throughput, while the
large data size had the highest latency and lowest throughput. The medium
data size had intermediate performance and security characteristics.
5 Conclusion
this paper proposed a novel solution for enhancing security in 6G-based IoT
networks using blockchain technology, hybrid encryption, and IPFS. The
proposed approach consists of four algorithms that enhance the security of
the system: a user authentication algorithm, a data access algorithm, a data
storage algorithm, and a secure data sharing algorithm. The paper’s
contributions include the use of hybrid encryption to ensure data
confidentiality and IPFS to provide decentralized and fault-tolerant storage.
Through evaluation, the proposed approach was found effective in
enhancing data security in 6G-based IoT networks by providing secure and
tamper-proof data sharing. The results demonstrate the potential of
blockchain technology, hybrid encryption, and IPFS to enhance security in
6G-based IoT networks.
Future work could focus on the scalability of the proposed approach to
larger networks and the use of other technologies to further enhance security
in 6G-based IoT networks. Additionally, the proposed approach could be
extended to address other security challenges in these networks, such as
protecting against denial of service attacks or ensuring privacy.
References
1. Srivastava A, Das DK (2022) A comprehensive review on the application of Internet of Thing
(IoT) in smart agriculture. Wireless Pers Commun 122:1807–1837
[Crossref]
2.
Xu H, Klaine PV, Onireti O, Cao B, Imran M, Zhang L (2020) Blockchain-enabled resource
management and sharing for 6G communications. Digital Commun Netw 6(3):261–269
3.
Bodkhe U, Tanwar S (2021) Secure data dissemination techniques for IoT applications: research
challenges and opportunities. Softw Pract Exper 51:2469–2491
[Crossref]
4.
Dahiya P, Kumar V (2023) IOT security: recent trends and challenges, emerging technologies in
data mining and information security, pp 3–10
5.
Deshmukh A, Sreenath N, Tyagi AK, Eswara Abhichandan UV (2022) Blockchain enabled cyber
security: a comprehensive survey. In: 2022 international conference on computer communication
and informatics (ICCCI), Coimbatore, India, pp 1–6
6.
Rathod T, Jadav NK, Tanwar S, Sharma R, Tolba A, Raboaca MS, Marina V, Said W (2023)
Blockchain-driven intelligent scheme for IoT-based public safety system beyond 5G networks.
Sensors 23(2):969
[Crossref]
7.
Wang J, Ling X, Le Y, Huang Y, You X (2021) Blockchain-enabled wireless communications: a
new paradigm towards 6G. Natl Sci Rev 8(9) (2021)
8.
Li W, Su Z, Li R, Zhang K, Wang Y (2020) Blockchain-based data security for artificial
intelligence applications in 6G networks. IEEE Netw 34(6):31–37
9.
Dwivedi SK, Amin R, Vollala S (2022) Smart contract and IPFS-based trustworthy secure data
storage and device authentication scheme in fog computing environment. In: Peer-to-peer network
and applications
10.
Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A (2022) A survey of security and
privacy issues in the Internet of Things from the layered context. Trans Emerging Tel Tech 33
11.
Yeasmin A, Baig A (2020) Permissioned blockchain-based security for IIoT. In: 2020 IEEE
international IOT, electronics and mechatronics conference (IEMTRONICS), pp 1–7
12.
Moraes Rossetto AG, Sega C, Leithardt VRQ (2022) An architecture for managing data privacy in
healthcare with blockchain. Sensors 22
13.
Naz M, Al-zahrani FA, Khalid R, Javaid N, Qamar AM, Afzal MK, Shafiq M (2019) A secure data
sharing platform using blockchain and interplanetary file system. Sustainability 11(24)
14.
Ye Z, Leyou Z, Wu Q, Mu Y (2022) Blockchain-enabled efficient distributed attribute-based
access control framework with privacy-preserving in IoV. J King Saud Univ—Comput Inf Sci
34(10):9216–9227
15.
Feng C, Yu K, Bashir A, AI-Otaibi Y, Lu Y, Chen S, Zhang Di (2020) Efficient and secure data
sharing for 5G flying drones: a blockchain-enabled approach. IEEE Netw 35
16.
Shrestha AK, Vassileva J, Deters R (2020) A blockchain platform for user data sharing ensuring
user control and incentives. Front Blockchain 3
17.
Baalamurugan KM, Bacanin N et al (2023) Blockchain-enabled K-harmonic framework for
industrial IoT-based systems. Sci Rep 13:1004
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_9
Hamid Jahankhani
Email: Hamid.jahanhani@northumbria.ac.uk
Abstract
The phenomenon of counterfeiting continues to grow steadily. According to
Global Brand Counterfeiting (GBC in The Global Brand Counterfeiting
Report, 2018), the volume of international trade in counterfeit goods
reached 1.097 trillion euros in 2017 and will exceed 1.65 trillion euros in
2020. To minimize this growing trend, the following project undertook an
in-depth analysis of the problem, delving into and implementing a system
that can effectively address the phenomenon of counterfeit luxury goods.
The approach involves the combined use of NFC and NFT tags to protect
these products. Its use has proven effective in several respects. Although it
has already been tested by several start-ups and consortia, the approach has
never been thoroughly studied and its behaviour has never been analysed.
This project implemented its mechanism simulation environment with off
the shelf technologies, thus analyzing behaviours and criticalities. Based on
the experiments conducted, guidelines were drafted to support future
implementations based on this mechanism. Possible future studies will
focus on the implementation of the mechanism in the context of high-value
products, monitoring the system’s response to counterfeiting and the degree
to which the entire ecosystem is able to provide security for the company.
Keywords NFC – NFT – Counterfeit – Solana blockchain – Ixkio
1 Introduction
Counterfeit phenomenon has been growing gradually over the years.
According to the Global Brand Counterfeiting [11], the volume of
international trade in counterfeit goods reached €1.097 trillion in 2017 and
has passed the €1.65 trilion in 2020. More evidence are reported by the
Organization for Economic Cooperation and Development (OECD), which
estimates in the Trends in Trade in Counterfeit and Pirated Goods research
[24] that the value of counterfeits goods imported worldwide reaches the
$509 billion according to the custom seizure data. For the European Union,
counterfeit trade represented 6.8% of imports from non-EU countries.
Furthermore, it can also cause problems on the ethical level. According
to counterfeit investigator [13], the purchase of fake items can contribute to
the financing of terrorism and organised crime.
The counterfeit damages reported by the companies are therefore
evident, both in terms of economic and reputational level. Some sectors are
badly affected, especially for the luxury clothing and footwear (see Fig. 1).
Fig. 1 Industry categories most hit by counterfeit and pirated goods according to the Global Brand
Counterfeiting [24]
A solution is needed to protect the original product from imitations. The
blockchain implementation, when paired with NFC and IoT technologies,
offers consumers the ability to access the entire history of a product,
whether it is new or second-hand.
The objective of this research is to develop a blockchain system capable
of protecting original luxury products from counterfeiting, by analysing the
functioning of the entire model (highlighting its features and shortcomings)
and providing a general framework to be fulfilled for future new
implementations.
This will be carried out through the creation of a test environment via
the Solana blockchain. Each sample product used in the test environment
will be associated with a Near-Field-Communication (NFC) tag inside.
Once scanned, a user will be able to verify the originality of the product by
checking the Non-Fungible-Tokens (NFT) correlated to the tag and
ascertain its authenticity.
Thus, the product is registered on the blockchain via the NFT, which
certifies that the item’s information has not been altered from the original
information entered into the system by the parent company.
The objective is to prevent and guarantee:
Ownership
Authenticity and
Product traceability
In other words, the NFT represents the digital counterpart of the product
in the blockchain environment. By consulting this latter, consumers can
learn about the authenticity, the origin of the product and the brand’s
history.
2 Literature Review
A blockchain is a shared immutable ledger capable of process transactions
and tracking assets in a commercial network. The treated asset can be
associate to something tangible (such as money, a car, or an item) or
intangible (ownership and intellectual property) depending on the type of
business related to the company [14]. The idea of blockchain was originally
introduced in the publication ‘Bitcoin: A peer-to-peer electronic cash
system’ [23], where the author describes this new system as:
“A purely peer-to-peer version of electronic cash that allows online
payments to be sent directly from one party to an- other without going
through a financial institution” [23].
The correlation between blockchain and Bitcoin is as close as it is
crucial. Released in 2009, Bitcoin was the first cryptocurrency to use this
new type of distributed ledger. Among the innovations introduced by this
new coin was the fact that every transaction was legitimised by a
decentralised network and not by central authorities. The history of this
cryptocurrency in a short time has marked and stimulated the evolution of
Blockchain technologies, amidst experimentation, perplexity, and an
unprecedented media hype.
A transaction is defined as a chain of digital signatures. Each owner
transfers the asset or currency to the next by digitally signing the hash of
the previous transaction and the public key of the next owner and adding
them to the end of the transaction. A beneficiary can check the signatures to
verify the authenticity of the chain (Fig. 2).
Fig. 12 Access to the machine via ssh from a machine terminal outside the LAN
Next, three others development libraries were installed and imported via
the linux apt install command, which are listed below:
libudev-dev -y
libssl-dev pkg-config -y
build-essential –y
The process of machine configuration was concluded with the
installation of the Solana Program Library (SPL), which is a library that
enables the creation of tokens based on the Solana network. The assets
created with SPL are able to benefit from the same advantages as the token
itself, allowing them to be scalable, performant and fast in terms of
transactions in the same way that Solana is.
For comparison with Ethereum, these assets use Solana’s blockchain in
the same way as ERC20 does with Ethereum. However, a small fee is
charged in Solana tokens as the latter are needed to power each transaction
and finalize the writing on the blockchain. This implies that a user must
purchase SOLs (Solana Tokens) before making any transactions. They can
be easily purchased from any exchanger such as Binance, Crypto.com, etc.
This step will be discussed later in the project [7].
This operation has been performed done via Cargo command, Rust’s
package manager mentioned in the previous paragraphs, which allows the
installation of the Solana Program Library via CLI. The command launched
is as follows:
cargo install spl-token-cli
Figures 15 and 16 show the installation process of the Solana Program
Library and display the command input and the ongoing installation of the
various dependencies for SPL operation, respectively.
After waiting the required time for the transaction to be written inside a
block and validated within the blockchain and then approved by the
members of the ledger, the confirmation that the transaction was successful
is obtained.
Checking on the Debian 11 machine it is possible to see via command:
solana balance
The Wallet credit has risen to 0.09 SOL (0.10 SOL - 0.01 fee) (Fig. 21).
Fig. 21 Different wallet credit than in Fig. 18
Fig. 24 Token information. Note how the address within the search field corresponds to that in
Fig. 22
Similar to the token created in the previous section, NFTs being present
on the Solana network can also be tracked through Solana Explorer
(Fig. 28).
Fig. 28 Note how the NFT is identified by checking that the value of decimals is zero
2. The simulation of a smart card, via the Host Card Emulation (HCE)
protocol, also enables fast and secure payments with your smartphone.
3. The reading and writing of NFC tags, i.e. RFID transponders capable of
storing information and interacting with NFC devices.
The NFC Data Exchange Format (NDEF), created by the NFC Forum
specifically for programming NFC tags, consists of a number of distinct
commands, known as ‘standard’ commands. In most cases, it is not
necessary to install any kind of programme on a smartphone for it to read
and execute these kinds of commands. iPhones are an exception. The
following standard commands are:
open link in general or query an API
open any type of application
sending or receiving text messages and email
initiate a call
show a text message
save a V-Card contact
start an application (does not work on iOS)
If the content of the chip is not protected by encryption, the content is
‘in the clear’, meaning that anyone scanning the tag with their smartphone,
or an NFC reader can read the content. To defend against this type of attack,
it is necessary to purchase a chip that supports encryption. Chips with this
function are listed below, in ascending order of security of the supported
cryptographic methods:
MIFARE Classic (CRYPTO01—Not secure as it was hacked in 2008)
MIFARE® DESFire EV1/EV2/Light (DES, 2K3DES, 3K3DES, AES)
MIFARE Plus/ICODE® DNA (AES 128 bit)
MIFARE Ultralight C (3DES)
NTAG413 DNA/NTAG424 DNA (AES-based CMAC)
At the implementation level of this project, nine NTAG 424 DNA type
tags were purchased at a price of around £9, as shown in Fig. 30 (each of
them therefore cost around £1, but it is possible to find them for less,
especially if one buys in bulk).
Fig. 30 9 tags 38 mm NFC Sticker Tag with White PVC NTAG 424 DNA
To get more information about the NTAG device, it is possible to
download the official application from: Play Store: https://play.google.com/
store/apps/details?id=com.nxp.taginfolite&hl=en_US&gl=US App Store
https://apps.apple.com/us/app/nfc-taginfo-by-nxp/id1246143596 of NXP
Semiconductors, the company that produces these two types of NFC tags
(Fig. 31).
Fig. 31 NFC tag information scanned via NPC’s TagInfo application from Android phone
Fig. 32 Static data can be cloned to other NFC NTAG 213 tags [27]
Authentication chips, such as NXP’s NTAG 424, work differently: a
unique dynamic code is generated with each scan, which means that the
copied data will be old and out of date. This system offers a significantly
higher level of protection against counterfeiting than standard NFC chips.
To be clear, NFC authentication tags have been around for a long time and
have been used in transportation and ticketing for many years. The
difference lies in how the functionality can be accessed: the old chips
encrypted the information inside the chip, and special codes, applications,
or readers were required to access the data. The new generation of chips
dynamically replaces the authentication data in the URL link presented
when scanning the tag, which means that no special application or software
is needed to read the tags and verify their authenticity.
When authentication chips are encoded, they store not only a link to the
URL, but also a unique key. The unique key is hidden inside the memory
and is not accessible. When the tags are scanned, an encryption algorithm
takes the scan count, ID and possibly some other data from the chip, and
combines it with the unique key to generate an authentication code. When
encoding the tag, it is possible to set the key as a parameter within our
URL, and that is therefore visible to the server. In other words, the chip
during scanning, automatically processes the URL by dynamically
replacing the authentication code. Note that the key itself is never
displayed, only the result of the algorithm that uses it. This combination of
tag, ID, scan count and authentication code can be verified on the
destination server, which also stores a copy of the key and undertakes the
same process. Once the scan count and then the corresponding
authentication code have been used, the authentication server marks it as no
longer valid, which means it cannot be used again. This happens with each
scan, because as the scan count increases, the data used in the algorithm
changes and a new unique authentication code is generated each time
(Fig. 33).
Fig. 33 NTAG 424 authentication diagram with the server [27]
Fig. 35 Page with the tag details. The encoded URL generated by Ixkio is highlighted
Fig. 41 The popup appears automatically by bringing the phone closer to the tag
Fig. 42 Clicking on the popup directly opens safari to the NFT-related page of Solana Explorer. In
all this, Ixkio acting as an intermediary, remains invisible to the user’s eyes throughout the process
References
1. AURA (2022) A revolution in the luxury industry. [Online] Available at: https://auraluxuryblockc
hain.com/. Accessed 10 July 2022
2.
BCG (2019) Why luxury brands should celebrate the preowned boom. [Online] Available at:
https://www.bcg.com/it-it/publications/2019/luxury-brands-should-celebrate-preowned-boom.
Accessed 2022
3.
Business of Fashion (2019) How luxury fashion learned to love the blockchain. [Online]
Available at: https://www.businessoffashion.com/articles/technology/how-luxury-fashion-
learned-to-love-the-blockchain/#:~:text=Amid%20growing%20concern%20about%20
the,profit%20with%20the%20same%20goal. Accessed 10 July 2022
4.
CNBC (2021) Cryptocurrency market value tops $2 trillion for the first time as ethereum hits
record high. [Online] Available at: https://www.cnbc.com/2021/04/06/cryptocurrency-market-
cap-tops-2-trillion-for-the-first-time.html. Accessed 10 July 2022
5.
CNBC (2022) Alfa Romeo unveils new electric-hybrid SUV with NFT, blockchain technology.
[Online] Available at: https://www.cnbc.com/2022/02/08/new-alfa-romeo-suv-equipped-with-
nft-blockchain-technology.html. Accessed 10 July 2022
6.
DocumentationRust (2022) Hello, Cargo!. [Online] Available at: https://doc.rust-lang.org/book/
ch01-03-hello-cargo.html. Accessed 10 July 2022
7.
Exodus (2022) Learn more about SPL tokens and the Solana ecosystem. [Online] Available at:
https://support.exodus.com/article/1808-solana-ecosystem#supported-spl. Accessed 10 July 2021
8.
Explorer (2022) Solana Explorer. [Online] Available at: https://explorer.solana.com/. Accessed
10 July 2022
9.
Forbes (2019) Ford Motor Company launches blockchain pilot on IBM platform to ensure
ethical sourcing of Cobalt. [Online] Available at: https://www.forbes.com/sites/rachelwolfson/
2019/01/16/ford-motor-company-launches-blockchain-pilot-on-ibm-platform-to-ensure-ethical-
sourcing-of-cobalt/?s h=535991c15a1d. Accessed 10 July 2022
10.
Forbes (2022) Hennessy enters the NFT space with $226,000 release. [Online] Available at:
https://www.forbes.com/sites/katedingwall/2022/01/10/hennessy-enters-the-nft-space-with-
226000-release/. Accessed 10 Aug 2022
11.
GBC (2018) The global brand counterfeiting report, s.l.: s.n
12.
Globalnewswire (2022) Global luxury resale market report 2022: surge in the luxury goods E-
commerce sales and increasing thrifters’ demand for pre-owned luxury. [Online] Available at:
https://www.globenewswire.com/en/news-release/2022/05/26/2451170/28124/en/Global-
Luxury-Resale-Market-Report-2022-Surge-in-the-Luxury-Goods-E-commerce-Sales-and-
Increasing-Thrifters-Demand-for-Pre-owned-Luxury.
html#:~:text=The%20global%20luxury%20resale%2
13.
Gray A (2018) How fake handbags fund terrorism and organized crime. s.l., s.n
14.
IBM (2022) What is blockchain technology?. [Online] Available at: https://www.ibm.com/topics/
what-is-blockchain. Accessed July 2022
15.
ICF Yale (2018) The psychology behind why people buy luxury goods. [Online] Available at:
https://www.investopedia.com/articles/personal-finance/091115/psychology-behind-why-people-
buy-luxury-goods.asp. Accessed 10 July 2022
16.
Insider (2021) Michael Dell says blockchain technology is ‘underrated’. [Online] Available at:
https://www.businessinsider.com/michael-dell-blockchain-is-underrated-but-will-pass-on-
bitcoin-2021-10?r=US&IR=T. Accessed 10 July 2022
17.
Ixkio (2022) Features. [Online] Available at: https://ixkio.com/. Accessed 10 Aug 2022
18.
learn me bitcoin (2020) Mnemonic seed. [Online] Available at: https://learnmeabitcoin.com/
technical/mnemonic. Accessed 10 July 2022
19.
Ledesma L (2021) Binance extended crypto exchange dominance during may trading frenzy.
[Online] Available at: https://www.coindesk.com/markets/2021/06/07/binance-extended-crypto-
exchange-dominance-during-may-trading-frenzy/. Accessed 10 July 2022
20.
Lim J (2021) Why luxury brands are embracing the resale revolution. [Online] Available at:
https://www.theindustry.fashion/why-luxury-brands-are-embracing-the-resale-revolution/#:~:
text=Estimated%20to%20be%20worth%20around,demand%20and%20digitisation%20of%20
retail
21.
Mansour K (2020) Early metrics-luxury brands using blockchain to fight counterfeiting. [Online]
Available at: https://earlymetrics.com/luxury-brands-using-blockchain-to-fight-counterfeiting/.
Accessed 10 July 2022
22.
N26 (2021) What is a crypto wallet? [Online] Available at: https://n26.com/en-it/blog/what-is-a-
crypto-wallet. Accessed 10 July 2022
23.
Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. [Online] Available at: https://
bitcoin.modeapp.com/bitcoin-white-paper.pdf
24.
OECD (2016) Trends in trade in counterfeit and pirated goods. [Online] Available at: https://
www.oecd.org/corruption-integrity/reports/trends-in-trade-in-counterfeit-and-pirated-goods.
Accessed 1 July 2022
25.
Precision (2022) Could blockchain revolutionize parcel shipping? [Online] Available at: https://
www.fedex.com/content/dam/fedex/us-united-states/Compatible-Solutions/images/2019/Q2/
Could_Blockchain_Revolutionize_Parcel_Shipping_V2_50457811.pdf
26.
RUST (2022) A language empowering everyone to build reliable and efficient software. [Online]
Available at: https://www.rust-lang.org/. Accessed 10 July 2022
27.
Seritag (2022) NFC tag authentication explained. [Online] Available at: https://www.youtube.
com/watch?v=ZFN881RKVZI. Accessed 10 Aug 2022
28.
Solana Documentation (2022) Associated token account program. [Online] Available at: https://
spl.solana.com/associated-token-account. Accessed 10 July 2022
29.
Solana Documentation (2022) Paper Wallet. [Online] Available at: https://docs.solana.com/
wallet-guide/paper-wallet. Accessed 10 July 2022
30.
solana-labs/token-list (2022) Adding a new token. [Online] Available at: https://github.com/
solana-labs/token-list. Accessed 10 July 2022
31.
The Usenet Big-8 (2022) The Usenet Big-8 management board. [Online] Available at: https://
www.big-8.org/wiki/Main_Page. Accessed July 2022
32.
Walmart Global Tech (2022) Blockchain in the food supply chain—what does the future look
like? [Online] Available at: https://one.walmart.com/content/globaltechindia/en_in/Tech-insights/
blog/Blockchain-in-the-food-supply-chain.html
33.
Yakovenko A (2017) Solana: a new architecture for a high performance blockchain v0.8.13.
[Online] Available at: https://solana.com/solana-whitepaper.pdf. Accessed 10 Aug 2022
OceanofPDF.com
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
H. Jahankhani, A. El Hajjar (eds.), Wireless Networks , Advanced Sciences and Technologies for
Security Applications
https://doi.org/10.1007/978-3-031-33631-7_10
Hamid Jahankhani
Email: Hamid.jahankhani@northumbria.ac.uk
Abstract
The importance of software-level communication security in ICS is
growing as these systems become more automated and connected to the
outside world. This chapter provides a secure-by-design approach to ICS
application development, where design-time abstractions known as secure
links are used to meet criteria from security protocols like ISA/IEC 62443.
Secure links are a proposed addition to an IEC 61499 design standard that
makes it easy to integrate both lightweight and conventional security
measures into software. Automatic compilation into completely IEC 61499-
compliant software is possible for applications that use secure links. To
keep up with this demand for greater adaptability. Nowadays, in the
revolution of digitalization, automation plays significant role to achieve a
sufficient level of security and reduce the use of both human resources and
static processes. Therefore, it is crucial to model all security related
capabilities and functionalities. In this chapter a unique requirements
repository model for Industrial Control System that applies the LPGs
(Labelled Property Graphs) to form and store standards based and system
specific requirements using well-defined relationship types are highlighted.
In addition, the researcher integrates the proposed requirements repository
with the Industrial Control System design tools to determine requirements
traceability. A wind turbine case study demonstrates the entire workflow
within the proposed framework.
1 Introduction
Top-down analysis is not the only option, though; industry frameworks
offer another perspective. A consensus amongst experts in a field is used to
develop a “prototype” for a business in that field, and this is what industry
frameworks give. In general, the frameworks identify typical functional and
business process breakdowns that may correspond to capabilities. It may be
more comprehensive and unbiased than a value chain tailored to a particular
company. Naturally, every organisation will be unique due to its own
specific set of circumstances and methods of operation, and these
distinctions may provide a competitive edge in some sectors.
The capabilities of an industrial framework tend to coincide with their
respective implementations in commercial enterprise software and
outsourced services, which is a definite plus. A well-defined standard value
chain should not be abandoned in favour of an industrial framework; rather,
it can provide even more insight into the description of shared capabilities
when used together. It is possible that a company's data model is part of the
framework for its industry. This paper serves as a stepping stone to
addressing security by design approaches by describing security capability
levels and requirements across the Industrial Control System zones.
Moreover, the paper examines why it is important to have a standard,
enterprise-wide logical data model by following an adapted case study
method. A safety critical wind turbine system was deployed and modelled
to examine several security issues of monitoring and managing
cybersecurity requirements in Industrial Control System. There are two
primary arguments in favour of seriously considering the use of a structural
data model early in the process of creating a CBA for such a given business.
To begin with, the CBA transformation will be delayed and the cost of
getting a model will be more than the cost of developing a suitable
corporate logical data model. Second, there will be fewer data
transformation issues when exchanging data between services because the
framework data model will likely be similar with competitive software
systems and technical service as well as regulatory requirements.
2 Literature Review
Different networks system like control processing, manufacturing of robotic
system, automation system for both home and office, intelligent system on
transportation and aircraft, spacecraft in advance. Sometime these types of
network system are typically made up of a significant number of
interconnected devices, the management of which can either be centralised
or decentralised, depending on the requirements of the application.
Routable data communications protocols like Ethernet (IEEE 802.3) and
Wi-Fi are typically placed in homes and workplaces, but due to modern
demands for adaptability, decentralisation, simple work for continuity, and
reduced minimal cost for operations, their incorporation into network
control systems has become increasingly common. Because of this shift,
maintaining a high level of security within industrial control systems is now
more vital than ever. Confidentiality is given the utmost priority in
traditional information technology (IT) security regulations, while network
availability receives the least amount of consideration [1]. In contrast,
critical infrastructure ICSs and ISCI (ISA Security Compliance Institute)
must always maintain both high availability and operational resilience. This
is necessary for a variety of reasons, including those pertaining to the
economy, the environment, the safety of humans, and the security of the
nation. It is unacceptable, with regard to many different procedures, to
suffer a decrease in performance for the sake of security [2]. In order to
arrive at such a conclusion, a risk–benefit analysis must first be performed
on each system. It is necessary to incorporate security safeguards in a
manner that will preserve the integrity of the system both when it is
functioning normally and when it is under attack from a computer network.
Alber and Prince [3] emphasised that industrial control system security
needs to incorporate both network security and features of robust physical
architecture (such as redundancy and physical adaptability) to maintain the
appropriate level of system availability. A comprehensive risk assessment
and methodical system engineering are the processes that are used to
establish such requirements. Based on the concepts of precise measurement
science, the Industrial Control System (ICS) testbed provides guidance on
how to implement security in an ICS via the course of testing.
According to Green et al. [4], the purpose of the Industrial Operation
System (ICS) Cyber Security Test Bed is to showcase the value of security
in a variety of contexts, such as the management of a chemical plant, the
dynamic assembly of complex parts with the help of robots, and the
centralised management of vast WANs. As indicated, the testbed's major
goal is to show how industrial control system security standards like NIST
SP 800-82 can be applied to a networked control system and how the
standards might affect the system's performance, if at all [5]. This test bed
will also serve as a guide for implementing security measures without
sacrificing efficiency. One of the testbed's secondary purposes is to assess
how well industrial control systems function in the midst of a cyber-attack;
this is important because no system can be rendered fully secure from
network assaults [6]. The ability of systems to withstand attacks will be one
of their primary concerns. The test bed will be available to universities,
government organisations, and commercial businesses for the purpose of
conducting research and evaluations on new technologies designed to
improve remote monitoring systems and enhance procedures more resilient
to attacks. A total of five years' worth of research will be supported by the
testbed.
Numerous commercially available tools exist to safeguard systems built
on top of industrial standards. Products like the CISCO Adaptive Protection
Appliance (ASA) and the Tofino Protection Appliance are examples of NG
firewall devices that offer a high standard of security and a plethora of
security functions [7]. The primary purpose of these solutions is to prevent
network perimeter exploits against programmable logic controllers (PLCs).
However, these technologies do provide valuable network protection. The
delay, the jitter, and the payload integrity of data packets are the metrics that
make up this set. This means that each enclave's starting point for
measurement will be based on deliberately generated delay, jitter, and noise,
and that the performance of the processes under study would be analysed in
relation to these factors [8], this document offers directions for the
establishment of safe control systems for industrial machinery (ICS). This
type of industrial control system (ICS) is widely used in manufacturing and
similar fields. Industries that frequently employ ICS include the ones
dealing with electricity, water, wastewater, oil and natural gas,
transportation, chemicals, pharmaceuticals, paper products, food and
beverages, and other types of discrete manufacturing (e.g., transportation
equipment, aeronautical machinery, and long-lasting products) [9]. SCADA
systems are typically used to control dispersed assets because of the
centralised data gathering and performance monitoring that provide [10].
Controlling production systems in a localised region such as a factory
through the use of supervisory and regulatory control is a typical use for
distributed control systems (DCS). Programmable logic controllers (PLCs)
are commonly employed to carry out regulatory control and perform
discrete control for a wide range of applications. Control systems are
crucial to the smooth running of the United States' essential infrastructures,
which are increasingly interconnected and reliant on one another. Almost
85% of the nation's critical infrastructures are owned and operated by
private enterprises [11], which must be taken into account. Postal Service
mail sorting and air traffic control are just two instances of the
aforementioned ICS that are also run by the federal government. This article
provides a general introduction to ICS, describes common system
topologies, discusses common security threats and vulnerabilities, and
suggests solutions to reduce these risks. The following are examples of
events that an ICS could potentially face: The flow of information over ICS
networks being obstructed or slowed down, which could cause ICS to stop
working, changes to alarm levels, instructions, or directives that could lead
to the malfunction, shutdown, or destruction of machinery due to
unauthorised tampering; cause harm to the environment; endanger people's
safety [12]. Franceschett et al. [13] has highlighted that incorrect
information relayed to operators of the system, with the intention of either
disguising unlawful changes or prompting the operators to take activities
that are not appropriate, both of which could have a variety of adverse
outcomes. Alterations were made to ICS software or configuration settings,
or malware was introduced into ICS software, any of which could have
serious consequences. Creating an unsafe environment by interfering with
safety systems that would otherwise keep people alive.
3 ISA-99 Security
Cybersecurity Testbed verified the ISA/IEC-62443 principles and
technological security standards. These criteria are similar to those found in
NIST 800-82. Groups of related documents from the IEC series are
displayed in Fig. 4. The documents in the 1-X series define the scope of the
standard's application and explain why it was developed. The 2-X
documents outline the necessities of an ICS security plan and how to put its
policies and procedures into action. The 3-X series documentation outline
the design criteria for solution providers and provides recommendations on
various security solutions that may be relevant to an ICS integrator.
Manufacturers of individual components are the primary targets of the 4-X
series, which specifies the requirements they must meet in order to offer the
vital functional hooks for a much more secure implementation. Meeting the
standards is laid out in ISA/IEC-62443-3-3 [17].
Fig. 4 ISA/IEC-62443 organization of standards documents
4.4.8 Cybersecurity in OT
CISA gives each organisation a risk assessment document that tells them to
do the following things:
Ensure that VPNs and other remote management systems are fully
patched.
Improve system monitoring so that unusual activity can be caught early,
and an alert sent.
Use multi-factor authentication.
Ensure that all machines have firewalls, anti-malware, and intrusion
protection software installed and properly set up.
Ensure continuity of operational processes or contingency planning are
up to date.
Raise awareness of IT support options for employees who work from
home.
Update incident response strategies to consider changes in the workforce
in a distributed environment.
Report to Discover
The factors that are driving the transition of the OT security market from
a focus on OT networks to a focus on CPS assets.
Market dynamics such as increasing threats, exposing vulnerabilities, a
continuous skills deficit, and growing laws, directives, and frameworks.
Suggestions for “anchoring security efforts to operational resilience” in
the face of growing threats, by implementing an integrated security
strategy that goes beyond legacy OT systems.
4.12.1 ISO-27001
Beginning around the turn of the millennium, several independently
developed industry standards began to converge into what is currently
known as the ISO set of guidelines for security management of information.
The International Organization for Standardization (ISO) is now widely
recognised as one of the most thorough standards for establishing and
maintaining an effective information security management system.
Information security is the primary focus of the ISO-27001 standard, and it
helps businesses prioritise and solve their needs for keeping data private,
secure, and accessible [31].
A plan-do-check-act cycle, which is more often known as the PDCA
cycle, lies at the core of it. This cycle can trace its origins back to quality
assurance in production contexts (Fig. 10).
Fig. 10 PDCA cycle for quality assurance
The cycle of plan-do-check-act can provide assistance in establishing
the framework of the organisation, defining the scope and objectives,
determining the requisite competence, and creating a written policy. This is
supplemented further by the evaluation of risks, the planning of treatments,
the selection of available controls, and the implementation of those controls
[32]. In addition, constant innovations and improvements are able to fulfil
the ongoing demand for risk reduction. In a nutshell, ISO-27001 provides
businesses with a step-by-step guide that assists in effectively implementing
the necessary security capabilities and minimising risks using an approach
that is iterative and scalable for successive degrees of development.
The Need for OT Security Standards
IT and OT systems are often different in terms of the technological nature
and scope of their operations. Murray et al. [33] stated in their work that the
approach to security that is taken with an OT system needs to be adapted to
the specific demands of that system. Since many of the controls that were
implemented to manage the security of IT systems are not relevant to OT
systems, a distinct set of industry standards is required in order to satisfy
the safety needs and limit the risks that are connected with them. Both the
NIST Common Security Framework (CSF) and the ISA/IEC 62443
standard were developed expressly for the for the sake of establishing
guidelines to ensure the security of industrial control and automation
systems.
Among the many different NIST standards, the NIST 800-53 and the
NIST 800-82 are two that stand out as particularly important. While NIST
800-53 is utilised across the industry for the purpose of managing the cyber
security needs of information systems, NIST 800-82 is utilised for the
purpose of managing the privacy and security controls of operational
technology (OT) systems. Through the use of an “overlay,” which is made
possible by NIST 800-82, businesses are able to modify certain controls
from NIST 800-53 so that they better meet the requirements of OT. The
written recommendations of the NIST provide an overview that is both
comprehensive and detailed of all the security capabilities of these
standards.
Stouffer et al. [39] found a guide for ensuring the security of industrial
control systems may be found in the Special Publication 800-82 that was
published by the National Institute of Standards and Technology. It is
feasible, as stated in the executive summary of Publication 800-82, to
consider it an “overlay” to Publication 800-53. Guidelines for applying the
security measures detailed in NIST Special Publication (SP) 800-53
Revision 4, Security and Privacy Controls for Federal Information Systems
and Organizations, have been developed by the National Institute of
Standards and Technology (NIST) in collaboration with the community of
ICS professionals working in the public and private sectors. A significant
number of the controls in Appendix F of NIST SP 800-53 can be directly
applied to ICS as written, however, many of these controls also require ICS-
specific interpretation and/or augmentation [10].
In fact, NIST SP 800-82 cites multiple other NIST SPs throughout the
document and offers “ICS-specific Recommendations and Guidance” for
every possible scenario.
The Importance of Security Policies
The lifetime of control systems includes not only the creation, testing, and
release of systems and software, but also the accompanying rules and
procedures. The absence of a security policy in and of itself might create
conditions that are conducive to the introduction of vulnerabilities in
industrial control systems.
To define roles and duties, provide direction for programme
implementation, and outline how violations will be handled, a thorough and
well-documented security policy is required. One of the most important
factors that determines whether a security programme is successful is the
level of support and governance that it receives from management. In-depth
discussions on policies and procedures are presented in both ISA/IEC
62443 and NIST SP 800-82; however, the two documents take somewhat
dissimilar approaches to the subject matter [40].
This subject is covered in depth by the IC4F and 62443-2 category,
which is organised into four subparts that focus primarily on developing a
management system for cybersecurity is suitable for IACS settings [41].
This is also known as an IACS security programme or, more generally, an
IACS security management system, according to the standard. These two
terms are synonymous with one another. Moreover, the requirements for a
successful IACS security system are outlined in the first part (62443-2-1),
and assistance for developing such a system is provided in the second part
(62443-2-2) of this document. Although, the third section (62443-2-3)
details the best practises for the system's patch and change management,
while section four (62443-2-4) restates the security programme criteria with
an emphasis on the responsibilities of IACS service providers [42].
The National Institute of Standards and Technology's Special
Publication 800-82 is another helpful reference for drafting and
implementing policies and procedures. In fact, it devotes an entire section in
Appendix C to the topic of detecting vulnerabilities and predisposing
factors that are related to the absence of policies and procedures.
5 Research Methodology
This part offers detailed of how the study was performed along with method
used.
Goal RID Example of security requirement (SR) of wind turbine PLCs Security
level
Confidentiality CR The master and slave PLCs shall ensure the confidentiality of
the data in transmission and at rest
CRa Data communication between master and slave PLCs shall use SL-C 2
appropriate encryption algorithms
CRb Critical parameters shall be not be persisted on the master and SL-C 4
slave PLCs in order to ensure the confidentiality of data for
discharged devices from the system
Authentication AR Any access to the PLC (master/slave) shall be provided after SL-C 1
appropriate authentication based on role-based identification
Integrity IR The system shall ensure the integrity of ingress and outguess
data
IRa Communication between master PLC and external components SL-C 4
shall use appropriate methods to ensure the integrity of the data
IRb Communication between master and slave PLCs shall support SL-C 4
communication integrity checks
Fig. 15 Integrity property graph produced by Neo4j
Listing 1
1 CREATE (cr:CSRS{name:"CSRS"})-[:HAS]->
(co:COMPONENT{name:"COMPONENT"}),
2 (cr)-[:HAS]->(sy:SYSTEM{name:"SYSTEM"}),
3 (sy)-[:HAS]->(:LEAF{name:"S1"}),
4 (sy)-[:HAS]->(:LEAF{name:"S2"}),
5 (co)-[:HAS]->(con:CONFIDENTIALITY
{name:"CONFIDENTIALITY"}),
6 (co)-[:HAS]->(auth:AUTHENTICATION
{name:"AUTHENTICATION"}),
7 (co)-[:HAS]->(inte:INTEGRITY
{name:"INTEGRITY"}),
8 (con)-[:SL-C{type:2,name:"SL-C:2"}]->
(:CON_REQ{name:"CRa"}),
9 (con)-[:SL-C{type:4,name:"SL-C:4"}]->
(:CON_REQ{name:"CRb"}),
10 (auth)-[:SL-C{type:1,name:"SL-C:1"}]->
(:AUTH_REQ{name:"AR"}),
11 (integ)-[:SL-C{type:4,name:"SL-C:4"}]->
(:INT_REQ{name:"IRa"}),
12 (integ)-[:SL-C{type:4,name:"SL-C:4"}]->
(:INT_REQ{name:"IRb"})
Listing 2
1 CREATE (s6244311)-[:contains]->(fr3),
2 (fr3)-[:points]->(s6244342),
3 (s6244342)-[:contains]->(cr31),
4 (cr31)-[:HAS {SL-C:4}]->(cr31RE1),
5 (cr31RE1)-[:APPLICATION]->(sISO19790),
6 (cr31RE1)-[:APPLICATION]->(sFIPS1402),
7 (cr31RE1)-[:APPLICATION]->(mDigitalSig),
8 (mDigitalSig)-[:points]->(sFIPS1864)
Another aspect of Neo4j that works well with our planned repository is
its ability to execute and store a series of searches in a specific database.
When a query is run, its results are stored in the database, opening the door
to the possibility of saving several views of the data for later use. The graph
database also stores the individual entities that resulted from the IEC
62443-4-2 FR3 and the wind turbine CSRS required inquiries in the
listings. Thus, both graphs can be merged, in other word, the information
can be obtained using additional Cypher queries. For instance, according
CSRS, IRa, a security criterion for wind turbines, must be provided at SL-C
4. Recommendations for carrying out the security standards specified in
IEC 62443-4-2 are existing in a structure of LPG nodes, which are stored in
the repository that the report offer. This set of rules covers the use of
common security methods and the corresponding cryptographic primitives.
The existing set of rules is not comprehensive; for example, the IEC 62443-
4-2 norm only specifies a small subset of the possible standard encryption
protocols and procedures. For the library to be utilised in large-scale
industrial control system (ICS) projects, the standard's LPG graphs must be
exhaustive.
Ultimately. secure connection and repository act like anchors in the
structure of cybersecurity algorithms/methods represented by the leaf nodes
of the property graph of IEC 62443 in the repository and implementation of
that functional block within the IEC 61499 Industrial Control System
application. complement each other. To each protected connection is
recognized by a unique identifier indicating to it [48].
End-to-end traceability of security requirements combines repositories
with design patterns to enforce communication security constraints via
secure connections [50], and the requirements traceability engine TORUS
[51].
8 Conclusions
Establishing safe and reliable control systems in industrial settings is the
focus of this article (ICS). Typical examples of these ICS can be found in
the process control sectors, and they include SCADA systems, DCSs, and
PLCs (among other control system types). This document gives an
introduction to ICS and common system architectures, details common
security threats and vulnerabilities, and suggests safeguards to implement to
reduce those risks.
At first, ICS were separate networks that used their own control
protocols and hardware and software that were not shared with other
networks, bearing little resemblance to the more common IT networks.
Many ICS elements were not linked to any kind of information technology
network or system and were instead kept in specially guarded rooms.
Internet Protocol (IP) components that are easy to find and inexpensive are
gradually replacing proprietary products, which raises the stakes for
cyberattacks. The increasing use of computers, operating systems (OS), and
network protocols from the IT industry in the design and implementation of
ICS has led to a convergence between the two types of systems.
Because of the critical role that cybersecurity plays in ensuring the safe
and reliable functioning of today's industrial processes, ICS cybersecurity
programmes must constantly be integrated into larger ICS safety and
security plans at both construction plants and corporate cybersecurity
programmes. Control systems are vulnerable to intrusion from a wide
variety of causes, including as hostile nations, terrorist groups, individual
employees, malevolent intruders, complications, accidents, natural
disasters, and even intentional or inadvertent activities by insiders.
Availability and integrity are the top priorities in ICS security, followed by
confidentiality.
To organise and consolidate CSRS and IEC 62443-4-2 standard
requirements, this paper suggests a decentralised LPG system requirement
repository with several partitions. In order to help determine which standard
cryptographic primitives are needed to implement a security needs, a formal
specification of the IEC 62443-4-2 expanded requirement structure is
provided. When the repository is used in conjunction with design patterns to
record communication security restrictions via secure links and a
requirements management engine like TORUS, full-stack security
requirements traceability can be attained. The document also shows how the
repository can be used to facilitate a process for adapting to new or altered
needs. Using graph-query languages to query the repository is what makes
the difference, further, to examine what this means for the security testing
process and how the repository can be used.
References
1. Norwich University (2019) IT vs. OT: comparing two vital information security concepts.
Norwich University. Online. Available at: https://online.norwich.edu/academic-programs/
resources/it-vs-ot. Accessed: 2 Sept 2022
2.
Kuppusamy E, Mariappan K (2021) Integration of operation technology (OT) and information
technology (IT) through intelligent automation in manufacturing industries. In: Advances in
manufacturing technology XXXIV: proceedings of the 18th international conference on
manufacturing research, incorporating the 35th national conference on manufacturing research,
7–10 Sept 2021. University of Derby, Derby, UK. IOS Press
3.
Alber B, Prince A (2021) The structure of OT typologies. Chapter 1: introduction to property
theory
4.
Green B, Derbyshire R, Knowles W, Boorman J, Ciholas P, Prince D, Hutchison D (2020) {ICS}
testbed tetris: practical building blocks towards a cyber security resource. In: 13th USENIX
workshop on cyber security experimentation and test (CSET 20)
5.
US Homeland Security (2022) Cybersecurity, cybersecurity | Homeland security. Available at:
https://www.dhs.gov/topics/cybersecurity. Accessed: 8 Sept 2022
6.
Ani UPD, Watson JM, Green B, Craggs B, Nurse JR (2021) Design considerations for building
credible security testbeds: perspectives from industrial control system use cases. J Cyber Secur
Technol 5(2):71–119
7.
Anwar RW, Abdullah T, Pastore F (2021) Firewall best practices for securing smart healthcare
environment: a review. Appl Sci 11(19):9183
[Crossref]
8.
IECEE Publication (2022) Rules of procedure—CB scheme of the IECEE for mutual recognition
of test certificates for electrotechnical equipment and components (CB scheme) and its related
services: statement of test results—Energy Efficiency Testing Service (E3) Global Motor Energy
Efficiency (GMEE) Program Industrial Cyber Security Program. IECEE documents | Rules,
operational documents and guides. Available at: IECEE 02—rules of procedure. Accessed: 13
Sept 2022
9.
Knapp ED, Langill J (2014) Industrial network security: securing critical infrastructure networks
for smart grid, SCADA, and other industrial control systems. Syngress
10.
Stouffer K et al (2015) Guide to industrial control systems (ICS) security. CSRC. Available at:
https://csrc.nist.gov/publications/detail/sp/800-82/rev-2/final. Accessed: 13 Nov 2022
11.
Hayden E (2019) 4 steps to critical infrastructure protection readiness: TechTarget, security.
TechTarget. Available at: http://www.techtarget.com/searchsecurity/tip/252465638/4-steps-to-
critical-infrastructure-protection-readiness. Accessed: 26 Sept 2022
12.
Boyer SA (2010) SCADA: supervisory control and data acquisition, 4th edn. ISA—International
Society of Automation, Research Triangle Park
13.
Franceschett AL, de Souza PR, de Barros FLP, de Carvalho VR (2019) A holistic approach—
how to achieve the state-of-art in cybersecurity for a secondary distribution automation energy
system applying the IEC 62443 standard. In: 2019 IEEE PES innovative smart grid technologies
conference-Latin America (ISGT Latin America). IEEE
14.
Ehrlich M et al (2019) Secure and flexible deployment of industrial applications inside cloud-
based environments: semantic scholar. In: 2019 24th IEEE international conference on emerging
technologies and factory automation (ETFA). Available at: https://www.semanticscholar.org/
paper/Secure-and-Flexible-Deployment-of-Industrial-inside-Ehrlich-Trsek/e73f3d815cbf1c3f
1ae437908cc39dbb37befb00. Accessed: 24 Dec 2022
15.
Conklin WA (2016) IT vs. OT security: a time to consider a change in CIA to include resilienc.
In: 2016 49th Hawaii international conference on system sciences (HICSS). IEEE
16.
Joint Task Force Transformation Initiative (2011) Managing information security risk:
organization, mission, and information system view. CSRC. Available at: https://csrc.nist.gov/
publications/detail/sp/800-39/final. Accessed: 22 Sept 2022
17.
Team E (2021) Understanding IEC 62443. IEC. Available at: https://www.iec.ch/blog/
understanding-iec-62443. Accessed: 12 Sept 2022
18.
ITL NIST (2018) About the RMF–NIST risk management framework: CSRC. CSRC. Available
at: https://csrc.nist.gov/projects/risk-management/about-rmf. Accessed: 12 Nov 2022
19.
Boehm A (2018) Take security to the next level with the top 5 CIS critical security controls,
Ivanti. Ivanti. Available at: https://www.ivanti.com/blog/take-security-to-the-next-level-with-cis-
critical-security-controls. Accessed: 21 Oct 2022
20.
Cooper D (2021) NIST test personal identity verification (PIV) cards version 2
21.
Abdelghani T (2019) Implementation of defense in depth strategy to secure industrial control
system in critical infrastructures. Am J Artif Intell 3(2):17–22
[Crossref]
22.
Dutta N, Tanchak K, Delvadia K (2020) Modern methods for analyzing malware targeting
control systems. In: Recent developments on industrial control systems resilience. Springer,
Cham, pp 135–150
23.
Culot G et al (2019) Addressing industry 4.0 cybersecurity challenges: semantic scholar. IEEE
Eng Manag Rev. Available at: https://www.semanticscholar.org/paper/Addressing-Industry-4.0-
Cybersecurity-Challenges-Culot-Fattori/ddefa2b96bdf6e9dc66ffc373ef5fd216b662574.
Accessed 30 Sept 2022
24.
Ehrlich M et al (2019) Figure 1 from automated processing of security requirements and controls
for a common Industrie 4.0 use case: semantic scholar. In: 2019 international conference on
networked systems (NetSys). Available at: https://www.semanticscholar.org/paper/Automated-
Processing-of-Security-Requirements-and-a-Ehrlich-Gergeleit/51d9b30acce66178
804333c960d20ee638887988/figure/0. Accessed 5 Oct 2022
25.
Hahm O, Baccelli E, Petersen H, Tsiftes N (2015) Operating systems for low-end devices in the
internet of things: a survey. IEEE Internet Things J 3(5):720–734
26.
Raymundo Belleza R, de Freitas Pignaton E (2018) Performance study of real‐time operating
systems for internet of things devices. IET Softw 12(3):176–182
27.
Zakaria HM (2022) Security of IoT: sine logistic map, S-box, and Tan-Bessel function
28.
Steinert LF (2022) Safety critical, high-performance systems based on COTS multicore
processors for industrial and aerospace applications. Doctoral dissertation, Technische
Universität München
29.
IEC (2010) What is IEC 61508? 61508 Association. Available at: https://www.61508.org/
knowledge/what-is-iec-61508.php. Accessed: 26 Dec 2022
30.
DRAGOS (2022) 10 ways asset visibility builds the foundation for OT cybersecurity. Available
at: https://cdn.cyberscoop.com/asset-visibility-builds-OT-cybersecurity-foundation.pdf. Accessed
21 Oct 2022
31.
Lopes IM et al (2019) How ISO 27001 can help achieve GDPR compliance. In: 2019 14th
Iberian conference on information systems and technologies (CISTI). IEEE
32.
Singgrit P, Pamuji GC (2020) The use of ISO 27001 framework for government’s online E-
monitoring system implementation. Int J Educ Inf Technol Others 3(3):556–563
33.
Murray G, Johnstone MN, Valli C (2017) The convergence of IT and OT in critical infrastructure
34.
Hohenegger A (2019) Die common criteria und IEC-62443. Deutscher IT-Sicherheitskongress
35.
Fachot M (2020) IEC 62443 standards—a cornerstone of industrial cyber security. Etech.
Available at: https://etech.iec.ch/issue/2020-04/iec-62443-standards-a-cornerstone-of-industrial-
cyber-security#:~:text=The%20IEC%2062443%20series%20of%20Standards%20is%20
organized,4%20Components%20%28IEC%2062443-4.%2A%20%E2%80%93%20both%20
parts%20published%29. Accessed: 27 Oct 2022
36.
ISA (2020) Security lifecycles in the ISA/IEC 62443 series. ISA.org. Available at: https://
21577316.fs1.hubspotusercontent-na1.net/hubfs/21577316/2022%20ISA%20Website%20
Redesigns/ISA%20Secure/Files%20Repository%20For%20Learning%20Center/Articles%20
Page/ISAGCA-Security-Lifecycles-whitepaper.pdf. Accessed: 27 Oct 2022
37.
Gupta S (2020) Assuring compliance with government certification and accreditation
regulations. In: Cloud computing security
38.
Brandao Filho SB, Cesar CDAC (2022) A secure method for industrial IoT development. SN
Comput Sci 3(2):173
39.
Stouffer K, Pease M, Tang C, Zimmerman T, Pillitteri V, Lightman S (2022) Guide to operational
technology (OT) security (No. NIST Special Publication (SP) 800-82 Rev. 3 (Draft)). National
Institute of Standards and Technology
40.
Syafrizal M, Selamat SR, Zakaria NA (2020) Analysis of cybersecurity standard and framework
components. Int J Commun Netw Inf Secur 12(3):417–432
41.
Hohenegger A, Krummeck G, Baños J, Ortega A, Hager M, Sterba J, Kertis T, Novobilsky P,
Prochazka J, Caracuel B, Sanz AL (2021) Security certification experience for industrial
cyberphysical systems using common criteria and IEC 62443 certifications in certMILS. In:
2021 4th IEEE international conference on industrial cyber-physical systems (ICPS). IEEE
42.
Téglásy BZ, Katsikas S, Lundteigen MA (2022) Standardized cyber security risk assessment for
unmanned offshore facilities. In: Proceedings of the 3rd international workshop on engineering
and cybersecurity of critical systems
43.
Grove C (2021) Surprising findings in the SANS 2021 OT/ICS cybersecurity survey. Nozomi
Networks. Available at: https://www.nozominetworks.com/blog/surprising-findings-in-the-sans-
2021-ot-ics-cybersecurity-survey/. Accessed: 2 Nov 2022
44.
Jones N (2019) International policy: pitfalls and possibilities. In: Cyber security: threats and
responses for government and business
45.
Stouffer K et al (2022) Guide to operational technology (OT) security. CSRC. Available at:
https://csrc.nist.gov/publications/detail/sp/800-82/rev-3/draft. Accessed: 4 Nov 2022
46.
Irny S, Rose A (2005) Designing a strategic information systems planning. Issues Inf Syst VI(1)
47.
BouSaba C (2019) Implementing a DeMilitarized zone using holistic open source solution. In:
2019 ASEE annual conference and exposition
48.
Tanveer A et al (2022) Tracing security requirements in industrial control systems using graph
databases—software and systems modeling. Springer, Berlin. Available at: https://doi.org/10.
1007/s10270-022-01019-8?code=4e726f40-5d33-456d-abf4-ffac84231bc8&error=cookies_not_
supported. Accessed: 14 Dec 2022
49.
Lal M (2015) Neo4j graph data modeling. Packt Publishing Ltd., UK
50.
Tanveer A, Sinha R, Kuo MM (2020) Secure links: secure-by-design communications in IEC
61499 industrial control applications. IEEE Trans Ind Inf 17(6):3992–4002
51.
Sinha R, Dowdeswell B, Zhabelova G, Vyatkin V (2018) Torus: scalable requirements
traceability for large-scale cyber-physical systems. ACM Trans Cyber Phys Syst 3(2):1–25
[Crossref]
OceanofPDF.com