Fig. 1 Example of the packet dropping when a hopping is occurred since the transmission delay.
Fig. 2 Compare to the transmission failure rate between with the number of using ports (C : attack strength, R : buffer space).
Fig. 3 System model of PHT algorithm
Fig. 4 Pseudo code of PHT algorithm. Algorithm 1: Protocol for a Drone. Algorithm 2: Protocol for GCS.
Fig. 5 Comparison of key usage between the hash function and the PHT algorithm for a drone network.
Fig. 6 Comparison of TX success probability for increasing the number of drones
Table. 1 Parameters and values for simulation
Table. 2 Parameters and meaning for simulation
참고문헌
- M. S. Hyun, K. H. Choi, and J. H. Kim, "Development of Simulation and Test-Bed for Searching Missing People Using Multi-Drone Simulator and LoRa Sensor Network," The Journal of Korean Institute of Communications and Information Sciences, vol. 43, no. 11, pp. 1941-1951, Nov. 2018. https://doi.org/10.7840/kics.2018.43.11.1941
- N. Jadeja, and V. Parmar, "Implementation and Mitigation of Various Tools for Pass the Hash Attack," Procedia Computer Science, vol. 79, pp. 755-764, Mar. 2016. https://doi.org/10.1016/j.procs.2016.03.099
- C. Gudla, S. Rana, and A. H. Sung, "Defense Techniques Against Cyber Attacks on Unmanned Aerial Vehicles," International Conference Embedded Systems, Cyber-Physical Systms & Applications. New York, Oct. 2018.
- K. Driscoll, "Lightweight crypto for lightweight unmanned arial systems," Integrated Communications, Navigation, Surveillance Conference (ICNS), 2018.
- G. C. Wang, B. S. Lee, K. J. Lim, and J. Y. Ahn, "Technical Trends on Security of Control and Non-Payload Communications Network for Unmanned Aircraft Systems," Electronics and Telecommunications Trends, ETRI, 2017.
- H. Okhravi, T. Hobson, D. Bigelow, and W. Streilein, "Finding focus in the blur of moving-target techniques," IEEE Security & Privacy, pp. 16-26, Nov. 2013.
- H. Lee, and V. Thing, "Port Hopping for Resilient Networks," 60th IEEE Vehicular Technology Conference, pp. 3291- 3295, Sept. 2004.
- M. Dunlop, S. Groat, W. Urbanski, R. Marchany, and J. Tront, "MT6D: A Moving Target IPv6 Defense," IEEE Military Communications Conference, pp. 1321-1326, Nov. 2011.
- Y. B. Luo, B. S. Wang, X. F. Wang, X. F. Hu, and G. L. Cai, "RPAH: Random port and address hopping for thwarting internal and external adversaries," Trustcom/Big-DataSE/ISPA, vol. 1, 2015.
- G. Badishi, A. Herzberg, and K. Idit, "Keeping Denial-of-Service Attackers in the Dark," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 3, pp. 191-204, Aug. 2007. https://doi.org/10.1109/TDSC.2007.70209
- K. Hartmann, and C. Steup, "The Vulnerability of UAVs to Cyber Attacks -An Approach to the Risk Assessment," 5th International Conference on Cyber Conflict, 2013.