Security and Privacy in Communication Networks. SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

Research Article

A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)

Download
323 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-78816-6_9,
        author={Md Haque and Morshed Chowdhury},
        title={A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)},
        proceedings={Security and Privacy in Communication Networks. SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22--25, 2017, Proceedings},
        proceedings_a={SECURECOMM \& ATCS \& SEPRIOT},
        year={2018},
        month={4},
        keywords={Identity-based cryptography Watermarking Cyber security Unmanned aerial vehicle},
        doi={10.1007/978-3-319-78816-6_9}
    }
    
  • Md Haque
    Morshed Chowdhury
    Year: 2018
    A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)
    SECURECOMM & ATCS & SEPRIOT
    Springer
    DOI: 10.1007/978-3-319-78816-6_9
Md Haque1,*, Morshed Chowdhury1,*
  • 1: Deakin University-Burwood Campus
*Contact email: mshaq@deakin.edu.au, morshed.chowdhury@deakin.edu.au

Abstract

Cyber Physical Systems (CPS) like UAVs are used for mission critical tasks including military and civilian operations. Their potentiality of usage is rapidly increasing in commercial space. The need for a secure channel to wirelessly communicate and transfer message between CPS is very crucial. Key idea behind this study is to propose a novel framework that is lightweight, robust and at the same time do not compromise security and pragmatic in the jurisdictions of energy-efficient atmospheres. This paper presents an idea for a practical and efficient hierarchical architecture for UAV network using identity-based encryption. Also, proposes selective encryption technique to reduce overheads and data hiding mechanism to increase confidentiality of the message.