3
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud Architecture

      ,
      Drones

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          An unmanned aerial vehicle (UAV) is an autonomous flying robot that has attracted the interest of several communities because of its capacity to increase the safety and productivity of labor. In terms of software engineering, UAV system development is extremely difficult because the focus is not only on functional requirement fulfillment, but also on nonfunctional requirements such as security and safety, which play a crucial role in mission success. Consequently, architecture robustness is very important, and one of the most common architectures developed is based on a centralized pattern in which all UAVs are controlled from a central location. Even though this is a very important problem, many developers must expend a great deal of effort to adapt and improve security. This is because there are few practical perspectives of security development in the context of UAV system development; therefore, the study of attack and defense patterns in centralized architecture is required to fill this knowledge gap. This paper concentrates on enhancing the security aspect of UAV system development by examining attack and defense patterns in centralized architectures. We contribute to the field by identifying 26 attack variations, presenting corresponding countermeasures from a software analyst’s standpoint, and supplying a node.js code template for developers to strengthen their systems’ security. Our comprehensive analysis evaluates the proposed defense strategies in terms of time and space complexity, ensuring their effectiveness. By providing a focused and in-depth perspective on security patterns, our research offers crucial guidance for communities and developers working on UAV-based systems, facilitating the development of more secure and robust solutions.

          Related collections

          Most cited references41

          • Record: found
          • Abstract: not found
          • Article: not found

          Flying Ad-Hoc Networks (FANETs): A survey

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Security and Privacy for the Internet of Drones: Challenges and Solutions

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Security, Privacy, and Safety Aspects of Civilian Drones

                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                (View ORCID Profile)
                Journal
                Drones
                Drones
                2504-446X
                May 2023
                April 25 2023
                : 7
                : 5
                : 289
                Article
                10.3390/drones7050289
                7ae8890e-b8ed-4f19-b2c5-fb26a5d797b1
                © 2023

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article