Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action
Unmanned aerial vehicles are increasingly being applied to various applications for a variety purposes, such as delivery, communication relay, mapping, and surveillance services. Through these, it is possible to provide flexible and stable network services. Unmanned aerial vehicles perform a wide ra...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-04-01
|
Series: | Drones |
Subjects: | |
Online Access: | https://www.mdpi.com/2504-446X/7/4/249 |
_version_ | 1797605737993601024 |
---|---|
author | Seok Bin Son Dong Hwa Kim |
author_facet | Seok Bin Son Dong Hwa Kim |
author_sort | Seok Bin Son |
collection | DOAJ |
description | Unmanned aerial vehicles are increasingly being applied to various applications for a variety purposes, such as delivery, communication relay, mapping, and surveillance services. Through these, it is possible to provide flexible and stable network services. Unmanned aerial vehicles perform a wide range of tasks using Internet-of-Things technology, which needs Internet access. These internet connections, however, make it more possible for attackers to execute various security attacks on unmanned aerial vehicles. Therefore, it is crucial to identify the attack behavior of the adversary, which is called “course-of-action”, to preserve security in the unmanned aerial vehicle infrastructure. Based on learned data, the existing course-of-action method has the drawback of not functioning on various networks. As a result, in this paper, we propose a novel heuristic search-based algorithm to apply to various unmanned aerial vehicle infrastructures. The algorithm can build the optimal heuristic functions in various unmanned aerial vehicle network environments to explore the attack course-of-action and design the optimal attack paths to maximize total reward. Applying the proposed algorithm in two unmanned aerial vehicle network scenarios allowed us to confirm that the best attack path is well established. |
first_indexed | 2024-03-11T05:05:19Z |
format | Article |
id | doaj.art-b121d95d1c99422fb3bb357138689510 |
institution | Directory Open Access Journal |
issn | 2504-446X |
language | English |
last_indexed | 2024-03-11T05:05:19Z |
publishDate | 2023-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Drones |
spelling | doaj.art-b121d95d1c99422fb3bb3571386895102023-11-17T18:58:05ZengMDPI AGDrones2504-446X2023-04-017424910.3390/drones7040249Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-ActionSeok Bin Son0Dong Hwa Kim1School of Electrical Engineering, Korea University, Seoul 02841, Republic of KoreaAgency for Defense Development (ADD), Seoul 05661, Republic of KoreaUnmanned aerial vehicles are increasingly being applied to various applications for a variety purposes, such as delivery, communication relay, mapping, and surveillance services. Through these, it is possible to provide flexible and stable network services. Unmanned aerial vehicles perform a wide range of tasks using Internet-of-Things technology, which needs Internet access. These internet connections, however, make it more possible for attackers to execute various security attacks on unmanned aerial vehicles. Therefore, it is crucial to identify the attack behavior of the adversary, which is called “course-of-action”, to preserve security in the unmanned aerial vehicle infrastructure. Based on learned data, the existing course-of-action method has the drawback of not functioning on various networks. As a result, in this paper, we propose a novel heuristic search-based algorithm to apply to various unmanned aerial vehicle infrastructures. The algorithm can build the optimal heuristic functions in various unmanned aerial vehicle network environments to explore the attack course-of-action and design the optimal attack paths to maximize total reward. Applying the proposed algorithm in two unmanned aerial vehicle network scenarios allowed us to confirm that the best attack path is well established.https://www.mdpi.com/2504-446X/7/4/249course-of-actioncourse-of-action attackcyber securitydronesheuristic functionscalable network |
spellingShingle | Seok Bin Son Dong Hwa Kim Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action Drones course-of-action course-of-action attack cyber security drones heuristic function scalable network |
title | Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action |
title_full | Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action |
title_fullStr | Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action |
title_full_unstemmed | Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action |
title_short | Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action |
title_sort | searching for scalable networks in unmanned aerial vehicle infrastructure using spatio attack course of action |
topic | course-of-action course-of-action attack cyber security drones heuristic function scalable network |
url | https://www.mdpi.com/2504-446X/7/4/249 |
work_keys_str_mv | AT seokbinson searchingforscalablenetworksinunmannedaerialvehicleinfrastructureusingspatioattackcourseofaction AT donghwakim searchingforscalablenetworksinunmannedaerialvehicleinfrastructureusingspatioattackcourseofaction |