Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action

Unmanned aerial vehicles are increasingly being applied to various applications for a variety purposes, such as delivery, communication relay, mapping, and surveillance services. Through these, it is possible to provide flexible and stable network services. Unmanned aerial vehicles perform a wide ra...

Full description

Bibliographic Details
Main Authors: Seok Bin Son, Dong Hwa Kim
Format: Article
Language:English
Published: MDPI AG 2023-04-01
Series:Drones
Subjects:
Online Access:https://www.mdpi.com/2504-446X/7/4/249
_version_ 1797605737993601024
author Seok Bin Son
Dong Hwa Kim
author_facet Seok Bin Son
Dong Hwa Kim
author_sort Seok Bin Son
collection DOAJ
description Unmanned aerial vehicles are increasingly being applied to various applications for a variety purposes, such as delivery, communication relay, mapping, and surveillance services. Through these, it is possible to provide flexible and stable network services. Unmanned aerial vehicles perform a wide range of tasks using Internet-of-Things technology, which needs Internet access. These internet connections, however, make it more possible for attackers to execute various security attacks on unmanned aerial vehicles. Therefore, it is crucial to identify the attack behavior of the adversary, which is called “course-of-action”, to preserve security in the unmanned aerial vehicle infrastructure. Based on learned data, the existing course-of-action method has the drawback of not functioning on various networks. As a result, in this paper, we propose a novel heuristic search-based algorithm to apply to various unmanned aerial vehicle infrastructures. The algorithm can build the optimal heuristic functions in various unmanned aerial vehicle network environments to explore the attack course-of-action and design the optimal attack paths to maximize total reward. Applying the proposed algorithm in two unmanned aerial vehicle network scenarios allowed us to confirm that the best attack path is well established.
first_indexed 2024-03-11T05:05:19Z
format Article
id doaj.art-b121d95d1c99422fb3bb357138689510
institution Directory Open Access Journal
issn 2504-446X
language English
last_indexed 2024-03-11T05:05:19Z
publishDate 2023-04-01
publisher MDPI AG
record_format Article
series Drones
spelling doaj.art-b121d95d1c99422fb3bb3571386895102023-11-17T18:58:05ZengMDPI AGDrones2504-446X2023-04-017424910.3390/drones7040249Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-ActionSeok Bin Son0Dong Hwa Kim1School of Electrical Engineering, Korea University, Seoul 02841, Republic of KoreaAgency for Defense Development (ADD), Seoul 05661, Republic of KoreaUnmanned aerial vehicles are increasingly being applied to various applications for a variety purposes, such as delivery, communication relay, mapping, and surveillance services. Through these, it is possible to provide flexible and stable network services. Unmanned aerial vehicles perform a wide range of tasks using Internet-of-Things technology, which needs Internet access. These internet connections, however, make it more possible for attackers to execute various security attacks on unmanned aerial vehicles. Therefore, it is crucial to identify the attack behavior of the adversary, which is called “course-of-action”, to preserve security in the unmanned aerial vehicle infrastructure. Based on learned data, the existing course-of-action method has the drawback of not functioning on various networks. As a result, in this paper, we propose a novel heuristic search-based algorithm to apply to various unmanned aerial vehicle infrastructures. The algorithm can build the optimal heuristic functions in various unmanned aerial vehicle network environments to explore the attack course-of-action and design the optimal attack paths to maximize total reward. Applying the proposed algorithm in two unmanned aerial vehicle network scenarios allowed us to confirm that the best attack path is well established.https://www.mdpi.com/2504-446X/7/4/249course-of-actioncourse-of-action attackcyber securitydronesheuristic functionscalable network
spellingShingle Seok Bin Son
Dong Hwa Kim
Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action
Drones
course-of-action
course-of-action attack
cyber security
drones
heuristic function
scalable network
title Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action
title_full Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action
title_fullStr Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action
title_full_unstemmed Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action
title_short Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action
title_sort searching for scalable networks in unmanned aerial vehicle infrastructure using spatio attack course of action
topic course-of-action
course-of-action attack
cyber security
drones
heuristic function
scalable network
url https://www.mdpi.com/2504-446X/7/4/249
work_keys_str_mv AT seokbinson searchingforscalablenetworksinunmannedaerialvehicleinfrastructureusingspatioattackcourseofaction
AT donghwakim searchingforscalablenetworksinunmannedaerialvehicleinfrastructureusingspatioattackcourseofaction