doi: 10.17586/2226-1494-2018-18-5-817-825


ANALYSIS OF INFORMATION INTERACTION SECURITY WITHIN GROUP OF UNMANNED AERIAL VEHICLES

E. D. Marinenkov, I. I. Viksnin, I. A. Zhukova, M. A. Usova


Read the full article  ';
Article in Russian

For citation:
Marinenkov E.D., Viksnin I.I., Zhukova Iu.A., Usova M.A. Analysis of information interaction security within group of unmanned aerial vehicles. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2018, vol. 18, no. 5, pp. 817–825 (in Russian). doi: 10.17586/2226-1494-2018-18-5-817-825


Abstract
Subject of Research. The paper presents analysis of information interaction of the elements within the group of unmanned aerial vehicles and their vulnerability to destructive information impact. At the moment, this problem is relevant for devices used in civil areas. In addition, the task of identifying hidden destructive information impact is an unsolved problem within the group of unmanned aerial vehicles. Method. A set-theoretical model of information interaction within the group of unmanned aerial vehicles is developed based on comparative evaluation results of the group control strategies. The developed model is analyzed, that gives the possibility to identify and evaluate the vulnerable elements, which carry out information interaction and are subjected to destructive information impact. Experiments are carried out, where destructive information is introduced into the process of information interaction (both internal and external), leading to disruption of the agent or group as a whole. Main Results. The information interaction of unmanned aerial vehicles group requires security factor increasing for contraction of the destructive information impact and a hidden destructive information impact. Hidden destructive information impact cannot be detected by classical approaches to information security, therefore, it is necessary to develop new methods to increase the information interaction security from such attacks. Practical Relevance. The results of the set-theoretical model analysis of information interaction within unmanned aerial vehicles group will enable the development of new information security methods to eliminate specific vulnerabilities associated not only with the classical, but also with the "soft" impact methods. They will be in demand for the use in autonomous robotic systems.

Keywords: information security, information interaction, destructive information impact, unmanned aerial vehicle, self-organizing system

References
1. Chung T.H., Jones K.D., Day M.A., Jones M., Clement M. 50 vs. 50 by 2015: Swarm vs. Swarm UAV live-fly competition at the naval postgraduate school. AUVSI, 2013, pp. 1792–1811.
2. Yakimenko O.A., Chung T.H. Extending autonomy capabilities for unmanned systems with CRUSER. Proc. 28th Congress of the International Council of the Aeronautical Sciences, ICAS 2012, 2012, pp. 47–49.
3.  Yang J.H., Kapolka M., Chung T.H. Autonomy balancing in a manned-unmanned teaming (MUT) swarm attack. In Robot Intelligence Technology and Applications, 2012, pp. 561–569. doi: 10.1007/978-3-642-37374-9_54
4. Chung T.H., Burdick J.W., Murray R.M. A decentralized motion coordination strategy for dynamic target tracking. Proc. IEEE Int. Conf. on Robotics and Automation, 2006, pp. 2416–2422. doi: 10.1109/ROBOT.2006.1642064
5.  Trubnikov G.V. The use of unmanned aerial vehicles for civilian purposes, 2017. Available at: http://www.uav.ru/articles/civil_uav_th.pdf (accessed 12.03.2018).
6.  Koval E.N., Lebedev I.N. General model of robotic systems information security. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 4, pp. 153–154. (in Russian)
7.  ikratov I.A., Kozlova E.V., Zikratova T.V. Vulnerability analysis of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 5, pp. 149–154. (in Russian)
8.  Viksnin I.I. A model of information security for cyberphysical systems. Science and Business: Ways of Development, 2018, no. 2, pp. 15–20. (in Russian)
9.   Komarov I.I., Yur'eva R.A., Drannik A.L., Maslennikov O.S., Kovalenko M.E., Egorov D.A. Research on destructive impact of robots-sabouters'' influence on multi-agent system''s productivity. Control Processes and Stability, 2014, vol. 1, no. 1, pp. 336–340. (in Russian)
10. Zikratov I.A., Zikratova T.V., Lebedev I.S., Gurtov A.V. Trust and reputation model design for objects of multi-agent robotics systems with decentralized control. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, no. 3, pp. 30–38. (in Russian)
11. Yur'eva R.A., Komarov I.I., Dorodnikov N.A. Designing the information interloper model for the multi-agent decentralized control robotic system. Software Systems and Computational Methods, 2016, no. 1, pp. 42–48. doi: 10.7256/2305-6061.2016.1.17946 (in Russian)
12.   Kirichenko V.V. Information security of communication channel with UAV. Electronics and Control Systems, 2015, no. 3, pp. 23–27. doi: 10.18372/1990-5548.45.9892
13.   Rivera E., Baykov R., Gu G. A Study on Unmanned Vehicles and Cyber Security. Texas, USA, 2014.
14.   Hooper M., Tian Y., Zhou R. et al. Securing commercial WiFi-based UAVs from common security attacks. Proc. IEEE Military Communications Conference, 2016, pp. 1213–1218. doi: 10.1109/MILCOM.2016.7795496
15.   Watkins L., Li C., Ramos J. et al. Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems. Proc. ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy. Los Angeles, 2018. doi: 10.1145/3215466.3215467
16.   Tutubalin P.I., Kirpichnikov A.P. Ensuring information security of functioning of unmanned reconnaissance complexes. Vestnik KSTU, 2017, vol. 20, no. 21, pp. 86–92. (in Russian)
17.   Higgins F., Tomlinson A., Martin K.M. Threats to the swarm: Security considerations for swarm robotics. International Journal on Advances in Security, 2009, vol. 2, no. 2&3, pp. 288–297.
18.   Sedjelmaci H., Senouci S.M. Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. The Journal of Supercomputing, 2018, pp. 1–17. doi: 10.1007/s11227-018-2287-8
19.   Sidorov V., Ng W.K., Lam K.Y., Salle M.F.B.M. Cyber-threat analysis of a UAV traffic management system for urban airspace. Air Transport Research Society World Conference, 2017, 9 p.
20.   Javaid A.Y. Cyber security threat analysis and attack simulation for unmanned aerial vehicle network. PhD Dissertation. University of Toledo, 2015.
21.   Barbasov V.K., Gavryushin N.M., Dryga D.O., Bataev M.S., Altynov A.E. Multimotor unmanned aerial vehicles and their capabilities for using in the field of Earth remote sensing. Inzhenernye Izyskaniya, 2012, no. 10, pp. 38–42. (in Russian)
22.   Kalyaev I.A., Gaiduk A.R., Kapustyan S.G. Models and Algorithms of the Collective Control of Robots Group. Moscow, Fizmatlit Publ., 2009, 280 p. (in Russian)
23.   Gao L., Yu S., Luan T.H., Zhou W. Delay Tolerant Networks. Springer, 2015, 85 p. doi: 10.1007/978-3-319-18108-0
24.   Rohmer E., Singh S.P.N., Freese M. V-REP: a versatile and scalable robot simulation framework. Proc. 2013 IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, 2013, pp. 1321–1326. doi: 10.1109/iros.2013.6696520
25. Grigoryev I. Any Logic 7 in Three Days: A Quick Course in Simulation Modeling. 2015, 256 p


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика