This paper is about an application of a method based on the ECIES (Elliptic Curve Integrated Encryption Scheme) to improve the security against malicious attacks of the UAVs (Unmanned Aerial Vehicles) communications system. This system is focused on improving the security conditions in extreme situations and preventing the aircraft for man-made incidents and cyber attacks. The paper briefly describes the different attacks that can affect to the operation of UAVs and the security methods that, nowadays, are used to guarantee the security during the operations. Moreover, it presents a solution to a strong vulnerability detected in the classical scheme used in UAV. This scheme uses ROS (Robot Operating System) as the core of the communication system to interconnect different devices and nodes in this paper, it is demonstrated that if an Intruder is able to enter in the local network of the UAV system, he/she is also able to impersonate the GCS (Ground Control Station) of the UAV and take control of it leading to an undesirable maneuver or even a dangerous crash against a building or a person. The security system proposed to avoid this consists of a simplified method based on ECIES sending packets, between UAV and GCS, which uses ECDSA (Elliptic Curve Digital Signature) and are ciphered in RSA (Rivest-Shamir-Adleman). Thus, it is possible to guarantee that the high level computer of the UAV is able to identify the identity of their GCS and prevent of being commanded by an unauthorized Intruder. Both, the vulnerability and the solution proposed have been experimentally tested and validated through software-in-the-loop simulations and in a outdoor scenario using a small UAV.Index Terms-UAV,security,software,drone,attack
SECTION I. INTRODUCTIONThe application range of UAV (Unmanned Aerial Vehicles) is significantly growing year after year [1]. However, most previous studies have been only focused from the operation point of view or showing experimental applications of this new technology, such as aerial manipulation [2] or inspection of infrastructure [3]. Nevertheless, there are more aspects that must be considered in real applications to guarantee that this technology can be applied in security conditions and commercially exploited. It means that it is not only important to reach the application goal, but also it should be secure and reliable in terms of communication.Moreover, most UAV developments lack a dedicated security system in their communication system leading to situations in which an attacker can be a dangerous and unwanted Intruder. These attacks are ranging from a MiTM (Man in The Middle) or DoS (Denial-of-Service) to a GPS spoofing or UAV hijacking. Their consequences in an unmanned system are critical and extremely dangerous.In general, data security and security in the communications are key tasks in most UAV applications. For instance, this work is one of the task in the RESIST H2020 European project [4], in which the UAVs must autonomously fly while they accomplish inspection tasks in bridges or tunn...