Applications, Restrictions, and Evaluation of Quantum Cryptography for Secure Unmanned Aerial Vehicle Communication
DOI:
https://doi.org/10.32628/CSEIT2390634Keywords:
Unmanned Aerial Vehicle, Quantum Computing, Quantum Cryptography, Military, Blockchain, Security.Abstract
Because of the abrupt increase in demand for security, researchers have developed immediate safety solutions that outperform state-of-the-art solutions. Data security was first sought for during the Spartan period. These days, efforts are being made to broaden this area of study by challenging the status quo and creating novel algorithms that outperform their weaker predecessors. Unmanned aerial vehicles, or UAVs, are widely used in a variety of industries, including agriculture, the military, healthcare, monitoring and surveillance, and many more, because of their svelte designs and adaptable mobility. In this post, we go over the significance of drone technology as well as its growth and demand. The study also discusses the current state of security concerns in real-time settings and how quantum cryptography outperforms conventional methods in protecting data. This inspires us to offer an overview of quantum cryptography's significance, function, and advantages in protecting UAV communications that go beyond 5G networks. Additionally, a unique layered architectural approach based on quantum cryptography is suggested to ensure excellent data security and effective transmission. A case study on the Internet of Military Things' implementation in the battlefield is also included in this presentation. The latency, security, and dependability of the suggested case study system are taken into account while assessing its performance.
References
- Peter W. Shor. 1994. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, 124–134. DOI: http://dx.doi.org/10.1109/SFCS.1994.365700
- Frank Arute, et al 2019. Quantum supremacy using a programmable superconducting processor. Nature 574, 7779 (Oct. 2019), 505–510. DOI: http://dx.doi.org/10.1038/s41586-019-1666-5
- Charles H. Bennett, Gilles Brassard et al. 1984. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Vol. 175. 8. Retrieved from http://www.cs.ucsb.edu/chong/.
- Masahide Sasaki. 2011. Tokyo QKD network and the evolution to secure photonic network. In Proceedings of the Conference on Laser Applications to Photonic Applications (CLEO’11), Vol. 1. OSA, Washington, D.C., JTuC1. DOI: http://dx.doi.org/10.1364/CLEO AT.2011.JTuC1
- Park, Man-Kyu, et al. “A Study of Future Internet Testbed Construction using NetFGA/OpenFlow Switch on KOREN/KREONET.” Journal of the Institute of Electronics Engineers of Korea TC 47.7 (2010): 109–117.
- Ma, Xiongfeng, et al. “Quantum random number generation.” npj Quantum Information 2.1 (2016): 1–9.
- Krawczyk, Hugo, and Pasi Eronen. “Hmac-based extract-and- expand key derivation function (hkdf).” RFC 5869, May, 2010.
- Chip Elliott, David Pearson, and Gregory Troxel. 2003. “Quantum cryptography in practice”, In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’03). 227. DOI: http://dx.doi.org/10.1145/863981.86 3982
- Chip Elliott and H. Yeh. 2007. “DARPA Quantum Network Testbed. Technical Report”, BBN Technologies Cambridge, New York, New York. Retrieved from http://oai.dtic.mil/oai/oai?verb=getRecord.
- Alexander Sergienko. 2005. “Quantum Communications and Cryptography.” Vol. 2005. CRC Press. Retrieved from http://books.google.com /books?hl=en
- Thomas Langer. 2013. “The Practical Application of Quantum Key Distribution”. Ph.D. Thesis. University of Lausanne.
- M. Peev, C. Pacher, R. Alleaume, et al. 2009. “The SECOQC quantum ´ key distribution network in Vienna”, New J. Phys. 11, 7 (July 2009), 75001. DOI: http://dx.doi.org/10.1088/1367-2630/11/7/075001
- A. R. Hall and C. J. Coyne, ‘‘The political economy of drones,’’ Defence Peace Econ., vol. 25, no. 5, pp. 445–460, Sep. 2014.
- P. K. R. Maddikunta, S. Hakak, M. Alazab, S. Bhattacharya, T. R. Gadekallu, W. Z. Khan, and Q.-V. Pham, ‘‘Unmanned aerial vehicles in smart agriculture: Applications, requirements, and challenges,’’ IEEE Sensors J., vol. 21, no. 16, pp. 17608–17619, Aug. 2021.
- N. Pathak, A. Mukherjee, and S. Misra, ‘‘AerialBlocks: Blockchainenabled UAV virtualization for industrial IoT,’’ IEEE Internet Things Mag., vol. 4, no. 1, pp. 72–77, Mar. 2021.
- A. E. Oigbochie, E. B. Odigie, and B. I. G. Adejumo, ‘‘Importance of drones in healthcare delivery amid a pandemic: Current and generation next application,’’ Open J. Med. Res., vol. 2, no. 1, pp. 1–13, Apr. 2021.
- S. Dahiya and M. Garg, ‘‘Unmanned aerial vehicles: Vulnerability to cyber attacks,’’ in Proc. Int. Conf. Unmanned Aerial Syst. Geomatics. Springer, 2019, pp. 201–211.
- Markets and Markets. (2021). Drone Services Market by Type (Platform Service, MRO, and Training & Simulation), Application, Industry, Solution (End-to-End, Point), and Region (North America, Europe, Asia Pacific, Middle East, and Row)-Global Forecast to 2026. [Online]. Available: https://www.marketsandmarkets.com/Market-Reports/drone-servicesmarket-80726041.html
- E. Shaikh, N. Mohammad, and S. Muhammad, ‘‘Model checking based unmanned aerial vehicle (UAV) security analysis,’’ in Proc. Int. Conf. Commun., Signal Process., Appl. (ICCSPA), Mar. 2021, pp. 1–6.
- A. Shafique, A. Mehmood, and M. Elhadef, ‘‘Survey of security protocols and vulnerabilities in unmanned aerial vehicles,’’ IEEE Access, vol. 9, pp. 46927–46948, 2021.
- R. Gupta, A. Nair, S. Tanwar, and N. Kumar, ‘‘Blockchain-assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges,’’ IET Commun., vol. 15, no. 10, pp. 1352–1367, 2021.
- A. Islam and S. Y. Shin, ‘‘A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things,’’ Comput. Electr. Eng., vol. 84, Jun. 2020, Art. no. 106627.
- S. Aggarwal, N. Kumar, M. Alhussein, and G. Muhammad, ‘‘Blockchainbased UAV path planning for healthcare 4.0: Current challenges and the way ahead,’’ IEEE Netw., vol. 35, no. 1, pp. 20–29, Jan. 2021.
- M. S. Haque and M. U. Chowdhury, ‘‘A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV),’’ in Proc. Int. Conf. Secur. Privacy Commun. Syst. in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 239, 2018, pp. 113–122.
- Y. Zhu, X. Zhang, Z. Y. Ju, and C. C. Wang, ‘‘A study of blockchain technology development and military application prospects,’’ J. Phys., Conf. Ser., vol. 1507, no. 5, Apr. 2020, Art. no. 052018.
- T. Alladi, V. Chamola, N. Sahu, and M. Guizani, ‘‘Applications of blockchain in unmanned aerial vehicles: A review,’’ Veh. Commun., vol. 23, Jun. 2020, Art. no. 100249.
- A. Kumari, R. Gupta, S. Tanwar, and N. Kumar, ‘‘A taxonomy of blockchain-enabled softwarization for secure UAV network,’’ Comput. Commun., vol. 161, pp. 304–323, Aug. 2020.
- N. Neji and T. Mostfa, ‘‘Communication technology for unmanned aerial vehicles: A qualitative assessment and application to precision agriculture,’’ in Proc. Int. Conf. Unmanned Aircr. Syst. (ICUAS), Jun. 2019, pp. 848–855.
- A. Kuzmin and E. Znak, ‘‘Blockchain-base structures for a secure and operate network of semi-autonomous unmanned aerial vehicles,’’ in Proc. IEEE Int. Conf. Service Oper. Logistics, Inform. (SOLI), Jul. 2018, pp. 32–37.
- J. Jensen, D. F. Selvaraj, and P. Ranganathan, ‘‘Blockchain technology for networked swarms of unmanned aerial vehicles (UAVs),’’ in Proc. IEEE 20th Int. Symp. World Wireless, Mobile Multimedia Netw. (WoWMoM), Jun. 2019, pp. 1–7.
- M. Golam, J.-M. Lee, and D.-S. Kim, ‘‘A UAV-assisted blockchain based secure device-to-device communication in Internet of Military Things,’’ in Proc. Int. Conf. Inf. Commun. Technol. Converg., Oct. 2020, pp. 1896–1898.
- Fortune Buiness Insights. (2021). The Global Military Drone Market. [Online]. Available: https://www.fortunebusinessinsights.com/militarydrone-market-102181
- R. Gupta, A. Shukla, P. Mehta, P. Bhattacharya, S. Tanwar, S. Tyagi, and N. Kumar, ‘‘VAHAK: A blockchain-based outdoor delivery scheme using UAV for healthcare 4.0 services,’’ in Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), Jul. 2020, pp. 255–260.
- T. Nakano, I. Kamiya, M. Tobita, J. Iwahashi, and H. Nakajima, ‘‘Landform monitoring in active volcano by UAV and SFM-MVS technique,’’ Int. Arch. Photogramm., Remote Sens. Spatial Inf. Sci., vol. 40, no. 8, p. 71, 2014.
- K. Kanistras, G. Martins, M. J. Rutherford, and K. P. Valavanis, ‘‘A survey of unmanned aerial vehicles (UAVs) for traffic monitoring,’’ in Proc. Int. Conf. Unmanned Aircr. Syst. (ICUAS), May 2013, pp. 221–234.
- Z. Shao, G. Cheng, J. Ma, Z. Wang, J. Wang, and D. Li, ‘‘Real-time and accurate UAV pedestrian detection for social distancing monitoring in COVID-19 pandemic,’’ IEEE Trans. Multimedia, early access, Apr. 28, 2021, doi: 10.1109/TMM.2021.3075566.
- M. Drauschke, J. Bartelsen, and P. Reidelstuerz, ‘‘Towards UAV-based forest monitoring,’’ in Proc. Workshop UAV-Based Remote Sens. Methods Monitor. Vegetation, Cologne, Germany, 2014, pp. 21–32.
- C. D. Drummond, M. D. Harley, I. L. Turner, A. N. A. Matheen, and W. C. Glamore, ‘‘UAV applications to coastal engineering,’’ in Proc. Australas. Coasts Ports Conf., 22nd Australas. Coastal Ocean Eng. Conf., 15th Australas. Port Harbour Conf., 2015, p. 267.
- J. G. Martinez, M. Gheisari, and L. F. Alarcón, ‘‘UAV integration in current construction safety planning and monitoring processes: Case study of a high-rise building construction project in Chile,’’ J. Manage. Eng., vol. 36, no. 3, May 2020, Art. no. 05020005.
- N. G. Smith, L. Passone, S. Al-Said, M. Al-Farhan, and T. E. Levy, ‘‘Drones in archaeology: Integrated data capture, processing, and dissemination in the Al-Ula Valley, Saudi Arabia,’’ Near Eastern Archaeol., vol. 77, no. 3, pp. 176–181, Sep. 2014.
- M. Erdelj and E. Natalizio, ‘‘UAV-assisted disaster management: Applications and open issues,’’ in Proc. Int. Conf. Comput., Netw. Commun. (ICNC), Feb. 2016, pp. 1–5.
- M. D’Aloia, M. Rizzi, R. Russo, M. Notarnicola, and L. Pellicani, ‘‘A marker-based image processing method for detecting available parking slots from UAVs,’’ in Proc. Int. Conf. Image Anal. Process. Cham, Switzerland: Springer, 2015, pp. 275–281.
- N. A. Khan, N. Z. Jhanjhi, S. N. Brohi, and A. Nayyar, ‘‘Emerging use of UAV’s: Secure communication protocol issues and challenges,’’ in Drones Smart-Cities. Amsterdam, The Netherlands: Elsevier, 2020, pp. 37–55.
- G. Panice, S. Luongo, G. Gigante, D. Pascarella, C. Di Benedetto, A. Vozella, and A. Pescapè, ‘‘A SVM-based detection approach for GPS spoofing attacks to UAV,’’ in Proc. 23rd Int. Conf. Autom. Comput. (ICAC), Sep. 2017, pp. 1–11.
- K. Hartmann and C. Steup, ‘‘The vulnerability of UAVs to cyber attacks— An approach to the risk assessment,’’ in Proc. 5th Int. Conf. Cyber Conflict (CYCON), Jun. 2013, pp. 1–23.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.