[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

BloothAir: A Secure Aerial Relay System Using Bluetooth Connected Autonomous Drones

Published: 15 April 2021 Publication History

Abstract

Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on Bluetooth Low Energy (BLE) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.

References

[1]
Reza Shakeri, Mohammed Ali Al-Garadi, Ahmed Badawy, Amr Mohamed, Tamer Khattab, Abdulla Khalid Al-Ali, Khaled A. Harras, and Mohsen Guizani. 2019. Design challenges of multi-UAV systems in cyber-physical applications: A comprehensive survey and future directions. IEEE Communications Surveys & Tutorials 21, 4 (2019), 3340--3385.
[2]
Deepak Vasisht, Zerina Kapetanovic, Jongho Won, Xinxin Jin, Ranveer Chandra, Sudipta Sinha, Ashish Kapoor, Madhusudhan Sudarshan, and Sean Stratman. 2017. Farmbeats: An IoT platform for data-driven agriculture. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI’17). 515--529.
[3]
Luca Mottola and Kamin Whitehouse. 2018. Fundamental concepts of reactive control for autonomous drones. Commun ications of the ACM 61, 10 (2018), 96--104.
[4]
Milan Erdelj, Enrico Natalizio, Kaushik R. Chowdhury, and Ian F. Akyildiz. 2017. Help from the sky: Leveraging UAVs for disaster management. IEEE Pervasive Computing 16, 1 (2017), 24--32.
[5]
Kai Li, Wei Ni, Xin Wang, Ren Ping Liu, Salil S. Kanhere, and Sanjay Jha. 2015. Energy-efficient cooperative relaying for unmanned aerial vehicles. IEEE Transactions on Mobile Computing 15, 6 (2015), 1377--1386.
[6]
Dario Floreano and Robert J. Wood. 2015. Science, technology and the future of small autonomous drones. Nature 521, 7553 (2015), 460.
[7]
Michael Hooper, Yifan Tian, Runxuan Zhou, Bin Cao, Adrian P. Lauf, Lanier Watkins, William H. Robinson, and Wlajimir Alexis. 2016. Securing commercial WiFi-based UAVs from common security attacks. In Proceedings of the IEEE Military Communications Conference (MILCOM’16). 1213--1218.
[8]
Manlio Bacco, Andrea Berton, Alberto Gotta, and Luca Caviglione. 2018. IEEE 802.15. 4 air-ground UAV communications in smart farming scenarios. IEEE Communications Letters 22, 9 (2018), 1910--1913.
[9]
Zhenhui Yuan, Jie Jin, Lingling Sun, Kwan-Wu Chin, and Gabriel-Miro Muntean. 2018. Ultra-reliable IoT communications with UAVs: A swarm use case. IEEE Communications Magazine 56, 12 (2018), 90--96.
[10]
Carles Gomez, Joaquim Oller, and Josep Paradells. 2012. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 12, 9 (2012), 11734--11753.
[11]
Riham Altawy and Amr M. Youssef. 2017. Security, privacy, and safety aspects of civilian drones: A survey. ACM Transactions on Cyber-Physical Systems 1, 2 (2017), 7.
[12]
Chi Cheng, Rongxing Lu, Albrecht Petzoldt, and Tsuyoshi Takagi. 2017. Securing the Internet of Things in a quantum world. IEEE Communications Magazine 55, 2 (2017), 116--120.
[13]
Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In IEEE INFOCOM. IEEE, 3048--3056.
[14]
Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim. 2011. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In IEEE INFOCOM. IEEE, 1422--1430.
[15]
Yunfei Ma, Nicholas Selby, and Fadel Adib. 2017. Drone relays for battery-free networks. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication. 335--347.
[16]
Minghu Zhang and Xin Li. 2020. Drone-enabled Internet of Things relay for environmental monitoring in remote areas without public networks. IEEE Internet of Things Journal 7 (2020), 7648–7662.
[17]
Xinlei Chen, Carlos Ruiz, Sihan Zeng, Liyao Gao, Aveek Purohit, Stefano Carpin, and Pei Zhang. 2020. H-DrunkWalk: Collaborative and adaptive navigation for heterogeneous MAV swarm. ACM Transactions on Sensor Networks (TOSN) 16, 2 (2020), 1--27.
[18]
Luca Mottola, Mattia Moretta, Kamin Whitehouse, and Carlo Ghezzi. 2014. Team-level programming of drone sensor networks. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. ACM, 177--190.
[19]
Pablo Ramon Soria, Andres Felipe Palomino, B. C. Arrue, and Anibal Ollero. 2017. Bluetooth network for micro-UAVs for communication network and embedded range only localization. In Proceedings of the 2017 International Conference on Unmanned Aircraft Systems (ICUAS’17). IEEE, 747--752.
[20]
Xiaoli Wang, Aakanksha Chowdhery, and Mung Chiang. 2017. Networked drone cameras for sports streaming. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS’17). IEEE, 308--318.
[21]
Yao Xie, Xiao-Yang Liu, Linghe Kong, Fan Wu, Guihai Chen, and Athanasios V. Vasilakos. 2016. Drone-based wireless relay using online tensor update. In Proceedings of the 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS’16). IEEE, 48--55.
[22]
Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey Vinel, and Xinyi Huang. 2018. Security and privacy for the internet of drones: Challenges and solutions. IEEE Communications Magazine 56, 1 (2018), 64--69.
[23]
Hichem Sedjelmaci, Sidi Mohammed Senouci, and Nirwan Ansari. 2017. A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Transactions on Systems, Man, and Cybernetics: Systems 48, 9 (2017), 1594--1606.
[24]
Daojing He, Yinrong Qiao, Sammy Chan, and Nadra Guizani. 2018. Flight security and safety of drones in airborne fog computing systems. IEEE Communications Magazine 56, 5 (2018), 66--71.
[25]
Seung-Hyun Seo, Jongho Won, Elisa Bertino, Yousung Kang, and Dooho Choi. 2016. A security framework for a drone delivery service. In Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use. ACM, 29--34.
[26]
Zachary Birnbaum, Andrey Dolgikh, Victor Skormin, Edward O’Brien, Daniel Muller, and Christina Stracquodaine. 2016. Unmanned aerial vehicle security using recursive parameter estimation. Journal of Intelligent & Robotic Systems 84, 1-4 (2016), 107--120.
[27]
Kai Li, Razvan Christian Voicu, Salil S Kanhere, Wei Ni, and Eduardo Tovar. 2019. Energy efficient legitimate wireless surveillance of UAV communications. IEEE Transactions on Vehicular Technology 68, 3 (2019), 2283--2293.
[28]
Kai Li, Salil S. Kanhere, Wei Ni, Eduardo Tovar, and Mohsen Guizani. 2019. Proactive eavesdropping via jamming for trajectory tracking of UAVs. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC’19). IEEE, 477--482.
[29]
Yue Zhang, Jian Weng, Zhen Ling, Bryan Pearson, and Xinwen Fu. 2020. BLESS: A BLE application security scanning framework. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’20). IEEE, 636--645.
[30]
Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020. Key negotiation downgrade attacks on bluetooth and bluetooth low energy. ACM Transactions on Privacy and Security (TOPS) 23, 3 (2020), 1--28.
[31]
Pallavi Sivakumaran and Jorge Blasco Alis. 2018. A low energy profile: Analysing characteristic security on BLE peripherals. In Proceedings of the ACM Conference on Data and Application Security and Privacy. 152--154.
[32]
2019. MX400 Hardware. Retrieved August 2019 from http://www.mindpx.net/assets/accessories/MX400usermanual_v12.pdf.
[33]
Kai Li, Ning Lu, Pei Zhang, Wei Ni, and Eduardo Tovar. 2020. Multi-drone assisted Internet of Things testbed based on Bluetooth 5 communications. In Proceedings of the 2020 19th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’20). IEEE, 345--346.
[34]
2019. MindPX. Retrieved August 2019 from http://www.mindpx.net/.
[35]
Dimitri P. Bertsekas. 1995. Dynamic Programming and Optimal Control. Vol. 1. Athena Scientific, Belmont, MA.
[36]
Yunchuan Wei, Kai Zeng, and Prasant Mohapatra. 2012. Adaptive wireless channel probing for shared key generation based on PID controller. IEEE Transactions on Mobile Computing 12, 9 (2012), 1842--1852.
[37]
Michael Hoeberl, Ihtesham Haider, and Bernhard Rinner. 2016. Towards a secure key generation and storage framework on resource-constrained sensor nodes. In EWSN. 313--318.
[38]
Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider Al-Khateeb, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2017. Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks. IEEE Internet of Things Journal 5, 4 (2017), 2496--2505.
[39]
2019. AirMind. Retrieved August 2019 from www.airmind.co.
[40]
Martin Woolley and Sarah Schmidt. 2019. Bluetooth 5. Go Faster. Go Further. Retrieved March 2019 from https://www.bluetooth.com/wp-content/uploads/2019/03/Bluetooth_5-FINAL.pdf.
[41]
Airmind. 2020. Product Overview: Gust Dual-Band Extended Range Radio. Retrieved November 2020 from http://www.mindpx.net/assets/accessories/Gust_product_overview_v1.1.pdf.
[42]
Shimpei Yasukawa, Hisato Iwai, and Hideichi Sasaoka. 2008. A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property. In IEEE International Symposium on Information Theory (ISIT’08). IEEE, 732--736.
[43]
Tomoyuki Aono, Keisuke Higuchi, Takashi Ohira, Bokuji Komiyama, and Hideichi Sasaoka. 2005. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation 53, 11 (2005), 3776--3784.
[44]
Lawrence E. Bassham III, Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Elaine B. Barker, Stefan D. Leigh, Mark Levenson, Mark Vangel, David L. Banks, et al. 2010. Sp 800-22 rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology.
[45]
Meltem Sönmez Turan, Elaine Barker, John Kelsey, Kerry A. McKay, Mary L. Baish, and Mike Boyle. 2018. Recommendation for the entropy sources used for random bit generation. NIST Special Publication 800, 90B (2018).

Cited By

View all
  • (2024)An Experimental Study on BLE 5 Mesh Applied to Public TransportationACM Transactions on Sensor Networks10.1145/364764120:3(1-27)Online publication date: 13-Apr-2024
  • (2024)Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppersDefence Technology10.1016/j.dt.2022.12.01031(537-543)Online publication date: Jan-2024
  • (2023)Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation DronesDrones10.3390/drones70704307:7(430)Online publication date: 28-Jun-2023
  • Show More Cited By

Index Terms

  1. BloothAir: A Secure Aerial Relay System Using Bluetooth Connected Autonomous Drones

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Cyber-Physical Systems
      ACM Transactions on Cyber-Physical Systems  Volume 5, Issue 3
      July 2021
      296 pages
      ISSN:2378-962X
      EISSN:2378-9638
      DOI:10.1145/3458848
      • Editor:
      • Chenyang Lu
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 15 April 2021
      Accepted: 01 January 2021
      Revised: 01 January 2021
      Received: 01 November 2020
      Published in TCPS Volume 5, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Autonomous drones
      2. Bluetooth low energy
      3. aerial data relays
      4. experimental testbed
      5. wireless security

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • CISTER Research Unit
      • CMU Portugal partnership

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)58
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 12 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)An Experimental Study on BLE 5 Mesh Applied to Public TransportationACM Transactions on Sensor Networks10.1145/364764120:3(1-27)Online publication date: 13-Apr-2024
      • (2024)Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppersDefence Technology10.1016/j.dt.2022.12.01031(537-543)Online publication date: Jan-2024
      • (2023)Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation DronesDrones10.3390/drones70704307:7(430)Online publication date: 28-Jun-2023
      • (2023)Deep Reinforcement Learning for Internet of Drones Networks: Issues and Research DirectionsIEEE Open Journal of the Communications Society10.1109/OJCOMS.2023.32518554(671-683)Online publication date: 2023
      • (2023)When Internet of Things Meets Metaverse: Convergence of Physical and Cyber WorldsIEEE Internet of Things Journal10.1109/JIOT.2022.323284510:5(4148-4173)Online publication date: 1-Mar-2023
      • (2023)Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.331222126:1(496-533)Online publication date: 11-Sep-2023
      • (2023)A systematic literature review on wireless security testbeds in the cyber-physical realmComputers and Security10.1016/j.cose.2023.103383133:COnline publication date: 1-Oct-2023
      • (2023)A Survey Study and Comparison of Drones Communication SystemsFlexible Electronics for Electric Vehicles10.1007/978-981-99-4795-9_33(351-361)Online publication date: 3-Nov-2023
      • (2022)Online Caching Networks with Adversarial GuaranteesACM SIGMETRICS Performance Evaluation Review10.1145/3547353.352263250:1(91-92)Online publication date: 7-Jul-2022
      • (2022)Robustness and Consistency in Linear Quadratic Control with Untrusted PredictionsProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35080386:1(1-35)Online publication date: 28-Feb-2022
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media