SECURING UAV SWARM-BASED SMART METERING INFRASTRUCTURE: A MULTI-PHASED APPROACH TO THREAT MITIGATION

Authors

  • QUTAIBA IBRAHIM ALI Department of Computer Engineering, University of Mosul, Mosul, Iraq.
  • MUSTAFA QASSAB Department of Computer Engineering, University of Mosul, Mosul, Iraq.

DOI:

https://doi.org/10.55197/qjoest.v6i2.201

Keywords:

UAV swarm, smart metering infrastructure, security, IPSec, authentication, confidentiality

Abstract

Unmanned Aerial Vehicle (UAV) swarms offer a promising solution for revolutionizing Smart Metering Infrastructure (SMI) by enabling efficient, scalable, and cost-effective data collection. However, the deployment of UAV swarms in critical infrastructure applications raises significant security concerns. This paper presents a comprehensive security model designed to protect a UAV swarm-based SMI against various threats throughout its operational phases. We identify key vulnerabilities and propose a multi-layered security framework that incorporates bidirectional entity authentication, secure communication channels using IPSec (Internet Protocol Security), and proactive measures to mitigate specific attacks, such as denial-of-service and man-in-the-middle attacks. We analyze the effectiveness of our proposed solutions in addressing potential threats during different operational phases: DMC (Data Management Center) interaction, in-flight operations, and data collection. We present a comparative analysis highlighting the advantages of our approach over existing security schemes for UAV swarms. Our findings provide valuable insights into securing UAV swarm-based critical infrastructure and contribute towards building more resilient and trustworthy smart city applications.

References

[1] Abiodun, O.I., Jantan, A., Omolara, A.E., Dada, K.V., Mohamed, N.A., Arshad, H. (2018): State-of-the-art in artificial neural network applications: A survey. – Heliyon 4(11): 41p.

[2] Akram, R.N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., Chaumette, S. (2017): Security, privacy and safety evaluation of dynamic and static fleets of drones. – In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), IEEE 12p.

[3] Alhabib, M.H., Ali, Q.I. (2023): Internet of autonomous vehicles communication infrastructure: A short review. – Diagnostyka 24: 9p.

[4] Ali, Q.I. (2017): Towards Secure & Green Advanced Metering Infrastructure (AMI). – International Journal of Applied Science and Engineering 14(3): 147-169.

[5] Ali, Q.I. (2016): Securing solar energy‐harvesting road‐side unit using an embedded cooperative‐hybrid intrusion detection system. – IET Information Security 10(6): 386-402.

[6] Ali, Q.I. (2015): Security Issues of Solar Energy Harvesting Road Side Unit (RSU). – Iraqi Journal for Electrical & Electronic Engineering 11(1): 18-31.

[7] Ali, Q.I. (2008): An efficient simulation methodology of networked industrial devices. – In 2008 5th International Multi-Conference on Systems, Signals and Devices, IEEE 6p.

[8] Ali, Q.I., Lazim, S. (2012): Design and implementation of an embedded intrusion detection system for wireless applications. – IET Information Security 6(3): 171-182.

[9] Aljumah, A. (2024): UAV-Based Secure Data Communication: Multilevel Authentication Perspective. – Sensors 24(3): 21p.

[10] Chen, W., Liu, J., Guo, H., Kato, N. (2020): Toward robust and intelligent drone swarm: Challenges and future directions. – IEEE Network 34(4): 278-283.

[11] Chung, S.J., Paranjape, A.A., Dames, P., Shen, S., Kumar, V. (2018): A survey on aerial swarm robotics. – IEEE Transactions on Robotics 34(4): 837-855.

[12] Do, H.T., Hua, H.T., Nguyen, M.T., Nguyen, C.V., Nguyen, H.T., Nguyen, H.T., Nguyen, N.T. (2021): Formation Control Algorithms for Multiple-UAVs: A Comprehensive Survey. – EAI Endorsed Transaction on Industrial Networks and Intelligent Systems 8(27): 13p.

[13] Dovgal, V.A., Dovgal, D.V. (2021): Security analysis of a swarm of drones resisting attacks by intruders. – In Distance Educational Technologies: Proceedings of the 5th International Scientific and Practical Conference 5p.

[14] François-Lavet, V., Henderson, P., Islam, R., Bellemare, M.G., Pineau, J. (2018): An introduction to deep reinforcement learning. – Foundations and Trends® in Machine Learning 11(3-4): 219-354.

[15] Han, K., Al Nuaimi, E., Al Blooshi, S., Psiakis, R., Yeun, C.Y. (2024): Scalable Authenticated Communication in Drone Swarm Environment. – Journal of Internet Technology 25(2): 255-265.

[16] Ibrahim, Q., Qassab, M. (2022): Theory, concepts and future of self organizing networks (SON). – Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science) 15(7): 904-928.

[17] ITS Committee (2013): IEEE standard for wireless access in vehicular environments-security services for applications and management messages. – IEEE Vehicular Technology Society 1609(2): 30p.

[18] Jahan, F., Sun, W., Niyaz, Q., Alam, M. (2019): Security modeling of autonomous systems: A survey. – ACM Computing Surveys (CSUR) 52(5): 1-34.

[19] Kent, S., Seo, K. (2005): Security architecture for the internet protocol (No. rfc4301). – Network Working Group 99p.

[20] Khoshafa, M.H., Ngatched, T.M., Gadallah, Y., Ahmed, M.H. (2023): Securing LPWANs: A reconfigurable intelligent surface (RIS)-assisted UAV approach. – IEEE Wireless Communications Letters 13(1): 158-162.

[21] Kim, J., Kim, S., Ju, C., Son, H.I. (2019): Unmanned aerial vehicles in agriculture: A review of perspective of platform, control, and applications. – IEEE Access 7: 105100-105115.

[22] Kozera, C.A. (2018): Military use of unmanned aerial vehicles-a historical study. – Safety & Defense 4: 17-21.

[23] Lee, D.H., Kim, J.G. (2014): IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks. – Personal and Ubiquitous Computing 18: 493-501.

[24] Lee, Y.J., Chae, H.S., Lee, K.W. (2021): Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices. – Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije 62(1): 127-136.

[25] Liu, Y., Liu, J., He, Z., Li, Z., Zhang, Q., Ding, Z. (2024): A survey of multi-agent systems on distributed formation control. – Unmanned Systems 12(05): 913-926.

[26] Lyu, M., Zhao, Y., Huang, C., Huang, H. (2023): Unmanned aerial vehicles for search and rescue: A survey. – Remote Sensing 15(13): 35p.

[27] Mekdad, Y., Aris, A., Babun, L., El Fergougui, A., Conti, M., Lazzeretti, R., Uluagac, A.S. (2023): A survey on security and privacy issues of UAVs. – Computer Networks 224: 25p.

[28] Nguyen, S.Q., Le, A.T., Le, C.B., Tin, P.T., Kim, Y.H. (2023): Exploiting user clustering and fixed power allocation for multi-antenna UAV-assisted IoT systems. – Sensors 23(12): 32p.

[29] Oh, K.K., Park, M.C., Ahn, H.S. (2015): A survey of multi-agent formation control. – Automatica 53: 424-440.

[30] Ouyang, Q., Wu, Z., Cong, Y., Wang, Z. (2023): Formation control of unmanned aerial vehicle swarms: A comprehensive review. – Asian Journal of Control 25(1): 570-593.

[31] Peng, K., Du, J., Lu, F., Sun, Q., Dong, Y., Zhou, P., Hu, M. (2019): A hybrid genetic algorithm on routing and scheduling for vehicle-assisted multi-drone parcel delivery. – IEEE Access 7: 49191-49200.

[32] Praptodiyono, S., Santoso, M.I., Firmansyah, T., Abdurrazaq, A., Hasbullah, I.H., Osman, A. (2019): Enhancing IPsec performance in mobile IPv6 using elliptic curve cryptography. – In 2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), IEEE 5p.

[33] Qaddoori, S.L., Ali, Q.I. (2023): An efficient security model for industrial internet of things (IIoT) system based on machine learning principles. – Al-Rafidain Engineering Journal (AREJ) 28(1): 329-340.

[34] Qassab, M.S., Ali, Q.I. (2022): A UAV‐based portable health clinic system for coronavirus hotspot areas. – Healthcare Technology Letters 9(4-5): 77-90.

[35] Rescorla, E., Modadugu, N. (2012): Datagram transport layer security version 1.2 (No. rfc6347). – Association for Computing Machinery 32p.

[36] Reynolds, C.W. (1987): Flocks, herds and schools: A distributed behavioral model. – In Proceedings of the 14th Annual Conference on Computer Graphics and Interactive Techniques 9p.

[37] Saffre, F., Hildmann, H., Karvonen, H. (2021): The design challenges of drone swarm control. – In International Conference on Human-Computer Interaction, Cham: Springer International Publishing 18p.

[38] Saini, H.K., Jain, K. (2023): Heuristics to Secure IoT-Based Edge-Driven UAV. – In Multidisciplinary Approaches to Sustainable Human Development, IGI Global 18p.

[39] Skorobogatov, G., Barrado, C., Salamí, E. (2020): Multiple UAV systems: A survey. – Unmanned Systems 8(02): 149-169.

[40] Su, Y., Zhou, H., Deng, Y., Dohler, M. (2023): Energy-efficient cellular-connected UAV swarm control optimization. – IEEE Transactions on Wireless Communications 23(5): 4127-4140.

[41] Wang, J., Jiao, Z., Chen, J., Hou, X., Yang, T., Lan, D. (2023): Blockchain-Aided secure access control for UAV computing networks. – IEEE Transactions on Network Science and Engineering 13p.

[42] Yin, Z., Cheng, N., Song, Y., Hui, Y., Li, Y., Luan, T.H., Yu, S. (2023): UAV-assisted secure uplink communications in satellite-supported IoT: Secrecy fairness approach. – IEEE Internet of Things Journal 11(4): 6904-6915.

[43] Zhang, Y., Meng, L., Zhang, M., Meng, W. (2023): A secure and lightweight batch authentication scheme for Internet of Drones environment. – Vehicular Communications 44(8): 11p.

Downloads

Published

2025-06-27

Issue

Section

Articles

How to Cite

SECURING UAV SWARM-BASED SMART METERING INFRASTRUCTURE: A MULTI-PHASED APPROACH TO THREAT MITIGATION. (2025). Quantum Journal of Engineering, Science and Technology, 6(2), 1-19. https://doi.org/10.55197/qjoest.v6i2.201