Blockchain-Based Data Security in Military Autonomous Systems

2020-11-01
Advances in technology have enabled the increased use of autonomous systems such as unmanned aerial vehicles (UAVs) in military operations and other critical military communications. While the use of autonomous systems has greatly facilitated military operations, provided a global view of the operational environment and eased sensitive data collection, making possible reduced casualties, it has also created a greater cyber attack surface due to its high level of automation. The existence of adversaries targeting this attack surface can seriously damage military operations by tampering with critical message content used in autonomous systems decision making. In order to ensure the successful operation of autonomous military systems, mechanisms must be developed to strictly protect the integrity of the collected / exchanged data and messages, and an immutable record of each message must be provided. These mechanisms should also be used to control autonomous systems under critical failures or attacks occurring during or after military operations. Blockchain has recently emerged as a technology that provides a decentralized architecture to achieve an unchangeable history of interactions between parties that are part of a distributed network. While blockchain is currently used in various fields such as cryptocurrencies, supply chain management and e-voting systems, it also has the potential to provide secure communication in autonomous systems. In this study, a blockchain-based communication architecture is proposed that guarantees integrity assurance and permanent recording of messages exchanged between all parties, including UAVs and ground control stations, in a military autonomous system network. The proposed secure communication architecture has been theoretically evaluated in terms of its resistance to the types of cyber attacks frequently encountered in distributed systems, and it has been shown to provide protection against attacks that compromise data integrity as well as spoofed authentication attempts. The proposed blockchain-based architecture is promising to increase the resilience of military autonomous systems against cyberattacks that aim to hurt the success of military operations through data content manipulation.
Avrupa Bilim ve Teknoloji Dergisi

Suggestions

Multiple Access Communications for Age Minimization in UAV Aided Data Collection
Ogutcu, Oktay; Yüksel Turgut, Ayşe Melda (2022-01-01)
Data collection with unmanned aerial vehicles (UAVs) is a novel technology with many practical applications. In this paper, UAV aided data collection in sensor networks for time-critical applications is considered. Maximum age of information (AoI) is used as the performance metric, where both communication time and flight time contribute to AoI. Given that sensors form groups of two, the UAV aims to visit each line segment formed by the two sensors in each group once and to return to the data center. To min...
Unmanned Aerial Vehicle Domain: Areas of Research
Demir, Kadir Alpaslan; Cicibas, Halil; ARICA, NAFİZ (2015-07-01)
Unmanned aerial vehicles (UAVs) domain has seen rapid developments in recent years. As the number of UAVs increases and as the missions involving UAVs vary, new research issues surface. An overview of the existing research areas in the UAV domain has been presented including the nature of the work categorised under different groups. These research areas are divided into two main streams: Technological and operational research areas. The research areas in technology are divided into onboard and ground techno...
Transfer Learning-Based Crack Detection by AutonomousUAVs
Küçüksubaşı, Fatih; Sorguç, Arzu (2018-07-20)
Unmanned Aerial Vehicles (UAVs) have recently shown great performance collecting visual data through autonomous exploration and mapping in building inspection. Yet, the number of studies is limited considering the post processing of the data and its integration with autonomous UAVs. These will enable huge steps onward into full automation of building inspection. In this regard, this work presents a decision making tool for revisiting tasks in visual building inspection by autonomous UAVs. The tool is an imp...
Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework
Sengul, Zafer; Acartürk, Cengiz (2021-01-01)
© 2021 IEEE.Malware propagation is capable of introducing adverse effects in military operations since today's high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer netw...
Application of a Fixed-Wing Unmanned Aerial Vehicle (UAV) in Reforestation of Lebanon Cedar (Cedrus Libani A. Rich)
Şahin, Mustafa (null; 2011-03-16)
Studies and development of Unmanned Aerial Vehicles (UAVs) started shortly after the first controlled, powered, heavier-than-air human flight in 1903. UAVs have many advantages over piloted aircraft, such as minimizing human risk, flying economically, and flying for extended periods of time. Early UAVs were mostly developed for military purposes, but modern development encompasses both military and civilian uses and is now pursued worldwide. While UAVs serve a number of important civilian functions such as ...
Citation Formats
P. Angın, “Blockchain-Based Data Security in Military Autonomous Systems,” Avrupa Bilim ve Teknoloji Dergisi, pp. 362–368, 2020, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/81963.