Towards Secure and Reliable Heterogeneous Real-time Telemetry Communication in Autonomous UAV Swarms

Pavlo Mykytyn,Marcin Brzozowski,Zoya Dyka,Peter Langendörfer
2024-04-11
Abstract:In the era of cutting-edge autonomous systems, Unmanned Aerial Vehicles (UAVs) are becoming an essential part of the solutions for numerous complex challenges. This paper evaluates UAV peer-to-peer telemetry communication, highlighting its security vulnerabilities and explores a transition to a het-erogeneous multi-hop mesh all-to-all communication architecture to increase inter-swarm connectivity and reliability. Additionally, we suggest a symmetric key agreement and data encryption mechanism implementation for inter - swarm communication, to ensure data integrity and confidentiality without compromising performance.
Cryptography and Security,Robotics
What problem does this paper attempt to address?
The paper primarily focuses on the communication security and reliability issues faced by UAV swarms during autonomous operations. Specifically, the authors discuss the following key points: 1. **Existing Challenges and Shortcomings**: The current Micro Air Vehicle Link (MAVlink) protocol used for UAV swarm communication lacks necessary security measures, making communication vulnerable to eavesdropping, Man-In-The-Middle (MITM) attacks, replay attacks, and other threats. Additionally, the encryption challenges inherent in the MAVlink protocol further exacerbate this issue. 2. **Improvement of Communication Architecture**: To enhance the security and reliability of communication within the UAV swarm and between the swarm and the Ground Control Station (GCS), the paper proposes a heterogeneous multi-hop mesh fully connected communication architecture. This architecture allows direct communication between UAVs or relaying information through other UAVs, thereby improving the overall connectivity and reliability of the swarm. 3. **Implementation of Encryption Mechanisms**: To ensure data integrity and confidentiality, the paper also suggests implementing a symmetric key agreement and data encryption mechanism. This mechanism utilizes Elliptic Curve Cryptography (ECC) techniques, including the Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm and the Elliptic Curve Digital Signature Algorithm (ECDSA), to achieve a secure key agreement process, and employs the Advanced Encryption Standard (AES) to encrypt data transmission. 4. **Hardware Requirements and Design**: To support the aforementioned communication architecture and technical solutions, the paper discusses the necessary hardware components, such as wireless modules operating on different frequency bands (e.g., Sub-1GHz, 2.4GHz Wi-Fi, and 5G/LTE), and a custom-designed Communication Hub for efficiently managing multiple RF modules. In summary, this research aims to improve the security and reliability of UAV swarm communication by introducing a heterogeneous communication architecture and robust encryption mechanisms, thereby laying the foundation for the widespread application of UAV swarms.