{"id":6564,"date":"2020-09-14T10:29:44","date_gmt":"2020-09-14T10:29:44","guid":{"rendered":"https:\/\/www.anratechnologies.com\/home\/?p=6564"},"modified":"2023-10-02T08:55:32","modified_gmt":"2023-10-02T08:55:32","slug":"trust-and-security-in-the-world-of-drones","status":"publish","type":"post","link":"https:\/\/www.anratechnologies.com\/home\/2020\/09\/14\/trust-and-security-in-the-world-of-drones\/","title":{"rendered":"Trust and Security in the world of Drones"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Unmanned Aerial Systems (UAS) or drones, as Internet of Things (IoT) devices, present security challenges and vulnerabilities for unintended data distribution.\u00a0 Safety is critical for the unmanned aircraft industry, similar to the manned aviation industry as both operate within a digital aviation ecosystem. With rapidly scaling operations and increasing integration between manned and unmanned operations in a sensitive airspace, addressing new and emerging cyber threats is of utmost importance in maintaining operational viability.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The aviation industry is built upon a trust framework including the: identification of communicating parties and the integrity of the information exchanged among them. Without an onboard pilot to communicate with air traffic services, interoperability has become the foundation of a viable UAS Traffic Management (UTM) framework. This is the same foundation that future systems will be built upon to ensure a trusted stack for increasingly more autonomous systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to information exchange, data collected by drones can be operational mission data in the form of telemetry, as well as acquired data such as photogrammetry, LiDAR, and live video feed etc.\u00a0 This data is secured by enterprise level data sharing controls which require sophisticated infrastructure and advanced security measures to combat the growing number of cyberattacks. \u00a0 In this article, we will discuss data security downstream of the mechanism that controls the drone, often known as the Ground Control Station (GCS).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Utilizing a UTM system such as ANRA Technologies<\/span><a href=\"https:\/\/www.anratechnologies.com\/reference\/smartskies-ctr-utm-platform\/\"><span style=\"font-weight: 400;\"> <strong>ANRA<sup>TM<\/sup><\/strong><\/span><\/a> CTR<span style=\"font-weight: 400;\">, ensures\u00a0 in-built internal defenses for protecting data.\u00a0 Our UTM platform, designed with elasticity in mind, minimizes the number of internal and external facing connectivity interfaces.\u00a0 Resilient identification, authentication, authorization, integrity and permissions-based system access are the foundations of a secure UTM platform. We have accepted that our controls and standards applied to this system will have to constantly evolve to meet changing global threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ANRA ANRA<\/span><span style=\"font-weight: 400;\">\u00a0CTR platform connects to existing and future air traffic control\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">systems.\u00a0 In addition, the platform can exchange data with other UTM systems and airspace participants with application programming interfaces and authorization services. ANRA is constantly looking to make the platforms more secure, agile, scalable, and transparent when it comes to data security. This is true for all participants within the aviation digital ecosystem, as threats evolve, new controls will be needed to ensure trust framework entities continue to operate within their role.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ANRA ANRA<\/span><span style=\"font-weight: 400;\">\u00a0UTM is hardened to tampering and false data injection, manipulation and repudiation. It also reduces the attack surface and eliminates certain classes of attacks by monitoring access to interfaces based on authorization and authentication mechanisms. The platform\u2019s audit logging capabilities ensure operational transparency both from an internal operational and a regulatory compliance perspective. Hardening the system starts with focusing on creating a secure environment.\u00a0<\/span><\/p>\n<h3>Security Focus Areas<\/h3>\n<p><span style=\"font-weight: 400;\">We can group the security focus into the following top level areas that warrant review and collaborative solutions with input from the stakeholder community.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Message security<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Key management<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Denial of service (DoS) protection<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Identity management<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Let&#8217;s review each security focus area in more detail.<\/span><\/p>\n<p><b>Message Security<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The major security objectives in the exchange of operational messages within the UAS Service Supplier (USS) Network include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Message integrity<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Non-repudiation<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Message authentication<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To achieve these three goals, UTM takes the approach of having USSs digitally sign the messages that they send. NASA published a white paper that covers these aspects in fairly great depth. UAS Service Supplier Framework for Authentication and Authorization (NASA\/TM\u20132019\u201322036)<\/span><\/p>\n<h3>Key Management<\/h3>\n<p><span style=\"font-weight: 400;\">Successful key management is critical to the security of a system. It is the more challenging side of cryptography in a sense that it involves aspects of social engineering such as system policy, user training, organizational and departmental interactions, and coordination between all of these elements, in contrast to pure mathematical practices that can be automated. To create a secure environment, <\/span><span style=\"font-weight: 400;\">the nodes that participate in this architecture are provisioned with cryptographic material that supports confidential, authenticated and integrity protected communications amongst actors and to\/through the gateway(s). The underlying cryptographic material and services required depend on the protocols that are being used (both communication and messaging) and the security objectives of each. In addition to keys required for communication protocols, messaging protocols (e.g,. MQTT, CoAP, DDS) also levy cryptographic algorithms and key material.\u00a0 Although some messaging protocols only support username\/password, many provide options for using symmetric keys, key pairs, and certificates to secure communication between devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the introduction of next generation broadband technologies and their evolution to 5G, IoT drone solution developers will be able to redesign their products with broad, direct access to the cloud and new capabilities for peer-to-peer communications. This requires flexible key management capabilities that support a variety of use cases.<\/span><\/p>\n<h3>Denial of Service Protection<\/h3>\n<p><span style=\"font-weight: 400;\">Mission critical services provided to drones, vehicular networks or industrial systems in particular require highly available, low-latency, and highly reliable communication systems. In the new connected world, the influx of low cost drones and other IoT solutions has and will introduce a large number of devices that are low cost and less sophisticated than wireless connected devices such as smartphones. As more devices are connected to the wireless broadband networks, the networks will be exposed to denial of service (DoS) threats, targeting the limited resources of specific services, much like botnet-driven distributed DoS attacks in the Internet. Drones operations need to account for this possibility and plan for mitigation of such attacks by having redundant interfaces, including extensive fail-safes integrated in the solution.<\/span><\/p>\n<h3>Identity Management<\/h3>\n<p><span style=\"font-weight: 400;\">Identification systems for drones need to provide more information than just a few details about the drones. The established identity can be the basis to accomplish further security goals, such as policy-based access control decisions for personnel within that system or recording of actions mapped to their actors to establish an auditable transaction history (e.g., through blockchain-based transaction integrity preservation).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A wide range of identities are involved in a typical commercial drone ecosystem and should not be limited to identification of the drone by itself. Identification needs to exist at every layer of the stack and in every segment of the architecture. For example, drones might need to be identified as hardware trust anchors, while other areas will require identification such as IP endpoints, cloud service instances, network services, virtualized network function instances, subscribers, and administrators and more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of those identities need to be defined, provisioned, maintained, validated, revoked, etc.,\u00a0 requiring a robust Identity Management solution that captures the entire life cycle of this management task.<\/span><\/p>\n<h3>International Aviation Trust Framework (IATF)<\/h3>\n<p><span style=\"font-weight: 400;\">There are some initiatives in place already that are looking at these aspects from the aviation industry point of view. The aim of the<\/span><span style=\"font-weight: 400;\"> International Civil Aviation Organization (ICAO)<\/span><span style=\"font-weight: 400;\"> Global Aviation Trust Framework (IATF) is to provide a high-level, globally inter-operable architecture to manage the vast number of new aviation entrants \u2013 such as drone operators \u2013 while helping to protect communication links between UTM and air traffic management (ATM) systems from cyber threats.\u00a0 Below are some highlights for the IATF framework.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">IATF participant Identities are trustable:<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Common IATF Master Trust Framework agreement\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Common Identity Policies audited through IATF<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Information flow between IATF participants are attributable to the IATF identity source of the information by digitally signing the information<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">IATF compliant networks called Global Resilient Aviation Information Networks (GRAIN)s are trustable:<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Trusted Network addressing<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Trusted Domain Naming Services<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Trusted Network Operations through IATF audited Information Security Management Systems (ISO 27000\/NIST)<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Certification<\/h3>\n<p><span style=\"font-weight: 400;\">International standards provide a foundation\u00a0 for mutual understanding, and can be used as best practices to facilitate performance measurement and reliability.\u00a0 It is one approach to help address drone data security.<\/span><\/p>\n<p><a href=\"https:\/\/www.iso.org\/isoiec-27001-information-security.html\"><span style=\"font-weight: 400;\">ISO\/IEC 27001 <\/span><\/a><span style=\"font-weight: 400;\">is an international standard on how to manage information security. It details requirements for establishing, implementing, maintaining and continually improving the information security management system (ISMS), in order to help organizations make their information assets more secure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Obtaining an ISO27001 certification demonstrates that an organization has identified risks, assessed implications and has put in place systemic controls to limit any damages to the organization.\u00a0 ISO27001 benefits include increased reliability and security of systems information as well as improved customer and stakeholder confidence.<\/span><\/p>\n<h3>Summary<\/h3>\n<p><span style=\"font-weight: 400;\">Trust and security in the world of drones is a complex, multifaceted problem.\u00a0 We can decompose it by looking at security by design principals as the ecosystem will continue to evolve.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Interoperability and a global trust framework is the basis of secure UAS operations and the foundation for Next Generation Airspace Management Systems.\u00a0 We at ANRA are working towards global interoperability by participating in various standards organizations, such as ASTM, the ICAO Trust Framework Working Group, and the Global UTM Association (GUTMA) to prevent industry fragmentation and achieve a safe, secure, scalable, interoperable solution for tomorrow&#8217;s airspace management.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unmanned Aerial Systems (UAS) or drones, as Internet of Things (IoT) devices, present security challenges and vulnerabilities for unintended data distribution.\u00a0 Safety is critical for the unmanned aircraft industry, similar to the manned aviation industry as both operate within a digital aviation ecosystem. With rapidly scaling operations and increasing integration between manned and unmanned operations [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8891,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32,36],"tags":[6,81,323,324,325,66,85,326,147,198],"class_list":["post-6564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting","category-rules","tag-business","tag-drones","tag-faa-utm","tag-iatf","tag-iso27001","tag-nasa","tag-security","tag-trust","tag-uam","tag-uspace"],"_links":{"self":[{"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/posts\/6564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/comments?post=6564"}],"version-history":[{"count":1,"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/posts\/6564\/revisions"}],"predecessor-version":[{"id":9537,"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/posts\/6564\/revisions\/9537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/media\/8891"}],"wp:attachment":[{"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/media?parent=6564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/categories?post=6564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.anratechnologies.com\/home\/wp-json\/wp\/v2\/tags?post=6564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}