{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:19:28Z","timestamp":1776334768370,"version":"3.51.2"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319788159","type":"print"},{"value":"9783319788166","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_9","type":"book-chapter","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:02:48Z","timestamp":1524524568000},"page":"113-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5308-957X","authenticated-orcid":false,"given":"Md Samsul","family":"Haque","sequence":"first","affiliation":[]},{"given":"Morshed U.","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"issue":"3","key":"9_CR1","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ijcip.2012.08.002","volume":"5","author":"M Burmester","year":"2012","unstructured":"Burmester, M., Magkos, E., Chrissikopoulos, V.: Modeling security in cyber\u2013physical systems. Int. J. Crit. Infrastruct. Prot. 5(3), 118\u2013126 (2012)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-13823-7_8","volume-title":"Modelling and Simulation for Autonomous Systems","author":"G Dini","year":"2014","unstructured":"Dini, G., Tiloca, M.: A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems. In: Hodicky, J. (ed.) MESAS. LNCS, vol. 8906, pp. 77\u201394. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-13823-7_8"},{"key":"9_CR3","volume-title":"Unmanned Aircraft Systems: UAVS Design, Development and Deployment","author":"R Austin","year":"2011","unstructured":"Austin, R.: Unmanned Aircraft Systems: UAVS Design, Development and Deployment. Wiley, Hoboken (2011)"},{"key":"9_CR4","unstructured":"Airborg\u2122 H8 10\u00a0K with top flight hybrid-power system (2017). \nhttp:\/\/www.tflighttech.com\/products\/airborg-h8-10k-with-top-flight-hybrid-power-system.html\n\n. Accessed July 2017"},{"key":"9_CR5","unstructured":"Snell, B.: McAfee labs 2017 threats predictions: \u201cDronejacking\u201d places threats in the sky (2016). \nhttps:\/\/www.mcafee.com\/au\/resources\/reports\/rp-threats-predictions-2017.pdf"},{"issue":"3","key":"9_CR6","first-page":"331","volume":"13","author":"C Rani","year":"2015","unstructured":"Rani, C., Modares, H., Sriram, R., Mikulski, D., Lewis, F.L.: Security of unmanned aerial vehicle systems against cyber-physical attacks. J. Def. Model. Simul. Appl. Methodol. Technol. 13(3), 331\u2013342 (2015)","journal-title":"J. Def. Model. Simul. Appl. Methodol. Technol."},{"key":"9_CR7","unstructured":"FAA releases 2016 to 2036 aerospace forecast (2016). \nhttps:\/\/www.faa.gov\/news\/updates\/?newsId=85227"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Mansfield, K., Eveleigh, T., Holzer, T.H., Sarkani, S.: Unmanned aerial vehicle smart device ground control station cyber security threat model. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 722\u2013728. IEEE (2013)","DOI":"10.1109\/THS.2013.6699093"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In: Infotech@ Aerospace, pp. 1\u201330 (2012)","DOI":"10.2514\/6.2012-2438"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 585\u2013590. IEEE (2012)","DOI":"10.1109\/THS.2012.6459914"},{"key":"9_CR11","unstructured":"Gallagher, S.: Triathlete injured by \u201chacked\u201d camera drone (2014). \nhttps:\/\/arstechnica.com\/security\/2014\/04\/triathlete-injured-by-hacked-camera-drone\/\n\n. Accessed June 2017"},{"key":"9_CR12","unstructured":"Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1\u201323. IEEE (2013)"},{"key":"9_CR13","unstructured":"Javaid, A.Y.: Cyber security threat analysis and attack simulation for unmanned aerial vehicle network. University of Toledo (2015)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Hu, S.: A hierarchical key management scheme for wireless sensor networks based on identity-based encryption. In: 2015 IEEE International Conference on Computer and Communications (ICCC), pp. 384\u2013389. IEEE (2015)","DOI":"10.1109\/CompComm.2015.7387601"},{"issue":"4","key":"9_CR15","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/TNSM.2010.1012.0362","volume":"7","author":"FR Yu","year":"2010","unstructured":"Yu, F.R., Tang, H., Mason, P.C., Wang, F.: A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans. Netw. Serv. Manage. 7(4), 258\u2013267 (2010)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"9","key":"9_CR16","first-page":"7","volume":"8","author":"DK Sarmah","year":"2010","unstructured":"Sarmah, D.K., Bajpai, N.: Proposed system for data hiding using cryptography and steganography. Int. J. Comput. Appl. 8(9), 7\u201310 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Altigani, A., Barry, B.: A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and word shift coding protocol. In: 2013 International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), pp. 134\u2013139. IEEE (2013)","DOI":"10.1109\/ICCEEE.2013.6633920"},{"key":"9_CR18","unstructured":"Vegh, L., Miclea, L.: A new approach towards increased security in cyber-physical systems. In: Systems, Signals and Image Processing (IWSSIP), pp. 175\u2013178: IEEE (2014)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Vegh, L., Miclea, L.: Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In: 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/AQTR.2014.6857845"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-29078-2_6","volume-title":"Lightweight Cryptography for Security and Privacy","author":"Y Yang","year":"2016","unstructured":"Yang, Y., Lu, J., Choo, K.-K.R., Liu, J.K.: On lightweight security enforcement in cyber-physical systems. In: G\u00fcneysu, T., Leander, G., Moradi, A. (eds.) LightSec 2015. LNCS, vol. 9542, pp. 97\u2013112. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-29078-2_6"},{"issue":"3","key":"9_CR21","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1016\/j.adhoc.2012.12.004","volume":"11","author":"I Bekmezci","year":"2013","unstructured":"Bekmezci, I., Sahingoz, O.K., Temel, \u015e.: Flying ad-hoc networks (FANETs): a survey. Ad Hoc Netw. 11(3), 1254\u20131270 (2013)","journal-title":"Ad Hoc Netw."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Faquih, A., Kadam, P., Saquib, Z.: Cryptographic techniques for wireless sensor networks: a survey. In: 2015 IEEE Bombay Section Symposium (IBSS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/IBSS.2015.7456652"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). \nhttps:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"issue":"2","key":"9_CR24","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.2009.4907556","volume":"16","author":"Y Fang","year":"2009","unstructured":"Fang, Y., Zhu, X., Zhang, Y.: Securing resource-constrained wireless ad hoc networks. IEEE Wirel. Commun. 16(2), 24\u201330 (2009)","journal-title":"IEEE Wirel. Commun."},{"issue":"3","key":"9_CR25","doi-asserted-by":"publisher","first-page":"e0151253","DOI":"10.1371\/journal.pone.0151253","volume":"11","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Tang, S., Luo, H.: Elliptic curve cryptography-based authentication with identity protection for smart grids. PLoS ONE 11(3), e0151253 (2016)","journal-title":"PLoS ONE"},{"issue":"1","key":"9_CR26","first-page":"25","volume":"9","author":"RK Kodali","year":"2013","unstructured":"Kodali, R.K., Chougule, S.K.: Hierarchical key agreement protocol for wireless sensor networks. Int. J. Recent Trends Eng. Technol. 9(1), 25 (2013)","journal-title":"Int. J. Recent Trends Eng. Technol."},{"issue":"1","key":"9_CR27","doi-asserted-by":"publisher","first-page":"22","DOI":"10.4258\/hir.2010.16.1.22","volume":"16","author":"J-Y Oh","year":"2010","unstructured":"Oh, J.-Y., Yang, D.-I., Chon, K.-H.: A selective encryption algorithm based on AES for medical information. Healthc. Inf. Res. 16(1), 22\u201329 (2010)","journal-title":"Healthc. Inf. Res."},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Ren, Y., Boukerche, A., Mokdad, L.: Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In: 2011 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1038\u20131043. IEEE (2011)","DOI":"10.1109\/WCNC.2011.5779278"},{"issue":"3","key":"9_CR29","first-page":"63","volume":"7","author":"S Almuhammadi","year":"2017","unstructured":"Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography. Comput. Sci. Inf. Technol. 7(3), 63\u201374 (2017)","journal-title":"Comput. Sci. Inf. Technol."},{"issue":"9","key":"9_CR30","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1016\/j.sysarc.2013.05.022","volume":"59","author":"OK Sahingoz","year":"2013","unstructured":"Sahingoz, O.K.: Large scale wireless sensor networks with multi-level dynamic key management scheme. J. Syst. Architect. 59(9), 801\u2013807 (2013)","journal-title":"J. Syst. Architect."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:07:45Z","timestamp":1524524865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}