{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:15:06Z","timestamp":1773843306853,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T00:00:00Z","timestamp":1613347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2019R1A2C1088092"],"award-info":[{"award-number":["NRF-2019R1A2C1088092"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>To perform advanced operations with unmanned aerial vehicles (UAVs), it is crucial that components other than the existing ones such as flight controller, network devices, and ground control station (GCS) are also used. The inevitable addition of hardware and software to accomplish UAV operations may lead to security vulnerabilities through various vectors. Hence, we propose a security framework in this study to improve the security of an unmanned aerial system (UAS). The proposed framework operates in the robot operating system (ROS) and is designed to focus on several perspectives, such as overhead arising from additional security elements and security issues essential for flight missions. The UAS is operated in a nonnative and native ROS environment. The performance of the proposed framework in both environments is verified through experiments.<\/jats:p>","DOI":"10.3390\/s21041369","type":"journal-article","created":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T22:58:01Z","timestamp":1613429881000},"page":"1369","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A Robot Operating System Framework for Secure UAV Communications"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7611-4296","authenticated-orcid":false,"given":"Hyojun","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Information and Communication Engineering, Daegu Gyeongbuk Institute of Science and Technology, Daegu 42988, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2504-8476","authenticated-orcid":false,"given":"Jiyoung","family":"Yoon","sequence":"additional","affiliation":[{"name":"INTUSEER Inc., Daegu 41260, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3867-9736","authenticated-orcid":false,"given":"Min-Seong","family":"Jang","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Daegu Gyeongbuk Institute of Science and Technology, Daegu 42988, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4807-6461","authenticated-orcid":false,"given":"Kyung-Joon","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Daegu Gyeongbuk Institute of Science and Technology, Daegu 42988, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2021,2,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.trpro.2017.03.043","article-title":"UAV-Based Traffic Analysis: A Universal Guiding Framework Based on Literature Survey","volume":"22","author":"Khan","year":"2017","journal-title":"Transp. Res. Procedia"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Vacca, G., Dess\u00ec, A., and Sacco, A. (2017). The Use of Nadir and Oblique UAV Images for Building Knowledge. ISPRS Int. J. Geo-Inf., 6.","DOI":"10.3390\/ijgi6120393"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Kang, J.-H., Kwon, Y.-M., and Park, K.-J. (2017). Cooperative Spatial Retreat for Resilient Drone Networks. Sensors, 17.","DOI":"10.3390\/s17051018"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bithas, P.S., Michailidis, E.T., Nomikos, N., Vouyioukas, D., and Kanatas, A.G. (2019). A Survey on Machine-Learning Techniques for UAV-Based Communications. Sensors, 19.","DOI":"10.3390\/s19235170"},{"key":"ref_5","unstructured":"(2020, December 17). Surprising Drone Uses (Besides Amazon Delivery). Available online: https:\/\/www.nationalgeographic.com\/news\/2013\/12\/131202-drone-uav-uas-amazon-octocopter-bezos-science-aircraft-unmanned-robot\/."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Wang, E.K., Ye, Y., Xu, X., Yiu, S.M., Hui, L.C.K., and Chow, K.P. (2010, January 18\u201320). Security Issues and Challenges for Cyber Physical System. Proceedings of the 2010 IEEE\/ACM Int\u2019l Conference on Green Computing and Communications & Int\u2019l Conference on Cyber, Physical and Social Computing, Hangzhou, China.","DOI":"10.1109\/GreenCom-CPSCom.2010.36"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"43203","DOI":"10.1109\/ACCESS.2018.2863237","article-title":"Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles","volume":"6","author":"Kwon","year":"2018","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3994","DOI":"10.1109\/TVT.2020.2972617","article-title":"Security Enhancement for NOMA-UAV Networks","volume":"69","author":"Zhao","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_9","unstructured":"Hartmann, K., and Steup, C. (2013, January 4\u20137). The vulnerability of UAVs to cyber attacks-An approach to the risk assessment. Proceedings of the 2013 5th International Conference on Cyber Conflict (CYCON 2013), Tallinn, Estonia."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yoon, K., Park, D., Yim, Y., Kim, K., Yang, S.K., and Robinson, M. (2017, January 10\u201312). Security authentication system using encrypted channel on uav network. Proceedings of the 2017 First IEEE International Conference on Robotic Computing (IRC), Taichung, Taiwan.","DOI":"10.1109\/IRC.2017.56"},{"key":"ref_11","unstructured":"(2020, December 17). MAVLink. Available online: https:\/\/mavlink.io\/en\/guide\/serialization."},{"key":"ref_12","unstructured":"(2020, December 17). MAVLink Format. Available online: https:\/\/mavlink.io\/en\/guide\/serialization.html."},{"key":"ref_13","unstructured":"(2020, December 17). ROS. Available online: https:\/\/www.ros.org\/core-components\/."},{"key":"ref_14","unstructured":"(2020, December 17). Rosbridge. Available online: http:\/\/wiki.ros.org\/rosbridge."},{"key":"ref_15","unstructured":"(2020, December 17). ROS Security. Available online: http:\/\/wiki.ros.org\/Security."},{"key":"ref_16","unstructured":"(2020, December 17). ROS Message Filter. Available online: http:\/\/wiki.ros.org\/message_filters."},{"key":"ref_17","unstructured":"(2020, December 17). ROS Watchdog Timer. Available online: http:\/\/library.isr.ist.utl.pt\/docs\/roswiki\/watchdog_timer.html."},{"key":"ref_18","unstructured":"(2020, December 17). ROS2 Lifecycle. Available online: https:\/\/design.ros2.org\/articles\/node_lifecycle.html."},{"key":"ref_19","unstructured":"(2020, December 17). ROS 2 DDS-Security integration. Available online: https:\/\/design.ros2.org\/articles\/ros2_dds_security.html."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Huang, J., Erdogan, C., Zhang, Y., Moore, B., Luo, Q., Sundaresan, A., and Rosu, G. (2014). ROSRV: Runtime Verification for Robots. Runtime Verification, Springer International Publishing.","DOI":"10.1007\/978-3-319-11164-3_20"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Toris, R., Shue, C., and Chernova, S. (2014, January 14\u201315). Message Authentication Codes for Secure Remote Non-Native Client Connections to ROS Enabled Robots. Proceedings of the 2014 IEEE International Conference on Technologies for Practical Robot Applications (TePRA), Woburn, MA, USA.","DOI":"10.1109\/TePRA.2014.6869141"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Dieber, B., Kacianka, S., Rass, S., and Schartner, P. (2016, January 9\u201314). Application-Level Security for ROS-Based Applications. Proceedings of the 2016 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), Daejeon, Korea.","DOI":"10.1109\/IROS.2016.7759659"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Doczi, R., Kis, F., Suto, B., Poser, V., Kronreif, G., Josvai, E., and Kozlovszky, M. (2016, January 9\u201312). Increasing ROS 1.x Communication Security for Medical Surgery Robot. Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary.","DOI":"10.1109\/SMC.2016.7844931"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"White, R., Christensen, D., Henrik, I., and Quigley, D. (2016). SROS: Securing ROS over the wire, in the graph, and through the kernel. arXiv.","DOI":"10.36288\/ROSCon2016-900213"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Fernandez, M.J., Sanchez-Cuevas, P.J., Heredia, G., and Ollero, A. (2019, January 25\u201327). Securing UAV Communications Using ROS with Custom ECIES-Based Method. Proceedings of the 2019 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED UAS), Cranfield, UK.","DOI":"10.1109\/REDUAS47371.2019.8999685"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1109\/TWC.2019.2892461","article-title":"Securing UAV Communications via Joint Trajectory and Power Control","volume":"18","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1109\/LWC.2020.2986291","article-title":"Securing UAV Communication in the Presence of Stationary or Mobile Eavesdroppers via Online 3D Trajectory Planning","volume":"9","author":"Savkin","year":"2020","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1109\/TVT.2020.3047082","article-title":"Secrecy Performance Analysis of Air-to-Ground Communication with UAV Jitter and Multiple Random Walking Eavesdroppers","volume":"70","author":"Wu","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_29","unstructured":"(2020, December 17). ROS-Based UAV Attack Experiment in Native Environment. Available online: https:\/\/youtu.be\/m6oT---Y36Q."},{"key":"ref_30","unstructured":"(2020, December 17). ROS-Based UAV Framework Experiment in Native Environment. Available online: https:\/\/youtu.be\/MUmTsNmxMsM."},{"key":"ref_31","unstructured":"(2020, December 17). ROS-Based UAV Attack Experiment in Non-Native Environment. Available online: https:\/\/youtu.be\/ODzQ1fQpUwE."},{"key":"ref_32","unstructured":"(2020, December 17). ROS-Based UAV Framework Experiment in Non-Native Environment. Available online: https:\/\/youtu.be\/NgvpGi9mzhI."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/4\/1369\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:24:30Z","timestamp":1760160270000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/4\/1369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,15]]},"references-count":32,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,2]]}},"alternative-id":["s21041369"],"URL":"https:\/\/doi.org\/10.3390\/s21041369","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,15]]}}}