Construction of a model of steganographic embedding of the UAV identifier into ADS-B data

Authors

DOI:

https://doi.org/10.15587/1729-4061.2023.288178

Keywords:

unmanned aerial vehicles, ADS-B system, information security, steganographic data protection, GERT network

Abstract

Secure data exchange in the control system of unmanned aerial vehicles (UAVs) is an important aspect for preventing unauthorized access and safety of aerial vehicles. Given the problems of automatic dependent surveillance-broadcast (ADS-B) data protection, the safety level of UAV flight tasks and air traffic in general is significantly reduced. Therefore, the protection of ADS-B data is an urgent task. The object of the study is the process of steganographic protection of ADS-B format data. A relevant problem of estimating the probabilistic time characteristics of the steganographic protection process is solved, taking into account the features of data embedding in the ADS-B format container. To solve it, a mathematical formalization of the methods of finding probabilistic-temporal characteristics of steganographic systems was carried out. A model of steganographic data transformation operations based on the Chinese remainder theorem has been built. The main difference of the model is taking into account the features of the ADS-B format data. This made it possible to formalize and evaluate the time functions of steganographic encoding and decoding of UAV identifiers with an integrated ADS-B system. A model of steganographic data transformation operations based on the finite integral ring theorem has been constructed. A list of operations performed in the developed algorithm has been compiled. This made it possible to carry out mathematical formalization of operations for complex use in the model of steganographic protection of UAV identifiers with a built-in ADS-B system. The mathematical model was studied and the estimation of the random value of the time of steganographic transformation of data, as well as the confidence interval, was performed. With the help of the reported set of models, it is possible to estimate the probability of the algorithm’s execution time falling within the given interval. The results of the calculation of probabilistic-time characteristics could be used in models of a higher level of the hierarchy

Author Biographies

Serhii Semenov, Institute of Computer Science University of the National Education Commission

Doctor of Technical Sciences, Professor

Institute of Computer Science

Minjian Zhang, Zhejiang Nova Intelligent Technology Co., Ltd

Postgraduate Student

Oleksandr Mozhaiev, Kharkiv National University of Internal Affairs

Doctor of Technical Sciences, Professor

Department of Cyber Security and DATA Technologies

Nina Kuchuk, National Technical University "Kharkiv Polytechnic Institute"

Doctor of Technical Sciences, Professor

Department of Computer Engineering and Programming

Serhii Tiulieniev, National Scientific Center «Hon. Prof. M. S. Bokarius Forensic Science Institute»

PhD

Director

Yurii Gnusov, Kharkiv National University of Internal Affairs

PhD, Associate Professor

Department of Cyber Security and DATA Technologies

Mykhailo Mozhaiev, Scientific Research Center for Forensic Science of Information Technologies and Intellectual Property

Doctor of Technical Sciences

Director

Volodymyr Strukov, Kharkiv National University of Internal Affairs

PhD, Associate Professor

Department of Cyber Security and DATA Technologies

Yurii Onishchenko, Kharkiv National University of Internal Affairs

PhD, Associate Professor

Department of Cyber Security and DATA Technologies

Heorhii Kuchuk, National Technical University "Kharkiv Polytechnic Institute"

Doctor of Technical Sciences, Professor

Department of Computer Engineering and Programming

References

  1. Wu, Z., Shang, T., Guo, A. (2020). Security Issues in Automatic Dependent Surveillance - Broadcast (ADS-B): A Survey. IEEE Access, 8, 122147–122167. doi: https://doi.org/10.1109/access.2020.3007182
  2. Perkaus, J. (2020). ADS-B Cyber Security alert. Available at: https://www.perkausandfarley.com/wp-content/uploads/2022/01/ADSBCyberSecurity.pdf
  3. Alghamdi, F., Alshhrani, A., Hamza, N. (2018). Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B). International Journal of Computer Applications, 180 (26), 23–28. doi: https://doi.org/10.5120/ijca2018916598
  4. Habibi Markani, J., Amrhar, A., Gagné, J.-M., Landry, R. J. (2023). Security Establishment in ADS-B by Format-Preserving Encryption and Blockchain Schemes. Applied Sciences, 13 (5), 3105. doi: https://doi.org/10.3390/app13053105
  5. Semenov, S., Zhang, M. J. (2022). Comparative studies of methods for improving the cyber security of unmanned aerial vehicles with the built-in ADS-B system. Advanced Information Systems, 6 (4), 69–73. doi: https://doi.org/10.20998/2522-9052.2022.4.10
  6. Desai, L., Mali, S. (2018). Crypto-Stego-Real-Time (CSRT) System for Secure Reversible Data Hiding. VLSI Design, 2018, 1–8. doi: https://doi.org/10.1155/2018/4804729
  7. Shahadi, H. I., Kod, M. S., Qasem, B., Farhan, H. R. (2021). Real-Time Scheme for Covert Communication Based VoIP. Journal of Physics: Conference Series, 1997 (1), 012020. doi: https://doi.org/10.1088/1742-6596/1997/1/012020
  8. Kuznetsov, A., Onikiychuk, A., Peshkova, O., Gancarczyk, T., Warwas, K., Ziubina, R. (2022). Direct Spread Spectrum Technology for Data Hiding in Audio. Sensors, 22 (9), 3115. doi: https://doi.org/10.3390/s22093115
  9. Kharchenko, V., Kliushnikov, I., Rucinski, A., Fesenko, H., Illiashenko, O. (2022). UAV Fleet as a Dependable Service for Smart Cities: Model-Based Assessment and Application. Smart Cities, 5 (3), 1151–1178. doi: https://doi.org/10.3390/smartcities5030058
  10. Semenov, S., Zhang, M., Yenhalychev, S., Smidovych, L. (2022). Generalized model of the ADS-B unmanned aerial vehicle data transmission process in a steganographic system. Innovative Technologies and Scientific Solutions for Industries, 4 (22), 14–19. doi: https://doi.org/10.30837/itssi.2022.22.014
  11. Li, J., Chen, J. (2006). The Number Theoretical Method in Response Analysis of Nonlinear Stochastic Structures. Computational Mechanics, 39 (6), 693–708. doi: https://doi.org/10.1007/s00466-006-0054-9
  12. Baake, M., Bustos, Á., Huck, C., Lemańczyk, M., Nickel, A. (2020). Number-theoretic positive entropy shifts with small centralizer and large normalizer. Ergodic Theory and Dynamical Systems, 41 (11), 3201–3226. doi: https://doi.org/10.1017/etds.2020.111
  13. Alhassan, E. A., Tian, K., Abban, O. J., Ohiami, I. E., Michael Adjabui, M., Armah, G., Agyemang, S. (2021). On Some Algebraic Properties of the Chinese Remainder Theorem with Applications to Real Life. Journal of Applied Mathematics and Computation, 5 (3), 219–224. doi: https://doi.org/10.26855/jamc.2021.09.008
  14. Selianinau, M. (2020). An efficient implementation of the Chinese Remainder Theorem in minimally redundant Residue Number System. Computer Science, 21 (2). doi: https://doi.org/10.7494/csci.2020.21.2.3616
  15. Chatterjee, R., Bharti, S. (2018). Finding the ring of integers and its algorithms in algebraic number theory. International Journal of Engineering, Science and Mathematics, 7 (4 (1)), 41–44. Available at: https://www.ijesm.co.in/uploads/68/5367_pdf.pdf
  16. Kuchuk, N., Mozhaiev, O., Mozhaiev, M., Kuchuk, H. (2017). Method for calculating of R-learning traffic peakedness. 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). doi: https://doi.org/10.1109/infocommst.2017.8246416
  17. Kovalenko, A., Kuchuk, H., Kuchuk, N., Kostolny, J. (2021). Horizontal scaling method for a hyperconverged network. 2021 International Conference on Information and Digital Technologies (IDT). doi: https://doi.org/10.1109/idt52577.2021.9497534
  18. Semenov, S., Davydov, V., Voloshyn, D. (2019). Obfuscated Code Quality Measurement. 2019 XXIX International Scientific Symposium “Metrology and Metrology Assurance” (MMA). doi: https://doi.org/10.1109/mma.2019.8936022
  19. Mozhaev, O., Kuchuk, H., Kuchuk, N., Mozhaev, M., Lohvynenko, M. (2017). Multiservice network security metric. 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT). doi: https://doi.org/10.1109/aiact.2017.8020083
  20. Semenov, S., Zhang, L., Cao, W., Bulba, S., Babenko, V., Davydov, V. (2021). Development of a fuzzy GERT-model for investigating common software vulnerabilities. Eastern-European Journal of Enterprise Technologies, 6 (2 (114)), 6–18. doi: https://doi.org/10.15587/1729-4061.2021.243715
  21. Zhang, N., Ou, M., Liu, B., Liu, J. (2023). A GERT Network Model for input-output optimization of general aviation industry chain based on value flow. Computers & Industrial Engineering, 176, 108945. doi: https://doi.org/10.1016/j.cie.2022.108945
  22. Kuchuk, N., Mozhaiev, O., Semenov, S., Haichenko, A., Kuchuk, H., Tiulieniev, S. et al. (2023). Devising a method for balancing the load on a territorially distributed foggy environment. Eastern-European Journal of Enterprise Technologies, 1 (4 (121)), 48–55. doi: https://doi.org/10.15587/1729-4061.2023.274177
  23. Kuznetsov, A., Smirnov, O., Zhora, V., Onikiychuk, A., Pieshkova, O. (2021). Hiding Messages in Audio Files Using Direct Spread Spectrum. 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). doi: https://doi.org/10.1109/idaacs53288.2021.9660879
  24. Mammadov, F. K. (2023). New approach to book cipher: web pages as a cryptographic key. Advanced Information Systems, 7 (1), 59–65. doi: https://doi.org/10.20998/2522-9052.2023.1.10
  25. Aleksandrov, E., Aleksandrova, T., Kostianyk, I., Morgun, Y. (2023). Simulation of random external disturbance acting on the car body in the urgent braking mode. Advanced Information Systems, 7 (1), 14–17. doi: https://doi.org/10.20998/2522-9052.2023.1.02
  26. Chiocchio, S., Persia, A., Santucci, F., Graziosi, F., Pratesi, M., Faccio, M. (2020). Modeling and evaluation of enhanced reception techniques for ADS-B signals in high interference environments. Physical Communication, 42, 101171. doi: https://doi.org/10.1016/j.phycom.2020.101171
  27. Afanasyev, I., Sytnikov, V., Strelsov, O., Stupen, P. (2022). The Applying of Low Order Frequency-Dependent Components in Signal Processing of Autonomous Mobile Robotic Platforms. Intelligent Computing, 882–891. doi: https://doi.org/10.1007/978-3-031-10464-0_61
Construction of a model of steganographic embedding of the UAV identifier into ADS-B data

Downloads

Published

2023-10-31

How to Cite

Semenov, S., Zhang, M., Mozhaiev, O., Kuchuk, N., Tiulieniev, S., Gnusov, Y., Mozhaiev, M., Strukov, V., Onishchenko, Y., & Kuchuk, H. (2023). Construction of a model of steganographic embedding of the UAV identifier into ADS-B data. Eastern-European Journal of Enterprise Technologies, 5(4 (125), 6–16. https://doi.org/10.15587/1729-4061.2023.288178

Issue

Section

Mathematics and Cybernetics - applied aspects