Designing an adaptive modular management system for data security in Multi-UAV by using a pattern language approach
Main Article Content
Abstract
In the rapidly evolving landscape of Unmanned Aerial Vehicle (UAV) technology, the dynamic and unpredictable nature of operational environments presents substantial challenges for data security systems. This research introduces a novel software pattern design tailored for enhancing data security in online UAV operations within such environments. Inspired by the principles of the Pattern Language of Program Community (PLOP), this study proposes a comprehensive design pattern focused on modularity, adaptability, and scalability. The proposed design intricately combines various software patterns, forming a unified framework that addresses key aspects of UAV data security operations, including real-time adaptability, environmental responsiveness, and efficient resource management. The architecture of this framework integrates behavioral, structural, and creational patterns, meticulously selected to bolster the UAVs’ decision-making capabilities, data handling, and dynamic adaptation in response to changing environmental and operational conditions. Theoretical analysis and conceptual evaluations underpin this research, favoring a detailed theoretical exploration over empirical experimentation. This approach allows for an in-depth examination of the design’s potential and applicability in the context of UAV data security. The research contributes to the UAV field by offering a structured and standardized methodology, laying a robust theoretical foundation for future empirical studies and practical implementations. The goal is to significantly enhance the security, efficiency, and safety of UAV operations in dynamic and challenging environments, setting a new benchmark for data security solutions in the realm of UAV technology.
Downloads
Article Details
Alami, A., & Krancher, O. (2022). How Scrum adds value to achieving software quality? Empirical Software Engineering, 27(7), 165. https://doi.org/10.1007/s10664-022-10208-4
Allioui, H., & Mourdi, Y. (2023). Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey. Sensors, 23(19), 8015. https://doi.org/10.3390/s23198015
Angel, S., & Salingaros, N. A. (2022). Christopher Alexander’s Architectural Insights and Limitations. New Design Ideas, 6(3), 386–401. https://doi.org/N/A
Arnold, I. (2022). Enterprise Architecture Function: A Pattern Language for Planning, Design and Execution. https://doi.org/N/A
Axelsson, J. (2022). Systems-of-Systems Design Patterns: A Systematic Literature Review and Synthesis. 2022 17th Annual System of Systems Engineering Conference (SOSE), 171–176. https://doi.org/10.1109/SOSE55472.2022.9812681
Bagaa, M., Taleb, T., Bernabe, J. B., & Skarmeta, A. (2020). A Machine Learning Security Framework for IoT Systems. IEEE Access, 8, 114066–114077. https://doi.org/10.1109/ACCESS.2020.2996214
Bakirtzis, G., Sherburne, T., Adams, S., Horowitz, B. M., Beling, P. A., & Fleming, C. H. (2022). An ontological metamodel for cyber-physical system safety, security, and resilience coengineering. Software and Systems Modeling, 21(1), 113–137. https://doi.org/10.1007/s10270-021-00892-z
Bassoli, R., Sacchi, C., Granelli, F., & Ashkenazi, I. (2019). A Virtualized Border Control System based on UAVs: Design and Energy Efficiency Considerations. 2019 IEEE Aerospace Conference, 1–11. https://doi.org/10.1109/AERO.2019.8742142
Bouhamed, O., Bouachir, O., Aloqaily, M., & Ridhawi, I. A. (2021). Lightweight IDS For UAV Networks: A Periodic Deep Reinforcement Learning-based Approach. 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), 1032–1037. https://doi.org/N/A
Buckley, I., & Fernandez, E. B. (2023). Dependability Patterns: A Survey. Computers, 12(10), 214. https://doi.org/10.3390/computers12100214
Elsayed, M. A., & Zulkernine, M. (2020). PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction. IEEE Access, 8, 45184–45197. https://doi.org/10.1109/ACCESS.2020.2977325
et al., A. F. (2019). Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges. IEEE Communications Surveys & Tutorials, 21(4), 3417–3442. https://doi.org/10.1109/COMST.2019.2906228
Fuertes, A. B., Pérez, M., & Meza, J. (2023). Transpiler-Based Architecture Design Model for Back-End Layers in Software Development. Applied Sciences, 13(20), 11371. https://doi.org/10.3390/app132011371
Goldfarb, A., & Lindsay, J. R. (2022). Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War. International Security, 46(3), 7–50.
Hassler, S. C., & Baysal-Gurel, F. (2019). Unmanned Aircraft System (UAS) Technology and Applications in Agriculture. Agronomy, 9(10), 618. https://doi.org/10.3390/agronomy9100618
Hildmann, H., & Kovacs, E. (2019). Review: Using Unmanned Aerial Vehicles (UAVs) as Mobile Sensing Platforms (MSPs) for Disaster Response, Civil Security and Public Safety. Drones, 3(3), 59. https://doi.org/10.3390/drones3030059
Huda, S. M. A., & Moh, S. (2022). Survey on computation offloading in UAV-Enabled mobile edge computing. Journal of Network and Computer Applications, 201, 103341. https://doi.org/N/A
K.-Y. Tsao T. Girdler, & Vassilakis, V. G. (2022). A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Networks, 133, 102894.
Khan, A., Gupta, S., & Gupta, S. K. (2022). Emerging UAV technology for disaster detection, mitigation, response, and preparedness. Journal of Field Robotics, 39(6), 905–955. https://doi.org/N/A
Khan, M. F., & Abaoud, M. (2023). Blockchain-Integrated Security for Real-Time Patient Monitoring in the Internet of Medical Things Using Federated Learning. IEEE Access, 11, 117826–117850. https://doi.org/10.1109/ACCESS.2023.3326155
Kotraski, D., Piljek, P., Pranji?, M., Carlo Giorgio Grlj, & Josip Kasa?. (2021). A Modular Multirotor Unmanned Aerial Vehicle Design Approach for Development of an Engineering Education Platform. Sensors, 21(8), 2737. https://doi.org/10.3390/s21082737
Kumar, A., & Jain, S. (2021). Drone-Based Monitoring and Redirecting System. In R. Krishnamurthi, A. Nayyar, & A. E. Hassanien (Eds.), Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead (pp. 163–183). https://doi.org/10.1007/978-3-030-63339-4_6
M. Mahdi Azari, Giovanni Geraci, Adrian Garcia-Rodriguez, S. P. (2020). UAV-to-UAV Communications in Cellular Networks. IEEE Transactions on Wireless Communications, 19(9), 6130–6144. https://doi.org/10.1109/TWC.2020.3000303
Ming, R., Jiang, R., Luo, H., Lai, T., Guo, E., & Zhou, Z. (2023). Comparative Analysis of Different UAV Swarm Control Methods on Unmanned Farms. Agronomy, 13(10), 2499. https://doi.org/10.3390/agronomy13102499
Mo, F., Querejeta, M. U., Hellewell, J., Rehman, H. U., Rezabal, M. I., Chaplin, J. C., … Ratchev, S. (2023). PLC orchestration automation to enhance human–machine integration in adaptive manufacturing systems. Journal of Manufacturing Systems, 71, 172–187. https://doi.org/10.1016/j.jmsy.2023.07.015
N. Mohamed J. Al-Jaroodi, I. J. A. I., & Mohammed, F. (2020). Unmanned aerial vehicles applications in future smart cities. Technological Forecasting and Social Change, 153. https://doi.org/10.1016/j.techfore.2020.119293
N. Neshenko E. Bou-Harb, J. C. G. K., & Ghani, N. (2019). Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Communications Surveys & Tutorials, 21(3), 2702–2733. https://doi.org/10.1109/COMST.2019.2910750
N. S. Labib M. R. Brust, G. D., & Bouvry, P. (2021). The Rise of Drones in Internet of Things: A Survey on the Evolution, Prospects and Challenges of Unmanned Aerial Vehicles. IEEE Access, 9, 115466–115487. https://doi.org/10.1109/ACCESS.2021.3104963
Okoye, C., Collins, O. C., & Mbah, G. C. E. (2023). Mathematical approach to the analysis of terrorism dynamics. In J. T. Omenma, I. E. Onyishi, & A.-M. Okolie (Eds.), Ten Years of Boko Haram in Nigeria: The Dynamics and Counterinsurgency Challenges (pp. 95–106). https://doi.org/N/A
Oubbati, O. S., Atiquzzaman, M., Ahanger, T. A., & Ibrahim, A. (2020). Softwarization of UAV Networks: A Survey of Applications and Future Trends. IEEE Access, 8, 98073–98125. https://doi.org/10.1109/ACCESS.2020.2994494
Pal, S., & Jadidi, Z. (2021). Analysis of Security Issues and Countermeasures for the Industrial Internet of Things. Applied Sciences, 11(20), 9393. https://doi.org/10.3390/app11209393
R. Zhang L. Cao, Y. L. R. G. J. L., & Shu, P. (2023). Decoding Spontaneous Informal Spaces in Old Residential Communities: A Drone and Space Syntax Perspective. ISPRS International Journal of Geo-Information, 12(11), 452. https://doi.org/10.3390/ijgi12110452
Rahouti, M., Xiong, K., Xin, Y., Jagatheesaperumal, S. K., Ayyash, M., & Shaheed, M. (2022). SDN Security Review: Threat Taxonomy, Implications, and Open Challenges. IEEE Access, 10, 45820–45854. https://doi.org/10.1109/ACCESS.2022.3168972
Restuccia, F., Meza, A., & Kastner, R. (2021). Aker: A Design and Verification Framework for Safe and Secure SoC Access Control. 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 1–9. https://doi.org/10.1109/ICCAD51958.2021.9643538
Romeh, A. El, & Mirjalili, S. (2023). Theoretical Framework and Practical Considerations for Achieving Superior Multi-Robot Exploration: Hybrid Cheetah Optimization with Intelligent Initial Configurations. Mathematics, 11(20), 4239. https://doi.org/10.3390/math11204239
Romero, V. M., & Fernandez, E. B. (2023). Towards a Reference Architecture for Cargo Ports. Future Internet, 15(4), Art. no. 139. https://doi.org/10.3390/fi15040139
Rugo, A., Ardagna, C. A., & Ioini, N. E. (2022). A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis. ACM Computing Surveys (CSUR), 55(1), 21. https://doi.org/N/A
S. A. H. Mohsan M. A. Khan, F. N. I. U., & Alsharif, M. H. (2022). Towards the Unmanned Aerial Vehicles (UAVs): A Comprehensive Review. Drones, 6(6), 147. https://doi.org/10.3390/drones6060147
S. A. H. Mohsan N. Q. H. Othman, Y. L. M. H. A., & Khan, M. A. (2023). Unmanned aerial vehicles (UAVs): practical aspects, applications, open challenges, security issues, and future trends. Intelligent Service Robotics, 16(1), 109–137.
Shakeri, R., Al-Garadi, M. A., Badawy, A., Mohamed, A., Khattab, T., Al-Ali, A. K., … Guizani, M. (2019). Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions. IEEE Communications Surveys and Tutorials, 21(4), 3340–3385. https://doi.org/10.1109/COMST.2019.2924143
Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., … Guizani, M. (2019). Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges. IEEE Access, 7, 48572–48634. https://doi.org/10.1109/ACCESS.2019.2909530
Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access, 8, 222310–222354. https://doi.org/10.1109/ACCESS.2020.3041951
Tan, Y., Wang, J., Liu, J., & Zhang, Y. (2020). Unmanned Systems Security: Models, Challenges, and Future Directions. IEEE Network, 34(4), 291–297. https://doi.org/10.1109/MNET.001.1900546
Thapa, B., Fernandez, E. B., Cardei, I., & Larrondo-Petrie, M. M. (2023). Abstract Entity Patterns for Sensors and Actuators. Computers, 12, Art. no. 93. https://doi.org/N/A
Thibbotuwawa Bocewicz, Z., & Nielsen. (2019). A Solution Approach for UAV Fleet Mission Planning in Changing Weather Conditions. Applied Sciences, 9(19), 3972. https://doi.org/10.3390/app9193972
Wang, C.-N., Yang, F.-C., Vo, N. T. M., & Nguyen, V. T. T. (2022). Wireless Communications for Data Security: Efficiency Assessment of Cybersecurity Industry—A Promising Application for UAVs. Drones, 6(11), 363. https://doi.org/10.3390/drones6110363
Waseeb, S., & Vrani?, V. (2023). Toward Organizational Pattern Ontology. Proc. of the 27th European Conference on Pattern Languages of Programs (EuroPLop ’22), Art. no. 20. https://doi.org/10.1145/3551902.3551983
Yaacoub, J.-P., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11. https://doi.org/10.1016/j.iot.2020.100218
Yang, L., Manias, D. M., & Shami, A. (2021). PWPAE: An Ensemble Framework for Concept Drift Adaptation in IoT Data Streams. 2021 IEEE Global Communications Conference (GLOBECOM), 1–6. https://doi.org/10.1109/GLOBECOM46510.2021.9685338
Zimmermann, O., Stocker, M., Lubke, D., Zdun, U., & Pautasso, C. (2022). Patterns for API Design: Simplifying Integration with Loosely Coupled Message Exchanges.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.