I am review security requirements frameworks for UAV security. I want to cover UAV security with CIA principles with authentication and non-repudation. Can I add these into the CIA triad?
Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
Internet of Vehicles (IoV) is deemed as a promising research field with huge potential of benefits. It shall streamline global traveling practices. The main objective of this chapter is to discuss the main research problem, research questions, and research objectives. Moreover, this chapter highlights security challenges and gives an overview of IoV and its modern technologies. Further, limitations, scope, and thesis organization are also mentioned in this chapter. With the continuous increase in urban population, fast expansion of big metropolitan cities, and roadside infrastructure development, the ownership of vehicles is on an exponential rise. Rapid advancement in networking technology, 5G, and the Internet of Things (IoT) is enabling more and more devices to connect to the Internet. Subsequently, the automotive industry is no exception with the addition of sensor embedded internet connected vehicles. The Internet of Vehicle (IoV) is a network of internet-connected vehicles with a fleet of sensors installed onboard to gather process and submit the information. The IoV uses Vehicular Ad hoc Networks (VANETs) communication patterns which is an emerging research field having a vast impact on the future of global driving culture and are considered essential for the environment. The IoV is an advanced form of VANET with more capabilities including Internet, cloud and edge, fast 5G technologies and standards.
Integrity means your data/content remains intact and no unauthorized modification hasn't done. With authentication, you can filter out the attacker. However, you cannot ensure that any unauthorized person has accessed it. Anyone has modified it or not? To cover the CIA triad, You can merge with blockchain which will assist you to meet your goal. I have attached some papers which might give you hints.
Article A Federated Meta Learning-Based Secure Data Consolidation Sc...
Article A Federated Unlearning-Based Secure Management Scheme to Ena...
Article A Digital Twin-Based Drone-Assisted Secure Data Aggregation ...
Article FBI: A Federated Learning-Based Blockchain-Embedded Data Acc...
Article A Blockchain-Based Artificial Intelligence-Empowered Contagi...
Article A Blockchain-Based Secure Healthcare Scheme with the Assista...
Article BUAV: A Blockchain Based Secure UAV-Assisted Data Acquisitio...
Article BUS: A Blockchain-Enabled Data Acquisition Scheme with the A...
Anik Islam Abhi Md Masuduzzaman Thank you for your valuable time and for posting your answers here. But blockchain is not a single solution for all things. I want to connect these security principles with a proper framework. Like integrity and non-repudiation on the same track. Please help me! Can I add authentication in the integrity or confidentiality? For UAV security requirements, I have made a heading UAV security requirements but in sub heading Confidentiality, Integrity Authentication but authentication and non-repudiation are also important security principles with respect to UAV security.
CIA are some parts of primary security issues (Parkerian Hexad). Authentication is a secondary issue relating to users (Identification, Authentication, Authorization and Accountability). Got it?