The rapid growth of Unmanned Aircraft Systems (UASs) usage in both commercial and defense areas has increased the requirement for advanced security schemes for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications for UASs. We define a UAS as consisting of a Control Station (CS) on the ground and at least one UAV. The pilot in the CS may have Visual Line-of-Sight (VLOS) or may not have VLOS to the airborne UAVs. The integration of UASs into the National Airspace (NAS) will rely on Unmanned Traffic Management (UTM) systems which can support Detect-And-Avoid (DAA) and de-confliction of flight paths. In case of non-cooperative traffic, tactical (in-flight) deconfliction becomes a critical element. In Beyond Visual Line of Sight (BVLoS) operations, where a remote pilot is unable to visually monitor the airspace beyond LoS, Sense-and-Avoid strategies become necessary. Further, the communication devices and messages must be protected against hacking and cyber-attacks. This paper investigates several use cases for UAS-to-UAS or V2V operations for UASs and the cyber-security strategies for protecting V2V communications addressed by IEEE P1920.2, a new standard for V2V communications for UASs, currently under development. This discussion included authentication of V2V parties, protection of Remote ID, cryptographic key management, and authorization policies based on a zero-trust architecture. |