UAV-Assisted IoT Applications, Cybersecurity Threats, AI-Enabled Solutions, Open Challenges With Future Research Directions

被引:20
作者
Adil, Muhammad [1 ]
Song, Houbing [2 ]
Mastorakis, Spyridon [3 ]
Abulkasim, Hussein [4 ,5 ]
Farouk, Ahmed [6 ]
Jin, Zhanpeng [7 ,8 ]
机构
[1] SUNY Buffalo, Univ Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[2] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21250 USA
[3] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
[4] Univ Sci & Technol Fujairah, Coll Engn & Technol, Fujairah, U Arab Emirates
[5] New Valley Univ, Fac Sci, El Kharga 72511, Egypt
[6] South Valley Univ, Fac Comp & Artificial Intelligence, Dept Comp Sci, Hurghada 83523, Egypt
[7] South China Univ Technol, Sch Future Technol, Guangzhou 511442, Guangdong, Peoples R China
[8] Univ Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
来源
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES | 2024年 / 9卷 / 04期
关键词
Security; Internet of Things; Artificial intelligence; Authentication; Wireless communication; Electronic mail; Surveys; data security; deep learning; machine learning; UAV-assisted IoTs; wireless communication security challenges; WIRELESS NETWORKS; DATA-COLLECTION; INTERNET; SECURITY; THINGS; COMMUNICATION; SCHEME; 5G; INTEROPERABILITY; OPTIMIZATION;
D O I
10.1109/TIV.2023.3309548
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unnamed Ariel Vehicle-assisted-Internet of Things (UAV-assisted IoT) applications have emerged as a powerful integrated technology, showcasing remarkable results in many domains with numerous advantages. However, this technology encounters several challenges, and security is one of them. Given that, authentication and verification of legitimate devices with data privacy pose key concerns in a wireless communication environment. Even though, the literature highlights the growing security threats of this technology, where attackers can easily compromise the existing authentication and data preservation schemes. Therefore, it is crucial for all involved stakeholders to address these concerns using Artificial Intelligence (AI), Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL) algorithms, as they offer cost-effective solutions. While some algorithms have been used in the literature to accurately and effectively predict, detect, and prevent vulnerabilities in this technology, they may not adequately handle modern or advanced security threats. Therefore, in this article, we provide a comprehensive survey of the existing literature from 2014 to 2022, specifically focusing on AI, ML, DL, and RL-enabled prototypes. Our goal is to highlight the contributions and limitations of the considered articles. Based on our observations, we will emphasize on the open challenges to set the stage for future research to enhance the security of this emerging technology. Moreover, to bridge this gap of all aspects of this technology, we will discuss layer-wise security threats and countermeasure schemes following the TCP/IP stack. Finally, we will compare our work with existing review articles to demonstrate its novelty, uniqueness, and potential usefulness for the people working in this field.
引用
收藏
页码:4583 / 4605
页数:23
相关论文
共 173 条
[1]   UAV-ASSISTED ATTACK PREVENTION, DETECTION, AND RECOVERY OF 5G NETWORKS [J].
Abdalla, Aly Sabri ;
Powell, Keith ;
Marojevic, Vuk ;
Geraci, Giovanni .
IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) :40-47
[2]   QoS Review: Smart Sensing in Wake of COVID-19, Current Trends and Specifications With Future Research Directions [J].
Adil, Muhammad ;
Alshahrani, Hani ;
Rajab, Adel ;
Shaikh, Asadullah ;
Song, Houbing ;
Farouk, Ahmed .
IEEE SENSORS JOURNAL, 2023, 23 (02) :865-876
[3]   An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems [J].
Adil, Muhammad ;
Khan, Muhammad Khurram ;
Jadoon, Muhammad Mohsin ;
Attique, Muhammad ;
Song, Houbing ;
Farouk, Ahmed .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05) :2719-2730
[4]   Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles [J].
Adil, Muhammad ;
Ali, Jehad ;
Attique, Muhammad ;
Jadoon, Muhammad Mohsin ;
Abbas, Safia ;
Alotaibi, Sattam Rabia ;
Menon, Varun G. ;
Farouk, Ahmed .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) :9358-9369
[5]   Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions [J].
Adil, Muhammad ;
Khan, Muhammad Khurram .
SUSTAINABLE CITIES AND SOCIETY, 2021, 75 (75)
[6]   An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks [J].
Adil, Muhammad ;
Ali, Jehad ;
Khan, Muhammad Sajjad ;
Kim, Junsu ;
Alturki, Ryan ;
Zakarya, Mohammad ;
Khan, Mukhtaj ;
Khan, Rahim ;
Kim, Su Min .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01) :447-470
[7]   A Reliable Sensor Network Infrastructure for Electric Vehicles to Enable Dynamic Wireless Charging Based on Machine Learning Technique [J].
Adil, Muhammad ;
Ali, Jehad ;
Ta, Qui Thanh Hoai ;
Attique, Muhammad ;
Chung, Tae-Sun .
IEEE ACCESS, 2020, 8 :187933-187947
[8]   Preventive Techniques of Phishing Attacks in Networks [J].
Adil, Muhammad ;
Khan, Rahim ;
Ul Ghani, M. Ahmad Nawaz .
2020 3RD INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN COMPUTATIONAL SCIENCES (ICACS), 2020,
[9]   An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks [J].
Adil, Muhammad ;
Almaiah, Mohammed Amin ;
Alsayed, Alhuseen Omar ;
Almomani, Omar .
SENSORS, 2020, 20 (08)
[10]  
Al-Turjman Fadi, 2020, Unmanned Aerial Veh. Smart Cities, P1