Secure Communication in Unmanned Aerial Vehicles

被引:0
作者
Devi, B. Renuka [1 ]
Sarveshwaran, Velliangiri [1 ]
机构
[1] SRM Inst Sci & Technol, Coll Engn & Technol, Sch Comp, Dept Computat Intelligence, Kattankulathur Campus, Chennai, India
关键词
Unmanned Aerial Vehicle; Secure Communication; Secure Protocol; Denial of Service attack; Eavesdropping attack; UAV; EFFICIENT; DESIGN; OPTIMIZATION; RESOURCE; SCHEME; SYSTEM;
D O I
10.1177/15741702241296436
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Unmanned Aerial Vehicles (UAVs) made major advances in security and defence applications like information gathering, safety missions, monitoring, judicial systems, urban planning, disaster management, vehicle tracking, recreation, and farming assessment. Since they are controlled by intruders, hence the infiltrated UAVs performance is poor. Despite their numerous benefits, UAVs receive little attention in regards to security, exposing them to attack. The consequences of UAV hacking include the loss of top-secret details, and the loss of critical operations. The majority of intrusion risks are occurred due to the inadequate security in communication systems. Moreover, such communication presents security problems because of its dynamic topology. In this study, we analyse 50 research papers focusing on different secure communication systems in UAV strategies and their key problems. The research intention is carefully considered, because it is primarily concerned with the current problems via secure communication in UAVs. As a result, the analysis of numerous existing methods of secure communication in UAV, such as deep learning (DL), machine learning (ML), and so on is facilitated based on a number of measures, including the year of publication, performance metrics, outcome of the techniques in numerical evaluations, and other factors. In addition, the analysis of each method, and its merits and demerits are provided. The paper is concluded by discussing the possible future research instructions and difficulties realising in efficient secure communication in UAV.
引用
收藏
页码:231 / 244
页数:14
相关论文
共 56 条
[1]   Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding [J].
Akhtarkavan, Ehsan ;
Majidi, Babak ;
Manzuri, Mohammad Taghi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) :10325-10351
[2]   A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions [J].
Alkatheiri, Mohammed Saeed ;
Saleem, Sajid ;
Alqarni, Mohammed Ali ;
Aseeri, Ahmad O. ;
Chauhdary, Sajjad Hussain ;
Zhuang, Yu .
ELECTRONICS, 2022, 11 (18)
[3]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[4]  
Allouch A, 2019, INT WIREL COMMUN, P621, DOI 10.1109/IWCMC.2019.8766667
[5]   Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems [J].
Alrayes, Fatma S. ;
Alotaibi, Saud S. ;
Alissa, Khalid A. ;
Maashi, Mashael ;
Alhogail, Areej ;
Alotaibi, Najm ;
Mohsen, Heba ;
Motwakel, Abdelwahed .
DRONES, 2022, 6 (09)
[6]  
Cai Y., 2019, P 2019 IEEE WIR COMM, P1
[7]   Joint Trajectory and Resource Allocation Design for Energy-Efficient Secure UAV Communication Systems [J].
Cai, Yuanxin ;
Wei, Zhiqiang ;
Li, Ruide ;
Ng, Derrick Wing Kwan ;
Yuan, Jinhong .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (07) :4536-4553
[8]   Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling [J].
Cai, Yunlong ;
Cui, Fangyu ;
Shi, Qingjiang ;
Zhao, Minjian ;
Li, Geoffrey Ye .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (09) :1972-1985
[9]  
Chaari L., 2020, P 2020 INT S NETW CO, P1
[10]   A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques [J].
Chamola, Vinay ;
Kotesh, Pavan ;
Agarwal, Aayush ;
Naren ;
Gupta, Navneet ;
Guizani, Mohsen .
AD HOC NETWORKS, 2021, 111 (111)