Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security

被引:8
作者
Mohammed, Ahmed Burhan [1 ]
Fourati, Lamia Chaari [2 ]
Fakhrudeen, Ahmed M. [3 ]
机构
[1] Univ Kirkuk, Natl Sch Elect & Telecommun Sfax, Kirkuk, Iraq
[2] Sfax Univ, Lab Signals Syst Artificial Intelligence Networks, Digital Res Ctr Sfax CRNS, Sfax, Tunisia
[3] Univ Kirkuk, Coll Comp Sci & Informat Technol, Software Dept, Kirkuk, Iraq
关键词
Unmanned aerial vehicles; Intrusion detection system; Systematic review; Internet of drones; Drones; UAVs; IDS; UNMANNED AERIAL VEHICLES; INTERNET; COMMUNICATION; TAXONOMY; ATTACKS; SURVEILLANCE; CHALLENGES; MECHANISM; SCHEME; ISSUES;
D O I
10.1016/j.comnet.2023.110140
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicles (UAVs) have evolved into a pivotal component of electronic devices deployed across a diverse array of sectors and industries in recent years. Novel concepts have been introduced to captivate the interest of investors, businesses, and service providers. Notwithstanding their extensive utilization, security breaches and attacks on these devices and their associated networks persist. Researchers are now delving into the development of techniques aimed at countering these threats and bolstering drone security. Building on this impetus, this systematic review proffers a range of counter-attack strategies contingent on intelligent methodologies and diverse techniques. Moreover, the study delves into the intricacies of counter-attack methods, their amalgamation with algorithms, and integration with machine-learning languages. Furthermore, the paper delineates forthcoming avenues for preempting various incursions on UAVs-based systems.
引用
收藏
页数:28
相关论文
共 158 条
  • [1] Abdelhafidh Maroua, 2019, Wireless sensor network monitoring system: architecture, applications, and future directions
  • [2] Abdullah D.B., 2021, Computation Offloading in the Internet of Connected Vehicles: A Systematic Literature Survey, DOI [10.1088/1742-6596/1818/1/012122, DOI 10.1088/1742-6596/1818/1/012122]
  • [3] High-performance intrusion detection system for networked UAVs via deep learning
    Abu Al-Haija, Qasem
    Al Badawi, Ahmad
    [J]. NEURAL COMPUTING & APPLICATIONS, 2022, 34 (13) : 10885 - 10900
  • [4] A comprehensive deep learning benchmark for IoT IDS
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    [J]. COMPUTERS & SECURITY, 2022, 114
  • [5] Blockchain-based privacy-preserving authentication protocol for UAV networks
    Akram, Muhammad Arslan
    Ahmad, Hira
    Mian, Adnan Noor
    Jurcut, Anca Delia
    Kumari, Saru
    [J]. COMPUTER NETWORKS, 2023, 224
  • [6] Optimized Unmanned Aerial Vehicles Deployment for Static and Mobile Targets' Monitoring
    Al-Turjman, Fadi
    Zahmatkesh, Hadi
    Al-Oqily, Ibrhaim
    Daboul, Reda
    [J]. COMPUTER COMMUNICATIONS, 2020, 149 (149) : 27 - 35
  • [7] A Novel Security Model for Cooperative Virtual Networks in the IoT Era
    Alabady, Salah A.
    Al-Turjman, Fadi
    Din, Sadia
    [J]. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2020, 48 (02) : 280 - 295
  • [8] Albasir A., 2021, J SURVEILLANCE SECUR, V2, P1, DOI DOI 10.20517/JSSS.2020.19
  • [9] Distributed Deep CNN-LSTM Model for Intrusion Detection Method in IoT-Based Vehicles
    Alferaidi, Ali
    Yadav, Kusum
    Alharbi, Yasser
    Razmjooy, Navid
    Viriyasitavat, Wattana
    Gulati, Kamal
    Kautish, Sandeep
    Dhiman, Gaurav
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [10] Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    [J]. COMPLEXITY, 2021, 2021