Drone Transportation System: Systematic Review of Security Dynamics for Smart Mobility

被引:19
作者
Ajakwe, Simeon Okechukwu [1 ]
Kim, Dong-Seong [1 ]
Lee, Jae-Min [1 ]
机构
[1] Kumoh Natl Inst Technol, Dept IT Convergence Engn, Gumi 39177, South Korea
关键词
Artificial intelligence (AI); blockchain; digital twin (DT); drone transportation system (DTS); metaverse; non-fungible token (NFT); security; unmanned aerial vehicle (UAV); CHALLENGES; INTERNET; SCHEME; IOT; TECHNOLOGIES; ARCHITECTURE; TRACKING; FUTURE;
D O I
10.1109/JIOT.2023.3266843
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The intelligence and integrity of a real-time cyber-physical system depend on how trustworthy the data's legitimacy, appropriation, and authorization are during end-to-end communication between the participating nodes in its network. With the recurrent repugnant global violations of the airspace by drones and their derivatives, there is an urgent need to empirically evaluate the underlying security architectures that govern drone usage operations for priority logistics. This review examines the significant contribution of artificial intelligence models and blockchain to the development of trustworthy and reliable intelligent and secure autonomous systems by integrating cyberspace, intelligence space, and airspace security. PRISMA-SPIDER methodology was adopted for the systematic review of 133 articles based on the inclusion criteria consisting of 91 (68.4%) quantitative studies, 19 qualitative studies (14.2%), and 23 (17.3%) mixed method studies to balance article selection sensitivity and specificity. The review outcome shows a significant disconnect between model proposals and actual implementation. Through the incorporation of zero-trust architecture into the existing blockchain technology and the convergence of newer AI models, dynamic security issues like drone ownership authentication, drone package delivery verification, drone operation authorization, and drone jurisdiction accountability, can be achieved seamlessly for secure smart mobility via drone transportation systems.
引用
收藏
页码:14462 / 14482
页数:21
相关论文
共 150 条
  • [41] Bernardini A., 2017, Electron Imaging, V2017, P60, DOI DOI 10.2352/ISSN.2470-1173.2017.10.IMAWM-168
  • [42] Secure Distribution of Protected Content in Information-Centric Networking
    Bilal, Muhammad
    Pack, Sangheon
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1921 - 1932
  • [43] Booth K., 2015, STRATEGY ETHNOCENTRI
  • [44] Buffi A, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY & APPLICATION (RFID-TA), P40, DOI 10.1109/RFID-TA.2017.8098872
  • [45] Buse M., 2019, P 11 INT C KNOWL MAN, V7, P1
  • [46] Decentralized AI: Edge Intelligence and Smart Blockchain, Metaverse, Web3, and DeSci
    Cao, Longbing
    [J]. IEEE INTELLIGENT SYSTEMS, 2022, 37 (03) : 6 - 19
  • [47] Caris M, 2016, EUROP RADAR CONF, P406
  • [48] A Review of Counter-UAS Technologies for Cooperative Defensive Teams of Drones
    Castrillo, Vittorio Ugo
    Manco, Angelo
    Pascarella, Domenico
    Gigante, Gabriella
    [J]. DRONES, 2022, 6 (03)
  • [49] A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques
    Chamola, Vinay
    Kotesh, Pavan
    Agarwal, Aayush
    Naren
    Gupta, Navneet
    Guizani, Mohsen
    [J]. AD HOC NETWORKS, 2021, 111 (111)
  • [50] Chang XY, 2018, PR IEEE SEN ARRAY, P573, DOI 10.1109/SAM.2018.8448409