A survey on security and privacy issues of UAVs

被引:96
作者
Mekdad, Yassine [2 ]
Aris, Ahmet [2 ]
Babun, Leonardo [2 ]
El Fergougui, Abdeslam [1 ]
Conti, Mauro [3 ]
Lazzeretti, Riccardo [4 ]
Uluagac, Selcuk [2 ]
机构
[1] Moulay Ismail Univ Meknes, Lab Comp Networks & Syst, Meknes 11201, Morocco
[2] Florida Int Univ, Dept Elect & Comp Engn, Cyber Phys Syst Secur Lab, Miami, FL 33174 USA
[3] Univ Padua, Dept Math, I-35121 Padua, Italy
[4] Sapienza Univ Rome, Dept Comp Control & Management Engn Antonio Rubert, I-00185 Rome, Italy
基金
美国国家科学基金会;
关键词
Unmanned Aerial Vehicles; UAVs; Security; Privacy; Drones; UNMANNED AERIAL VEHICLES; AD-HOC NETWORKS; CIVIL APPLICATIONS; ROUTING PROTOCOLS; COMMUNICATION; DRONES; ATTACKS; INTERNET; SURVEILLANCE; ATTESTATION;
D O I
10.1016/j.comnet.2023.109626
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilian applications such as hostage rescue and parcel delivery will integrate smart cities in the future. Nowadays, the affordability of commercial drones expands their usage on a large scale. However, the development of drone technology is associated with vulnerabilities and threats due to the lack of efficient security implementations. Moreover, the complexity of UAVs in software and hardware triggers potential security and privacy issues. Thus, posing significant challenges for the industry, academia, and governments. In this paper, we extensively survey the security and privacy issues of UAVs by providing a systematic classification at four levels: Hardware-level, Software-level, Communication-level, and Sensor-level. In partic-ular, for each level, we thoroughly investigate (1) common vulnerabilities affecting UAVs for potential attacks from malicious actors, (2) existing threats that are jeopardizing the civilian application of UAVs, (3) active and passive attacks performed by the adversaries to compromise the security and privacy of UAVs, (4) possible countermeasures and mitigation techniques to protect UAVs from such malicious activities. In addition, we summarize the takeaways that highlight lessons learned about UAVs' security and privacy issues. Finally, we conclude our survey by presenting the critical pitfalls and suggesting promising future research directions for security and privacy of UAVs.
引用
收藏
页数:25
相关论文
共 197 条
[1]  
Ab B., 2022, FABULA, V2.1, P7
[2]   Forensic-by-Design Framework for Cyber-Physical Cloud Systems [J].
Ab Rahman, Nurul Hidayah ;
Glisson, William Bradley ;
Yang, Yanjiang ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2016, 3 (01) :50-59
[3]   DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems [J].
Abera, Tigist ;
Bahmani, Raad ;
Brasser, Ferdinand ;
Ibrahim, Ahmad ;
Sadeghi, Ahmad-Reza ;
Schunter, Matthias .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[4]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[5]  
Aggarwal A., 2012, ARXIV
[6]   Research Challenges and Opportunities in Drone Forensics Models [J].
Al-Dhaqm, Arafat ;
Ikuesan, Richard A. ;
Kebande, Victor R. ;
Razak, Shukor ;
Ghabban, Fahad M. .
ELECTRONICS, 2021, 10 (13)
[7]   SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication [J].
Alladi, Tejasvi ;
Bansal, Gaurang ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15068-15077
[8]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy R. ;
Youssef A.M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[9]   Drone services: issues in drones for location-based services from human-drone interaction to information processing [J].
Alwateer, M. ;
Loke, S. W. ;
Zuchowicz, A. M. .
JOURNAL OF LOCATION BASED SERVICES, 2019, 13 (02) :94-127
[10]  
Amazon.com Inc, 2015, Tech. Rep., P1