A survey on recent optimal techniques for securingunmanned aerial vehiclesapplications

被引:73
作者
Syed, Farheen [1 ]
Gupta, Sachin Kumar [1 ]
Alsamhi, Saeed Hamood [2 ,3 ]
Rashid, Mamoon [4 ]
Liu, Xuan [5 ]
机构
[1] Shri Mata Vaishno Devi Univ, Sch Elect & Commun Engn, Katra 182320, Jammu & Kashmir, India
[2] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen, Peoples R China
[3] IBB Univ, Fac Engn, Ibb, Yemen
[4] Lovely Profess Univ, Sch Comp Sci & Engn, Jalandhar, Punjab, India
[5] Yangzhou Univ, Sch Informat Engn, Yangzhou, Jiangsu, Peoples R China
关键词
PARTICLE SWARM OPTIMIZATION; VEHICLES UAVS; HEALTH-CARE; IOT SECURITY; DISTRIBUTED CONSENSUS; NETWORK ARCHITECTURE; DIGITAL WATERMARKING; CIVIL APPLICATIONS; WIRELESS NETWORKS; RESEARCH ISSUES;
D O I
10.1002/ett.4133
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Unmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. The applications include smart things, smart transportation, smart cities, smart healthcare, smart personal care, smart house, smart industries, and so on. Due to the sensitive applications of UAVs, the security has become a major concern, and therefore, efficient techniques are required to protect captured data from hackers and the fictitious activities from illegitimate users. Machine learning (ML) techniques play a vital role in improving UAVs' security intelligently, while blockchain is recent technology for decentralized UAVs and security. Furthermore, watermarking guarantees digital media to be authenticated, protected, and copyright. Therefore, we provide a comprehensive survey of optimal techniques, which are used for securing UAVs applications in terms of blockchain, ML, and watermarking. Furthermore, we introduce each technique with the advantages and suitably used for securing UAVs collaboration applications. This survey contributes to a better understanding of the blockchain, ML, and watermarking techniques for securing UAVs and sheds new light on challenges and opportunities on subject applications.
引用
收藏
页数:34
相关论文
共 321 条
[1]  
Abbasi K, 2019, VISION BASED AMATEUR, P1
[2]   Blockchain for smart communities: Applications, challenges and opportunities [J].
Aggarwal, Shubhani ;
Chaudhary, Rajat ;
Aujla, Gagangeet Singh ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond ;
Zomaya, Albert Y. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 144 :13-48
[3]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[4]  
Al-Haj Ali, 2007, Journal of Computer Sciences, V3, P740, DOI 10.3844/jcssp.2007.740.746
[5]   Metadata hiding for UAV video based on digital watermarking in DWT transform [J].
Al-Maweri, Nasr Addin Ahmed Salem ;
Sabri, Aznul Qalid Md ;
Mansoor, Ali Mohammed ;
Obaidellah, Unaizah Hanum ;
Faizal, Erma Rahayu Mohd ;
Lai, Joan P. C. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) :16239-16261
[6]   A Blockchain-Based Authorization System for Trustworthy Resource Monitoring and Trading in Smart Communities [J].
Alcarria, Ramon ;
Bordel, Borja ;
Robles, Tomas ;
Martin, Diego ;
Manso-Callejo, Miguel-Angel .
SENSORS, 2018, 18 (10)
[7]  
Alexandrov D, 2019, PROC CONF OPEN INNOV
[8]  
Ali Maher, 2017, Biometric Recognition. 12th Chinese Conference, CCBR 2017. Proceedings: LNCS 10568, P511, DOI 10.1007/978-3-319-69923-3_55
[9]  
Alipour-Fanid A, 2019, IEEE CONF COMM NETW
[10]  
Aljehani Maher, 2016, 2016 IEEE 5th Global Conference on Consumer Electronics, DOI 10.1109/GCCE.2016.7800524