Comprehensive Review of UAV Detection, Security, and Communication Advancements to Prevent Threats

被引:53
作者
Abro, Ghulam E. Mustafa [1 ,2 ,3 ,4 ]
Zulkifli, Saiful Azrin B. M. [1 ,3 ]
Masood, Rana Javed [5 ]
Asirvadam, Vijanth Sagayan [3 ]
Laouti, Anis [2 ]
机构
[1] Univ Teknol PETRONAS, Ctr Automot Res & Elect Mobil CAREM, Seri Iskandar 32610, Perak, Malaysia
[2] Inst Polytech Paris, CNRS, Telecom SudParis, Samovar, 9 Rue Charles Fourier, F-91011 Paris, France
[3] Univ Teknol PETRONAS, Elect & Elect Engn Dept, Seri Iskandar 32610, Perak, Malaysia
[4] Mehran Univ Engn & Technol MUET, Condit Monitoring Syst CMS Lab, NCRA, Jamshoro 67480, Sindh, Pakistan
[5] Usman Inst Technol UIT, Elect Engn Dept, Karachi 75300, Sindh, Pakistan
关键词
unmanned aerial vehicle; advancement; classification; tracking and communication threats; UNMANNED AERIAL VEHICLES; CIVIL APPLICATIONS; NETWORKS; PROTOCOL;
D O I
10.3390/drones6100284
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
It has been observed that unmanned aerial vehicles (UAVs), also known as drones, have been used in a very different way over time. The advancements in key UAV areas include detection (including radio frequency and radar), classification (including micro, mini, close range, short range, medium range, medium-range endurance, low-altitude deep penetration, low-altitude long endurance, and medium-altitude long endurance), tracking (including lateral tracking, vertical tracking, moving aerial pan with moving target, and moving aerial tilt with moving target), and so forth. Even with all of these improvements and advantages, security and privacy can still be ensured by researching a number of key aspects of an unmanned aerial vehicle, such as through the jamming of the control signals of a UAV and redirecting them for any high-assault activity. This review article will examine the privacy issues related to drone standards and regulations. The manuscript will also provide a comprehensive answer to these limitations. In addition to updated information on current legislation and the many classes that can be used to establish communication between a ground control room and an unmanned aerial vehicle, this article provides a basic overview of unmanned aerial vehicles. After reading this review, readers will understand the shortcomings, the most recent advancements, and the strategies for addressing security issues, assaults, and limitations. The open research areas described in this manuscript can be utilized to create novel methods for strengthening the security and privacy of an unmanned aerial vehicle.
引用
收藏
页数:20
相关论文
共 113 条
  • [1] Abdullah Q.A., INTRO UNMANNED AIRCR
  • [2] An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace
    Ali, Busyairah Syd
    Saji, Sam
    Su, Moon Ting
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 37
  • [3] UAV communication system integrated into network traversal with mobility
    Aljehani, Maher
    Inoue, Masahiro
    Watanbe, Akira
    Yokemura, Taketoshi
    Ogyu, Fumiya
    Iida, Hidemasa
    [J]. SN APPLIED SCIENCES, 2020, 2 (06):
  • [4] [Anonymous], 2021, TRAFICOM 0717
  • [5] [Anonymous], 2020, IVYPANDA 0113
  • [6] [Anonymous], 2020, PILOT 0322
  • [7] [Anonymous], 2015, HDB UNMANNED AERIAL, DOI DOI 10.1007/978-90-481-9707-1_151
  • [8] A hierarchical, objectives-based framework for the digital investigations process
    Beebe, Nicole Lang
    Clark, Jan Guynes
    [J]. DIGITAL INVESTIGATION, 2005, 2 (02) : 147 - 167
  • [9] Berg T.R., 2020, AIR SPACE MAG 0110
  • [10] Unauthorized Amateur UAV Detection Based on WiFi Statistical Fingerprint Analysis
    Bisio, Igor
    Garibotto, Chiara
    Lavagetto, Fabio
    Sciarrone, Andrea
    Zappatore, Sandro
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (04) : 106 - 111