Security in Internet of Drones: A Comprehensive Review

被引:26
作者
Samanth, Snehal [1 ]
Prema, K., V [2 ]
Balachandra, Mamatha [1 ]
机构
[1] Manipal Acad Higher Educ, Manipal Inst Technol, Dept Comp Sci & Engn, Manipal, Karnataka, India
[2] Manipal Acad Higher Educ, Manipal Inst Technol Bengaluru, Dept Comp Sci & Engn, Manipal, Karnataka, India
关键词
AirSim; authentication; decryption; encryption; internet of drones; key agreement; security; UAV; KEY AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION PROTOCOL; IOT-ENABLED INTERNET; ACCESS-CONTROL; MUTUAL AUTHENTICATION; PRIVACY PRESERVATION; COMMUNICATION; EFFICIENT; DESIGN; SYSTEM;
D O I
10.1080/23311916.2022.2029080
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Unmanned Aerial Vehicles (UAVs), also called drones, are used for various applications with two basic classifications: civilian and military drones. Civilian drones are used for various applications like construction site monitoring, natural disaster area monitoring, agriculture, etc. Military drones are used for applications like monitoring a country's border, the transmission of information about the intruders to Ground Control Station (GCS), or to any other server which has been designed for the purpose. Before the real-time deployment of the Internet of Drones (IoD), the feasibility and efficiency of a proposed UAV framework should be tested in an open-source UAV simulator or any network simulator. AirSim simulator is an open-source UAV simulator that has different features like ease of development, efficient motion capture, efficient obstacle detections and collision detections, use of different sensor models, and physics models. Hence, a review has been done on recent UAV frameworks which have been designed and tested using the AirSim simulator. Since a vast amount of data is being transmitted between IoD devices in this era, there is a need for designing secure IoD communication frameworks, with the least compromise in the performance of the designed frameworks. Hence, an extensive review has been done on different secure IoD communication frameworks which have used different cryptography concepts like key agreement, authentication, encryption and decryption, integrity, blockchain, digital signatures, and have implemented their proposed frameworks in real-time, or by using network simulators. The common network simulators that have been used for simulating secure IoD frameworks/mechanisms are NS3 and OMNeT++.
引用
收藏
页数:80
相关论文
共 212 条
[91]  
Hussein MN, 2017, 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), P393, DOI 10.1109/ICENCO.2017.8289821
[92]   Design and Analysis of Lightweight Authentication Protocol for Securing IoD [J].
Jan, Saeed Ullah ;
Qayum, Fawad ;
Khan, Habib Ullah .
IEEE ACCESS, 2021, 9 :69287-69306
[93]  
Keith J., 2009, P 47 AIAA AER SCI M
[94]   An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks [J].
Khan, Muhammad Asghar ;
Ullah, Insaf ;
Kumar, Neeraj ;
Oubbati, Omar Sami ;
Qureshi, Ijaz Mansoor ;
Noor, Fazal ;
Khanzada, Fahim Ullah .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (05) :4839-4851
[95]   Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption [J].
Khan, Muhammad Asghar ;
Ullah, Insaf ;
Nisar, Shibli ;
Noor, Fazal ;
Qureshi, Ijaz Mansoor ;
Khanzada, Fahimullah ;
Khattak, Hizbullah ;
Aziz, Muhammad Adnan .
MOBILE INFORMATION SYSTEMS, 2020, 2020
[96]   An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network [J].
Khan, Muhammad Asghar ;
Ullah, Insaf ;
Nisar, Shibli ;
Noor, Fazal ;
Qureshi, Ijaz Mansoor ;
Khanzada, Fahim Ullah ;
Ul Amin, Noor .
IEEE ACCESS, 2020, 8 :36807-36828
[97]   An Efficient and Provably Secure Certificateless Blind Signature Scheme for Flying Ad-Hoc Network Based on Multi-Access Edge Computing [J].
Khan, Muhammad Asghar ;
Qureshi, Ijaz Mansoor ;
Ullah, Insaf ;
Khan, Suleman ;
Khanzada, Fahimullah ;
Noor, Fazal .
ELECTRONICS, 2020, 9 (01)
[98]  
Kim K, 2020, I C INF COMM TECH CO, P1672, DOI 10.1109/ICTC49870.2020.9289387
[99]   UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization [J].
Kim, Sieun ;
Youn, Taek-Young ;
Choi, Daeseon ;
Park, Ki-Woong .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
[100]   Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone [J].
Ko, Yongho ;
Kim, Jiyoon ;
Duguma, Daniel Gerbi ;
Astillo, Philip Virgil ;
You, Ilsun ;
Pau, Giovanni .
SENSORS, 2021, 21 (06) :1-25