A Survey of Cyberattack Countermeasures for Unmanned Aerial Vehicles

被引:27
作者
Kong, Peng-Yong [1 ]
机构
[1] Khalifa Univ, Elect Engn & Comp Sci Dept, Abu Dhabi, U Arab Emirates
关键词
Computer crime; Computer security; Unmanned aerial vehicles; Wireless communication; Companies; Jamming; Costs; Cybersecurity; cyberattack; countermeasure; unmanned aerial vehicle; UAV; drone; SPOOFING DETECTION; SECURITY; CHALLENGES; NETWORKS;
D O I
10.1109/ACCESS.2021.3124996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a wide range of cyberattacks. This paper first surveys existing literature for different cyberattacks. Then, we classify these attacks based on their attack entry points, which can be radio channels, messages or on-board systems. There are six classes of UAV cyberattacks, namely channel jamming, message interception, message deletion, message injection, message spoofing and on-board system attack. In the existing literature, there is no survey focusing on UAV cyberattack countermeasures. To close this gap, we survey existing countermeasures for the six attack classes. A comprehensive review of countermeasures is important because countermeasure may not be exclusive to an attack. Knowing a wide range of existing countermeasures can prepare us against existing and new cyberattacks. We classify countermeasure into three classes, namely prevention, detection and mitigation. Prevention countermeasures stop a cyberattack from starting. When prevention countermeasures fail, detection countermeasures alert UAV operator of an attack. After detecting an attack, mitigation countermeasures limits the damage. Following the survey, we further discuss the open challenges in developing countermeasures and propose some potential future research works.
引用
收藏
页码:148244 / 148263
页数:20
相关论文
共 73 条
[1]   Who's Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC) [J].
Akos, Dennis M. .
NAVIGATION-JOURNAL OF THE INSTITUTE OF NAVIGATION, 2012, 59 (04) :281-290
[2]  
Altawy R, 2017, ACM TRANS CYBER-PHYS, V1, DOI 10.1145/3001836
[3]  
[Anonymous], 2013, Communications and network
[4]  
Bhattacharya S, 2010, P AMER CONTR CONF, P818
[5]  
Birnbaum Z, 2014, INT CONF UNMAN AIRCR, P692, DOI 10.1109/ICUAS.2014.6842314
[6]  
Borio D, 2015, 2015 INTERNATIONAL CONFERENCE ON LOCATION AND GNSS (ICL-GNSS)
[7]  
Carroll T. Brandon., 2012, THESIS BRIGHAM YOUNG
[8]  
Cook Kendra L. B., 2007, 2007 IEEE Aerospace Conference, P1, DOI 10.1109/AERO.2007.352737
[9]  
Daubert J, 2018, P IEEE IFIP NETW OP, P1, DOI DOI 10.1109/NOMS.2018.8406315
[10]  
Davidson D., 2016, WORKSHOP OFFENSIVE T, P221