Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey

被引:127
作者
Hassija, Vikas [1 ]
Chamola, Vinay [2 ,3 ]
Agrawal, Adhar [1 ]
Goyal, Adit [1 ]
Nguyen Cong Luong [4 ,5 ]
Niyato, Dusit [6 ]
Yu, Fei Richard [7 ]
Guizani, Mohsen [8 ]
机构
[1] Jaypee Inst Informat Technol, Dept Comp Sci & IT, Noida 201304, India
[2] BITS Pilani, Dept Elect & Elect Engn, Pilani Campus, Pilani 333031, Rajasthan, India
[3] BITS Pilani, APPCAIR, Pilani Campus, Pilani 333031, Rajasthan, India
[4] PHENIKAA Univ, Fac Comp Sci, Hanoi 100000, Vietnam
[5] PHENIKAA Univ, PHENIKAA Res & Technol Inst, Hanoi 100000, Vietnam
[6] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
[7] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[8] Qatar Univ, Comp Sci & Engn Dept, Doha, Qatar
基金
加拿大自然科学与工程研究理事会;
关键词
Drones; Security; Privacy; Ad hoc networks; Tutorials; Encryption; Computer science; Blockchain; drone applications; drone security; fog computing; machine learning; software defined networks; UAV; UNMANNED AERIAL VEHICLES; INTERNET; BLOCKCHAIN; NETWORKS; ATTACKS; SYSTEM; IOT; 5G; CLASSIFICATION; LOCALIZATION;
D O I
10.1109/COMST.2021.3097916
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural changes are not made, the upcoming drone applications will not be able to serve their actual purpose. Therefore, in this paper, we present a detailed review of the security-critical drone applications, and security-related challenges in drone communication such as DoS attacks, Man-in-the-middle attacks, De-Authentication attacks, and so on. Furthermore, as part of solution architectures, the use of Blockchain, Software Defined Networks (SDN), Machine Learning, and Fog/Edge computing are discussed as these are the most emerging technologies. Drones are highly resource-constrained devices and therefore it is not possible to deploy heavy security algorithms on board. Blockchain can be used to cryptographically store all the data that is sent to/from the drones, thereby saving it from tampering and eavesdropping. Various ML algorithms can be used to detect malicious drones in the network and to detect safe routes. Additionally, the SDN technology can be used to make the drone network reliable by allowing the controller to keep a close check on data traffic, and fog computing can be used to keep the computation capabilities closer to the drones without overloading them.
引用
收藏
页码:2802 / 2832
页数:31
相关论文
共 163 条
[1]   A Mechanism for Securing IoT-enabled Applications at the Fog Layer [J].
Abbas, Nadeem ;
Asim, Muhammad ;
Tariq, Noshina ;
Baker, Thar ;
Abbas, Sohail .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (01)
[2]  
Abdo JB, 2017, 2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P45, DOI 10.1109/FMEC.2017.7946406
[3]  
Aggarwal S., 2019, 2019 IEEE International Conference on Communications (ICC), P1, DOI DOI 10.1109/ICC.2019
[4]   Secure Ground Control Station-based Routing Protocol for UAV Networks [J].
Agron, Danielle Jaye Segui ;
Ramli, Muhammad Rusyadi ;
Lee, Jae-Min ;
Kim, Dong-Seong .
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, :794-798
[5]   Using Deep Networks for Drone Detection [J].
Aker, Cemal ;
Kalkan, Sinan .
2017 14TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS), 2017,
[6]   A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography [J].
Al Hasib, Abdullah ;
Haque, Abul Ahsan Md. Mahmudul .
THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, :505-510
[7]  
Al-Emadi S, 2019, INT WIREL COMMUN, P459, DOI 10.1109/IWCMC.2019.8766732
[8]   A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing [J].
Aliyu, Farouq ;
Sheltami, Tarek ;
Shakshuki, Elhadi M. .
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 :24-31
[9]  
Alladi Tejasvi, 2020, Vehicular Communications, V23, DOI 10.1016/j.vehcom.2020.100249
[10]   HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Naren .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) :361-369