Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey

被引:127
作者
Hassija, Vikas [1 ]
Chamola, Vinay [2 ,3 ]
Agrawal, Adhar [1 ]
Goyal, Adit [1 ]
Nguyen Cong Luong [4 ,5 ]
Niyato, Dusit [6 ]
Yu, Fei Richard [7 ]
Guizani, Mohsen [8 ]
机构
[1] Jaypee Inst Informat Technol, Dept Comp Sci & IT, Noida 201304, India
[2] BITS Pilani, Dept Elect & Elect Engn, Pilani Campus, Pilani 333031, Rajasthan, India
[3] BITS Pilani, APPCAIR, Pilani Campus, Pilani 333031, Rajasthan, India
[4] PHENIKAA Univ, Fac Comp Sci, Hanoi 100000, Vietnam
[5] PHENIKAA Univ, PHENIKAA Res & Technol Inst, Hanoi 100000, Vietnam
[6] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
[7] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[8] Qatar Univ, Comp Sci & Engn Dept, Doha, Qatar
基金
加拿大自然科学与工程研究理事会;
关键词
Drones; Security; Privacy; Ad hoc networks; Tutorials; Encryption; Computer science; Blockchain; drone applications; drone security; fog computing; machine learning; software defined networks; UAV; UNMANNED AERIAL VEHICLES; INTERNET; BLOCKCHAIN; NETWORKS; ATTACKS; SYSTEM; IOT; 5G; CLASSIFICATION; LOCALIZATION;
D O I
10.1109/COMST.2021.3097916
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural changes are not made, the upcoming drone applications will not be able to serve their actual purpose. Therefore, in this paper, we present a detailed review of the security-critical drone applications, and security-related challenges in drone communication such as DoS attacks, Man-in-the-middle attacks, De-Authentication attacks, and so on. Furthermore, as part of solution architectures, the use of Blockchain, Software Defined Networks (SDN), Machine Learning, and Fog/Edge computing are discussed as these are the most emerging technologies. Drones are highly resource-constrained devices and therefore it is not possible to deploy heavy security algorithms on board. Blockchain can be used to cryptographically store all the data that is sent to/from the drones, thereby saving it from tampering and eavesdropping. Various ML algorithms can be used to detect malicious drones in the network and to detect safe routes. Additionally, the SDN technology can be used to make the drone network reliable by allowing the controller to keep a close check on data traffic, and fog computing can be used to keep the computation capabilities closer to the drones without overloading them.
引用
收藏
页码:2802 / 2832
页数:31
相关论文
共 163 条
[21]  
Baird M. H. L., Hedera: A Public Hashgraph Network and Governing Council
[22]  
Bamasag O, 2016, I C INF COMM TECH CO, P429, DOI 10.1109/ICTC.2016.7763512
[23]   Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function [J].
Bansal, Gaurang ;
Naren, Naren ;
Chamola, Vinay ;
Sikdar, Biplab ;
Kumar, Neeraj ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) :7234-7246
[24]  
Bartels J., DRONE SCARE NEAR VEG
[25]  
Bellardo J, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P15
[26]   A survey on fog computing for the Internet of Things [J].
Bellavista, Paolo ;
Berrocal, Javier ;
Corradi, Antonio ;
Das, Sajal K. ;
Foschini, Luca ;
Zanni, Alessandro .
PERVASIVE AND MOBILE COMPUTING, 2019, 52 :71-99
[27]   On Detecting and Preventing Jamming Attacks with Machine Learning in Optical Networks [J].
Bensalem, Mounir ;
Singh, Sandeep Kumar ;
Jukan, Admela .
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
[28]  
Beyerer I. H. J., DEFENSE DRONES THE D
[29]  
Bhandari R., 1999, SURVIVABLE NETWORKS
[30]   A Survey on Machine-Learning Techniques for UAV-Based Communications [J].
Bithas, Petros S. ;
Michailidis, Emmanouel T. ;
Nomikos, Nikolaos ;
Vouyioukas, Demosthenes ;
Kanatas, Athanasios G. .
SENSORS, 2019, 19 (23)