UAV IoT Framework Views and Challenges: Towards Protecting Drones as "Things"

被引:114
作者
Lagkas, Thomas [1 ]
Argyriou, Vasileios [2 ]
Bibi, Stamatia [3 ]
Sarigiannidis, Panagiotis [3 ]
机构
[1] Univ Sheffield, CITY Coll, Int Fac, Comp Sci Dept, Thessaloniki 54626, Greece
[2] Kingston Univ, Dept Networks & Digital Media, Kingston Upon Thames KT1 2EE, Surrey, England
[3] Univ Western Macedonia, Dept Informat & Telecommun Engn, Kozani 50100, Greece
关键词
security; privacy; drones; IoT; UAV; UNMANNED AERIAL VEHICLES; AIRCRAFT SYSTEMS; AD-HOC; SURVEILLANCE; PRIVACY; NETWORKS; INTERNET;
D O I
10.3390/s18114015
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring applications. Lately, there has been heavy investment in the development of UAVs and multi-UAVs systems that can collaborate and complete missions more efficiently and economically. Emerging technologies such as 4G/5G networks have significant potential on UAVs equipped with cameras, sensors, and GPS receivers in delivering Internet of Things (IoT) services from great heights, creating an airborne domain of the IoT. However, there are many issues to be resolved before the effective use of UAVs can be made, including security, privacy, and management. As such, in this paper we review new UAV application areas enabled by the IoT and 5G technologies, analyze the sensor requirements, and overview solutions for fleet management over aerial-networking, privacy, and security challenges. Finally, we propose a framework that supports and enables these technologies on UAVs. The introduced framework provisions a holistic IoT architecture that enables the protection of UAVs as "flying" things in a collaborative networked environment.
引用
收藏
页数:21
相关论文
共 83 条
  • [1] Akram R.N., 2016, 2016 IEEEAIAA 35 DIG, P1
  • [2] Akram RN, 2016, IEEE TRUST BIG, P606, DOI [10.1109/TrustCom.2016.0116, 10.1109/TrustCom.2016.115]
  • [3] Unified Model for Data Security - A Position Paper
    Akram, Raja Naeem
    Ko, Ryan K. L.
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 831 - 839
  • [4] Al-Hourani A, 2014, IEEE GLOB COMM CONF, P2898, DOI 10.1109/GLOCOM.2014.7037248
  • [5] Anonymous authentication for privacy-preserving IoT target-driven applications
    Alcaide, Almudena
    Palomar, Esther
    Montero-Castillo, Jose
    Ribagorda, Arturo
    [J]. COMPUTERS & SECURITY, 2013, 37 : 111 - 123
  • [6] Altawy R, 2017, ACM TRANS CYBER-PHYS, V1, DOI 10.1145/3001836
  • [7] [Anonymous], 2018, ARXIV180300680
  • [8] [Anonymous], P IEEE 2014 INT S ET
  • [9] [Anonymous], 2016, IEEE VTS VEH TECHNOL
  • [10] [Anonymous], IEEE INTERNET THINGS