Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles

被引:49
作者
Shafique, Arslan [1 ]
Mehmood, Abid [2 ]
Elhadef, Mourad [2 ]
机构
[1] Riphah Int Univ, Dept Elect Engn, Islamabad 46000, Pakistan
[2] Abu Dhabi Univ, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
关键词
Security; Protocols; Drones; Wireless fidelity; Global Positioning System; Privacy; Videos; Unmanned aerial vehicles (UAVs); security; vulnerabilities; attacks; drones; security threats; PHYSICAL LAYER SECURITY; UAV; SURVEILLANCE; NETWORKS; ATTACK; THROUGHPUT; TRACKING; SEARCH; DESIGN; MODEL;
D O I
10.1109/ACCESS.2021.3066778
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility and advantages of UAVs, they may lead to major security breaches in the context of hardware, software, and communication channel, due their ease of use and availability. UAVs are vulnerable to various types of attacks such as spoofing, false data injection, jamming, fuzzing, availability, confidentiality, and integrity attacks. To overcome these security threats, researchers have been investigating strong security protocols to keep UAVs safe from the attackers. Nevertheless, there are many flaws in the developed protocols which can be exploited by hackers. Therefore, it is becomes crucial to study and analyze the existing security protocols used in UAVs to discover and address their vulnerabilities and weaknesses. The purpose of this study is to explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions.
引用
收藏
页码:46927 / 46948
页数:22
相关论文
共 130 条
[51]  
Kirichenko V., 2015, ELECT CONTROL SYST, V3, P23, DOI 10.18372/1990-5548.45.9892
[52]  
Kotenko I., 2019, P INT S INT DISTR CO
[53]  
Krishna CGL, 2017, 2017 IEEE INTERNATIONAL SYMPOSIUM ON SAFETY, SECURITY AND RESCUE ROBOTICS (SSRR), P194, DOI 10.1109/SSRR.2017.8088163
[54]   UranusLink - Communication Protocol for UAV with Small Overhead and Encryption Ability [J].
Kriz, Vlastimil ;
Gabrlik, Petr .
IFAC PAPERSONLINE, 2015, 48 (04) :474-479
[55]   Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles [J].
Kwon, Young-Min ;
Yu, Jaemin ;
Cho, Byeong-Moon ;
Eun, Yongsoon ;
Park, Kyung-Joon .
IEEE ACCESS, 2018, 6 :43203-43212
[56]   UAV-Aided Secure Communications With Cooperative Jamming [J].
Lee, Hoon ;
Eom, Subin ;
Park, Junhee ;
Lee, Inkyu .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (10) :9385-9392
[57]   Protecting Secure Communication Under UAV Smart Attack With Imperfect Channel Estimation [J].
Li, Chao ;
Xu, Yan ;
Xia, Junjuan ;
Zhao, Junhui .
IEEE ACCESS, 2018, 6 :76395-76401
[58]  
Li F., 2020, IEEE ACCESS, V8
[59]   Addressable metasurfaces for dynamic holography and optical information encryption [J].
Li, Jianxiong ;
Kamin, Simon ;
Zheng, Guoxing ;
Neubrech, Frank ;
Zhang, Shuang ;
Liu, Na .
SCIENCE ADVANCES, 2018, 4 (06)
[60]   Energy Efficient Legitimate Wireless Surveillance of UAV Communications [J].
Li, Kai ;
Voicu, Razvan Christian ;
Kanhere, Salil S. ;
Ni, Wei ;
Tovar, Eduardo .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) :2283-2293