Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles

被引:49
作者
Shafique, Arslan [1 ]
Mehmood, Abid [2 ]
Elhadef, Mourad [2 ]
机构
[1] Riphah Int Univ, Dept Elect Engn, Islamabad 46000, Pakistan
[2] Abu Dhabi Univ, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
关键词
Security; Protocols; Drones; Wireless fidelity; Global Positioning System; Privacy; Videos; Unmanned aerial vehicles (UAVs); security; vulnerabilities; attacks; drones; security threats; PHYSICAL LAYER SECURITY; UAV; SURVEILLANCE; NETWORKS; ATTACK; THROUGHPUT; TRACKING; SEARCH; DESIGN; MODEL;
D O I
10.1109/ACCESS.2021.3066778
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility and advantages of UAVs, they may lead to major security breaches in the context of hardware, software, and communication channel, due their ease of use and availability. UAVs are vulnerable to various types of attacks such as spoofing, false data injection, jamming, fuzzing, availability, confidentiality, and integrity attacks. To overcome these security threats, researchers have been investigating strong security protocols to keep UAVs safe from the attackers. Nevertheless, there are many flaws in the developed protocols which can be exploited by hackers. Therefore, it is becomes crucial to study and analyze the existing security protocols used in UAVs to discover and address their vulnerabilities and weaknesses. The purpose of this study is to explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions.
引用
收藏
页码:46927 / 46948
页数:22
相关论文
共 130 条
[61]   Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks [J].
Li, Qiang ;
Yang, Ye ;
Ma, Wing-Kin ;
Lin, Meilu ;
Ge, Jianhua ;
Lin, Jingran .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (01) :206-220
[62]   Cooperative Jamming via Spectrum Sharing for Secure UAV Communications [J].
Li, Yupeng ;
Zhang, Rongqing ;
Zhang, Jianhua ;
Yang, Liuqing .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (03) :326-330
[63]   Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper [J].
Liu, Chenxi ;
Lee, Jemin ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (06) :2919-2931
[64]   Pedestrian Detection and Tracking from Low-Resolution Unmanned Aerial Vehicle Thermal Imagery [J].
Ma, Yalong ;
Wu, Xinkai ;
Yu, Guizhen ;
Xu, Yongzheng ;
Wang, Yunpeng .
SENSORS, 2016, 16 (04)
[65]   Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication [J].
Mabodi, Kobra ;
Yusefi, Mehdi ;
Zandiyan, Shahram ;
Irankhah, Leili ;
Fotohi, Reza .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (09) :7081-7106
[66]   Prediction-discrepancy based on innovative particle filter for estimating UAV true position in the presence of the GPS spoofing attacks [J].
Majidi, Mohammad ;
Erfanian, Alireza ;
Khaloozadeh, Hamid .
IET RADAR SONAR AND NAVIGATION, 2020, 14 (06) :887-897
[67]   Security of vehicular ad-hoc networks: A comprehensive survey [J].
Malhi, Avleen Kaur ;
Batra, Shalini ;
Pannu, Husanbir Singh .
COMPUTERS & SECURITY, 2020, 89
[68]  
Marcinak MP, 2005, IEEE MILIT COMMUN C, P1637
[69]  
Maxa J. A., 2017, ADHOC SENSOR WIRELES, V37
[70]   Security Challenges of Vehicle Recovery for Urban Air Mobility Contexts [J].
Maxa, Jean Aline ;
Blaize, Raphael ;
Longuy, Sebastien .
2019 IEEE/AIAA 38TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2019,