Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security

被引:0
|
作者
Kumar, Naveen [1 ]
Chaudhary, Ankit [1 ]
机构
[1] Jawaharlal Nehru Univ, Sch Engn, Comp Sci & Engn Dept, New Delhi 110067, India
关键词
Authentication; Covert communication; Cryptography; Cyber-attacks; GCS; Physical layer security; Relaying; Trajectory optimization; UAV; MUTUAL AUTHENTICATION PROTOCOL; UNMANNED AERIAL VEHICLE; COVERT COMMUNICATION; TRAJECTORY OPTIMIZATION; RESOURCE-ALLOCATION; TRANSMIT POWER; DESIGN; SCHEME; INTERNET; SURVEILLANCE;
D O I
10.1016/j.comnet.2024.110695
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with time from military operations like surveillance, reconnaissance to commercial operations such as transportation, agriculture. The Drone market will be grown to around 43 billion USD by the 2025. With the increase in the usages, there is increase in cyber-attacks. So, Drone security and privacy are of major concern as they are used to perform the critical operations. The rapid adoption of UAVs in various sectors has prompted the need for robust and comprehensive cyber security measures. By implementing robust countermeasures, such as authentication, encryption etc. the risks posed by cyber threats can be significantly mitigated. The study investigates cyber security vulnerabilities and countermeasures in UAV systems within the scope of Authentication techniques, Physical Layer Security, Covert Communication. Relaying and Trajectory Optimization techniques are also discussed so that the flight trajectory can be optimized. It also discusses the communication modes used in UAV communication. An analysis of communication protocols is also carried out in this survey. The goal of the survey is to get the idea of cyber security threats involved in UAV communication. Our analysis emphasizes the importance of a holistic approach to UAV cyber security, leveraging the synergies among these domains to enhance overall resilience.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
    Hasanova, Huru
    Baek, Ui-jun
    Shin, Mu-gon
    Cho, Kyunghee
    Kim, Myung-Sup
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2019, 29 (02)
  • [2] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [3] Wireless security: Vulnerabilities and countermeasures
    Johnson, DM
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 91 - 91
  • [4] Security Vulnerabilities and Countermeasures in MPSoCs
    Sant'Ana, Anderson Camargo
    Medina, Henrique
    Moraes, Fernando Gehm
    [J]. IEEE DESIGN & TEST, 2021, 38 (04) : 70 - 77
  • [5] Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
    Almaiah, Mohammed Amin
    Saqr, Leen Mohammad
    Al-Rawwash, Leen Ahmad
    Altellawi, Layan Ahmed
    Al-Ali, Romel
    Almomani, Omar
    [J]. Computers, Materials and Continua, 2024, 81 (02): : 3189 - 3220
  • [6] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [7] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    [J]. INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [8] Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication
    Algarni, Abdullah
    Thayananthan, Vijey
    [J]. SYMMETRY-BASEL, 2022, 14 (12):
  • [9] Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey
    Sifra, Epherem Merete
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 512 - 515
  • [10] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644