Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security

被引:2
|
作者
Kumar, Naveen [1 ]
Chaudhary, Ankit [1 ]
机构
[1] Jawaharlal Nehru Univ, Sch Engn, Comp Sci & Engn Dept, New Delhi 110067, India
关键词
Authentication; Covert communication; Cryptography; Cyber-attacks; GCS; Physical layer security; Relaying; Trajectory optimization; UAV; MUTUAL AUTHENTICATION PROTOCOL; UNMANNED AERIAL VEHICLE; COVERT COMMUNICATION; TRAJECTORY OPTIMIZATION; RESOURCE-ALLOCATION; TRANSMIT POWER; DESIGN; SCHEME; INTERNET; SURVEILLANCE;
D O I
10.1016/j.comnet.2024.110695
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with time from military operations like surveillance, reconnaissance to commercial operations such as transportation, agriculture. The Drone market will be grown to around 43 billion USD by the 2025. With the increase in the usages, there is increase in cyber-attacks. So, Drone security and privacy are of major concern as they are used to perform the critical operations. The rapid adoption of UAVs in various sectors has prompted the need for robust and comprehensive cyber security measures. By implementing robust countermeasures, such as authentication, encryption etc. the risks posed by cyber threats can be significantly mitigated. The study investigates cyber security vulnerabilities and countermeasures in UAV systems within the scope of Authentication techniques, Physical Layer Security, Covert Communication. Relaying and Trajectory Optimization techniques are also discussed so that the flight trajectory can be optimized. It also discusses the communication modes used in UAV communication. An analysis of communication protocols is also carried out in this survey. The goal of the survey is to get the idea of cyber security threats involved in UAV communication. Our analysis emphasizes the importance of a holistic approach to UAV cyber security, leveraging the synergies among these domains to enhance overall resilience.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] Effects of Security Knowledge, Self-Control, and Countermeasures on Cybersecurity Behaviors
    Ifinedo, Princely
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2023, 63 (02) : 380 - 396
  • [32] Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures
    Siwakoti, Yuba Raj
    Bhurtel, Manish
    Rawat, Danda B. B.
    Oest, Adam
    Johnson, R. C.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (13) : 11224 - 11239
  • [33] Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network (EPON)
    Jin, Di
    Kartalopoulos, Stamatios V.
    Verma, Pramode K.
    CHINA COMMUNICATIONS, 2007, 4 (03) : 17 - 29
  • [34] Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network(EPON)
    Stamatios V.Kartalopoulos
    Pramode K.Verma
    中国通信, 2007, 4 (03) : 17 - 29
  • [35] The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations
    Kioskli, Kitty
    Fotis, Theo
    Mouratidis, Haralambos
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [36] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Hu, Yiwen
    Wang, Sihan
    Tu, Guan-Hua
    Xiao, Li
    Xie, Tian
    Lei, Xinyu
    Li, Chi-Yu
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100
  • [37] Enhancing Privacy and Security of Autonomous UAV Navigation
    Aggarwal, Vatsal
    Kaushik, Arjun Ramesh
    Jutla, Charanjit
    Ratha, Nalini
    2024 IEEE CONFERENCE ON ARTIFICIAL INTELLIGENCE, CAI 2024, 2024, : 518 - 523
  • [38] A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
    Farhadi, Mozhdeh
    Lanet, Jean-Louis
    Pierre, Guillaume
    Miorandi, Daniele
    SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (06): : 973 - 997
  • [39] Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review
    Yaqoob, Tehreem
    Abbas, Haider
    Atiquzzaman, Mohammed
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3723 - 3768
  • [40] Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks
    Giaretta, Alberto
    Balasubramaniam, Sasitharan
    Conti, Mauro
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 665 - 676