Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications

被引:18
|
作者
Wang L. [1 ]
Chen Y. [2 ]
Wang P. [1 ]
Yan Z. [1 ,3 ]
机构
[1] Xidian University, China
[2] San Jose State University, United States
[3] Aalto University, Finland
来源
关键词
'current - Communications security - Future prospects - Military industries - Security countermeasures - Security requirements - Security threats - Unmanned aerial vehicle systems - Vehicle communications - Vehicle security;
D O I
10.1109/MCOMSTD.0001.2000078
中图分类号
学科分类号
摘要
Unmanned aerial vehicles (UAVs) have been widely applied in various fields, including but not limited to military, industry, and agriculture. But UAVs also confront severe security threats, which slows down their wide application. Current research mainly focuses on the security of a single UAV system, while paying little attention to UAV-related communications, especially in the physical and network layers. Thus, it becomes necessary to summarize potential security threats and corresponding countermeasures. To this end, we study mainstream attacks on UAV communications in order to propose security requirements. Then we present a comprehensive review on existing security countermeasures for enhancing UAV communication security in both the physical and network layers. We conclude with open issues and future prospects of UAV security. © 2017 IEEE.
引用
收藏
页码:41 / 47
页数:6
相关论文
共 50 条
  • [21] Integrated Communications System for the Remote Operation of Unmanned Aerial Vehicle
    Kurek, K.
    Keller, T.
    Modelski, J.
    Yashchyshyn, Y.
    Piasecki, M.
    Pastuszak, G.
    Darmetko, M.
    Bajurko, P.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2013, 7 (02) : 235 - 242
  • [22] Survey on Unmanned Aerial Vehicle Communications for 6G
    Chen Xinying
    Sheng Min
    Li Bo
    Zhao Nan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (03) : 781 - 789
  • [23] Network simulation tools for unmanned aerial vehicle communications: A survey
    Jiang, Weiwei
    Han, Haoyu
    He, Miao
    Gu, Weixi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2024, 37 (15)
  • [24] Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects
    Kuang B.
    Li Y.
    Gu F.
    Su M.
    Fu A.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2304 - 2321
  • [25] Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems
    Bharati, Subrato
    Podder, Prajoy
    Mondal, M. Rubaiyat Hossain
    Robel, Md Robiul Alam
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2020, 15 (04): : 153 - 164
  • [26] Security threats and countermeasures in WLAN
    Nagamalai, D
    Dhinakaran, BC
    Sasikala, P
    Lee, SH
    Lee, JK
    TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 168 - 182
  • [27] Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation
    Birnbaum, Zachary
    Dolgikh, Andrey
    Skormin, Victor
    O'Brien, Edward
    Muller, Daniel
    Stracquodaine, Christina
    JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS, 2016, 84 (1-4) : 107 - 120
  • [28] Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation
    Birnbaum, Zachary
    Dolgikh, Andrey
    Skormin, Victor
    O'Brien, Edward
    Muller, Daniel
    2014 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS), 2014, : 692 - 702
  • [29] Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation
    Zachary Birnbaum
    Andrey Dolgikh
    Victor Skormin
    Edward O’Brien
    Daniel Muller
    Christina Stracquodaine
    Journal of Intelligent & Robotic Systems, 2016, 84 : 107 - 120
  • [30] Comparison of Path Planning Algorithms for an Unmanned Aerial Vehicle Deployment Under Threats
    Danancier, Kevin
    Ruvio, Delphine
    Sung, Inkyung
    Nielsen, Peter
    IFAC PAPERSONLINE, 2019, 52 (13): : 1978 - 1983