亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

无人机 计算机科学 计算机安全 无线自组网 互联网 搜救 控制(管理) 电信 无线 万维网 遗传学 人工智能 机器人 生物
作者
Kai-Yun Tsao,Thomas Girdler,Vassilios G. Vassilakis
出处
期刊:Ad hoc networks [Elsevier BV]
卷期号:133: 102894-102894 被引量:107
标识
DOI:10.1016/j.adhoc.2022.102894
摘要

Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly mobile, UAV systems are able to cooperate with each other to accomplish a wide range of different tasks. UAVs can be used in commercial applications, such as goods delivery, as well as in military surveillance. They can also operate in civil domains like search-and-rescue missions, that require multiple UAVs to collect location data as well as transmit video streams. However, the malicious use of UAVs began to emerge in recent years. The frequency of such attacks has been significantly increasing and their impact can have devastating effects. Hence, the relevant industries and standardisation bodies are exploring possibilities for securing UAV systems and networks. Our survey focuses on UAV security and privacy issues whilst establishing flying ad-hoc networks (FANETs) as well as on threats to the Internet of drones (IoD) infrastructure used to provide control and access over the Internet between UAVs and users. The goal of this survey is to categorise the versatile aspects of the UAV threat landscape and develop a classification approach based on different types of connections and nodes in FANETs and IoD. In particular, we categorise security and privacy threats on connections between UAVs, ground control stations, and personal pilot devices. All the most relevant threats and their corresponding defence mechanisms are classified using characteristics of the first four layers of the OSI model. We then analyse the conventional and novel UAV routing protocols, indicating their advantages and disadvantages from the cyber security perspective. To provide a deeper insight, the reviewed defence mechanisms have undergone a thorough examination of their security requirements and objectives such as availability, authentication, authorisation, confidentiality, integrity, privacy, and non-repudiation. Finally, we discuss the open research challenges, the limitations of current UAV standards, and provide possible future directions for research.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
blueskyzhi完成签到,获得积分10
8秒前
街道办柏阿姨完成签到 ,获得积分10
9秒前
共享精神应助等等采纳,获得10
10秒前
时间煮雨我煮鱼完成签到,获得积分10
25秒前
清欢完成签到 ,获得积分10
27秒前
大模型应助包容的凌雪采纳,获得10
35秒前
可靠诗筠完成签到 ,获得积分10
1分钟前
1分钟前
1分钟前
zh完成签到,获得积分10
1分钟前
路漫漫其修远兮完成签到 ,获得积分10
1分钟前
研友_VZG7GZ应助科研通管家采纳,获得10
3分钟前
香蕉觅云应助科研通管家采纳,获得10
3分钟前
赘婿应助科研通管家采纳,获得10
3分钟前
共享精神应助科研通管家采纳,获得10
3分钟前
3分钟前
等等发布了新的文献求助10
3分钟前
JamesPei应助等等采纳,获得10
4分钟前
慕青应助等等采纳,获得10
4分钟前
打打应助等等采纳,获得10
4分钟前
天天快乐应助等等采纳,获得10
4分钟前
共享精神应助等等采纳,获得10
4分钟前
小马甲应助等等采纳,获得10
4分钟前
科研通AI2S应助等等采纳,获得10
4分钟前
ding应助等等采纳,获得10
4分钟前
4分钟前
orixero应助等等采纳,获得10
4分钟前
在水一方应助等等采纳,获得10
4分钟前
打打应助等等采纳,获得10
4分钟前
领导范儿应助等等采纳,获得10
4分钟前
丘比特应助等等采纳,获得10
4分钟前
CipherSage应助等等采纳,获得10
4分钟前
顾矜应助等等采纳,获得10
4分钟前
传奇3应助等等采纳,获得10
4分钟前
传奇3应助等等采纳,获得10
4分钟前
科研通AI2S应助等等采纳,获得10
4分钟前
烟花应助等等采纳,获得10
4分钟前
所所应助等等采纳,获得10
4分钟前
酷波er应助等等采纳,获得10
4分钟前
善学以致用应助等等采纳,获得10
4分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Elements of Propulsion: Gas Turbines and Rockets, Second Edition 1000
卤化钙钛矿人工突触的研究 1000
Engineering for calcareous sediments : proceedings of the International Conference on Calcareous Sediments, Perth 15-18 March 1988 / edited by R.J. Jewell, D.C. Andrews 1000
Wolffs Headache and Other Head Pain 9th Edition 1000
Continuing Syntax 1000
Signals, Systems, and Signal Processing 510
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6246222
求助须知:如何正确求助?哪些是违规求助? 8069697
关于积分的说明 16845485
捐赠科研通 5322806
什么是DOI,文献DOI怎么找? 2834202
邀请新用户注册赠送积分活动 1811685
关于科研通互助平台的介绍 1667464