A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis

计算机科学 无人机 计算机安全 欺骗攻击 恶意软件 形势意识 加密 领域(数学) 背景(考古学) 数学 遗传学 生物 工程类 航空航天工程 古生物学 纯数学
作者
Alessio Rugo,Claudio A. Ardagna,Nabil El Ioini
出处
期刊:ACM Computing Surveys [Association for Computing Machinery]
卷期号:55 (1): 1-35 被引量:38
标识
DOI:10.1145/3485272
摘要

Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for commercial applications, embracing many domains ranging from human safety to the medical field, agriculture and environment, multimedia production, and even commercial delivery. This rise in popularity, however, is causing an increasing interest from criminals, making UAVs the target of new attacks. To fully characterize the current UAV cybersecurity landscape, we perform a complete literature review, digging into drone security historic facts and scientific studies on the matter, reviewing specialized articles and scientific papers focusing on cybersecurity threats and gaps in the context of small UAVs in commercial applications. Being a recent research and development area, most of the articles have been published between 2016 and 2020 as a direct consequence of the increase of security concerns and interest in the drone field. Papers in this review deal with UAV cyberthreats and related vulnerabilities, identifying flaws experimented in a lab or describing incidents detected in the field. Communication, sensors, and system misconfigurations are among the most important threat vectors, while sensor spoofing/jamming and malware DoS/control are among the most cited threats. Threat vectors permit depicting a complete overview of the topic and potential countermeasures known to date, with related gap analysis, also accounting for the recent Unmanned Aircraft System evolution toward ad hoc or cloud-based UAV networks. Countermeasures include the adoption of traditional communication encryption and standard protocols, GPS spoofing/jamming mitigation, encryption and privacy-aware implementations, and counter-malware techniques, to name the most adopted. It also emerges that often attacks are simply ported or adapted from other attacks in similar domains, while peculiar attacks still remain such as targeted physical attacks, specific UAV malware, and GPS spoofing/jamming.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
刚刚
刚刚
Orange应助YJY采纳,获得10
1秒前
NEKO发布了新的文献求助10
1秒前
斯文啊斯文完成签到,获得积分20
1秒前
lbt发布了新的文献求助10
1秒前
米奥应助大萝贝采纳,获得10
2秒前
2秒前
Gaahung完成签到,获得积分10
2秒前
湘玉给你溜肥肠完成签到,获得积分10
3秒前
3秒前
4秒前
聚光灯下发布了新的文献求助10
4秒前
5秒前
N型半导体发布了新的文献求助10
5秒前
chekd完成签到,获得积分20
5秒前
shuang0116应助舒畅采纳,获得10
5秒前
5秒前
6秒前
取个名儿吧完成签到,获得积分10
6秒前
万能图书馆应助present采纳,获得10
6秒前
6秒前
lbt完成签到,获得积分10
6秒前
6秒前
7秒前
慕青应助采蘑菇的小姑凉采纳,获得10
8秒前
唐瑚芦发布了新的文献求助30
8秒前
9秒前
大福发布了新的文献求助10
9秒前
10秒前
10秒前
汉堡包应助hail采纳,获得10
10秒前
秭归子归完成签到,获得积分10
10秒前
10秒前
Jeannine完成签到,获得积分10
11秒前
九三完成签到,获得积分20
11秒前
12秒前
所所应助感动水杯采纳,获得10
12秒前
愤怒的小鸽子完成签到,获得积分10
12秒前
ThunderWave完成签到,获得积分10
12秒前
高分求助中
The Mother of All Tableaux Order, Equivalence, and Geometry in the Large-scale Structure of Optimality Theory 1370
生物降解型栓塞微球市场(按产品类型、应用和最终用户)- 2030 年全球预测 1000
Implantable Technologies 500
Ecological and Human Health Impacts of Contaminated Food and Environments 400
Phylogenetic study of the order Polydesmida (Myriapoda: Diplopoda) 360
International Relations at LSE: A History of 75 Years 308
Conceptual Metaphor Theory in World Language Education 300
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 物理 生物化学 计算机科学 内科学 纳米技术 复合材料 化学工程 遗传学 催化作用 物理化学 基因 冶金 量子力学 免疫学
热门帖子
关注 科研通微信公众号,转发送积分 3926171
求助须知:如何正确求助?哪些是违规求助? 3470878
关于积分的说明 10965418
捐赠科研通 3200460
什么是DOI,文献DOI怎么找? 1768360
邀请新用户注册赠送积分活动 857490
科研通“疑难数据库(出版商)”最低求助积分说明 796036