2022
DOI: 10.1145/3485272
|View full text |Cite
|
Sign up to set email alerts
|

A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis

Abstract: Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for commercial applications, embracing many domains ranging from human safety to the medical field, agriculture and environment, multimedia production, and even commercial delivery. This rise in popularity, however, is causing an increasing interest from criminals, making UAVs the target of new attacks. To fully characterize the current UAV cybersecurity landscape, we perform a complete literature review, digging into drone sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(8 citation statements)
references
References 77 publications
0
8
0
Order By: Relevance
“…Another effective approach is to disable unauthorized modifications that could compromise the authenticity of critical UAV components. These measures involve the careful monitoring and control of suppliers and manufacturers to ensure the integrity of the components used in the UAV production [127]. By establishing strict verification procedures and maintaining a transparent supply chain, the organizations can significantly reduce the risk of attacks in the supply chain.…”
Section: B Countermeasures For Cyber Attacksmentioning
confidence: 99%
“…Another effective approach is to disable unauthorized modifications that could compromise the authenticity of critical UAV components. These measures involve the careful monitoring and control of suppliers and manufacturers to ensure the integrity of the components used in the UAV production [127]. By establishing strict verification procedures and maintaining a transparent supply chain, the organizations can significantly reduce the risk of attacks in the supply chain.…”
Section: B Countermeasures For Cyber Attacksmentioning
confidence: 99%
“…Rugo et al [47] collected ∼125 papers and presented a systematic literature review on drone security. Among these, ∼4 technical papers discussed GPS Spoofing attacks in UAVs.…”
Section: State-of-the-artmentioning
confidence: 99%
“…In fact, the cellularconnected UAV swarm is formatted as a Flying Ad-hoc Network (FANET) system that uses an Ad-hoc On-demand Distance Vector (AODV) routing protocol for communication and control. Because the AODV protocol has less protection and authentication on the node, it makes the swarm FANET vulnerable to a spoofing attack [90]. Although the proposed deep learning and transfer learning approaches demonstrate effectiveness in detecting GPS spoofing, they are designed for one single cellular-connected UAV and do not consider the case of a cellular-connected UAV swarm.…”
Section: Problem Descriptionmentioning
confidence: 99%