2022
DOI: 10.3934/mbe.2022121
|View full text |Cite
|
Sign up to set email alerts
|

Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations

Abstract: <abstract> <p>Over time, the use of UAVs (unmanned aerial vehicles)/drones has increased across several civil and military application domains. Such domains include real-time monitoring, remote sensing, wireless coverage in disaster areas, search and rescue, product delivery, surveillance, security, agriculture, civil infrastructure inspection, and the like. This rapid growth is opening doors to numerous opportunities and conveniences in everyday life. On the other hand, security and privacy con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(10 citation statements)
references
References 54 publications
0
10
0
Order By: Relevance
“…Concerns about security and privacy in relation to unmanned aerial vehicles were briefly analysed by Siddiqi M.A. et al [57]. As a means of addressing these issues, the report also provided solutions and recommendations.…”
Section: Related Workmentioning
confidence: 99%
“…Concerns about security and privacy in relation to unmanned aerial vehicles were briefly analysed by Siddiqi M.A. et al [57]. As a means of addressing these issues, the report also provided solutions and recommendations.…”
Section: Related Workmentioning
confidence: 99%
“…In earlier sections, we provided a thorough review of a variety of threat modelling methods such as STRIDE, PASTA, and LINDDUN, which are used to model security and privacy in AS [95], [137], [138]. However, these techniques only emphasize some specified security but not data privacy threats.…”
Section: Limitation Of the Existing Data Privacy Threat Modelling Tec...mentioning
confidence: 99%
“…The defensive ECM helps to shield against offensive ECM. Some popular defensive ECM are as follows: The RF link between the UAV and the remote controller is vulnerable to jamming [ 36 ] and hacking [ 37 ]. The jamming can be avoided by spread-spectrum techniques and high frequency-hopping rates.…”
Section: Challenges and Threats From Malicious Uavsmentioning
confidence: 99%
“…The RF link between the UAV and the remote controller is vulnerable to jamming [ 36 ] and hacking [ 37 ]. The jamming can be avoided by spread-spectrum techniques and high frequency-hopping rates.…”
Section: Challenges and Threats From Malicious Uavsmentioning
confidence: 99%