2022
DOI: 10.1016/j.adhoc.2022.102805
|View full text |Cite
|
Sign up to set email alerts
|

Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(11 citation statements)
references
References 67 publications
0
11
0
Order By: Relevance
“…Specialized coatings applied to the surface of the drone play a crucial role in absorbing or deflecting projectiles, mitigating their impact and preventing penetration. Finally, the integration of active defense systems, including anti-missile mechanisms and laser-based defense systems, can effectively intercept and neutralize incoming missiles [113].…”
Section: A Countermeasures For Physical Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Specialized coatings applied to the surface of the drone play a crucial role in absorbing or deflecting projectiles, mitigating their impact and preventing penetration. Finally, the integration of active defense systems, including anti-missile mechanisms and laser-based defense systems, can effectively intercept and neutralize incoming missiles [113].…”
Section: A Countermeasures For Physical Attacksmentioning
confidence: 99%
“…This ensures the confidentiality and the authenticity of the exchanged data during the communication between UAVs and the GCS. Power control algorithms present an effective approach for creating a network topology in a UAV that ensures Quality of Service (QoS) and it can be also used to prevent eavesdropping attacks [113]. Additionally, continuous identity verification checks can identify the unique profile of an operator during a flight mission.…”
Section: ) Protection Form Network Attacksmentioning
confidence: 99%
“…There is an overhead in the performance of charging systems, which consequently leads to several challenges in terms of performance degradation, battery degradation and power exhaustion. As a result, the need for efficient charging systems has become a critical challenge [129].…”
Section: Lack Of Dynamic Power Load Balancingmentioning
confidence: 99%
“…It is also compounded by the fact that many UAV developers do not have special knowledge related to the security problems in UAVs. Therefore, a practical analysis related to attack and defense security patterns for UAV-cloud architecture is urgently needed in order to respond to the data security risks posed by UAVs [9]. These attack patterns are utilized by attackers to exploit system vulnerabilities, whereas the defense patterns are employed to prevent or minimize the impacts of these attacks [10].…”
Section: Introductionmentioning
confidence: 99%