2021
DOI: 10.1109/access.2021.3066778
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles

Abstract: With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility and advantages of UAVs, they may lead to major security breaches in the context of hardware, software, and communication channel, due their ease of use and availability. UAVs are vulnerable to various types of attacks such as spoofing, false data injection, jamming, fuzzing, availability, co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 67 publications
(36 citation statements)
references
References 114 publications
(140 reference statements)
0
23
0
Order By: Relevance
“…The benefits and drawbacks of security countermeasures against possible attacks in critical UAV-based applications (e.g., military and disaster scenarios) were highlighted in [18], and the role of Blockchain, ML, and watermarking was emphasized. An exhaustive literature review on the existing security protocols for UAVs together with the vulnerabilities of these protocols was provided in [19]. In this respect, several crucial topics were investigated, such as secure UAV-based communications, intrusion detection systems, the security of routing protocols, attacks on control systems, the detection of malicious UAVs, etc.…”
Section: Previous Review Papersmentioning
confidence: 99%
“…The benefits and drawbacks of security countermeasures against possible attacks in critical UAV-based applications (e.g., military and disaster scenarios) were highlighted in [18], and the role of Blockchain, ML, and watermarking was emphasized. An exhaustive literature review on the existing security protocols for UAVs together with the vulnerabilities of these protocols was provided in [19]. In this respect, several crucial topics were investigated, such as secure UAV-based communications, intrusion detection systems, the security of routing protocols, attacks on control systems, the detection of malicious UAVs, etc.…”
Section: Previous Review Papersmentioning
confidence: 99%
“…UAVs uses various communication protocols to accomplish the triumphant flight of a drone. Dif-FIGURE 2: Various techniques to secure UAV communication [9] [8] ages data security, transparency, and trust [9]. It keeps various copies of the same data on each node present in the network and its consensus protocols ensure data integrity.…”
Section: Introductionmentioning
confidence: 99%
“…With the sudden outbreak of new coronavirus pneumonia in 2020, UAVs actively responded to the call and played a huge role [ 3 ], and the development and planning of the UAV industry also has ushered in new opportunities and challenges [ 4 ]. According to [ 5 ] statistics, it is estimated that by 2025, the global UAV market will reach 42.8 billion U.S. dollars, and it is estimated that by 2030, the global UAV market will reach 150 billion U.S. dollars.…”
Section: Introductionmentioning
confidence: 99%