2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops) 2020
DOI: 10.1109/seconworkshops50264.2020.9149780
|View full text |Cite
|
Sign up to set email alerts
|

UAVs Path Deviation Attacks: Survey and Research Challenges

Abstract: Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of civilian applications. Such flying vehicles can accomplish tasks under the pilot's eyesight within the range of a remote controller, or autonomously according to a certain pre-loaded path configuration. Different path deviation attacks can be performed by malicious users against UAVs. We classify such attacks and the relative defenses based on the UAV's flight mode, i.e., (i) First Person View (FPV), (ii) civilian Global Navigation Satell… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…However, they are significantly different from this paper. (1) Scope: some papers focus on the general security and safety problems in specific RV systems, e.g., drones [103]- [111], autonomous vehicles [45], [112]- [121]. Some papers just target one type of sensor spoofing, e.g., GPS [7]- [11], camera [12]- [15] or microphone [16], [88]).…”
Section: Systematization Scopementioning
confidence: 99%
“…However, they are significantly different from this paper. (1) Scope: some papers focus on the general security and safety problems in specific RV systems, e.g., drones [103]- [111], autonomous vehicles [45], [112]- [121]. Some papers just target one type of sensor spoofing, e.g., GPS [7]- [11], camera [12]- [15] or microphone [16], [88]).…”
Section: Systematization Scopementioning
confidence: 99%
“…Furthermore, the authors of [21] review the use of Game Theory-based approaches for UAVs. UAV path deviation attacks have been surveyed in [22]. The authors of [14] provide a review of the characteristics and requirements of UAV networks for upcoming drone applications.…”
Section: A Related Surveys and Our Contributionsmentioning
confidence: 99%
“…The existing methods of detecting and preventing spoofing attacks on navigation systems for software and hardware solutions were considered, and their advantages and disadvantages were highlighted [4,5,43,44].…”
mentioning
confidence: 99%