2022
DOI: 10.3390/app13010277
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions

Abstract: This paper demonstrates a broad exploration of existing authentication and secure communication of unmanned aerial vehicles (UAVs) in a ‘6G network’. We begin with an overview of existing surveys that deal with UAV authentication in 6G and beyond communications, standardization, applications and security. In order to highlight the impact of blockchain and UAV authentication in ‘UAV networks’ in future communication systems, we categorize the groups in this review into two comprehensive groups. The first group,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 117 publications
0
6
0
Order By: Relevance
“…Despite its advantages over traditional networks, such as centralized monitoring and granular management, SDN is less secure due to its increased vulnerability to attacks and the introduction of new security concerns. 28 SDN can be compromised in a variety of ways, such as by spoofing, 29 tampering, repudiation, information leakage, and DoS. [30][31][32] Attacks using DoS could also be launched against the SDN.…”
Section: Problem Statementmentioning
confidence: 99%
“…Despite its advantages over traditional networks, such as centralized monitoring and granular management, SDN is less secure due to its increased vulnerability to attacks and the introduction of new security concerns. 28 SDN can be compromised in a variety of ways, such as by spoofing, 29 tampering, repudiation, information leakage, and DoS. [30][31][32] Attacks using DoS could also be launched against the SDN.…”
Section: Problem Statementmentioning
confidence: 99%
“…According to [40], 6G-based intelligent cybersecurity will lead to new techniques; some of these are given below. Finally, several studies have focused on detection performance in mobile environments [2], which is important for enhancing cybersecurity, encrypting medical images against various threats when transmitting data via wireless broadcasting [41], and using deep-learning algorithms in segmentation tasks with various kinds of networks [42].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sriram et al 25 proposed a DL‐based IoT botnet attack detection framework based on network traffic flows. The proposed solution captures the network flows, transforms them into connection records, and uses a DL‐based solution to detect anomalies from compromised IoT devices.…”
Section: Related Workmentioning
confidence: 99%