The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1109/maes.2018.160145
|View full text |Cite
|
Sign up to set email alerts
|

A survey on securing UAS cyber physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…There are several survey studies on the security of UAV-aided communication systems [30], [39], [40], [41], [42], [43], [44], [45], [46]. In particular, the survey paper [39] has considered various cyber vulnerabilities on drones along with their mitigation techniques and defensive strategies.…”
Section: Prior Survey Papersmentioning
confidence: 99%
See 1 more Smart Citation
“…There are several survey studies on the security of UAV-aided communication systems [30], [39], [40], [41], [42], [43], [44], [45], [46]. In particular, the survey paper [39] has considered various cyber vulnerabilities on drones along with their mitigation techniques and defensive strategies.…”
Section: Prior Survey Papersmentioning
confidence: 99%
“…There are several survey studies on the security of UAV-aided communication systems [30], [39], [40], [41], [42], [43], [44], [45], [46]. In particular, the survey paper [39] has considered various cyber vulnerabilities on drones along with their mitigation techniques and defensive strategies. It has covered works on classifying the application scenarios based on channel encryption, providing secure and reliable firmware via monitoring, and overhauling corrupted components of the communication system hardware.…”
Section: Prior Survey Papersmentioning
confidence: 99%
“…However, the IoD architecture incorporated with the security and privacy mechanism was not explored. In [25], the authors reviewed the architecture and state of the art vulnerabilities of drones against cyber-attacks and the mitigation, countermeasures, and defence strategy. Additionally, the areas that require an urgent emphasis on securing drones were recommended by the authors.…”
Section: Introductionmentioning
confidence: 99%
“…Among the reasons identified, it can be mentioned the disparity in research and application of techniques: whereas well-known methods (including models and techniques) have been effectively applied to achieve safety, security is, in many respects, a discipline still in evolution, e.g. in unmanned aerial systems [14], IoT [10], and vehicular clouds [12]. This assessment is true in particular for the aeronautics domain where stringent certification processes exist and are based upon broad consensus and operable standards.…”
Section: Introductionmentioning
confidence: 99%