2022
DOI: 10.3390/drones6100284
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Review of UAV Detection, Security, and Communication Advancements to Prevent Threats

Abstract: It has been observed that unmanned aerial vehicles (UAVs), also known as drones, have been used in a very different way over time. The advancements in key UAV areas include detection (including radio frequency and radar), classification (including micro, mini, close range, short range, medium range, medium-range endurance, low-altitude deep penetration, low-altitude long endurance, and medium-altitude long endurance), tracking (including lateral tracking, vertical tracking, moving aerial pan with moving target… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(42 citation statements)
references
References 77 publications
0
16
0
Order By: Relevance
“…However, during long-time flight, the accumulated error of inertial navigation cannot be ignored. Besides, because of huge advancements in the technology, UAVs has a high probability of experiencing attacks such as GPS spoofing [49]. Celestial and inertial integrated navigation system applied to UAVs is a topic of interest, which is a good alternative to GPS [50].…”
Section: B Potential Applicationsmentioning
confidence: 99%
“…However, during long-time flight, the accumulated error of inertial navigation cannot be ignored. Besides, because of huge advancements in the technology, UAVs has a high probability of experiencing attacks such as GPS spoofing [49]. Celestial and inertial integrated navigation system applied to UAVs is a topic of interest, which is a good alternative to GPS [50].…”
Section: B Potential Applicationsmentioning
confidence: 99%
“…The maintenance and security of drone transportation present a variety of surveillance issues due to the continued advancement of the drones’ underlying technology [ 1 , 20 ]. To conduct drone surveillance, it is necessary to communicate with, identify, authenticate, elicit, and disarm drones considered dangerous from a drone pool in a DTN.…”
Section: Overview Of Invasive Drone Encroachment Techniquesmentioning
confidence: 99%
“…A disaster situation in [ 30 ] incorporates 2D UAV placement in the presence of critical nodes, whereas the efficiency in UAV networks highly depends on LoS/NLoS probabilities and elevation-demanding 3D optimization. A secondary critical challenge in certain emergency networks is to secure this communication link as discussed in [ 31 , 32 ].…”
Section: Introductionmentioning
confidence: 99%