2022
DOI: 10.1109/access.2022.3215975
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey

Abstract: Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance, civilian applications, precision farming, as well as providing extensive wireless network access in remote areas. They have also been used in other areas such as transmission line and oil rig monitoring, disaster recovery, etc. With their increasing payload ability and flight duration, using UAVs is a preferred choice for a multitude of upcoming w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(15 citation statements)
references
References 209 publications
(379 reference statements)
0
15
0
Order By: Relevance
“…The Media Access Control (MAC) protocol in the network interface layer is associated with a unique identifier to the network interface card [170], which is licked up with the devices connected to the network. This kind of linkage affects the privacy of these connected devises.…”
Section: Mac Address Tracking and Profilingmentioning
confidence: 99%
“…The Media Access Control (MAC) protocol in the network interface layer is associated with a unique identifier to the network interface card [170], which is licked up with the devices connected to the network. This kind of linkage affects the privacy of these connected devises.…”
Section: Mac Address Tracking and Profilingmentioning
confidence: 99%
“…Therefore, a practical analysis related to attack and defense security patterns for UAV-cloud architecture is urgently needed in order to respond to the data security risks posed by UAVs [9]. These attack patterns are utilized by attackers to exploit system vulnerabilities, whereas the defense patterns are employed to prevent or minimize the impacts of these attacks [10]. Our research will undertake an analysis of data security concerns in UAV-cloud architecture and provide protection methods to counteract these threats.…”
Section: Introductionmentioning
confidence: 99%
“…Aiming at complementing the research efforts in analyzing performance of the UAV-based links, this work addresses the secrecy analysis as one of the main performance aspects. To the best of our knowledge, only few works have investigated the secrecy analysis in UAV-based links based on practical channel modelling [19]. For example, in [20], a UAV is utilized as a jammer to enhance the secrecy capacity between two ground users.…”
Section: Introductionmentioning
confidence: 99%