2019
DOI: 10.48550/arxiv.1903.05155
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps

Abstract: The evolution of drone technology in the past nine years since the first commercial drone was introduced at CES 2010 has caused many individuals and businesses to adopt drones for various purposes. We are currently living in an era in which drones are being used for pizza delivery, the shipment of goods, and filming, and they are likely to provide an alternative for transportation in the near future. However, drones also pose a significant challenge in terms of security and privacy within society (for both ind… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 70 publications
0
16
0
Order By: Relevance
“…In this case, the spoofing source sends false signals to sensors, which can lead to the destabilization of the malicious drone control system. For example, as indicated in [91] and in references reported there, gyroscopes and accelerometers are sensitive to ultrasound at their resonant frequency and this vulnerability can be attacked. In [92], the authors spoofed the gyroscope of a drone, causing it to land.…”
Section: Spoofingmentioning
confidence: 99%
See 3 more Smart Citations
“…In this case, the spoofing source sends false signals to sensors, which can lead to the destabilization of the malicious drone control system. For example, as indicated in [91] and in references reported there, gyroscopes and accelerometers are sensitive to ultrasound at their resonant frequency and this vulnerability can be attacked. In [92], the authors spoofed the gyroscope of a drone, causing it to land.…”
Section: Spoofingmentioning
confidence: 99%
“…However, these attacks require powerful speakers and are limited in range due to the degradation of the sound wave with distance. Furthermore, a reference for a possible solution to an acoustic attack is always present in [91]. Other sensors that can be spoofed are those of the optical flow type.…”
Section: Spoofingmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, drones are becoming tools for cyberattack and terrorism. For instance, Wi-Fi sniffing UAVs can eavesdrop on smartphone users and steal sensitive data without being detected [5], [6].…”
Section: Introductionmentioning
confidence: 99%