Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications
نویسندگان
چکیده
Unmanned aerial vehicles (UAVs) have been widely applied in various fields, including but not limited to military, industry, and agriculture. But UAVs also confront severe security threats, which slows down their wide application. Current research mainly focuses on the of a single UAV system, while paying little attention UAV-related communications, especially physical network layers. Thus, it becomes necessary summarize potential threats corresponding countermeasures. To this end, we study mainstream attacks communications order propose requirements. Then present comprehensive review existing countermeasures for enhancing communication both We conclude with open issues future prospects security.
منابع مشابه
Unmanned Aerial Vehicle Images
The main aim of this chapter is to give to the reader a complete overview about the general context in which the thesis is positioned. In a second part, the problems faced in the following chapters are introduced. Finally, we describe the proposed solutions and the thesis structure and organization. Chapter
متن کاملdesigning unmanned aerial vehicle based on neuro-fuzzy systems
در این پایان نامه، کنترل نرو-فازی در پرنده هدایت پذیر از دور (پهپاد) استفاده شده است ابتدا در روش پیشنهادی اول، کنترل کننده نرو-فازی توسط مجموعه اطلاعات یک کنترل کننده pid به صورت off-line آموزش دیده است و در روش دوم یک کنترل کننده نرو-فازی on-line مبتنی بر شناسایی سیستم توسط شبکه عصبی rbf پیشنهاد شده است. سپس کاربرد این کنترل کننده در پهپاد بررسی شده است و مقایسه ای ما بین کنترل کننده های معمو...
RFID Security and Privacy: Threats and Countermeasures
The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This research presents the RFID Threat Countermeasure Framework (RTCF) to better understand the wide ...
متن کاملAutonomous Landing Unmanned Aerial Vehicle
This thesis presents the system architecture for landing an Unmanned Aerial Vehicle (UAV) from a hovering position without the intervention of a human operator. Through the use of feedback information from a height sensor, the UAV is commanded to perform controlled descent with the desired landing parameters by implementation of the flight control laws. The plant model of the system was determi...
متن کاملCloud Computing Security threats and Countermeasures
Introduction Within the last decade, there have been several advances in technology that have created more opportunities for people to communicate around the world. Technology trends have reached not only the enterprise environments, but also in ordinary people's homes. Cloud computing implementation has revolutionized the tech community, and spread throughout the business world. It is no longe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE communications standards magazine
سال: 2021
ISSN: ['2471-2825', '2471-2833']
DOI: https://doi.org/10.1109/mcomstd.0001.2000078