Arslan, Shafique Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles. IEEE Access, 09. pp. 46927-46948. ISSN 2169-3536
Text
Survey-IEEE Access.pdf - Published Version Download (2MB) |
Abstract
With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility and advantages of UAVs, they may lead to major security breaches in the context of hardware, software, and communication channel, due their ease of use and availability. UAVs are vulnerable to various types of attacks such as spoofing, false data injection, jamming, fuzzing, availability, confidentiality, and integrity attacks. To overcome these security threats, researchers have been investigating strong security protocols to keep UAVs safe from attackers. Nevertheless, there are many flaws in the developed protocols which can be exploited by hackers. Therefore, it is becoming crucial to study and analyze the existing security protocols used in UAVs to discover and address their vulnerabilities and weaknesses. The purpose of this study is to explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions.
Item Type: | Article |
---|---|
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Divisions: | Faculty of Engineering and Applied Sciences (FEAS) > Department of Electrical Engineering Islamabad |
Depositing User: | Mr. Arslan Shafique |
Date Deposited: | 27 Apr 2021 17:41 |
Last Modified: | 27 Apr 2021 17:41 |
URI: | http://research.riphah.edu.pk/id/eprint/1374 |
Actions (login required)
View Item |