Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles

Arslan, Shafique Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles. IEEE Access, 09. pp. 46927-46948. ISSN 2169-3536

[img] Text
Survey-IEEE Access.pdf - Published Version

Download (2MB)

Abstract

With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility and advantages of UAVs, they may lead to major security breaches in the context of hardware, software, and communication channel, due their ease of use and availability. UAVs are vulnerable to various types of attacks such as spoofing, false data injection, jamming, fuzzing, availability, confidentiality, and integrity attacks. To overcome these security threats, researchers have been investigating strong security protocols to keep UAVs safe from attackers. Nevertheless, there are many flaws in the developed protocols which can be exploited by hackers. Therefore, it is becoming crucial to study and analyze the existing security protocols used in UAVs to discover and address their vulnerabilities and weaknesses. The purpose of this study is to explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions.

Item Type: Article
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Engineering and Applied Sciences (FEAS) > Department of Electrical Engineering Islamabad
Depositing User: Mr. Arslan Shafique
Date Deposited: 27 Apr 2021 17:41
Last Modified: 27 Apr 2021 17:41
URI: http://research.riphah.edu.pk/id/eprint/1374

Actions (login required)

View Item View Item