4.5 Article

Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations

Journal

MATHEMATICAL BIOSCIENCES AND ENGINEERING
Volume 19, Issue 3, Pages 2641-2670

Publisher

AMER INST MATHEMATICAL SCIENCES-AIMS
DOI: 10.3934/mbe.2022121

Keywords

UAV; Drone; UAV security; UAV privacy; UAV applications; UAV countermeasures; UAV threats; UAV architecture; blockchain

Ask authors/readers for more resources

This paper provides a brief analysis of security and privacy concerns regarding unmanned aerial vehicles/drones and presents countermeasures and recommendations to address these concerns. It also offers readers up-to-date information on existing regulations, classification, architecture, and communication methods for drones. Additionally, the paper discusses application areas, vulnerabilities, existing countermeasures against different attacks, and related limitations. It concludes with a discussion on open research areas and recommendations for improving the security and privacy of unmanned aerial vehicles.
Over time, the use of UAVs (unmanned aerial vehicles)/drones has increased across several civil and military application domains. Such domains include real-time monitoring, remote sensing, wireless coverage in disaster areas, search and rescue, product delivery, surveillance, security, agriculture, civil infrastructure inspection, and the like. This rapid growth is opening doors to numerous opportunities and conveniences in everyday life. On the other hand, security and privacy concerns for unmanned aerial vehicles/drones are progressively increasing. With limited standardization and regulation of unmanned aerial vehicles/drones, security and privacy concerns are growing. This paper presents a brief analysis of unmanned aerial vehicle's/drones security and privacy-related concerns. The paper also presents countermeasures and recommendations to address such concerns. While laying out a brief survey of unmanned aerial vehicles/drones, the paper also provides readers with up-to-date information on existing regulations, classification, architecture, and communication methods. It also discusses application areas, vulnerabilities, existing countermeasures against different attacks, and related limitations. In the end, the paper concludes with a discussion on open research areas and recommendations on how the security and privacy of unmanned aerial vehicles can be improved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available