Journal ArticleDOI
Communication Security of Unmanned Aerial Vehicles
TLDR
This article reports the low-cost implementation of GPS spoofing attack and WiFi attack on UAVs, and suggests solutions to them.Abstract:
Communication security is critically important for the success of Unmanned Aerial Vehicles (UAVs). With the increasing use of UAVs in military and civilian applications, they often carry sensitive information that adversaries might try to get hold of. While UAVs consist of various modules to enable them to function properly, potential security vulnerabilities may also exist in those modules. For example, by launching a GPS spoofing attack or WiFi attack, adversaries can capture the targeted UAV and access the sought after information. In fact, it has become easy to launch such attacks. In this article, we report our low-cost implementation of these attacks and suggest solutions to them.read more
Citations
More filters
Journal ArticleDOI
Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges
Azade Fotouhi,Haoran Qiang,Ming Ding,Mahbub Hassan,Lorenzo Galati Giordano,Adrian Garcia-Rodriguez,Jinhong Yuan +6 more
TL;DR: In this paper, the authors provide a comprehensive survey of all of these developments promoting smooth integration of UAVs into cellular networks, including the types of consumer UAV currently available off-the-shelf, the interference issues and potential solutions addressed by standardization bodies for serving aerial users with the existing terrestrial BSs, challenges and opportunities for assisting cellular communications with UAV-based flying relays and BSs.
Journal ArticleDOI
Securing UAV Communications via Joint Trajectory and Power Control
TL;DR: In this paper, the authors considered both the downlink and uplink UAV communications with a ground node, namely, UAV-to-ground (U2G) and groundto-UAV (G2U) communications, respectively, subject to a potential eavesdropper on the ground.
Posted Content
Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges
Azade Fotouhi,Haoran Qiang,Ming Ding,Mahbub Hassan,Lorenzo Galati Giordano,Adrian Garcia-Rodriguez,Jinhong Yuan +6 more
TL;DR: A comprehensive survey of the types of consumer UAVs currently available off-the-shelf, the interference issues and potential solutions addressed by standardization bodies for serving aerial users with the existing terrestrial BSs, and the cyber-physical security of UAV-assisted cellular communications are surveyed.
Journal ArticleDOI
Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems
TL;DR: This work conceive an energy-efficient computation offloading technique for UAV-MEC systems, with an emphasis on physical-layer security, and formulate a number of energy-efficiency problems for secure UAVs, which are then transformed to convex problems and found for both active and passive eavesdroppers.
Journal ArticleDOI
Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling
TL;DR: This paper investigates a novel unmanned aerial vehicle (UAV)-enabled secure communication system where one UAV moves around to communicate with multiple users on the ground using orthogonal time-division multiple access while the other UAV in the area jams the eavesdroppers to protect communications of the desired users.
References
More filters
Journal ArticleDOI
Unmanned Aircraft Capture and Control Via GPS Spoofing
TL;DR: The necessary conditions for UAV capture via GPS spoofing are established, and the spoofer's range of possible post‐capture control over the UAV is explored, to explore UAV vulnerability to deceptive GPS signals.
Journal ArticleDOI
A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks
TL;DR: The proposed algorithm considers that UAVs with queue occupancy above a threshold are experiencing congestion resulting in communication delay resulting in congestion, and adjusts their center coordinates and also, if needed, the radius of their trajectory to alleviate the congestion.
Proceedings Article
The vulnerability of UAVs to cyber attacks - An approach to the risk assessment
Kim Hartmann,Christoph Steup +1 more
TL;DR: A first approach to an UAV specific risk assessment is provided and take into account the factors exposure, communication systems, storage media, sensor systems and fault handling mechanisms to assess the risk of some currently used UAVs: The “MQ-9 Reaper” and the “AR Drone”.
Journal ArticleDOI
Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing
TL;DR: A concept of practical anti-spoofing system implementation is proposed and a GPS spoofing mitigation method which uses spatial filtering (null-steering) for excision of undesired signals is presented.
Journal ArticleDOI
Security in the integration of low-power Wireless Sensor Networks with the Internet
TL;DR: This goal is to analyze how security may be addressed as an enabling factor of the integration of low-power WSN with the Internet, in the context of its contribution to the IoT.