scispace - formally typeset
Journal ArticleDOI

Communication Security of Unmanned Aerial Vehicles

TLDR
This article reports the low-cost implementation of GPS spoofing attack and WiFi attack on UAVs, and suggests solutions to them.
Abstract
Communication security is critically important for the success of Unmanned Aerial Vehicles (UAVs). With the increasing use of UAVs in military and civilian applications, they often carry sensitive information that adversaries might try to get hold of. While UAVs consist of various modules to enable them to function properly, potential security vulnerabilities may also exist in those modules. For example, by launching a GPS spoofing attack or WiFi attack, adversaries can capture the targeted UAV and access the sought after information. In fact, it has become easy to launch such attacks. In this article, we report our low-cost implementation of these attacks and suggest solutions to them.

read more

Citations
More filters
Journal ArticleDOI

Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges

TL;DR: In this paper, the authors provide a comprehensive survey of all of these developments promoting smooth integration of UAVs into cellular networks, including the types of consumer UAV currently available off-the-shelf, the interference issues and potential solutions addressed by standardization bodies for serving aerial users with the existing terrestrial BSs, challenges and opportunities for assisting cellular communications with UAV-based flying relays and BSs.
Journal ArticleDOI

Securing UAV Communications via Joint Trajectory and Power Control

TL;DR: In this paper, the authors considered both the downlink and uplink UAV communications with a ground node, namely, UAV-to-ground (U2G) and groundto-UAV (G2U) communications, respectively, subject to a potential eavesdropper on the ground.
Posted Content

Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges

TL;DR: A comprehensive survey of the types of consumer UAVs currently available off-the-shelf, the interference issues and potential solutions addressed by standardization bodies for serving aerial users with the existing terrestrial BSs, and the cyber-physical security of UAV-assisted cellular communications are surveyed.
Journal ArticleDOI

Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems

TL;DR: This work conceive an energy-efficient computation offloading technique for UAV-MEC systems, with an emphasis on physical-layer security, and formulate a number of energy-efficiency problems for secure UAVs, which are then transformed to convex problems and found for both active and passive eavesdroppers.
Journal ArticleDOI

Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling

TL;DR: This paper investigates a novel unmanned aerial vehicle (UAV)-enabled secure communication system where one UAV moves around to communicate with multiple users on the ground using orthogonal time-division multiple access while the other UAV in the area jams the eavesdroppers to protect communications of the desired users.
References
More filters
Journal ArticleDOI

Unmanned Aircraft Capture and Control Via GPS Spoofing

TL;DR: The necessary conditions for UAV capture via GPS spoofing are established, and the spoofer's range of possible post‐capture control over the UAV is explored, to explore UAV vulnerability to deceptive GPS signals.
Journal ArticleDOI

A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks

TL;DR: The proposed algorithm considers that UAVs with queue occupancy above a threshold are experiencing congestion resulting in communication delay resulting in congestion, and adjusts their center coordinates and also, if needed, the radius of their trajectory to alleviate the congestion.
Proceedings Article

The vulnerability of UAVs to cyber attacks - An approach to the risk assessment

TL;DR: A first approach to an UAV specific risk assessment is provided and take into account the factors exposure, communication systems, storage media, sensor systems and fault handling mechanisms to assess the risk of some currently used UAVs: The “MQ-9 Reaper” and the “AR Drone”.
Journal ArticleDOI

Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing

TL;DR: A concept of practical anti-spoofing system implementation is proposed and a GPS spoofing mitigation method which uses spatial filtering (null-steering) for excision of undesired signals is presented.
Journal ArticleDOI

Security in the integration of low-power Wireless Sensor Networks with the Internet

TL;DR: This goal is to analyze how security may be addressed as an enabling factor of the integration of low-power WSN with the Internet, in the context of its contribution to the IoT.
Related Papers (5)