A Survey of Physical Layer-Aided UAV Security

Raju Dhakal, Laxima Niure Kandel
{"title":"A Survey of Physical Layer-Aided UAV Security","authors":"Raju Dhakal, Laxima Niure Kandel","doi":"10.1109/ICNS58246.2023.10124288","DOIUrl":null,"url":null,"abstract":"Low-cost Unmanned Aerial Vehicles (UAVs) and their swarms are increasingly being used and have become an integral part of various industries and aspects of daily life. They are being used in industries such as agriculture, delivery services, construction and to achieve critical tasks such as disaster relief, search and rescue operations, etc. As Unmanned Aerial Vehicles (UAVs) become increasingly pervasive and essential, they are becoming both a target for attack and the very weapon on which such attacks are carried out. For example, UAVs can be hacked and used to perform cyber attacks on targets such as power grids, and communication and military networks. To protect UAVs against cyber-attacks, different techniques both traditional (cryptography-based) and non-traditional (sound-based, video-based, physical layer (PHY) based) have been proposed in the literature. Traditional crypto-based authentication solutions usually involve high computational overhead and require the challenging task of managing secret keys. Recently introduced PHY-based solutions that exploit the inherent randomness of the wireless channels and non-ideal hardware characteristics have witnessed an increased interest from the research community resulting in many publications. Nevertheless, we noticed a lack of an up-to-date survey that keeps track of all the recent research developments in this new area of security research. Thus, the goal of this paper is to bridge the gap in the literature by providing a timely and comprehensive discussion on different techniques and methods proposed in the literature, summarizing their working principles, and highlighting the various strengths and weaknesses. We also discuss different challenges that physical layer security faces and potential future opportunities.","PeriodicalId":103699,"journal":{"name":"2023 Integrated Communication, Navigation and Surveillance Conference (ICNS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Integrated Communication, Navigation and Surveillance Conference (ICNS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNS58246.2023.10124288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Low-cost Unmanned Aerial Vehicles (UAVs) and their swarms are increasingly being used and have become an integral part of various industries and aspects of daily life. They are being used in industries such as agriculture, delivery services, construction and to achieve critical tasks such as disaster relief, search and rescue operations, etc. As Unmanned Aerial Vehicles (UAVs) become increasingly pervasive and essential, they are becoming both a target for attack and the very weapon on which such attacks are carried out. For example, UAVs can be hacked and used to perform cyber attacks on targets such as power grids, and communication and military networks. To protect UAVs against cyber-attacks, different techniques both traditional (cryptography-based) and non-traditional (sound-based, video-based, physical layer (PHY) based) have been proposed in the literature. Traditional crypto-based authentication solutions usually involve high computational overhead and require the challenging task of managing secret keys. Recently introduced PHY-based solutions that exploit the inherent randomness of the wireless channels and non-ideal hardware characteristics have witnessed an increased interest from the research community resulting in many publications. Nevertheless, we noticed a lack of an up-to-date survey that keeps track of all the recent research developments in this new area of security research. Thus, the goal of this paper is to bridge the gap in the literature by providing a timely and comprehensive discussion on different techniques and methods proposed in the literature, summarizing their working principles, and highlighting the various strengths and weaknesses. We also discuss different challenges that physical layer security faces and potential future opportunities.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物理层辅助无人机安全研究综述
低成本的无人驾驶飞行器(uav)及其群被越来越多地使用,并已成为各个行业和日常生活中不可或缺的一部分。它们被用于农业、快递服务、建筑等行业,并用于完成救灾、搜索和救援行动等关键任务。随着无人驾驶飞行器(uav)变得越来越普遍和必不可少,它们既成为攻击的目标,也成为实施攻击的武器。例如,无人机可以被黑客攻击,并用于对电网、通信和军事网络等目标进行网络攻击。为了保护无人机免受网络攻击,文献中提出了传统(基于密码)和非传统(基于声音、基于视频、基于物理层(PHY))的不同技术。传统的基于加密的身份验证解决方案通常涉及高计算开销,并且需要管理密钥的挑战性任务。最近引入的基于物理的解决方案利用了无线信道固有的随机性和非理想的硬件特性,引起了研究界越来越大的兴趣,并发表了许多出版物。然而,我们注意到,在这一新的安全研究领域,缺乏跟踪所有最新研究进展的最新调查。因此,本文的目标是通过对文献中提出的不同技术和方法进行及时和全面的讨论,总结其工作原理,并突出各种优点和缺点,从而弥补文献中的空白。我们还讨论了物理层安全面临的不同挑战和潜在的未来机遇。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Tracking Performance Analysis of Ground-Based Radar Networks for Urban Air Mobility Noise Measurements of Unmanned Aircraft Vehicles: Experiences, Challenges and Recommendations for Standards taken from Flight Trials BB-Planner: an urban traffic dataset generation tool Conceptual Analysis of Allocation Strategies for Air Traffic Control Concepts without Conventional Sector Boundaries Flight Testing Drone Contingencies during Runway Inspection in U-space Shared Airspace
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1