A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Communications Surveys and Tutorials Pub Date : 2024-12-11 DOI:10.1109/COMST.2024.3515051
Ozlem Ceviz;Sevil Sen;Pinar Sadioglu
{"title":"A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions","authors":"Ozlem Ceviz;Sevil Sen;Pinar Sadioglu","doi":"10.1109/COMST.2024.3515051","DOIUrl":null,"url":null,"abstract":"Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and Flying Ad Hoc Networks (FANETs). Our approach incorporates attack surface analysis and aligns it with the identification of potential threats. Additionally, we discuss countermeasures proposed in the existing literature in two categories: preventive and detection strategies. Our primary focus centers on the security challenges inherent to FANETs, acknowledging their susceptibility to insider threats due to their decentralized and dynamic nature. To provide a deeper understanding of these challenges, we simulate and analyze four distinct routing attacks on FANETs, using realistic parameters to evaluate their impact. Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations. Finally, we rigorously examine open issues, and propose research directions to guide future endeavors in this field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3227-3265"},"PeriodicalIF":34.4000,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Communications Surveys and Tutorials","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10793113/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and Flying Ad Hoc Networks (FANETs). Our approach incorporates attack surface analysis and aligns it with the identification of potential threats. Additionally, we discuss countermeasures proposed in the existing literature in two categories: preventive and detection strategies. Our primary focus centers on the security challenges inherent to FANETs, acknowledging their susceptibility to insider threats due to their decentralized and dynamic nature. To provide a deeper understanding of these challenges, we simulate and analyze four distinct routing attacks on FANETs, using realistic parameters to evaluate their impact. Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations. Finally, we rigorously examine open issues, and propose research directions to guide future endeavors in this field.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无人机和卫星网络安全调查:问题、威胁、攻击分析和解决方案
由于技术的快速发展,无人驾驶飞行器(uav)能够在不需要人工干预的情况下相互合作完成许多任务。近年来,广泛用于军事任务的无人机已经开始在民用领域部署,主要用于商业目的。随着无人机数量的增长和应用范围的扩大,无人机越来越受欢迎;另一方面,它们也是各种威胁的目标,这些威胁可以利用无人机系统的各种漏洞来造成破坏性影响。因此,确保无人机和提供无人机之间通信的网络的安全性至关重要。本调查旨在为无人机和飞行自组织网络(fanet)领域的安全提供一个全面的视角。我们的方法结合了攻击面分析,并将其与潜在威胁的识别相结合。此外,我们还讨论了现有文献中提出的两类对策:预防和检测策略。我们的主要焦点集中在fanet固有的安全挑战上,承认由于其分散和动态的性质,它们容易受到内部威胁。为了更深入地了解这些挑战,我们模拟和分析了对fanet的四种不同的路由攻击,使用现实参数来评估其影响。因此,本研究通过整合基于广泛模拟的攻击分析而超越了标准审查。最后,我们严格审查开放的问题,并提出研究方向,以指导该领域的未来努力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Communications Surveys and Tutorials
IEEE Communications Surveys and Tutorials COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
80.20
自引率
2.50%
发文量
84
审稿时长
6 months
期刊介绍: IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast. IEEE Communications Surveys and Tutorials focuses on integrating and adding understanding to the existing literature on communications, putting results in context. Whether searching for in-depth information about a familiar area or an introduction into a new area, IEEE Communications Surveys & Tutorials aims to be the premier source of peer-reviewed, comprehensive tutorials and surveys, and pointers to further sources. IEEE Communications Surveys & Tutorials publishes only articles exclusively written for IEEE Communications Surveys & Tutorials and go through a rigorous review process before their publication in the quarterly issues. A tutorial article in the IEEE Communications Surveys & Tutorials should be designed to help the reader to become familiar with and learn something specific about a chosen topic. In contrast, the term survey, as applied here, is defined to mean a survey of the literature. A survey article in IEEE Communications Surveys & Tutorials should provide a comprehensive review of developments in a selected area, covering its development from its inception to its current state and beyond, and illustrating its development through liberal citations from the literature. Both tutorials and surveys should be tutorial in nature and should be written in a style comprehensible to readers outside the specialty of the article.
期刊最新文献
Toward Edge General Intelligence With Agentic AI and Agentification: Concepts, Technologies, and Future Directions A Tutorial on MIMO-OFDM ISAC: From Far-Field to Near-Field Generative AI-Enabled Semantic Communication: State-of-the-Art, Applications, and the Way Ahead Optical Wireless Communication in Atmosphere and Underwater: Statistical Models, Improvement Techniques, and Recent Applications Physical-Layer Aspects of Quantum Communications: A Survey
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1