A Survey of Physical Layer-Aided UAV Security

Raju Dhakal, Laxima Niure Kandel
{"title":"A Survey of Physical Layer-Aided UAV Security","authors":"Raju Dhakal, Laxima Niure Kandel","doi":"10.1109/ICNS58246.2023.10124288","DOIUrl":null,"url":null,"abstract":"Low-cost Unmanned Aerial Vehicles (UAVs) and their swarms are increasingly being used and have become an integral part of various industries and aspects of daily life. They are being used in industries such as agriculture, delivery services, construction and to achieve critical tasks such as disaster relief, search and rescue operations, etc. As Unmanned Aerial Vehicles (UAVs) become increasingly pervasive and essential, they are becoming both a target for attack and the very weapon on which such attacks are carried out. For example, UAVs can be hacked and used to perform cyber attacks on targets such as power grids, and communication and military networks. To protect UAVs against cyber-attacks, different techniques both traditional (cryptography-based) and non-traditional (sound-based, video-based, physical layer (PHY) based) have been proposed in the literature. Traditional crypto-based authentication solutions usually involve high computational overhead and require the challenging task of managing secret keys. Recently introduced PHY-based solutions that exploit the inherent randomness of the wireless channels and non-ideal hardware characteristics have witnessed an increased interest from the research community resulting in many publications. Nevertheless, we noticed a lack of an up-to-date survey that keeps track of all the recent research developments in this new area of security research. Thus, the goal of this paper is to bridge the gap in the literature by providing a timely and comprehensive discussion on different techniques and methods proposed in the literature, summarizing their working principles, and highlighting the various strengths and weaknesses. We also discuss different challenges that physical layer security faces and potential future opportunities.","PeriodicalId":103699,"journal":{"name":"2023 Integrated Communication, Navigation and Surveillance Conference (ICNS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Integrated Communication, Navigation and Surveillance Conference (ICNS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNS58246.2023.10124288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Low-cost Unmanned Aerial Vehicles (UAVs) and their swarms are increasingly being used and have become an integral part of various industries and aspects of daily life. They are being used in industries such as agriculture, delivery services, construction and to achieve critical tasks such as disaster relief, search and rescue operations, etc. As Unmanned Aerial Vehicles (UAVs) become increasingly pervasive and essential, they are becoming both a target for attack and the very weapon on which such attacks are carried out. For example, UAVs can be hacked and used to perform cyber attacks on targets such as power grids, and communication and military networks. To protect UAVs against cyber-attacks, different techniques both traditional (cryptography-based) and non-traditional (sound-based, video-based, physical layer (PHY) based) have been proposed in the literature. Traditional crypto-based authentication solutions usually involve high computational overhead and require the challenging task of managing secret keys. Recently introduced PHY-based solutions that exploit the inherent randomness of the wireless channels and non-ideal hardware characteristics have witnessed an increased interest from the research community resulting in many publications. Nevertheless, we noticed a lack of an up-to-date survey that keeps track of all the recent research developments in this new area of security research. Thus, the goal of this paper is to bridge the gap in the literature by providing a timely and comprehensive discussion on different techniques and methods proposed in the literature, summarizing their working principles, and highlighting the various strengths and weaknesses. We also discuss different challenges that physical layer security faces and potential future opportunities.
物理层辅助无人机安全研究综述
低成本的无人驾驶飞行器(uav)及其群被越来越多地使用,并已成为各个行业和日常生活中不可或缺的一部分。它们被用于农业、快递服务、建筑等行业,并用于完成救灾、搜索和救援行动等关键任务。随着无人驾驶飞行器(uav)变得越来越普遍和必不可少,它们既成为攻击的目标,也成为实施攻击的武器。例如,无人机可以被黑客攻击,并用于对电网、通信和军事网络等目标进行网络攻击。为了保护无人机免受网络攻击,文献中提出了传统(基于密码)和非传统(基于声音、基于视频、基于物理层(PHY))的不同技术。传统的基于加密的身份验证解决方案通常涉及高计算开销,并且需要管理密钥的挑战性任务。最近引入的基于物理的解决方案利用了无线信道固有的随机性和非理想的硬件特性,引起了研究界越来越大的兴趣,并发表了许多出版物。然而,我们注意到,在这一新的安全研究领域,缺乏跟踪所有最新研究进展的最新调查。因此,本文的目标是通过对文献中提出的不同技术和方法进行及时和全面的讨论,总结其工作原理,并突出各种优点和缺点,从而弥补文献中的空白。我们还讨论了物理层安全面临的不同挑战和潜在的未来机遇。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信