Muhammad Asghar Khan;Neeraj Kumar;Saeed Hamood Alsamhi;Gordana Barb;Justyna Zywiołek;Insaf Ullah;Fazal Noor;Jawad Ali Shah;Abdullah M. Almuhaideb
{"title":"Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review","authors":"Muhammad Asghar Khan;Neeraj Kumar;Saeed Hamood Alsamhi;Gordana Barb;Justyna Zywiołek;Insaf Ullah;Fazal Noor;Jawad Ali Shah;Abdullah M. Almuhaideb","doi":"10.1109/TNSM.2024.3487265","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) in beyond 5G (B5G) are crucial for revolutionizing various industries, including surveillance, agriculture, and logistics, by enabling high-speed data transfer, ultra-low latency communication, and ultra-reliable connectivity. However, integrating UAVs into B5G networks poses various security and privacy concerns. These risks encompass the possibility of unauthorized access, breaches of data, and cyber-physical attacks which jeopardize the integrity, confidentiality, and availability of UAV operations. Moreover, UAVs in B5G networks are also at high risk from the application of machine learning (ML)-based attacks by exploiting vulnerabilities in ML models, leading to adversarial manipulation, data poisoning and model evasion techniques, which can compromise the integrity of UAV operations, lead to navigation errors, and expose sensitive data collected by UAVs. Considering the aforementioned security and privacy concerns, this review article presents emerging security and privacy solutions for UAVs in B5G networks. Firstly, We introduce the essential background of integrating UAVs into B5G networks and discuss the advantages and security challenges which the emerging integrated network architecture have. Then, we proceed to analyze and examine the security and privacy landscape by including threats and requirements of UAVs in B5G networks. Based on these threats and requirements, solutions from physical layer security (PLS), blockchain (BC), federated learning (FL) and post-quantum cryptography (PQC) are discussed and explored in details. Moreover, potential future research directions are discussed in details as open research issues.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"892-912"},"PeriodicalIF":4.7000,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10737101","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network and Service Management","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10737101/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Unmanned aerial vehicles (UAVs) in beyond 5G (B5G) are crucial for revolutionizing various industries, including surveillance, agriculture, and logistics, by enabling high-speed data transfer, ultra-low latency communication, and ultra-reliable connectivity. However, integrating UAVs into B5G networks poses various security and privacy concerns. These risks encompass the possibility of unauthorized access, breaches of data, and cyber-physical attacks which jeopardize the integrity, confidentiality, and availability of UAV operations. Moreover, UAVs in B5G networks are also at high risk from the application of machine learning (ML)-based attacks by exploiting vulnerabilities in ML models, leading to adversarial manipulation, data poisoning and model evasion techniques, which can compromise the integrity of UAV operations, lead to navigation errors, and expose sensitive data collected by UAVs. Considering the aforementioned security and privacy concerns, this review article presents emerging security and privacy solutions for UAVs in B5G networks. Firstly, We introduce the essential background of integrating UAVs into B5G networks and discuss the advantages and security challenges which the emerging integrated network architecture have. Then, we proceed to analyze and examine the security and privacy landscape by including threats and requirements of UAVs in B5G networks. Based on these threats and requirements, solutions from physical layer security (PLS), blockchain (BC), federated learning (FL) and post-quantum cryptography (PQC) are discussed and explored in details. Moreover, potential future research directions are discussed in details as open research issues.
期刊介绍:
IEEE Transactions on Network and Service Management will publish (online only) peerreviewed archival quality papers that advance the state-of-the-art and practical applications of network and service management. Theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. These transactions will focus on the key technical issues related to: Management Models, Architectures and Frameworks; Service Provisioning, Reliability and Quality Assurance; Management Functions; Enabling Technologies; Information and Communication Models; Policies; Applications and Case Studies; Emerging Technologies and Standards.