对无人机网络的网络攻击:全面调查

Ashish Mahalle, Sarika Khandelwal, Abhishek Dhore, Vishwajit Barbudhe, Vivek Waghmare
{"title":"对无人机网络的网络攻击:全面调查","authors":"Ashish Mahalle, Sarika Khandelwal, Abhishek Dhore, Vishwajit Barbudhe, Vivek Waghmare","doi":"10.18488/76.v11i1.3636","DOIUrl":null,"url":null,"abstract":"New technologies are constantly emerging in the modern world and changing the way we live our everyday lives. Although technology has many useful applications, there are various ways it can potentially be abused. Unmanned aerial vehicles (UAVs) are one of the most rapidly developing technologies, with potentially far-reaching consequences. A new focus on UAV applications has fueled rising concerns with regards to security, specifically around networked UAVs. UAVs may be managed from a remote place with relative ease. Essential operations involving the use of military tactics and weapons involve employing them in a variety of situations, such as reconnaissance, surveillance, and offensive, defensive, and civilian capacities. Message insertion, message manipulation, jamming, and GPS spoofing are the most commonly used cyber-attacks against these systems. Ensuring the security of electronics and communications in systems that employ several UAVs is of utmost importance to guarantee their safety and dependability in military and civilian activities. Many technological methods have been developed over the past decade for securing UAVs from cyber-attacks. This paper attempts to summaries the problems that can arise with unmanned aerial vehicles (UAVs), cyber-attacks, and the countermeasures used to protect against them. This is the first paper that details all of the past cyber-attacks on unmanned aerial vehicles (UAVs).","PeriodicalId":493889,"journal":{"name":"Review of computer engineering research","volume":"227 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber attacks on UAV networks: A comprehensive survey\",\"authors\":\"Ashish Mahalle, Sarika Khandelwal, Abhishek Dhore, Vishwajit Barbudhe, Vivek Waghmare\",\"doi\":\"10.18488/76.v11i1.3636\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"New technologies are constantly emerging in the modern world and changing the way we live our everyday lives. Although technology has many useful applications, there are various ways it can potentially be abused. Unmanned aerial vehicles (UAVs) are one of the most rapidly developing technologies, with potentially far-reaching consequences. A new focus on UAV applications has fueled rising concerns with regards to security, specifically around networked UAVs. UAVs may be managed from a remote place with relative ease. Essential operations involving the use of military tactics and weapons involve employing them in a variety of situations, such as reconnaissance, surveillance, and offensive, defensive, and civilian capacities. Message insertion, message manipulation, jamming, and GPS spoofing are the most commonly used cyber-attacks against these systems. Ensuring the security of electronics and communications in systems that employ several UAVs is of utmost importance to guarantee their safety and dependability in military and civilian activities. Many technological methods have been developed over the past decade for securing UAVs from cyber-attacks. This paper attempts to summaries the problems that can arise with unmanned aerial vehicles (UAVs), cyber-attacks, and the countermeasures used to protect against them. This is the first paper that details all of the past cyber-attacks on unmanned aerial vehicles (UAVs).\",\"PeriodicalId\":493889,\"journal\":{\"name\":\"Review of computer engineering research\",\"volume\":\"227 6\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Review of computer engineering research\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.18488/76.v11i1.3636\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Review of computer engineering research","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.18488/76.v11i1.3636","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

现代社会中新技术不断涌现,改变着我们的日常生活方式。虽然技术有许多有用的应用,但也有各种可能被滥用的方式。无人驾驶飞行器 (UAV) 是发展最迅速的技术之一,可能会产生深远的影响。对无人飞行器应用的新关注加剧了人们对其安全性的担忧,特别是对联网无人飞行器的担忧。无人驾驶飞行器可以在遥远的地方相对轻松地进行管理。涉及使用军事战术和武器的基本行动包括在各种情况下使用它们,如侦察、监视、进攻、防御和民用。信息插入、信息篡改、干扰和 GPS 欺骗是针对这些系统最常用的网络攻击手段。确保采用多架无人机的系统的电子和通信安全,对于保证其在军事和民用活动中的安全性和可靠性至关重要。在过去十年中,已经开发出许多技术方法来确保无人机免受网络攻击。本文试图总结无人驾驶飞行器(UAV)可能出现的问题、网络攻击以及用于防范这些攻击的对策。这是第一篇详细介绍过去所有针对无人驾驶飞行器(UAV)的网络攻击的论文。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cyber attacks on UAV networks: A comprehensive survey
New technologies are constantly emerging in the modern world and changing the way we live our everyday lives. Although technology has many useful applications, there are various ways it can potentially be abused. Unmanned aerial vehicles (UAVs) are one of the most rapidly developing technologies, with potentially far-reaching consequences. A new focus on UAV applications has fueled rising concerns with regards to security, specifically around networked UAVs. UAVs may be managed from a remote place with relative ease. Essential operations involving the use of military tactics and weapons involve employing them in a variety of situations, such as reconnaissance, surveillance, and offensive, defensive, and civilian capacities. Message insertion, message manipulation, jamming, and GPS spoofing are the most commonly used cyber-attacks against these systems. Ensuring the security of electronics and communications in systems that employ several UAVs is of utmost importance to guarantee their safety and dependability in military and civilian activities. Many technological methods have been developed over the past decade for securing UAVs from cyber-attacks. This paper attempts to summaries the problems that can arise with unmanned aerial vehicles (UAVs), cyber-attacks, and the countermeasures used to protect against them. This is the first paper that details all of the past cyber-attacks on unmanned aerial vehicles (UAVs).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
1.90
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信