Abstract

Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a wide range of cyberattacks. This paper first surveys existing literature for different cyberattacks. Then, we classify these attacks based on their attack entry points, which can be radio channels, messages or on-board systems. There are six classes of UAV cyberattacks, namely channel jamming, message interception, message deletion, message injection, message spoofing and on-board system attack. In the existing literature, there is no survey focusing on UAV cyberattack countermeasures. To close this gap, we survey existing countermeasures for the six attack classes. A comprehensive review of countermeasures is important because countermeasure may not be exclusive to an attack. Knowing a wide range of existing countermeasures can prepare us against existing and new cyberattacks. We classify countermeasure into three classes, namely prevention, detection and mitigation. Prevention countermeasures stop a cyberattack from starting. When prevention countermeasures fail, detection countermeasures alert UAV operator of an attack. After detecting an attack, mitigation countermeasures limits the damage. Following the survey, we further discuss the open challenges in developing countermeasures and propose some potential future research works.

Highlights

  • An unmanned aerial vehicle (UAV) is an aircraft without any human pilot, crew or passenger on-board

  • While surveying for cyberattack countermeasures, this paper focuses on attacks which are launched on Unmanned aerial vehicle (UAV), but not using UAVs as attack agents on other UAV or nonUAV targets

  • We focus on cyberattacks but not physical attacks, which must use some forms of mechanical contact or physical tool to seize, trap or catch a targeted UAV

Read more

Summary

INTRODUCTION

An unmanned aerial vehicle (UAV) is an aircraft without any human pilot, crew or passenger on-board. In [17], the reference list includes a significant number of existing works which have not been developed in the context of UAVs. Compared to cyberattacks, we find it more useful to survey the countermeasures for these attacks. We first classify UAV cyberattacks, based on the type of their attack entry point, which can be either radio channel, message or on-board system Following this classification, there are six categories of attack, namely channel jamming, message interception, message deletion, message injection, message spoofing, and on-board system attack. III, we first present the basis of cyberattack classification and group the attacks into six classes

UAV SYSTEM AND OPERATION MODEL
COUNTERMEASURES
DETECTION Cyberattacks can be detected through the following two methods:
MITIGATION
RESEARCH CHALLENGES AND FUTURE WORKS
Findings
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call