Abstract
Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue missions, reconnaissance, traffic monitoring, and logistics. Typically, UAVs are operated from a controller or a ground control station (GCS) with the help of different communication protocols such as MAVLink, UranusLink, UAVCAN. These communication protocols are used to exchange messages. The messages contain considerable information about the UAV and certain control commands sent from GCS to UAV or UAV to GCS. Though these protocols provide better communication along with secure aspects, however, mostly there is no subtle mechanism for securing these messages and are prone to many security attacks such as man-in-the-middle (MITM) attack, denial-of-services (DoS) attack, packet data injection attack, and eavesdropping. This can result in serious consequences, for instance, crash land of a military or civilian UAV, steal important data of a military operation, false injection of reports in a reconnaissance or search and rescue operation, and many more. So, there is a need for a secure communication protocol which can ensure the required security standard sets for communication of UAVs. This survey presents the applications, general architecture, attacks on UAVs, and an insight into the security issues of UAV’s communication protocols and proposes a new secure communication protocol for the stated issues of UAVs.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.