Abstract

The use of unmanned aerial vehicles or drones are a valuable technique in coping with issues related to life in the general public’s daily routines. Given the growing number of drones in low-altitude airspace, linking drones to form the Internet of drones (IoD) is a highly desirable trend to improve the safety as well as the quality of flight. However, there remain security, privacy, and communication issues related to IoD. In this paper, we discuss the key requirements of security, privacy, and communication and we present a taxonomy of IoD based on the most relevant considerations. Furthermore, we present the most commonly used commercial case studies and address the latest advancements and solutions proposed for the IoD environments. Lastly, we discuss the challenges and future research directions of IoD.

Highlights

  • The Internet of drones (IoD) can be described as an infrastructure designed to provide control and access over the Internet between drones and users

  • The key advantage of a unmanned aerial vehicles (UAVs) with fixed wings compared to a UAV with rotary wings is that a less complex repair and maintenance process is required by simple structure, thereby giving the consumer more operating time at a reduced cost

  • Researchers have created several security and privacy approaches to secure the Internet of drones (IoD) network to protect the location of unmanned aerial vehicles (UAVs) and the privacy and security problems that come with using the IoD network

Read more

Summary

Introduction

The Internet of drones (IoD) can be described as an infrastructure designed to provide control and access over the Internet between drones and users. To facilitate personal and business drones for independent flight, a cer-a certain of authentication key exchange protocols are required between the entwo tain typetype of authentication and and key exchange protocols are required between the two entities in the. Both entities create symmetricsecurity securitykey keyfor forfuture futuredata data tities in the sky.sky. This includes data required by the user’s cellular equipment that control signals and sigGPS equipment. This includes data required by the user’s cellular equipment that control signals This is an example of an interception of information giving enemies the ability nals and GPS signals. Discuss the IoD open challenges and prospective study directions (Section 7)

Related Works
Communication Requirements
Real-Time and Remote
Drone Identification and Regulation
Positioning of High-Precision
Security Requirements
Confidentiality
Non-Repudiation
Taxonomy of IoD
Architecture
Communication Protocols
Middlewares
Service-Based
Cloud-Based
Data Fusion and Sharing
Distributed
Centralized
Security
Authentication
Privacy
Intrusion Detection
Availability
Smart Agriculture
Mining
Construction
Emergency and Delivery Services
Films and TV
Commercial Case Studies
Matternet
DroneSmartX
H3 Dynamics
Recent Advancements
Method
Privacy and Security-Related Challenges
Global Resource Management-Related Challenges
Sensor Communication-Related Challenges
Coordination and Tasks Scheduling-Related Challenges
Drones Distribution and Deployment-Related Challenges
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call