UAVs Path Deviation Attacks: Survey and Research Challenges

02/12/2021
by   Francesco Betti Sorbelli, et al.
0

Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of civilian applications. Such flying vehicles can accomplish tasks under the pilot's eyesight within the range of a remote controller, or autonomously according to a certain pre-loaded path configuration. Different path deviation attacks can be performed by malicious users against UAVs. We classify such attacks and the relative defenses based on the UAV's flight mode, i.e., (i) First Person View (FPV), (ii) civilian Global Navigation Satellite System based (GNSS), and (iii) GNSS "plus" auxiliary technologies (GNSS+), and on the multiplicity, i.e., (i) Single UAV, and (ii) Multiple UAVs. We found that very little has been done to secure the FPV flight mode against path deviation. In GNSS mode, spoofing is the most worrisome attack. The best defense against spoofing seems to be redundancy, such as adding vision chips to single UAV or using multiple arranged UAVs. No specific attacks and defenses have been found in literature for GNSS+ or for UAVs moving in group without a pre-ordered arrangement. These aspects require further investigation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/16/2020

Real-time Framework for Trust Monitoring in aNetwork of Unmanned Aerial Vehicles

Unmanned aerial vehicles (UAVs) have been increasingly utilized in vario...
research
01/16/2022

Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain

Unmanned Aerial Vehicles (UAVs), also known as drones, have exploded in ...
research
07/01/2020

UAV-Assisted Attack Prevention, Detection, and Recovery of 5G Networks

Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting ...
research
11/03/2020

Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles

Unmanned aerial vehicles (UAVs) can be deployed to monitor very large ar...
research
08/09/2020

Consumer UAV Cybersecurity Vulnerability Assessment Using Fuzzing Tests

Unmanned Aerial Vehicles (UAVs) are remote-controlled vehicles capable o...
research
08/21/2018

Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms

Nowadays, companies such as Amazon, Alibaba, and even pizza chains are p...
research
07/12/2018

Decentralized Multi-UAV Routing in the Presence of Disturbances

We introduce a decentralized and online path planning technique for a ne...

Please sign up or login with your details

Forgot password? Click here to reset