Over time, the use of UAVs (unmanned aerial vehicles)/drones has increased across several civil and military application domains. Such domains include real-time monitoring, remote sensing, wireless coverage in disaster areas, search and rescue, product delivery, surveillance, security, agriculture, civil infrastructure inspection, and the like. This rapid growth is opening doors to numerous opportunities and conveniences in everyday life. On the other hand, security and privacy concerns for unmanned aerial vehicles/drones are progressively increasing. With limited standardization and regulation of unmanned aerial vehicles/drones, security and privacy concerns are growing. This paper presents a brief analysis of unmanned aerial vehicle's/drones security and privacy-related concerns. The paper also presents countermeasures and recommendations to address such concerns. While laying out a brief survey of unmanned aerial vehicles/drones, the paper also provides readers with up-to-date information on existing regulations, classification, architecture, and communication methods. It also discusses application areas, vulnerabilities, existing countermeasures against different attacks, and related limitations. In the end, the paper concludes with a discussion on open research areas and recommendations on how the security and privacy of unmanned aerial vehicles can be improved.
Citation: Murtaza Ahmed Siddiqi, Celestine Iwendi, Kniezova Jaroslava, Noble Anumbe. Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations[J]. Mathematical Biosciences and Engineering, 2022, 19(3): 2641-2670. doi: 10.3934/mbe.2022121
Over time, the use of UAVs (unmanned aerial vehicles)/drones has increased across several civil and military application domains. Such domains include real-time monitoring, remote sensing, wireless coverage in disaster areas, search and rescue, product delivery, surveillance, security, agriculture, civil infrastructure inspection, and the like. This rapid growth is opening doors to numerous opportunities and conveniences in everyday life. On the other hand, security and privacy concerns for unmanned aerial vehicles/drones are progressively increasing. With limited standardization and regulation of unmanned aerial vehicles/drones, security and privacy concerns are growing. This paper presents a brief analysis of unmanned aerial vehicle's/drones security and privacy-related concerns. The paper also presents countermeasures and recommendations to address such concerns. While laying out a brief survey of unmanned aerial vehicles/drones, the paper also provides readers with up-to-date information on existing regulations, classification, architecture, and communication methods. It also discusses application areas, vulnerabilities, existing countermeasures against different attacks, and related limitations. In the end, the paper concludes with a discussion on open research areas and recommendations on how the security and privacy of unmanned aerial vehicles can be improved.
[1] | M. K. Bombe, Unmanned Aerial Vehicle (UAV) Market Worth $21.8 billion by 2027- Pre and Post COVID-19 Market Analysis Report by Meticulous Research, 11 June 2020. Available from: https://www.meticulousresearch.com/download-sample-report/cp_id=5086. |
[2] | R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, T. R. Gadekallu, G. Srivastava, SP2F: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles, Comput. Netw., 14 (2021), 107819. https://doi.org/10.1016/j.comnet.2021.107819 doi: 10.1016/j.comnet.2021.107819 |
[3] | S. Hayat, E. Yanmaz, R. Muzaffar, Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications View point, IEEE Commun. Surv. Tut., 18 (2016), 2624–2661. https://doi.org/10.1109/COMST.2016.2560343 doi: 10.1109/COMST.2016.2560343 |
[4] | K. Chan, U. Nirmal, W. Cheaw, Progress on drone technology and their applications: a comprehensive review, AIP Conf. Proc. 2030, 020308 (2018). https://doi.org/10.1063/1.5066949 doi: 10.1063/1.5066949 |
[5] | S. C. Hartmann K, The vulnerability of UAVs to cyber, in Cyber Conflict (CyCon) 2013 5th International Conference, Tallinn, Estonia, 2013. |
[6] | S. O'Donnell, Consortiq. Available from: https://consortiq.com/short-history-unmanned-aerial-vehicles-uavs/. |
[7] | D. Ekramul, First successful Air-raid in history, 22 August 2019. Available from: https://www.daily-bangladesh.com/english/First-successful-Air-raid-in-history/27424. |
[8] | T. R. Berg, Air Space Mag, 10 January 2020. Available from: https://www.airspacemag.com/daily-planet/first-map-compiled-aerial-photographs-180973929/. |
[9] | Q. A. Abdullah, Introduction to the Unmanned Aircraft Systems, Available from: https://www.e-education.psu.edu/geog892/node/643. |
[10] | M. Bowden, How the Predator Drone Changed the Character of War, Smithsonian Magazine, November 2013. Available from: https://www.smithsonianmag.com/history/how-the-predator-drone-changed-the-character-of-war-3794671/. |
[11] | A. Miah, Drones: The Brilliant, the Bad and the Beautiful (Societynow), London: Emerald Publishing Limited, 2020. https://doi.org/10.1108/9781838679859 |
[12] | S. Wright, Ethical and safety implications of the growing use of civilian drone, UK Parliament Website (Science and Technology Committee), 2019. |
[13] | C. Lowbridge, Are drones dangerous or harmless fun?, BBC News, 5 October 2015. Available from: https://www.bbc.com/news/uk-england-34269585. |
[14] | Federal Aviation Authorities, Recreational Flyers & Modeler Community-Based Organizations, 18 February 2020. Available from: https://www.faa.gov/uas/recreational_fliers/. |
[15] | U. Coach, Master List of Drone Laws (Organized by State & Country), Available from: https://uavcoach.com/drone-laws/. |
[16] | M. Aljehani, M. Inoue, A. Watanbe, T. Yokemura, F. Ogyu, H. Iida, UAV communication system integrated into network traversal with mobility, SN Appl. Sci., 2 (2020), 1057. https://doi.org/10.1007/s42452-020-2749-5 doi: 10.1007/s42452-020-2749-5 |
[17] | A. Professionals, Drones and remotely piloted aircraft (UAS/RPAS) - frequencies and radio licenses, Traficom, 17 July 2021. Available from: https://www.traficom.fi/en/transport/aviation/drones-and-remotely-piloted-aircraft-uasrpas-frequencies-and-radio-licences. |
[18] | C. Carnahan, ISO/TC 20/SC 16 Unmanned aircraft systems, 2014. Available from: https://www.iso.org/committee/5336224.html. |
[19] | Pilot, What's the Difference Between Drones, UAV, and UAS? Definitions and Terms, Pilot Institute, 22 March 2020. Available from: https://pilotinstitute.com/drones-vs-uav-vs-uas/. |
[20] | A. Fotouhi, H. Qiang, M. Ding, M. Hassan, L. G. Giordano, A. Garcia-Rodriguez, et al., Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges, IEEE Commun. Surv. Tut., 21 (2019), 3417–3442. https://doi.org/10.1109/COMST.2019.2906228 doi: 10.1109/COMST.2019.2906228 |
[21] | J. Irizarry, M. Gheisari, B. Walker, Usability Assessment of Drone Technology as Safety Inspection Tools, Electron. J. Inf. Technol. Constr., 17 (2012), 194–212. |
[22] | M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, M. Debbah, A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems, IEEE Commun. Surv. Tut., 21 (2019), 2334–2360. https://doi.org/10.1109/COMST.2019.2902862 doi: 10.1109/COMST.2019.2902862 |
[23] | K. Nagpal, Unmanned Aerial Vehicles (UAV) Market, Q Tech Synergy, 24 December 2016. Available from: https://defproac.com/?p=2041. |
[24] | E. Pastor, J. Lopez, P. Royo, A Hardware/Software Architecture for UAV Payload and Mission Control, 2006 IEEE/AIAA 25TH Digital Avionics Systems Conference, Portland, 2006, 1–8. https://doi.org/10.1109/DASC.2006.313738 |
[25] | J. VanZwol, Design Essentials: For UAVs and Drones, Batteries are Included, Machine Design, 4 April 2017. Available from: https://www.machinedesign.com/mechanical-motion-systems/article/21835356/design-essentials-for-uavs-and-drones-batteries-are-included. |
[26] | A. Sharma, P. Vanjani, N. Paliwal, C. M. Basnayaka, D. N. K. Jayakody, H.C. Wang, et al., Communication and networking technologies for UAVs: A survey, J. Netw. Comput. Appl., 168 (2020), 102739. https://doi.org/10.1016/j.jnca.2020.102739 doi: 10.1016/j.jnca.2020.102739 |
[27] | H. Ullah, N. G. Nair, A. Moore, C. Nugent, P. Muschamp, M. Cuevas, 5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases, IEEE Access, 7 (2019), 37251–37268. https://doi.org/10.1109/ACCESS.2019.2905347 doi: 10.1109/ACCESS.2019.2905347 |
[28] | C. Luo, W. Miao, H. Ullah, S. McClean, G. Parr, G. Min, Unmanned aerial vehicles for disaster management, Geological Disaster Monitoring Based on Sensor Networks, Singapore, Springer, 2018, 93-107. https://doi.org/10.1007/978-981-13-0992-2_7 |
[29] | N. Hosseini, H. Jamal, D. W. Matolak, J. Haque, T. Magesacher, UAV Command and Control, Navigation and Surveillance: A Review of Potential 5G and Satellite, IEEE Aerospace Conference March 2019, MT, USA, 2019. https://doi.org/10.1109/AERO.2019.8741719 |
[30] | IvyPanda, Unmanned Aerial Vehicles Essay, 13 January 2020. Available from: https://ivypanda.com/essays/unmanned-aerial-vehicles-essay/. (Accessed 20 December 2020). |
[31] | K. P. Valavanis, G. J. Vachtsevanos, UAV Applications: Introduction, in Handbook of Unmanned Aerial Vehicles, Dordrecht, Springer, 2015, pp. 2639–2641. https://doi.org/10.1007/978-90-481-9707-1_151 |
[32] | H. Shakhatreh, A. H. Sawalmeh, A. Al-Fuqaha, Z. Dou, E. Almaita, I. Khalil, et al., Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges, IEEE Access, 7 (2019), 48572–48634. https://doi.org/10.1109/ACCESS.2019.2909530 doi: 10.1109/ACCESS.2019.2909530 |
[33] | K. L. B. Cook, The Silent Force Multiplier: The History and Role of UAVs in Warfare, in 2007 IEEE Aerospace Conference, MT, USA, 2007. |
[34] | M. A. Siddiqi, M. Khoso, A. Aziz, Analysis on Security Methods of Wireless Sensor Network (WSN), in SJCMS 2018, Sukkur, Pakistan, 2018. |
[35] | A. Cavoukian, Privacy and Drones: Unmanned Aerial Vehicle, Ontario: Information and Privacy Commissioner, Ontario, Canada, 2012. |
[36] | M. A. Kafia, Y. Challal, D. Djenouri, M. Doudou, A. Bouabdallah, N. Badache, A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures, Procedia Comput. Sci., 19 (2013), 617–626. https://doi.org/10.1016/j.procs.2013.06.082 doi: 10.1016/j.procs.2013.06.082 |
[37] | K. Mansfield, T. Eveleigh, T. H. Holzer, S. Sarkani, Unmanned aerial vehicle smart device ground control station cyber security threat model, 2013 IEEE Int. Conf. Technol. Homel. Secur. (HST), Walthan, USA, 2013. https://doi.org/10.1109/THS.2013.6699093 |
[38] | K. W. Smith, Drone Technology: Benefits, Risks, and Legal Considerations, Seattle J. Environ. Law (SJEL), 5 (2015), 291–302. |
[39] | J. Eyerman, K. Hinkle, C. Letterman, D. Schanzer, W. Pitts, K. Ladd, et al., Unmanned Aircraft and the Human Element: Public Perceptions and First Responder Concerns, Institute of Homeland security and solutions, 2013. |
[40] | N. Syed, M. Berry, Journo-drones: a Flight over the Legal Landscape, American Bar Association, Chicago, Illinois, United States, 2014. |
[41] | M. F. B. A. Rahman, Smart CCTVS for Secure Cities: Potentials and Challenges, S. Rajaratnam School of International Studies (RSIS), Singapore, 2017. |
[42] | A. Kim, B. Wampler, J. Goppert, I. Hwang, H. Aldridge, Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles, Aerospace Research Central, (2012), 2438. https://doi.org/10.2514/6.2012-2438 doi: 10.2514/6.2012-2438 |
[43] | Y. Zeng, R. Zhang, T. J. Lim, Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges, IEEE Commun. Mag., 54 (2016), 36–42. https://doi.org/10.1109/MCOM.2016.7470933 doi: 10.1109/MCOM.2016.7470933 |
[44] | P. R. Soria, R. Bevec, B. C. Arrue, A. Ude, A. Ollero, Extracting Objects for Aerial Manipulation on UAVs Using Low Cost Stereo Sensors, Sensors, 16 (2016), 700. https://doi.org/10.3390/s16050700 doi: 10.3390/s16050700 |
[45] | M. Erdelj, E. Natalizio, Drones, Smartphones and Sensors to Face Natural Disasters, 4th ACM Workshop on Micro Aerial Vehicle Networks, Systems, and Applications, France, 2018, 75–86. https://doi.org/10.1145/3213526.3213541 |
[46] | Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, et al., Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors, in 24th USENIX Security Symposium, Washington, D.C, 2015. |
[47] | Y. Zhi, Z. Fu, X. Sun, J. Yu, Security and Privacy Issues of UAV: A Survey, Mobile Netw. Appl., 25 (2019), 95–101. https://doi.org/10.1007/s11036-018-1193-x doi: 10.1007/s11036-018-1193-x |
[48] | M. Strohmeier, M. Schäfer, V. Lenders, I. Martinovic, Realities and challenges of nextgen air traffic management: the case of ADS-B, IEEE Commun. Mag., 52 (2014), 111–118. https://doi.org/10.1109/MCOM.2014.6815901 doi: 10.1109/MCOM.2014.6815901 |
[49] | M. Hooper, Y. Tian, R. Zhou, B. Cao, A. P. Lauf, L. Watkins, et al., Securing commercial wifi-based UAVs from common security attacks, MILCOM 2016-2016 IEEE Military Communications Conference, 2016, 1213–1218. https://doi.org/10.1109/MILCOM.2016.7795496 doi: 10.1109/MILCOM.2016.7795496 |
[50] | E. Rivera, R. Baykov, G. Gu, A Study On Unmanned Vehicles and Cyber Security, in Rivera 2014 ASO, Texas, USA, 2014. |
[51] | I. N. Junejo, H. Foroosh, GPS coordinates estimation and camera calibration from solar shadows, Comput. Vis. Image Underst., 114 (2010), 991–1003. https://doi.org/10.1016/j.cviu.2010.05.003 doi: 10.1016/j.cviu.2010.05.003 |
[52] | K. Hartmann, K. Giles, UAV Exploitation: A New Domain for Cyber Power, 2016 8th Int. Conf. Cyber Conflict, Tallinn, Estonia, 2016,205–221. https://doi.org/10.1109/CYCON.2016.7529436 |
[53] | C. Currier, H. Moltke, Spies in the sky, The Intercept, New York, USA, 2016. |
[54] | E. Yadereli, C. Gemci, A. Z. Akta, A study on cyber-security of autonomous and unmanned vehicles, J. Def. Model. Simul., 12 (2015), 369–381. https://doi.org/10.1177/1548512915575803 doi: 10.1177/1548512915575803 |
[55] | Y. S. Lee, Y. J. Kang, S. G. Lee, H. Lee, Y. Ryu, An overview of unmanned aerial vehicle: Cyber security perspective, in IT Convergence Technology 2016, Korea, 2016. |
[56] | L. Wu and X. Cao, Geo-location estimation from two shadow trajectories, in Computer Vision and Pattern Recognition (CVPR), San Francisco. USA, 2010. |
[57] | C. G. Leela Krishna, R. R. Murphy, A Review on Cybersecurity Vulnerabilities for Unmanned Aerial Vehicles, 2017 IEEE Int. Symposium on Safety, Security and Rescue Robotics (SSRR), Shanghai, China, 2017,194–199. https://doi.org/10.1109/SSRR.2017.8088163 |
[58] | M. A. Siddiqi, W. Pak, Optimizing Filter-Based Feature Selection Method Flow for Intrusion Detection System, Electronics, 9 (2020), 2114. https://doi.org/10.3390/electronics9122114 doi: 10.3390/electronics9122114 |
[59] | M. Strohmeier, V. Lenders, I. Martinovic, Intrusion Detection for Airborne Communication Using PHY-Layer Information, Int. Conf. Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, Cham, 2015, 67–77. https://doi.org/10.1007/978-3-319-20550-2_4 |
[60] | S. G. Casals, P. Owezarski, G. Descargues, Generic And Autonomous System For Airborne Networks Cyber-Threat Detection, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), IEEE, 2013. https://doi.org/10.1109/DASC.2013.6712578 |
[61] | C. Rani, H. Modares, R. Sriram, D. Mikulski, F. L. Lewis, Security of unmanned aerial vehicle systems against cyber-physical attacks, J. Def. Model. Simul., 13 (2016), 331–342. https://doi.org/10.1177/1548512915617252 doi: 10.1177/1548512915617252 |
[62] | G. Zhang, Q. Wu, M. Cui, R. Zhang, Securing UAV Communications via Joint Trajectory and Power Control, IEEE Trans. Wireless Commun., 18 (2019), 1376–1389, . https://doi.org/10.1109/TWC.2019.2892461 doi: 10.1109/TWC.2019.2892461 |
[63] | Y. S. Lee, E. Kim, Y. S. Kim, D. C. Seol, Effective Message Authentication Method for Performing a Swarm Flight of Drones, Emergency, 3 (2015), 95–97. |
[64] | E. S. Pilli, R. Joshi, R. Niyogi, A Generic Framework for Network Forensics, International J. Comput. Appl., 1 (2010), 1–6. https://doi.org/10.5120/251-408 doi: 10.5120/251-408 |
[65] | N. L. Beebe, J. G. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digit. Investig., 2 (2005), 147–167. https://doi.org/10.1016/j.diin.2005.04.002 doi: 10.1016/j.diin.2005.04.002 |
[66] | U. Jain, M. Rogers, E. T. Matson, Drone forensic framework: Sensor and data identification and verification, 2017 IEEE Sensors Appl. Symp. (SAS), 2017, 1–6. https://doi.org/10.1109/SAS.2017.7894059 doi: 10.1109/SAS.2017.7894059 |
[67] | A. Roder, K. K. R. Choo, N. A. Le-Khac, Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, arXiv preprint arXiv: 1804.08649, 2018. |
[68] | M. A. Siddiqi, N. Ghani, Critical Analysis on Advanced Persistent Threats, Int. J. Comput. Appl., 141 (2016), 46–50. https://doi.org/10.5120/ijca2016909784 doi: 10.5120/ijca2016909784 |
[69] | G. Wild, J. Murray, G. Baxter, Exploring Civil Drone Accidents and Incidents to Help Prevent Potential Air Disasters, Aerospace, 3 (2016), 22. https://doi.org/10.3390/aerospace3030022 doi: 10.3390/aerospace3030022 |
[70] | M. Goodrich, Drone Catcher: "Robotic Falcon" can Capture, Retrieve Renegade Drones, Michigan Tech, 7 January 2016. Available from: https://www.mtu.edu/news/stories/2016/january/drone-catcher-robotic-falcon-can-capture-retrieve-renegade-drones.html. |
[71] | M. McNabb, Dedrone Acquires the Anti Drone Shoulder Rifle, Batelle's Drone Defender, Drone life, 9 October 2019. Available from: https://dronelife.com/2019/10/09/dedrone-acquires-the-anti-drone-shoulder-rifle-batelles-drone-defender/. |
[72] | E. Capello, M. Dentis, L. N. Mascarello, S. Primatesta, Regulation Analysis and New Concept for a Cloud-based UAV Supervision System in Urban Environment, 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS), IEEE, (2017), 90–95. https://doi.org/10.1109/RED-UAS.2017.8101649 |
[73] | R. Joglekar, 4 strategies for stopping 'rogue' drones from flying in illegal airspace, ABC news, 23 December 2018. Available from: https://abcnews.go.com/Technology/strategies-stopping-rogue-drones-flying-illegal-airspace/story?id=59973853. |
[74] | S. Friedberg, A Primer on Jamming, Spoofing, and Electronic Interruption of a Drone, Dedrone, 19 April 2018. Available from: https://blog.dedrone.com/en/primer-jamming-spoofing-and-electronic-interruption-of-a-drone. |
[75] | T. E. O. Cyber, How To Crack WPA/WPA2 Wi-Fi Passwords Using Aircrack-ng, Medium, 5 November 2019. Available from: https://medium.com/@TheEyeOfCyberBuckeyeSecurity/how-to-crack-wpa-wpa2-wi-fi-passwords-using-aircrack-ng-8cb7161abcf9. |
[76] | J. P. Yaacoub, H. Noura, O. Salman, A. Chehab, Security analysis of drones systems: Attacks, limitations, and recommendations, Internet Things, 11 (2020), 100218. https://doi.org/10.1016/j.iot.2020.100218 doi: 10.1016/j.iot.2020.100218 |
[77] | C. A. T. Bonilla, O. J. S. Parra, J. H. D. Forero, Common Security Attacks on Drones, Int. J. Appl. Eng. Res., 13 (2018), 4982–4988. |
[78] | J. Gaspar, R. Ferreira, P. Sebastião, N. Souto, Capture of UAVs Through GPS Spoofing Using Low-Cost SDR Platforms, Wireless Pers. Commun., 115 (2020), 2729–2754. https://doi.org/10.1007/s11277-020-07211-7 doi: 10.1007/s11277-020-07211-7 |
[79] | M. Ezuma, F. Erden, C. K. Anjinappa, O. Ozdemir, I. Guvenc, Micro-UAV Detection and Classification from RF Fingerprints Using Machine Learning Techniques, 2019 IEEE Aerospace Conf., IEEE, (2019), 1–13. https://doi.org/10.1109/AERO.2019.8741970 |
[80] | A. Digulescu, C. Despina-Stoian, D. Stanescu, F. Popescu, F. Enache, C. Ioana, et al., New Approach of UAV Movement Detection and Characterization Using Advanced Signal Processing Methods Based on UWB Sensing, Sensors, 20 (2020), 5904. https://doi.org/10.3390/s20205904 doi: 10.3390/s20205904 |
[81] | I. Bisio, C. Garibotto, F. Lavagetto, A. Sciarrone, S. Zappatore, Unauthorized Amateur UAV Detection Based on WiFi Statistical Fingerprint Analysis, IEEE Commun. Mag., 56 (2018), 106–111. https://doi.org/10.1109/MCOM.2018.1700340 doi: 10.1109/MCOM.2018.1700340 |
[82] | G. Choudhary, V. Sharma, T. Gupta, J. Kim, I. You, Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives, in MobiSec 2018: The 3rd International Symposium on Mobile Internet Security, Cebu, Philippines, 2018 |
[83] | H. N.Noura, O. Salman, A. Chehab and R. Couturier, DistLog: A distributed logging scheme for IoT forensics, Ad Hoc Netw., 98 (2020), 102061. https://doi.org/10.1016/j.adhoc.2019.102061 doi: 10.1016/j.adhoc.2019.102061 |
[84] | R. S. Cohen, The Drone Zappers, Air Force Magazine, 22 March 2019. Available: https://www.airforcemag.com/article/the-drone-zappers/. |
[85] | M. A. Siddiqi, H. Yu, J. Joung, 5G Ultra-Reliable Low-Latency Communication Implementation Challenges and Operational Issues with IoT Devices, Electronics, 8 (2019), 981. https://doi.org/10.3390/electronics8090981 doi: 10.3390/electronics8090981 |
[86] | G. Zhang, Q. Wu, M. Cui, R. Zhang, Securing UAV communications via joint trajectory and power control, IEEE Trans. Wireless Commun., 18 (2019), 1376–1389. https://doi.org/10.1109/TWC.2019.2892461 doi: 10.1109/TWC.2019.2892461 |
[87] | K. Mizokami, Air Force Downs Several Drones With New ATHENA Laser Weapon System, Popular Mechanics, 8 November 2019. Available from: https://www.popularmechanics.com/military/research/a29727696/athena-laser-weapon/. |
[88] | Federal Aviation Administration, Become a Drone Pilot, Become a pilot, May 19, 2021. Available from: https://www.faa.gov/uas/commercial_operators/become_a_drone_pilot/. |
[89] | Transport Canada, Where to fly your drone, Drone safety, February 19, 2021. Available from: https://tc.canada.ca/en/aviation/drone-safety/where-fly-your-drone. |
[90] | R. Ch, G. Srivastava, T. R. Gadekallu, P. K. Maddikunta, S. Bhattacharya, Security and privacy of UAV data using blockchain technology, J. Inf. Secur. Appl., 55 (2020), 102670. https://doi.org/10.1016/j.jisa.2020.102670 doi: 10.1016/j.jisa.2020.102670 |
[91] | Sinha Satyajit, Securing IoT with Blockchain, Counterpoint, 11 May 2018. Available from: https://www.counterpointresearch.com/securing-iot-blockchain/. |
[92] | W. Wang, H. Xu, M. Alazab, T. R. Gadekallu, Z. Han, C. Su, Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices, IEEE Trans. Ind. Inform., 2021. https://doi.org/10.1109/TII.2021.3084753 doi: 10.1109/TII.2021.3084753 |
[93] | W. Wang, H. Huang, L. Zhang, and C. Su, Secure and efficient mutual authentication protocol for smart grid under blockchain, Peer-to-Peer Netw. Appl., 14 (2020), 2681–2693. https://doi.org/10.1007/s12083-020-01020-2 doi: 10.1007/s12083-020-01020-2 |
[94] | L. Zhang, Z. Zhang, W. Wang, Z. Jin, Y. Su, H. Chen, Research on a Covert Communication Model Realized by Using Smart Contracts in Blockchain Environment, IEEE Syst. J., 2021. https://doi.org/10.1109/JSYST.2021.3057333 doi: 10.1109/JSYST.2021.3057333 |
[95] | L. Zhang, Y. Zou, W. Wang, Z. Jin, Y. Su, H. Chen, Resource allocation and trust computing for blockchain-enabled edge computing system, Comput. Secur., 105 (2021), 102249. https://doi.org/10.1016/j.cose.2021.102249 doi: 10.1016/j.cose.2021.102249 |
[96] | L. Zhang, M. Peng, W. Wang, Z. Jin, Y. Su, H. Chen, Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing, Trans. Emerging Telecommun. Technol., (2021), e4315. https://doi.org/10.1002/ett.4315 doi: 10.1002/ett.4315 |