Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles

100Citations
Citations of this article
103Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility and advantages of UAVs, they may lead to major security breaches in the context of hardware, software, and communication channel, due their ease of use and availability. UAVs are vulnerable to various types of attacks such as spoofing, false data injection, jamming, fuzzing, availability, confidentiality, and integrity attacks. To overcome these security threats, researchers have been investigating strong security protocols to keep UAVs safe from the attackers. Nevertheless, there are many flaws in the developed protocols which can be exploited by hackers. Therefore, it is becomes crucial to study and analyze the existing security protocols used in UAVs to discover and address their vulnerabilities and weaknesses. The purpose of this study is to explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions.

Cite

CITATION STYLE

APA

Shafique, A., Mehmood, A., & Elhadef, M. (2021). Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles. IEEE Access, 9, 46927–46948. https://doi.org/10.1109/ACCESS.2021.3066778

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free