Advertisement

Security and Privacy Issues of UAV: A Survey

  • Yueyan Zhi
  • Zhangjie FuEmail author
  • Xingming Sun
  • Jingnan Yu
Article
  • 82 Downloads

Abstract

The rapid development of the Unmanned Aerial Vehicle(UAV) brings much convenience to our life. However, security and privacy problems caused by UAVs are gradually exposed. This paper analyzes UAV safety from three aspects, including sensors, communications and multi-UAVs. A UAV relies on different sensors to locate and calculate its flight attitude, which means spoof and attacks on sensors are fatal. On the one hand, wrong information from sensors will lead UAVs to make wrong judgments. On the other hand, damage to sensors can cause UAVs to fail to obtain information and severely cause UAVs to crash. Information exchange between UAV and Ground Control Station(GCS) relies on communication links and an unsafe link is susceptible to attacks. Multi-UAVs applications rely on stable network among UAVs. Ad-hoc network the mainstream of current networking method but it still exists many potential dangers. Besides, another possibility of privacy disclosure caused by aerial photos is also mentioned. These photos often contain private information such as location and shooting time which is likely to be leaked when the photographer shares photos on social applications. Finally, we summarize the paper and discuss the future research direction.

Keywords

UAV security UAV privacy Attacks on UAV 

Notes

Acknowledgements

This work is supported by the National Key R&D Program of China under grant 2018YFB1003205; by the National Natural Science Foundation of China under grant U1836208, U1536206, U1836110, 61602253, 61672294; by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20181407; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.

References

  1. 1.
    iResearch (2016) China Unmanned Aerial Vehicle Industry Research Report 2016. https://www.iresearch.com.cn/Detail/report?id=2588&isfree=0,2016Google Scholar
  2. 2.
    Hartmann K, Steup C (2013) The vulnerability of UAVs to cyber attacks-An approach to the risk assessment[C]//Cyber Conflict (CyCon) 2013 5th International Conference on. 2013:1-23Google Scholar
  3. 3.
    Pleban JS, Band R, Creutzburg R (2014) Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy[C]//Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014. International Society for Optics and Photonics 9030: 90300L.Google Scholar
  4. 4.
    Altawy R, Youssef AM (2017) Security, privacy, and safety aspects of civilian drones: A survey[J]. ACM Trans Cyber-Physical Syst 1(2):7Google Scholar
  5. 5.
    He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles[J]. IEEE Wireless Communications 24(4):134–139.99CrossRefGoogle Scholar
  6. 6.
    He D, Du X, Qiao Y, Zhu Y, Fan Q, Luo W (2017) A Survey on Cyber security of Unmanned Aerial Vehicles, Vol.40, Online Publishing No. 125Google Scholar
  7. 7.
    Davidson D, Wu H, Jellinek R, et al. (2016) Controlling UAVs with sensor input spoofing attacks[C]// Usenix Conference on Offensive Technologies. USENIX Association, 221-231.Google Scholar
  8. 8.
    Son Y, Shin H, Kim D, et al. (2015) Rocking drones with intentional sound noise on gyroscopic sensors[C]// Usenix Conference on Security Symposium. USENIX Association, 881-896.Google Scholar
  9. 9.
    Jing Q, Vasilakos AV, Wan J et al (2014) Security of the Internet of things: perspectives and challenges. Wireless Network 20(8):2481–2501Google Scholar
  10. 10.
    Elkashlan M, Wang L, Duong TQ et al (2015) On the security of cognitive radio networks. IEE Transactions on Vehicular Technology 64(8):3790–3795Google Scholar
  11. 11.
    Roddy NM, Schmidt RO, Pras A (2016) Exploring security vulnerabilities of unmanned aerial vehicles. In Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP (pp. 993–994). IEEE.Google Scholar
  12. 12.
    Vanhoef, M, Piessens F (2017) Key reinstallation attacks: Forcing nonce reuse in WPA2. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACMGoogle Scholar
  13. 13.
    Strohmeier M, Schafer M, Lenders V et al (2014) Realities and challenges of nextgen air traffic management: the case of ADS-B[J]. IEEE Commun Mag 52(5):111–118CrossRefGoogle Scholar
  14. 14.
    Kim A, Wampler B, Goppert J et al (2012) Cyber attack vulnerabilities analysis for unmanned aerial vehicles[M]//Infotech@ Aerospace 2012. 2012: 2438Google Scholar
  15. 15.
    Yang H, Yao M, Xu Z et al (2017) LHCSAS: A Lightweight and Highly-Compatible Solution for ADS-B Security[C]//GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE, pp 1–7Google Scholar
  16. 16.
    Yang H, Zhou Q, Yao M et al (2018) A Practical and Compatible Cryptographic Solution to ADS-B Security[J]. IEEE Internet of Things JGoogle Scholar
  17. 17.
    Yang A, Tan X, Baek J et al (2017) A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification[J]. IEEE Trans Serv Comput 10(2):165–175CrossRefGoogle Scholar
  18. 18.
    Ghose N, Lazos L (2015) Verifying ADS-B navigation information through Doppler shift measurements[C]//Digital Avionics Systems Conference (DASC), 2015 IEEE/AIAA 34th. IEEE, pp 1–27Google Scholar
  19. 19.
    Gupta L, Jain R, Vaszkun G (2016) Survey of important issues in UAV communication networks[J]. IEEE Communications Surveys & Tutorials 18(2):1123–1152CrossRefGoogle Scholar
  20. 20.
    De Freitas EP, Heimfarth T, Netto IF et al. (2010) UAV relay network to support WSN connectivity[C]//Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on. IEEE, 309-314.Google Scholar
  21. 21.
    Dorri A, Kamel SR, Kheirkhah E (2015) Security challenges in mobile ad hoc networks: a survey[J]. arXiv preprint arXiv:1503.03233Google Scholar
  22. 22.
    He D, Zeadally S, Xu B et al (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Trans Inf Forensics Secur 10(12):2681–2691CrossRefGoogle Scholar
  23. 23.
    Li W, Song H (2016) ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 17(4):960–969CrossRefGoogle Scholar
  24. 24.
    Birnbach S, Baker R, Martinovic I (2017) Wi-fly?: Detecting privacy invasion attacks by consumer drones[J]Google Scholar
  25. 25.
    Saqib M, Khan SD, Sharma N et al (2017) A study on detecting drones using deep convolutional neural networks[C]//2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, pp 1–5Google Scholar
  26. 26.
    Busset J, Perrodin F, Wellig P et al (2015) Detection and tracking of drones using advanced acoustic cameras[C]//Unmanned/Unattended Sensors and Sensor Networks XI; and Advanced Free-Space Optical Communication Techniques and Applications. Int Soc Opt Photon 9647:96470FGoogle Scholar
  27. 27.
    Jeon S, Shin JW, Lee YJ et al (2017) Empirical study of drone sound detection in real-life environment with deep neural networks[C]//Signal Processing Conference (EUSIPCO), 2017 25th European. IEEE, pp 1858–1862Google Scholar
  28. 28.
    Orozco ALS, González DMA, Villalba LJG, Hernández-Castro J (2015) Analysis of errors in exif metadata on mobile devices. Multimedia Tools Appl 74(13):4735–4763CrossRefGoogle Scholar
  29. 29.
    Gloe T (2012) Forensic analysis of ordered data structures on the example of JPEG files[C]//Information Forensics and Security (WIFS), 2012 IEEE International Workshop on. IEEE, pp 139–144Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Yueyan Zhi
    • 1
  • Zhangjie Fu
    • 1
    • 2
    Email author
  • Xingming Sun
    • 1
  • Jingnan Yu
    • 1
  1. 1.School of Computer and SoftwareNanjing University of Information Science & TechnologyNanjingChina
  2. 2.College of Information Science and TechnologyJinan UniversityGuangzhouChina

Personalised recommendations