Abstract
Unmanned Aerial Vehicles (UAV) systems are autonomous systems that can fly separately or it can be functioned remotely without carrying any individuals. These networks prone to various attacks. The people are benefitted from the current growth of networking and cyber world; however, the rapid development of cyber world has furthermore contributed to immoral practices by persons who are using the technology to utilize others. That type of utilization of cyber world with the intension of accessing unauthorized or protected information, collapsing networks, spying, data and currency theft is called as cyber-attack. There is a tremendous increase in Cyber-attacks in number and complexity greater than the previous era, and also lack of awareness on cyber- attacks which has provided many people/societies/groups reveal the true to these attacks. The main aim of this study is to do a brief study of these cyber-attacks in order to create alertness about the various types of attacks and their action so that suitable security methods can be originated against such attacks and also this paper explores the impacts and parameters affected by the most dangerous cyber-attack namely, false data dissemination attack on UAV networks for further implementation and research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bekmezci, I., Sahingoz, O.K., Temel, S.: Flying Ad-Hoc Networks (FANETs): a survey. Ad-hoc Netw. 1, 1254–1270 (2013)
Oubbati, O.S., et al.: Intelligent UAV-assisted routing protocol for urban VANETS. Comput. Commun. 107, 93–111 (2017)
Sedjelmaci, H., Senouci, S.M.: A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans. Syst. Man Cybern. Syst. PP, 1–13 (2016)
Kim, A., et al.: Cyber-attack vulnerabilities analysis for unmanned aerial vehicles. In: Infotech@ Aerospace, pp. 1–30 (2012)
George, S.: FAA Unmanned Aircraft Systems (UAS) Cyber Security Initiatives, pp. 1–19. Federal Aviation Administration (2015)
Podins, K., Stinissen, J., Maybaum, M. (eds.) The vulnerability of UAVs to cyber-attacks - an approach to the risk assessment. In: 5th International Conference on Cyber Conflict (2015)
Abbaspoura, A., et al.: Detection of fault data injection attack on UAV using adaptive neural network. Proc. Comput. Sci. 95, 193–200 (2016)
Mokdada, L., Ben-Othmanb, J., Nguyena, A.T.: DJAVAN: detecting jamming attacks in Vehicle Ad hoc Networks. Perform. Eval. 87, 47–59 (2015)
Zhou, Y., Cheng, N., Lu, N., (Sherman) Shen, X.: Multi-UAV-Aided networks. IEEE Veh. Technol. Mag. 10, 36–44 (2015)
He, D., Chan, S., Guizani, M.: Communication security of unmanned aerial vehicles. IEEE Wirel. Commun. 24, 1415–1420 (2017)
Hartmann, K., Steup, C.: The vulnerability of UAVs to cyber-attacks - an approach to the risk assessment. In: Cyber Conflict (CyCon), 5th International Conference, pp. 1–23. IEEE, June 2013
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vanitha, N., Padmavathi, G. (2018). A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks. In: Ganapathi, G., Subramaniam, A., Graña, M., Balusamy, S., Natarajan, R., Ramanathan, P. (eds) Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation. ICC3 2017. Communications in Computer and Information Science, vol 844. Springer, Singapore. https://doi.org/10.1007/978-981-13-0716-4_11
Download citation
DOI: https://doi.org/10.1007/978-981-13-0716-4_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0715-7
Online ISBN: 978-981-13-0716-4
eBook Packages: Computer ScienceComputer Science (R0)