Security, privacy, and safety aspects of civilian drones: A survey

被引:283
作者
Altawy R. [1 ]
Youssef A.M. [1 ]
机构
[1] Concordia Institute for Information Systems Engineering, Concordia University, 1515 St. Catherine StreetWest S-EV 009.181, Montreal, H3G, QC
关键词
Civilain drones; Cyber-physical systems; Parcelcopters; Privacy; Safety; Security; Unmanned aerial vehicles;
D O I
10.1145/3001836
中图分类号
学科分类号
摘要
The market for civilian unmanned aerial vehicles, also known as drones, is expanding rapidly as new applications are emerging to incorporate the use of civilian drones in our daily lives. On one hand, the convenience of offering certain services via drones is attractive. On the other hand, the mere operation of these airborne machines, which rely heavily on their cyber capabilities, poses great threats to people and property. Also, while the Federal Aviation Administration NextGen project aims to integrate civilian drones into the national airspace, the regulation is still a work-in-progress and does not cope with their threats. This article surveys the main security, privacy, and safety aspects associated with the use of civilian drones in the national airspace. In particular, we identify both the physical and cyber threats of such systems and discuss the security properties required by their critical operation environment.We also identify the research challenges and possible future directions in the fields of civilian drone security, safety, and privacy. Based on our investigation, we forecast that security will be a central enabling technology for the next generation of civilian unmanned aerial vehicles. © 2016 ACM.
引用
收藏
相关论文
共 83 条
[1]  
Addady M., The Number of Drones Expected to Sell During the Holiday Seasons is Caring the Government, (2015)
[2]  
Al Tawy R., Youssef A.M., Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices, IEEE Access, 4, pp. 959-979, (2016)
[3]  
Sastry S., Cardenas A.A., Amin S., Secure control: Towards survivable cyber-physical systems, Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, pp. 495-500, (2008)
[4]  
Amazon Revising the Airspace Model for the Safe Integration of Small Unmanned Aircraft Systems, (2015)
[5]  
Angelov P., Sense and Avoid in UAS: Research and Applications, (2012)
[6]  
Bekmezci I., Sahingoz O.K., Temel S., Flying ad-hoc networks (FANETs): A survey, Ad Hoc Netw., 11, 3, pp. 1254-1270, (2013)
[7]  
Bellare M., Namprempre C., Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, Advances in Cryptology-ASIACRYPT, Tatsuaki Okamoto (Ed.), 1976, pp. 531-545, (2000)
[8]  
Computers used for Benchmarking Cryptographic Systems, (2016)
[9]  
Bethke B., Valenti M., How J.P., UAV task assignment, IEEE Robot. Autom. Mag., 15, 1, pp. 39-44, (2008)
[10]  
Birnbaum Z., Dolgikh A., Skormin V., O'Brien E., Muller D., Unmanned aerial vehicle security using recursive parameter estimation, Proceedings of the International Conference on Unmanned Aircraft Systems. IEEE, pp. 692-702, (2014)