1. Correction to: Intelligent Computing and Innovation on Data Science
- Author
-
Sheng-Lung Peng, Le Hoang Son, G. Suseendran, and D. Balaganesh
- Subjects
Computer science ,Network packet ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Eavesdropping ,Ground control station ,Man-in-the-middle attack ,Computer security ,computer.software_genre ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Secure communication ,Military operation ,Communications protocol ,business ,computer ,Search and rescue - Abstract
Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue missions, reconnaissance, traffic monitoring, and logistics. Typically, UAVs are operated from a controller or a ground control station (GCS) with the help of different communication protocols such as MAVLink, UranusLink, UAVCAN. These communication protocols are used to exchange messages. The messages contain considerable information about the UAV and certain control commands sent from GCS to UAV or UAV to GCS. Though these protocols provide better communication along with secure aspects, however, mostly there is no subtle mechanism for securing these messages and are prone to many security attacks such as man-in-the-middle (MITM) attack, denial-of-services (DoS) attack, packet data injection attack, and eavesdropping. This can result in serious consequences, for instance, crash land of a military or civilian UAV, steal important data of a military operation, false injection of reports in a reconnaissance or search and rescue operation, and many more. So, there is a need for a secure communication protocol which can ensure the required security standard sets for communication of UAVs. This survey presents the applications, general architecture, attacks on UAVs, and an insight into the security issues of UAV’s communication protocols and proposes a new secure communication protocol for the stated issues of UAVs.
- Published
- 2020