Recapitulation of Survey on Taxonomy: Security Unmanned Aerial Vehicles Networks

  • Veronica Sima Kilat Faculty of Computer Science and Information Technology, 94300 Kota Samarahan, Sarawak, Malaysia
  • Adnan Shahid Khan Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, 94300 Kota Samarahan, Sarawak, Malaysia
  • Eunice James Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, 94300 Kota Samarahan, Sarawak, Malaysia
  • Nayeem Ahmad Khan Faculty of Computer Science and Information Technology, AlBaha University, AlBaha, Saudi Arabia
Keywords: UAVs, unmanned aerial vehicle, security, IoE, cyber security

Abstract

The operation of unmanned aerial vehicles (UAVs) presents various challenges for radio spectrum management. It is crucial to ensure safety, effective spectrum use, and compatibility with existing wireless networks. However, the dynamic nature of UAV networks requires adaptive spectrum decisions and resilient schemes that can provide reliable services. Current spectrum schemes may have limitations when used in UAV networks. Nevertheless, the integration of communication technology, computation power, and control modules in UAV networks can construct a comprehensive sequence of data detecting, intelligence transferring, deliberation, and final implementation, which facilitates cyber processes in physical devices. This integration turns the UAV network into a cyber-physical system (CPS). The internet of everything (IoE) is the concept of an all-encompassing network connecting everything. It is facing significant obstacles, such as limited broadband service and shortages in existing network technology. UAVs have recently gained attention due to their mobility, affordability, and versatility. They have the potential to circumvent the challenges faced by IoE. This paper aims to provide an overview of UAVs from a different perspective, highlighting the challenges they present and discussing future research directions to ensure a proper plan for the future. With the proliferation of UAVs, it is essential to address issues related to their safe operation, efficient use of spectrum, and compatibility with existing networks. Moreover, research should focus on developing resilient schemes that can deliver smooth and reliable services in UAV networks. In conclusion, the operation of UAVs poses several challenges for radio spectrum management, but they also offer opportunities for innovation and development. The integration of communication technology, computation power, and control modules in UAV networks turns them into cyber-physical systems with the potential to overcome the challenges faced by IoE. Further research is necessary to ensure safe and efficient operation, and to explore the possibilities that UAVs offer for the future.

References

Abdelmaboud, A. (2021). The Internet of Drones: Requirements, Taxonomy, Recent Advances, and Challenges of Research Trends. Sensors, 21(17), 5718.

Ahmad, Z., Khan, A. S., Cheah, W. S., Abdullah, J., & Ahmad, F. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, vol. 32 no.1, pp. e4150.

Alqarni, A. A., Alsharif, N., Khan, N. A., Georgieva, L., Pardade, E., & Alzahrani, M. Y. (2022). MNN-XSS: Modular neural network based approach for XSS attack detection. Computers, Materials and Continua, 70(2), 4075-4085.

Alshehri, A., Khan, N., Alowayr, A., & Alghamdi, M. Y. (2023). Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics. Computer Systems Science and Engineering, 44(2), 1679-1689.

Asim, J., Khan, A. S., Saqib, R. M., Abdullah, J., Ahmad, Z., Honey, S., Afzal, S., Alqahtani, M. S., & Abbas, M. (2022). Blockchain-based Multifactor Authentication for Future 6G Cellular Networks. : A Systematic Review. Appl. Sci., 12, 3551.https:// doi.org/10.3390/app12073551.

Ayub, M. F., Ghawash, F., Shabbir, M. A., Kamran, M., & Butt, F. A. (2018). "Next Generation Security And Surveillance System Using Autonomous Vehicles,". Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS), pp. 1-5, doi: 10.110.

Bansal, G., & Sikdar, B. (2021). A Secure and Efficient Mutual Authentication Protocol Framework for Unmanned Aerial Vehicles. In 2021 IEEE Globecom Workshops (GC Wkshps). pp. 1-6.

Chamola, V. K. (2021). A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques. Ad hoc networks, 111, 102324.

Da, L., Wang, Y., Ding, Y., Xiong, W., Wang, H., & Liang, H. (2021). "An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster Network IEEE Intl Conf on Parallel & Distributed Processing with Applications, p 884-891.

Dildar, M. S., Khan, N., Abdullah, J., & Khan, A. S. (2017) "Effective way to defend the hypervisor attacks in cloud computing." In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), pp. 154-159. IEEE, 2017.

Fotohi, R. (2020). Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system. Reliability Engineering & System Safety, 193, 106675.

Iqbal, A. M., Iqbal, S., Khan, A. S., & Senin, A. A. (2013). "A Novel Cost Efficient Evaluation Model for Assessing Research-Based Technology Transfer between University and Industry." Jurnal Teknologi 64(2).

Iqbal, A. M., Khan, A. S., Abdullah, J., Kulathuramaiyer, N., & Senin, A. A. (2021). Blended system thinking approach to strengthen the education and training in university-industry research collaboration. Technology Analysis & Strategic Management DOI: 10.1080/09537325.2021.1905790

Kar, H. A., & Rather, G. M. (2020). Multilayer Software Defined Networking Architecture for the Internet of Things. International Journal of Computing and Digital Systems, 9(4), 735-746.

Kar, H. A., & Rather, G. M. (2020, March). An analytical and simulation study of round trip transmission time of an edge based Internet of Things network. In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 538-543). IEEE.

Khan, A.S., Ahmad, Z., Abdullah, J. & Ahmad, F. A. (2021). Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network. IEEE Access, 9, 87079–87093.

Khan, A.S., Balan, K., Javed, Y. Abdullah., J. & Tarmizi, S. (2019). Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors (Switzerland), 19(22), 1.

Khan, A. S., Javed, Y., & Abdullah, J. (2021). Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS). Journal of Ambient Intelligence and Humanized Computing, 10.1007/s12652-021-02968-6.

Khan, A. S., Javed, Y., Saqib, R., Ahmad, Z., Abdullah, J., Zen, K. & Khan, N. (2022). Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks. IEEE Access. 10, 31273–31288.

Khan, A.S., Yahya, M. I., Zen, K., Abdullah, J., Rashid, R. A., Javed, J., Khan, N. A., & Mostafa, A. M "Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network," in IEEE Access, doi: 10.1109/ACCESS.2023.3249969.

Kilic, S. & Ozkan, O. (2019, July). A self-adaptive UAV routing for forest fire risk mitigation: a conceptual model. In Proceedings of the 2019 Summer Simulation Conference, pp. 1-12.

Li, Y., & Pu, C. (2020, December). Lightweight digital signature solution to defend micro aerial vehicles against man-in-the-middle attack. In 2020 IEEE 23rd international conference on computational science and engineering (CSE), (pp. 92-97.

Liu, Y., Dai, H. N., Wang, Q., Shukla, M. K., & Imran, M. (2020). Unmanned aerial vehicle for internet of everything: Opportunities and challenges. Computer communications, 155, 66-83.

Lopez, M. A., Baddeley, M., Lunardi, W.T., Pandey, A., & Giacalone, J-P. (2021). "Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities. 17th International Conference in Distributed Computing in Sensor Systems (DCOSS), pp 319-326.

Maikol, S. O., Khan, A. S., Javed, Y., Bunsu, A. L., Petrus, C., George, H., & Jau, S. (2020). A novel authentication and key agreement scheme for countering MITM and impersonation attack in medical facilities. International Journal of Integrated Engineering, vol. 13, no. 2.

Mohammad. Y., Alzahrani, N., Khan, L., Georgieva, A. M., Bamahdi, O. A., & Abdulkader, A. H. (2023). Protecting Attacks on Unmanned Aerial Vehicles using Homomorphic Encryption, Indonesian Journal of Electrical Engineering and Informatics, Vol. 11, No. 1.

Mohsan, S. A. H., Khan, M. A., Noor, F., Ullah, I., & Alsharif, M. H. (2022). Towards the Unmanned Aerial Vehicles (UAVs). A Comprehensive Review. Drones, 6(6), 147.

Raj, J. S. (2021). Security enhanced blockchain based unmanned aerial vehicle health monitoring system. Journal of ISMAC, 3(02), 121-131.

Sekander, S., Tabassum, H., & Hossain, E. (2018). Multi-tier drone architecture for 5G/B5G cellular networks: Challenges, trends, and prospects. IEEE Communications Magazine, 56(3), 96-103.

Shamsoshoara, A., Afghah, F., Razi, A., Mousavi, S., Ashdown, J., & Turk, K. (2020). An autonomous spectrum management scheme for unmanned aerial vehicle networks in disaster relief operations. IEEE Access, 8, 58064-58079.

Su, J., Yu, S., Li, B., & Ye, Y. (2022). "Distributed and Collective Intelligence for Computation Offloading in Aerial Edge Networks. IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2022.3160594.

Torianyk, V. K. (2021, March). IMECA Based Assessment of Internet of Drones Systems Cyber Security Considering Radio Frequency Vulnerabilities. In IntelITSIS, pp. 460-470.

Wang, H. Z. (2019). Survey on unmanned aerial vehicle networks: A cyber physical system perspective. IEEE Communications Surveys & Tutorials, 22(2), 1027-1070.

Zhao, Y., & Smidts, C. (2020). A control-theoretic approach to detecting and distinguishing replay attacks from other anomalies in nuclear power plants. Progress in Nuclear Energy, 123, 103315.

Zhou, Y. R. (2020). UAV swarm intelligence: Recent advances and future trends. IEEE Access, 8, 183856-183878.

Published
2023-04-26
How to Cite
Kilat, V. S., Khan, A. S., James, E., & Khan, N. A. (2023). Recapitulation of Survey on Taxonomy: Security Unmanned Aerial Vehicles Networks. Journal of Computing and Social Informatics, 2(1), 21-31. https://doi.org/10.33736/jcsi.4969.2023