Computer Science ›› 2024, Vol. 51 ›› Issue (4): 366-372.doi: 10.11896/jsjkx.230200135
• Information Security • Previous Articles Next Articles
PANG Yuxiang, CHEN Zemao
CLC Number:
[1]LI G.Current Status and Trends of Unmanned Aerial Vehicles[J].Modern Industrial Economy and Informationization,2021,11(3):12-13,16. [2]HE D J,DU XIAO,QIAO Y R,et al.Review of Unmanned Aircraft Information Security[J].Chinese Journal of Computers,2019,42(5):1076-1094. [3]AHMED F,MOHANTA J C,KESHARI A,et al.Recent Advances in Unmanned Aerial Vehicles:A Review[J].Arabian Journal for Science and Engineering,2022,47(7):7963-7984. [4]IQBAL S.A study on UAV operating system security and future research challenges[C]//2021 IEEE 11th Annual Computing and Communication Workshop and Conference(CCWC).IEEE,2021:759-765. [5]KERNS A J,SHEPARD D P,BHATTI J A,et al.Unmanned Aircraft Capture and Control Via GPS Spoofing[J].Journal of Field Robotics,2014,31(4):617-636. [6]KIM A,WAMPLER B,GOPPERT J,et al.Cyber attack vulne-rabilities analysis for unmanned aerial vehicles[M].Infotech@ Aerospace 2012.2012:2438. [7]SON Y,SHIN H,KIM D,et al.Rocking drones with intentional sound noise on gyroscopic sensors[C]//24th USENIX Security Symposium(USENIX Security 15).2015:881-896. [8]QUINONEZ R,GIRALDO J,SALAZAR L,et al.SAVIOR:Securing autonomous vehicles with robust physical invariants[C]//Usenix Security.2020. [9]SHEN J,WON J Y,CHEN Z,et al.Drift with devil:Security of multi-sensor fusion based localization in high-level autonomous driving under GPS spoofing[C]//Proceedings of the 29th USENIX Conference on Security Symposium.2020:931-948. [10]MUNIRAJ D,FARHOOD M.A framework for detection ofsensor attacks on small unmanned aircraft systems[C]//2017 International Conference on Unmanned Aircraft Systems(ICUAS).IEEE,2017:1189-1198. [11]ZHANG L H,WANG S,ZHOU H,et al.Secure communication scheme for UAS based on MAVLink protocol[J].Journal of Computer Applications,2020,40(8):2286-2292. [12]HARTMANN K,STEUP C.The vulnerability of UAVs to cyber attacks-An approach to the risk assessment[C]//2013 5th international Conference on Cyber Conflict(CYCON 2013).IEEE,2013:1-23. [13]JAVAID A Y,SUN W,DEVABHAKTUNI V K,et al.Cyber security threat analysis and modeling of an unmanned aerial vehicle system[C]//2012 IEEE Conference on Technologies for Homeland Security(HST).IEEE,2012:585-590. [14]TSAO K Y,GIRDLER T,VASSILAKIS V G.A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks[J].Ad Hoc Networks,2022,133:102894. [15]CHOI H,LEE W C,AAFER Y,et al.Detecting attacks against robotic vehicles:A control invariant approach[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:801-816. [16]YOON M K,LIU B,HOVAKIMYAN N,et al.Virtualdrone:virtual sensing,actuation,and communication for attack-resilient unmanned aerial systems[C]//Proceedings of the 8th International Conference on Cyber-physical Systems.2017:143-154. [17]HASAN M,MOHAN S.Protecting actuators in safety-critical IoT systems from control spoofing attacks[C]//Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things.2019:8-14. [18]BHATT S,SANDHU R.Abac-cc:Attribute-based access control and communication control for internet of things[C]//Proceedings of the 25th ACM Symposium on Access Control Mo-dels and Technologies.2020:203-212. [19]GUPTA M,BENSON J,PATWA F,et al.Dynamic groups and attribute-based access control for next-generation smart cars[C]//Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy.2019:61-72. [20]KIM H,KIM D K,ALAERJAN A.ABAC-based security model for DDS[J].IEEE Transactions on Dependable and Secure Computing,2021,19(5):3113-3124. [21]YANG X C,LIU G,WANG Y T,et al.Overview of OpenSource Flight Control Project and Its Aeronautical Application Prospect[J].Aerodynamic Missile Journal,2018(4):25-32. [22]MEIER L,HONEGGER D,POLLEFEYS M.PX4:A node-based multithreaded open source robotics framework for deeply embedded platforms[C]//2015 IEEE International Conference on Robotics and Automation(ICRA).IEEE,2015:6235-6240. |
[1] | LU Yanfeng, WU Tao, LIU Chunsheng, YAN Kang, QU Yuben. Survey of UAV-assisted Energy-Efficient Edge Federated Learning [J]. Computer Science, 2024, 51(4): 270-279. |
[2] | WANG Xinlong, LIN Bing, CHEN Xing. Computation Offloading with Wardrop Routing Game in Multi-UAV-aided MEC Environment [J]. Computer Science, 2024, 51(3): 309-316. |
[3] | LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9. |
[4] | ZHENG Hongqiang, ZHANG Jianshan, CHEN Xing. Deployment Optimization and Computing Offloading of Space-Air-Ground Integrated Mobile Edge Computing System [J]. Computer Science, 2023, 50(2): 69-79. |
[5] | LIN Zeyang, LAI Jun, CHEN Xiliang, WANG Jun. UAV Anti-tank Policy Training Model Based on Curriculum Reinforcement Learning [J]. Computer Science, 2023, 50(10): 214-222. |
[6] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[7] | LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627. |
[8] | XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11. |
[9] | SHI Dian-xi, LIU Cong, SHE Fu-jiang, ZHANG Yong-jun. Cooperation Localization Method Based on Location Confidence of Multi-UAV in GPS-deniedEnvironment [J]. Computer Science, 2022, 49(4): 302-311. |
[10] | YUAN Xin-wang, XIE Zhi-dong, TAN Xin. Survey of Resource Management Optimization of UAV Edge Computing [J]. Computer Science, 2022, 49(11): 234-241. |
[11] | CHENG Zhao-wei, SHEN Hang, WANG Yue, WANG Min, BAI Guang-wei. Deep Reinforcement Learning Based UAV Assisted SVC Video Multicast [J]. Computer Science, 2021, 48(9): 271-277. |
[12] | XU Hao, LIU Yue-lei. UAV Sound Recognition Algorithm Based on Deep Learning [J]. Computer Science, 2021, 48(7): 225-232. |
[13] | GU Shuang-jia, LIU Wan-ping, HUANG Dong. Application of Express Information Encryption Based on AES and QR [J]. Computer Science, 2021, 48(11A): 588-591. |
[14] | YANG Zhang-lin, XIE Jun, ZHANG Geng-qiang. Review of Directional Routing Protocols for Flying Ad-Hoc Networks Based on Directional Antennas [J]. Computer Science, 2021, 48(11): 334-344. |
[15] | LI Bin, ZHOU Qing-lei, SI Xue-ming, CHEN Xiao-jie. Optimized Implementation of Office Password Recovery Based on FPGA Cluster [J]. Computer Science, 2020, 47(11): 32-41. |
|