Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230800086-6.doi: 10.11896/jsjkx.230800086
• Information Security • Previous Articles Next Articles
WANG Zhen, ZHOU Chao, FAN Yongwen, Shi Pengfei
CLC Number:
[1]YANUSHEVSKY R.Guidance of unmanned aerial vehicles[M].CRC Press,2011. [2]ILLMAN M.9 cool ways drones are being used to deliver goods to you[EB/OL].https://www.pocket-lint.com/drones/news/146105-things-drones-can-deliver-to-you. [3]MOON M.Faa makes it easy for drone hobbyists to fly in con-trolled airspace[EB/OL].https://www.engadget.com/2019/07/24/faa-opens-laanc-to-drone-hobbyists/. [4]CONSTANTINIDES C,PARKINSON P.Security challenges in uav devel-opment[C]//27th Digital Avionics Systems Confe-rence.IEEE,2008:1-8. [5]EVANS A.Not in my backyard! Woman throws stones before using a gun to get rid of nosy neighbour’s drone[EB/OL].https://www.dailymail.co.uk/news/article-4283486/Woman-grabs-gun-shoots-nosy-neighbour-s-drone.html. [6]GETTINGER D.The soleimani killing and 5 things to knowabout drones in iraq[EB/OL].https://thebulletin.org/2020/01/soleimani-and-beyond-5-ways-that-drones-have-destabilized-iraq/. [7]MARGARITOFF M.Tobacco-smuggling drone found by uk-raine border patrol reveals region’s black market[EB/OL].https://www.thedrive.com/tech/23447/tobacco-smuggling-drone-found-by-ukraine-border-patrol-reveals-regions-black-market. [8]NASSI B,SHABTAI A,MASUOKA R,et al.SoK-security and privacy in the age of drones:threats,challenges,solution mechanisms,and scientific gaps[J].arXiv:1903.05155,2019. [9]CLARKE R.Understanding the drone epidemic[J].Computer Law & Security Review,2014,30(3):230-246. [10]AUSTIN R.Unmanned aircraft systems:UAVS design,deve-lopment and deployment[M].John Wiley & Sons,2011. [11]WANG H,ZHAO H,ZHANG J,et al.Survey on unmanned aerial vehicle networks:A cyber physical system perspective[J].IEEE Communications Surveys & Tutorials,2019,22(2):1027-1070. [12]Ardupilot[EB/OL].https://ardupilot.org/. [13]Mavlink[EB/OL].https://mavlink.io/en/. [14]ALLOUCH A,CHEIKHROUHOU O,KOUBÂA A,et al.MAVSec:Securing the MAVLink protocol for ardupilot/PX4 unmanned aerial systems[C]//2019 15th International Wireless Communications & Mobile Computing Conference(IWCMC).IEEE,2019:621-628. [15]BUTCHER N,STEWART A,BIAZ S.Securing the mavlinkcommunication protocol for unmanned aircraft systems[J/OL].https://eng.auburn.edu/files/acad_depts/csse/csse_technical_reports/csse14-02.pdf. [16]Px4[EB/OL].https://px4.io/. [17]Paparazziuav[EB/OL].https://wiki.paparazziuav.org/wiki/Main Page. [18]DEY V,PUDI V,CHATTOPADHYAY A,et al.Security vulnerabilities of unmanned aerial vehicles and countermeasures:An experimental study[C]//2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems(VLSID).IEEE,2018:398-403. [19]LIAO S.Dji drones can get past no-fly zones thanks to this rus-sian software company[EB/OL].https://www.theverge.com/2017/6/21/15848344/drones-russian-software-hack-dji-jailbreak. [20]TRUJANO F,CHAN B,BEAMS G,et al.Security analysis of dji phantom 3 standard[J/OL].https://courses.csail.mit.edu/6.857/2016/files/9.pdf. [21]Dji lightbridge[EB/OL].https://www.dji.com/ca/dji-lightbridge. [22]Chibios[EB/OL].http://chibios.org/dokuwiki/doku.php. [23]Apache nuttx[EB/OL].https://nuttx.apache.org/. [24]KERNS A J,SHEPARD D P,BHATTI J A,et al.Unmanned aircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636. [25]LUO A.Drones hijacking[J/OL].https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEF%20CON%2024%20-%20Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf. [26]VERVISCH-PICOIS A,SAMAMA N,TAILLANDIER-LOIZE T.Influence of GNSS spoofing on drone in automatic flight mode[C]//ITSNT 2017:4th International Symposium of Navigation and Timing.Ecole nationale de l’aviation civile,2017:1-9. [27]HE D,QIAO Y,CHEN S,et al.A friendly and low-cost technique for capturing non-cooperative civilian unmanned aerial vehicles[J].IEEE Network,2018,33(2):146-151. [28]FENG Z,GUAN N,LV M,et al.Efficient drone hijacking detec-tion using onboard motion sensors[C]//Design,Automation & Test in Europe Conference & Exhibition(DATE),2017.IEEE,2017:1414-1419. [29]FENG Z,GUAN N,LV M,et al.An efficient UAV hijacking detection method using onboard inertial measurement unit[J].ACM Transactions on Embedded Computing Systems(TECS),2018,17(6):1-19. [30]WEN H,HUANG P Y R,DYER J,et al.Countermeasures for GPS signal spoofing[C]//Proceedings of the 18th International Technical Meeting of the Satellite Division of the Institute of Navigation(ION GNSS 2005).2005:1285-1290. [31]ELDOSOUKY A R,FERDOWSI A,SAAD W.Drones in distress:A game-theoretic countermeasure for protecting UAVs against GPS spoofing[J].IEEE Internet of Things Journal,2019,7(4):2840-2854. [32]SON Y,SHIN H,KIM D,et al.Rocking drones with intentionalsound noise on gyroscopic sensors[C]//24th USENIX Security Symposium(USENIX Security 15).2015:881-896. [33]CHOI H,LEE W C,AAFER Y,et al.Detecting attacks against robotic vehicles:A control invariant approach[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:801-816. [34]Dji adds airplane and helicopter detectors to new consumerdrones[EB/OL].https://www.dji.com/ca/newsroom/news/dji-adds-airplane-and-helicopter-detectors-to-new-consumer-drones. [35]MCCALLIE D,BUTTS J,MILLS R.Security analysis of theADS-B implementation in the next generation air transportation system[J].International Journal of Critical Infrastructure Protection,2011,4(2):78-87. [36]KIM Y,JO J Y,LEE S.A secure location verification method for ADS-B[C]//2016 IEEE/AIAA 35th Digital Avionics Systems Conference(DASC).IEEE,2016:1-10. [37]KACEM T,WIJESEKERA D,COSTA P,et al.An ADS-B intrusion detection system[C]//2016 IEEE Trustcom/BigDataSE/ISPA.IEEE,2016:544-551. [38]DAVIDSON D,WU H,JELLINEK R,et al.Controlling {UAVs} with sensor input spoofing attacks[C]//10th USENIX workshop on offensive technologies(WOOT 16).2016. [39]ABUNADA A H,OSMAN A Y,KHANDAKAR A,et al.Design and implementation of a RF based anti-drone system[C]//2020 IEEE International Conference on Informatics,IoT,and Enabling Technologies(ICIoT).IEEE,2020:35-42. [40]MULTERER T,GANIS A,PRECHTEL U,et al.Low-costjamming system against small drones using a 3D MIMO radar based tracking[C]//2017 European Radar Conference(EURAD).IEEE,2017:299-302. [41]CURPEN R,BĂLAN T,MICLOŞ I A,et al.Assessment of signal jamming efficiency against LTE UAVs[C]//2018 International Conference on Communications(COMM).IEEE,2018:367-370. [42]PÄRLIN K,ALAM M M,LE MOULLEC Y.Jamming of UAV remote control systems using software defined radio[C]//2018 International Conference on Military Communications and Information Systems(ICMCIS).IEEE,2018:1-6. [43]WANG Q,NGUYEN T,PHAM K,et al.Mitigating jamming attack:A game-theoretic perspective[J].IEEE Transactions on Vehicular Technology,2018,67(7):6063-6074. [44]DI PIETRO R,OLIGERI G.Freedom of speech:Thwarting jammers via a probabilistic approach[C]//Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks.2015:1-6. [45]DI PIETRO R,OLIGERI G,TEDESCHI P.JAM-ME:exploiting jamming to accomplish drone mission[C]//2019 IEEE Conference on Communications and Network Security(CNS).IEEE,2019:1-9. [46]SODERI S,MUCCHI L,HÄMÄLÄINEN M,et al.Physical la-yer security based on spread-spectrum watermarking and jamming receiver[J].Transactions on Emerging Telecommunications Technologies,2017,28(7):e3142. [47]RODDAY N M,SCHMIDT R O,PRAS A.Exploring security vulnerabilities of unmanned aerial vehicles[C]//2016 IEEE/IFIP Network Operations and Management Symposium(NOMS 2016).IEEE,2016:993-994. [48]KRISHNA C G L,MURPHY R R.A review on cybersecurity vulnerabilities for unmanned aerial vehicles[C]//2017 IEEE International Symposium on Safety,Security and Rescue Robotics(SSRR).IEEE,2017:194-199. [49]HE D,CHAN S,GUIZANI M.Communication security of unmanned aerial vehicles[J].IEEE Wireless Communications,2016,24(4):134-139. |
[1] | SUN Yang, DING Jianwei, ZHANG Qi, WEI Huiwen, TIAN Bowen. Study on Super-resolution Image Reconstruction Using Residual Feature Aggregation NetworkBased on Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600039-6. |
[2] | MA Yinghong, LI Xu’nan, DONG Xu, JIAO Yi, CAI Wei, GUO Youguang. Fast Path Recovery Algorithm for Obstacle Avoidance Scenarios [J]. Computer Science, 2024, 51(6): 331-337. |
[3] | LU Yanfeng, WU Tao, LIU Chunsheng, YAN Kang, QU Yuben. Survey of UAV-assisted Energy-Efficient Edge Federated Learning [J]. Computer Science, 2024, 51(4): 270-279. |
[4] | PANG Yuxiang, CHEN Zemao. Security Scheme of UAV Flight Control Based on Attribute Access Control Policy [J]. Computer Science, 2024, 51(4): 366-372. |
[5] | GAO Mengqi, FENG Xiang, YU Huiqun, WANG Mengling. Large-scale Multi-objective Evolutionary Algorithm Based on Online Learning of Sparse Features [J]. Computer Science, 2024, 51(3): 56-62. |
[6] | ZHANG Guohao, WANG Yi, ZHOU Xi, WANG Baoquan. Deep Collaborative Truth Discovery Based on Variational Multi-hop Graph Attention Encoder [J]. Computer Science, 2024, 51(3): 109-117. |
[7] | WANG Xinlong, LIN Bing, CHEN Xing. Computation Offloading with Wardrop Routing Game in Multi-UAV-aided MEC Environment [J]. Computer Science, 2024, 51(3): 309-316. |
[8] | LIU Changxin, WU Ning, HU Lirui, GAO Ba, GAO Xueshan. Recursive Gated Convolution Based Super-resolution Network for Remote Sensing Images [J]. Computer Science, 2024, 51(2): 205-216. |
[9] | ZHAO Ran, YUAN Jiabin, FAN Lili. Medical Ultrasound Image Super-resolution Reconstruction Based on Video Multi-frame Fusion [J]. Computer Science, 2023, 50(7): 143-151. |
[10] | YANG Da, LUO Liang, ZHENG Long. New Global Optimization Algorithm:Carbon Cycle Algorithm [J]. Computer Science, 2023, 50(6A): 220300131-7. |
[11] | LIANG Meiyan, ZHANG Yu, LIANG Jianan, CHEN Qinghui, WANG Ru, WANG Lin. Pathological Image Super-resolution Reconstruction Based on Sparse Coding Non-local AttentionDual Network [J]. Computer Science, 2023, 50(6A): 220700016-8. |
[12] | YU Jiuyang, ZHANG Dean, DAI Yaonan, HU Tianhao, XIA Wenfeng. Image Super-resolution Reconstruction Based on Structured Fusion Attention Network [J]. Computer Science, 2023, 50(6A): 220600240-5. |
[13] | QIAN Jiang, ZHANG Ding. Numerical Solution of Saint-Venant Equation by Cubic B-spline Quasi-interpolation [J]. Computer Science, 2023, 50(4): 125-132. |
[14] | HUAN Zhigang, JIANG Guoquan, ZHANG Yujian, LIU Liu, LIU Shanshan. Employing Gated Mechanism to Incorporate Multi-features into Chinese Event Coreference Resolution [J]. Computer Science, 2023, 50(3): 291-297. |
[15] | ZHENG Hongqiang, ZHANG Jianshan, CHEN Xing. Deployment Optimization and Computing Offloading of Space-Air-Ground Integrated Mobile Edge Computing System [J]. Computer Science, 2023, 50(2): 69-79. |
|