A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward

An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard human pilot. It can be remotely controlled through a ground control station (GCS), remote control, or onboard computer programs. The elements onboard use a network of sensors to communicate with GCS via a wireless link...

Full description

Saved in:
Bibliographic Details
Main Authors: Mahmoud, Aminu Abdulkadir, Ramli, Sofia Najwa, Mohd Ariff, Mohd Aifaa, Chai Wen, Chuah, Rahim, Nordiana
Format: Article
Language:English
Published: 2024
Subjects:
Online Access:http://eprints.uthm.edu.my/12426/1/J17910_427936e3075b5837b6c72ac6e473e9b7.pdf
http://eprints.uthm.edu.my/12426/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uthm.eprints.12426
record_format eprints
spelling my.uthm.eprints.124262025-01-31T08:35:02Z http://eprints.uthm.edu.my/12426/ A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward Mahmoud, Aminu Abdulkadir Ramli, Sofia Najwa Mohd Ariff, Mohd Aifaa Chai Wen, Chuah Rahim, Nordiana TL Motor vehicles. Aeronautics. Astronautics An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard human pilot. It can be remotely controlled through a ground control station (GCS), remote control, or onboard computer programs. The elements onboard use a network of sensors to communicate with GCS via a wireless link and thus make the system susceptible to various cyber-attacks. These have magnified concerns, especially in recent years, due to the increased adoption of drones across multiple sectors such as governments, industries, businesses, and transport. Given the paramount need to ensure availability, integrity, and confidentiality, securing these systems is crucial. The attacks may present in forms such as jamming, denial of service, signal attack, eavesdropping, hijacking, man-in-the-middle, intrusion, and malicious application, among others, and these attacks could be mitigated using an effective authentication model. This research reviews several such models, majorly cryptographic, lightweight, and blockchain-based, proposed by different scholars. Considering the importance of blockchain, this research grouped these authentication techniques into two: blockchain and non-blockchain-based. The study shows that all the reviewed authentication techniques have certain limitations, indicating the need for enhancement. Finally, this review identifies the need to consider UAV's peculiarities, operating environment, communication channels, energy consumption (battery life), and blockchain technology to formulate an optimal authentication model. 2024 Article PeerReviewed text en http://eprints.uthm.edu.my/12426/1/J17910_427936e3075b5837b6c72ac6e473e9b7.pdf Mahmoud, Aminu Abdulkadir and Ramli, Sofia Najwa and Mohd Ariff, Mohd Aifaa and Chai Wen, Chuah and Rahim, Nordiana (2024) A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward. International Journal Of Intelligent Systems And Applications In Engineering, 12 (4). pp. 389-398. ISSN 2147-6799
institution Universiti Tun Hussein Onn Malaysia
building UTHM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tun Hussein Onn Malaysia
content_source UTHM Institutional Repository
url_provider http://eprints.uthm.edu.my/
language English
topic TL Motor vehicles. Aeronautics. Astronautics
spellingShingle TL Motor vehicles. Aeronautics. Astronautics
Mahmoud, Aminu Abdulkadir
Ramli, Sofia Najwa
Mohd Ariff, Mohd Aifaa
Chai Wen, Chuah
Rahim, Nordiana
A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward
description An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard human pilot. It can be remotely controlled through a ground control station (GCS), remote control, or onboard computer programs. The elements onboard use a network of sensors to communicate with GCS via a wireless link and thus make the system susceptible to various cyber-attacks. These have magnified concerns, especially in recent years, due to the increased adoption of drones across multiple sectors such as governments, industries, businesses, and transport. Given the paramount need to ensure availability, integrity, and confidentiality, securing these systems is crucial. The attacks may present in forms such as jamming, denial of service, signal attack, eavesdropping, hijacking, man-in-the-middle, intrusion, and malicious application, among others, and these attacks could be mitigated using an effective authentication model. This research reviews several such models, majorly cryptographic, lightweight, and blockchain-based, proposed by different scholars. Considering the importance of blockchain, this research grouped these authentication techniques into two: blockchain and non-blockchain-based. The study shows that all the reviewed authentication techniques have certain limitations, indicating the need for enhancement. Finally, this review identifies the need to consider UAV's peculiarities, operating environment, communication channels, energy consumption (battery life), and blockchain technology to formulate an optimal authentication model.
format Article
author Mahmoud, Aminu Abdulkadir
Ramli, Sofia Najwa
Mohd Ariff, Mohd Aifaa
Chai Wen, Chuah
Rahim, Nordiana
author_facet Mahmoud, Aminu Abdulkadir
Ramli, Sofia Najwa
Mohd Ariff, Mohd Aifaa
Chai Wen, Chuah
Rahim, Nordiana
author_sort Mahmoud, Aminu Abdulkadir
title A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward
title_short A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward
title_full A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward
title_fullStr A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward
title_full_unstemmed A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward
title_sort review of unmanned aerial vehicles/urban air mobility potential cyberattacks and authentication models: a way forward
publishDate 2024
url http://eprints.uthm.edu.my/12426/1/J17910_427936e3075b5837b6c72ac6e473e9b7.pdf
http://eprints.uthm.edu.my/12426/
_version_ 1823094305374339072
score 13.235796