A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward
An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard human pilot. It can be remotely controlled through a ground control station (GCS), remote control, or onboard computer programs. The elements onboard use a network of sensors to communicate with GCS via a wireless link...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/12426/1/J17910_427936e3075b5837b6c72ac6e473e9b7.pdf http://eprints.uthm.edu.my/12426/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uthm.eprints.12426 |
---|---|
record_format |
eprints |
spelling |
my.uthm.eprints.124262025-01-31T08:35:02Z http://eprints.uthm.edu.my/12426/ A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward Mahmoud, Aminu Abdulkadir Ramli, Sofia Najwa Mohd Ariff, Mohd Aifaa Chai Wen, Chuah Rahim, Nordiana TL Motor vehicles. Aeronautics. Astronautics An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard human pilot. It can be remotely controlled through a ground control station (GCS), remote control, or onboard computer programs. The elements onboard use a network of sensors to communicate with GCS via a wireless link and thus make the system susceptible to various cyber-attacks. These have magnified concerns, especially in recent years, due to the increased adoption of drones across multiple sectors such as governments, industries, businesses, and transport. Given the paramount need to ensure availability, integrity, and confidentiality, securing these systems is crucial. The attacks may present in forms such as jamming, denial of service, signal attack, eavesdropping, hijacking, man-in-the-middle, intrusion, and malicious application, among others, and these attacks could be mitigated using an effective authentication model. This research reviews several such models, majorly cryptographic, lightweight, and blockchain-based, proposed by different scholars. Considering the importance of blockchain, this research grouped these authentication techniques into two: blockchain and non-blockchain-based. The study shows that all the reviewed authentication techniques have certain limitations, indicating the need for enhancement. Finally, this review identifies the need to consider UAV's peculiarities, operating environment, communication channels, energy consumption (battery life), and blockchain technology to formulate an optimal authentication model. 2024 Article PeerReviewed text en http://eprints.uthm.edu.my/12426/1/J17910_427936e3075b5837b6c72ac6e473e9b7.pdf Mahmoud, Aminu Abdulkadir and Ramli, Sofia Najwa and Mohd Ariff, Mohd Aifaa and Chai Wen, Chuah and Rahim, Nordiana (2024) A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward. International Journal Of Intelligent Systems And Applications In Engineering, 12 (4). pp. 389-398. ISSN 2147-6799 |
institution |
Universiti Tun Hussein Onn Malaysia |
building |
UTHM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tun Hussein Onn Malaysia |
content_source |
UTHM Institutional Repository |
url_provider |
http://eprints.uthm.edu.my/ |
language |
English |
topic |
TL Motor vehicles. Aeronautics. Astronautics |
spellingShingle |
TL Motor vehicles. Aeronautics. Astronautics Mahmoud, Aminu Abdulkadir Ramli, Sofia Najwa Mohd Ariff, Mohd Aifaa Chai Wen, Chuah Rahim, Nordiana A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward |
description |
An Unmanned Aerial Vehicle (UAV) is an aircraft that operates without an onboard human pilot. It can be remotely controlled through a ground control station (GCS), remote control, or onboard computer programs. The elements onboard use a network of sensors to communicate with GCS via a wireless link and thus make the system susceptible to various cyber-attacks. These have magnified concerns, especially in recent years, due to the increased adoption of drones across multiple sectors such as governments, industries, businesses, and transport. Given the paramount need to ensure availability, integrity, and confidentiality, securing these systems is crucial. The attacks may present in forms such as jamming, denial of service, signal attack, eavesdropping, hijacking, man-in-the-middle, intrusion,
and malicious application, among others, and these attacks could be mitigated using an effective authentication model. This research reviews several such models, majorly cryptographic, lightweight, and blockchain-based, proposed by different scholars. Considering the importance of blockchain, this research grouped these authentication techniques into two: blockchain and non-blockchain-based. The study shows that all the reviewed authentication techniques have certain limitations, indicating the need for enhancement. Finally, this review identifies the need to consider UAV's peculiarities, operating environment, communication channels, energy consumption (battery life),
and blockchain technology to formulate an optimal authentication model. |
format |
Article |
author |
Mahmoud, Aminu Abdulkadir Ramli, Sofia Najwa Mohd Ariff, Mohd Aifaa Chai Wen, Chuah Rahim, Nordiana |
author_facet |
Mahmoud, Aminu Abdulkadir Ramli, Sofia Najwa Mohd Ariff, Mohd Aifaa Chai Wen, Chuah Rahim, Nordiana |
author_sort |
Mahmoud, Aminu Abdulkadir |
title |
A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward |
title_short |
A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward |
title_full |
A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward |
title_fullStr |
A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward |
title_full_unstemmed |
A Review of Unmanned Aerial Vehicles/Urban Air Mobility Potential Cyberattacks and Authentication Models: A Way Forward |
title_sort |
review of unmanned aerial vehicles/urban air mobility potential cyberattacks and authentication models: a way forward |
publishDate |
2024 |
url |
http://eprints.uthm.edu.my/12426/1/J17910_427936e3075b5837b6c72ac6e473e9b7.pdf http://eprints.uthm.edu.my/12426/ |
_version_ |
1823094305374339072 |
score |
13.235796 |