Skip to main content
Log in

Security and Privacy Issues of UAV: A Survey

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The rapid development of the Unmanned Aerial Vehicle(UAV) brings much convenience to our life. However, security and privacy problems caused by UAVs are gradually exposed. This paper analyzes UAV safety from three aspects, including sensors, communications and multi-UAVs. A UAV relies on different sensors to locate and calculate its flight attitude, which means spoof and attacks on sensors are fatal. On the one hand, wrong information from sensors will lead UAVs to make wrong judgments. On the other hand, damage to sensors can cause UAVs to fail to obtain information and severely cause UAVs to crash. Information exchange between UAV and Ground Control Station(GCS) relies on communication links and an unsafe link is susceptible to attacks. Multi-UAVs applications rely on stable network among UAVs. Ad-hoc network the mainstream of current networking method but it still exists many potential dangers. Besides, another possibility of privacy disclosure caused by aerial photos is also mentioned. These photos often contain private information such as location and shooting time which is likely to be leaked when the photographer shares photos on social applications. Finally, we summarize the paper and discuss the future research direction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig 1.
Fig 2.
Fig 3.
Fig 4.
Fig 5.
Fig 6.
Fig 7.

Similar content being viewed by others

References

  1. iResearch (2016) China Unmanned Aerial Vehicle Industry Research Report 2016. https://www.iresearch.com.cn/Detail/report?id=2588&isfree=0,2016

  2. Hartmann K, Steup C (2013) The vulnerability of UAVs to cyber attacks-An approach to the risk assessment[C]//Cyber Conflict (CyCon) 2013 5th International Conference on. 2013:1-23

  3. Pleban JS, Band R, Creutzburg R (2014) Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy[C]//Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014. International Society for Optics and Photonics 9030: 90300L.

  4. Altawy R, Youssef AM (2017) Security, privacy, and safety aspects of civilian drones: A survey[J]. ACM Trans Cyber-Physical Syst 1(2):7

    Google Scholar 

  5. He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles[J]. IEEE Wireless Communications 24(4):134–139.99

    Article  Google Scholar 

  6. He D, Du X, Qiao Y, Zhu Y, Fan Q, Luo W (2017) A Survey on Cyber security of Unmanned Aerial Vehicles, Vol.40, Online Publishing No. 125

  7. Davidson D, Wu H, Jellinek R, et al. (2016) Controlling UAVs with sensor input spoofing attacks[C]// Usenix Conference on Offensive Technologies. USENIX Association, 221-231.

  8. Son Y, Shin H, Kim D, et al. (2015) Rocking drones with intentional sound noise on gyroscopic sensors[C]// Usenix Conference on Security Symposium. USENIX Association, 881-896.

  9. Jing Q, Vasilakos AV, Wan J et al (2014) Security of the Internet of things: perspectives and challenges. Wireless Network 20(8):2481–2501

    Article  Google Scholar 

  10. Elkashlan M, Wang L, Duong TQ et al (2015) On the security of cognitive radio networks. IEE Transactions on Vehicular Technology 64(8):3790–3795

    Article  Google Scholar 

  11. Roddy NM, Schmidt RO, Pras A (2016) Exploring security vulnerabilities of unmanned aerial vehicles. In Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP (pp. 993–994). IEEE.

  12. Vanhoef, M, Piessens F (2017) Key reinstallation attacks: Forcing nonce reuse in WPA2. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM

  13. Strohmeier M, Schafer M, Lenders V et al (2014) Realities and challenges of nextgen air traffic management: the case of ADS-B[J]. IEEE Commun Mag 52(5):111–118

    Article  Google Scholar 

  14. Kim A, Wampler B, Goppert J et al (2012) Cyber attack vulnerabilities analysis for unmanned aerial vehicles[M]//Infotech@ Aerospace 2012. 2012: 2438

  15. Yang H, Yao M, Xu Z et al (2017) LHCSAS: A Lightweight and Highly-Compatible Solution for ADS-B Security[C]//GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE, pp 1–7

  16. Yang H, Zhou Q, Yao M et al (2018) A Practical and Compatible Cryptographic Solution to ADS-B Security[J]. IEEE Internet of Things J

  17. Yang A, Tan X, Baek J et al (2017) A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification[J]. IEEE Trans Serv Comput 10(2):165–175

    Article  Google Scholar 

  18. Ghose N, Lazos L (2015) Verifying ADS-B navigation information through Doppler shift measurements[C]//Digital Avionics Systems Conference (DASC), 2015 IEEE/AIAA 34th. IEEE, pp 1–27

  19. Gupta L, Jain R, Vaszkun G (2016) Survey of important issues in UAV communication networks[J]. IEEE Communications Surveys & Tutorials 18(2):1123–1152

    Article  Google Scholar 

  20. De Freitas EP, Heimfarth T, Netto IF et al. (2010) UAV relay network to support WSN connectivity[C]//Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on. IEEE, 309-314.

  21. Dorri A, Kamel SR, Kheirkhah E (2015) Security challenges in mobile ad hoc networks: a survey[J]. arXiv preprint arXiv:1503.03233

  22. He D, Zeadally S, Xu B et al (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Trans Inf Forensics Secur 10(12):2681–2691

    Article  Google Scholar 

  23. Li W, Song H (2016) ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 17(4):960–969

    Article  Google Scholar 

  24. Birnbach S, Baker R, Martinovic I (2017) Wi-fly?: Detecting privacy invasion attacks by consumer drones[J]

  25. Saqib M, Khan SD, Sharma N et al (2017) A study on detecting drones using deep convolutional neural networks[C]//2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, pp 1–5

  26. Busset J, Perrodin F, Wellig P et al (2015) Detection and tracking of drones using advanced acoustic cameras[C]//Unmanned/Unattended Sensors and Sensor Networks XI; and Advanced Free-Space Optical Communication Techniques and Applications. Int Soc Opt Photon 9647:96470F

    Google Scholar 

  27. Jeon S, Shin JW, Lee YJ et al (2017) Empirical study of drone sound detection in real-life environment with deep neural networks[C]//Signal Processing Conference (EUSIPCO), 2017 25th European. IEEE, pp 1858–1862

  28. Orozco ALS, González DMA, Villalba LJG, Hernández-Castro J (2015) Analysis of errors in exif metadata on mobile devices. Multimedia Tools Appl 74(13):4735–4763

    Article  Google Scholar 

  29. Gloe T (2012) Forensic analysis of ordered data structures on the example of JPEG files[C]//Information Forensics and Security (WIFS), 2012 IEEE International Workshop on. IEEE, pp 139–144

Download references

Acknowledgements

This work is supported by the National Key R&D Program of China under grant 2018YFB1003205; by the National Natural Science Foundation of China under grant U1836208, U1536206, U1836110, 61602253, 61672294; by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20181407; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhangjie Fu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhi, Y., Fu, Z., Sun, X. et al. Security and Privacy Issues of UAV: A Survey. Mobile Netw Appl 25, 95–101 (2020). https://doi.org/10.1007/s11036-018-1193-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1193-x

Keywords

Navigation