TY - GEN
T1 - Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey
AU - Choudhary, Gaurav
AU - Sharma, Vishal
AU - You, Ilsun
AU - Yim, Kangbin
AU - Chen, Ing Ray
AU - Cho, Jin Hee
PY - 2018/8/30
Y1 - 2018/8/30
N2 - Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving civilian and/or military missions. The significantly increased attention on UAV applications also has led to security concerns particularly in the context of networked UAVs. Networked UAVs are vulnerable to malicious attacks over open-air radio space and accordingly intrusion detection systems (IDSs) have been naturally derived to deal with the vulnerabilities and/or attacks. In this paper, we briefly survey the state-of-the-art IDS mechanisms that deal with vulnerabilities and attacks under networked UAV environments. In particular, we classify the existing IDS mechanisms according to information gathering sources, deployment strategies, detection methods, detection states, IDS acknowledgment, and intrusion types. We conclude this paper with research challenges, insights, and future research directions to propose a networked UAVIDS system which meets required standards of effectiveness and efficiency in terms of the goals of both security and performance.
AB - Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving civilian and/or military missions. The significantly increased attention on UAV applications also has led to security concerns particularly in the context of networked UAVs. Networked UAVs are vulnerable to malicious attacks over open-air radio space and accordingly intrusion detection systems (IDSs) have been naturally derived to deal with the vulnerabilities and/or attacks. In this paper, we briefly survey the state-of-the-art IDS mechanisms that deal with vulnerabilities and attacks under networked UAV environments. In particular, we classify the existing IDS mechanisms according to information gathering sources, deployment strategies, detection methods, detection states, IDS acknowledgment, and intrusion types. We conclude this paper with research challenges, insights, and future research directions to propose a networked UAVIDS system which meets required standards of effectiveness and efficiency in terms of the goals of both security and performance.
KW - attack
KW - intrusion detection system
KW - security
KW - Unmanned aerial vehicle
KW - vulnerability
UR - http://www.scopus.com/inward/record.url?scp=85053889909&partnerID=8YFLogxK
U2 - 10.1109/IWCMC.2018.8450305
DO - 10.1109/IWCMC.2018.8450305
M3 - Conference contribution
AN - SCOPUS:85053889909
SN - 9781538620700
T3 - International Wireless Communications and Mobile Computing Conference, IWCMC
SP - 560
EP - 565
BT - 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018
Y2 - 25 June 2018 through 29 June 2018
ER -