GPS Spoofing Attacks in FANETs: A Systematic Literature Review
نویسندگان
چکیده
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an manner to accomplish a common mission. The widespread acceptance due their low cost and high efficiency has attracted malicious security attacks against them. These cannot be easily prevented UAVs’ limited computational power, short battery life, inability execute complex algorithms. FANETs rely on the Global Positioning System (GPS) for localization. GPS Spoofing, easy-to-launch attack, is one main challenges FANETs. In which, legitimate not-encrypted civilian signals overridden by counterfeit deceive collide or hijacked. Researchers proposed various countermeasures address Spoofing To further assist future research, this paper provides systematic literature review defense mechanisms. After formulating eight research questions applying well-defined inclusion/exclusion criteria quality assessment tools, 70 articles were extracted. existing mechanisms classified based objectives (i.e., detection, mitigation, and/or prevention) according basis relying readings from drones’ devices/sensors, processing received sensors, employing machine learning algorithms, game theory, leveraging cryptographic techniques authenticate protect confidentiality signals). also analyzed identify attacker models, impacts detection performance. This study found that most methods approaches, rather than mitigation prevention. Also, almost all papers used simulation experiments proof-of-concept implementation, which does not demonstrate convincing performance under realistic mobility propagation models. Moreover, solutions addressed single UAV. Only multiple UAV scenarios none them provided evaluation.
منابع مشابه
Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks
The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural N...
متن کاملEthical Issues in Technological Disaster: A Systematic Review of Literature
Ethical issues in Technological disaster: A systematic review of literature Introduction: Industrialization could bring risk of Technological Disaster (TD) such as happened in Chernobyl, Bhopal and Fukushima crisis. little has been discussed about its related ethical issues. In this study, we aimed to investigate ethical issues have been stated for technological disasters. Material and Methods:...
متن کاملInformation Avoidance in the mirror of literature: A systematic review
Purpose and background: One usually think of information as means to an end. Despite the excessive worth of information - contrary to manchr('39')s inherent need for awareness - some avoid information, favoring ignorance over knowledge. The purpose of this study is to elucidate the concept of information evasion, consequences and factors influencing it. Methodology: The study was a systematic ...
متن کاملCrowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
The aviation industry’s increasing reliance on GPS to facilitate navigation and air traffic monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with air safety. We propose Crowd-GPS-Sec to detect and localize GPS spoofing attacks on moving airborne targets such as UAVs or commercial airliners. Unlike previous attempts to secure GPS, Crowd-GPS-Sec neither requir...
متن کاملRevisiting Email Spoofing Attacks
The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3281731