GPS Spoofing Attacks in FANETs: A Systematic Literature Review

نویسندگان

چکیده

Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an manner to accomplish a common mission. The widespread acceptance due their low cost and high efficiency has attracted malicious security attacks against them. These cannot be easily prevented UAVs’ limited computational power, short battery life, inability execute complex algorithms. FANETs rely on the Global Positioning System (GPS) for localization. GPS Spoofing, easy-to-launch attack, is one main challenges FANETs. In which, legitimate not-encrypted civilian signals overridden by counterfeit deceive collide or hijacked. Researchers proposed various countermeasures address Spoofing To further assist future research, this paper provides systematic literature review defense mechanisms. After formulating eight research questions applying well-defined inclusion/exclusion criteria quality assessment tools, 70 articles were extracted. existing mechanisms classified based objectives (i.e., detection, mitigation, and/or prevention) according basis relying readings from drones’ devices/sensors, processing received sensors, employing machine learning algorithms, game theory, leveraging cryptographic techniques authenticate protect confidentiality signals). also analyzed identify attacker models, impacts detection performance. This study found that most methods approaches, rather than mitigation prevention. Also, almost all papers used simulation experiments proof-of-concept implementation, which does not demonstrate convincing performance under realistic mobility propagation models. Moreover, solutions addressed single UAV. Only multiple UAV scenarios none them provided evaluation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks

The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural N...

متن کامل

Ethical Issues in Technological Disaster: A Systematic Review of Literature

Ethical issues in Technological disaster: A systematic review of literature Introduction: Industrialization could bring risk of Technological Disaster (TD) such as happened in Chernobyl, Bhopal and Fukushima crisis. little has been discussed about its related ethical issues. In this study, we aimed to investigate ethical issues have been stated for technological disasters. Material and Methods:...

متن کامل

Information Avoidance in the mirror of literature: A systematic review

Purpose and background: One usually think of information as means to an end.  Despite the excessive worth of information - contrary to manchr('39')s inherent need for awareness - some avoid information, favoring ignorance over knowledge. The purpose of this study is to elucidate the concept of information evasion, consequences and factors influencing it. Methodology: The study was a systematic ...

متن کامل

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

The aviation industry’s increasing reliance on GPS to facilitate navigation and air traffic monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with air safety. We propose Crowd-GPS-Sec to detect and localize GPS spoofing attacks on moving airborne targets such as UAVs or commercial airliners. Unlike previous attempts to secure GPS, Crowd-GPS-Sec neither requir...

متن کامل

Revisiting Email Spoofing Attacks

The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3281731