Security threats and mitigation techniques in UAV communications: A comprehensive survey

GK Pandey, DS Gurjar, HH Nguyen, S Yadav - IEEE Access, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …

A security review in the UAVNet era: threats, countermeasures, and gap analysis

A Rugo, CA Ardagna, NE Ioini - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for
commercial applications, embracing many domains ranging from human safety to the …

[HTML][HTML] On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions

SZ Khan, M Mohsin, W Iqbal - PeerJ Computer Science, 2021 - peerj.com
Abstract Unmanned Aerial Systems (UAVs, Drones), initially known only for their military
applications, are getting increasingly popular in the civil sector as well. Over the military …

[图书][B] New dimensions of information warfare

R Di Pietro, S Raponi, M Caprolu, S Cresci, R Di Pietro… - 2021 - Springer
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …

Air-to-air micro air vehicle interceptor with an embedded mechanism and deep learning

ZW Lee, WH Chin, HW Ho - Aerospace Science and Technology, 2023 - Elsevier
Illegal flight of small and portable aerial vehicles, or the so-called Micro Air Vehicles (MAVs),
has become a serious safety issue in most cities around the world. Most existing intercepting …

Spoofing attacks on FMCW radars with low-cost backscatter tags

A Lazaro, A Porcel, M Lazaro, R Villarino, D Girbau - Sensors, 2022 - mdpi.com
This work studies the feasibility of using backscatter-modulated tags to introduce false
information into a signal received by a frequency-modulated continuous-wave (FMCW) …

Convert harm into benefit: A coordination-learning based dynamic spectrum anti-jamming approach

Y Xu, Y Xu, X Dong, G Ren, J Chen… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
This paper mainly investigates the multi-user anti-jamming spectrum access problem. Using
the idea of “converting harm into benefit,” the malicious jamming signals projected by the …

ARID: Anonymous remote identification of unmanned aerial vehicles

P Tedeschi, S Sciancalepore, R Di Pietro - Proceedings of the 37th …, 2021 - dl.acm.org
To enable enhanced accountability of Unmanned Aerial Vehicles (UAVs) operations, the US-
based Federal Avionics Administration (FAA) recently published a new dedicated regulation …

[HTML][HTML] Noise2Weight: On detecting payload weight from drones acoustic emissions

OA Ibrahim, S Sciancalepore, R Di Pietro - Future Generation Computer …, 2022 - Elsevier
The increasing popularity of autonomous and remotely-piloted drones has paved the way for
several use-cases and application scenarios, including merchandise delivery, surveillance …

JoLo: Multi-device joint localization based on wireless data fusion

SI Sou, FJ Wu, WC Wu - IEEE Transactions on Mobile …, 2022 - ieeexplore.ieee.org
Many indoor localization techniques have been widely investigated. As the proportion of
people with multiple mobile devices is increasing, an interesting research challenge arising …