Security threats and mitigation techniques in UAV communications: A comprehensive survey

GK Pandey, DS Gurjar, HH Nguyen, S Yadav - IEEE Access, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …

A survey of cyber-physical systems from a game-theoretic perspective

W Tushar, C Yuen, TK Saha, S Nizami, MR Alam… - IEEE …, 2023 - ieeexplore.ieee.org
With the emergence of the Internet-of-Things (IoT), artificial intelligence, and communication
technologies, cyber-physical systems (CPS) have revolutionized the engineering paradigm …

Protect your sky: A survey of counter unmanned aerial vehicle systems

H Kang, J Joung, J Kim, J Kang, YS Cho - Ieee Access, 2020 - ieeexplore.ieee.org
Recognizing the various and broad range of applications of unmanned aerial vehicles
(UAVs) and unmanned aircraft systems (UAS) for personal, public and military applications …

Drones in distress: A game-theoretic countermeasure for protecting UAVs against GPS spoofing

AR Eldosouky, A Ferdowsi… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
One prominent security threat that targets unmanned aerial vehicles (UAVs) is the capture
via global positioning system (GPS) spoofing in which an attacker manipulates a UAV's GPS …

Honeypot detection strategy against advanced persistent threats in industrial internet of things: A prospect theoretic game

W Tian, M Du, X Ji, G Liu, Y Dai… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Software-defined networking (SDN) has become a promising trend for managing the
Industrial Internet of Things (IIoT) devices. As the core of sensitive data storage and …

Covert communication with time uncertainty in time-critical wireless networks

X Lu, S Yan, W Yang, M Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this work, we investigate the status packet covert communication with time uncertainty in
time-critical wireless networks. We model the packet generation as a Poisson process that …

Effect of disinformation propagation on opinion dynamics: A game theoretic approach

Z Guo, J Valinejad, JH Cho - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
Disinformation can alter or manipulate our values, opinions, and rational decisions toward
any life event because disinformation, such as fake news or rumors, is propagated rapidly …

A game-theoretic method for defending against advanced persistent threats in cyber systems

L Zhang, T Zhu, FK Hussain, D Ye… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Advanced persistent threats (APTs) are one of today's major threats to cyber security. Highly
determined attackers along with novel and evasive exfiltration techniques mean APT attacks …

A survey on cybersecurity attacks and defenses for unmanned aerial systems

Z Wang, Y Li, S Wu, Y Zhou, L Yang, Y Xu… - Journal of Systems …, 2023 - Elsevier
In recent years, unmanned aerial systems (UAS) have been widely used in both military and
civilian fields. However, their open-source software and protocols have made their security …

Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks

A Gupta, SK Gupta - International journal of communication …, 2022 - Wiley Online Library
A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers
worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone …