小型无人机安全研究综述.

被引:27
作者
刘炜
冯丙文
翁健
机构
[1] 暨南大学网络空间安全学院
基金
高等学校博士学科点专项科研基金;
关键词
小型无人机; 信息安全; 安全威胁; 隐私侵犯; 认证;
D O I
暂无
中图分类号
V279 [无人驾驶飞机];
学科分类号
1111 ;
摘要
近年来,随着制造成本的降低和技术的发展,小型无人机正逐渐从军用和高端商用走向大众消费级市场,并引起了学界较为广泛的关注。小型无人机在给人们生活带来便利的同时,也面临日益严峻的安全问题。从小型无人机面临的安全威胁、利用小型无人机发起的攻击以及无人机的认证和溯源等方面总结和分析了国内外无人机安全领域的研究现状,并对小型无人机安全的未来发展趋势进行了展望。
引用
收藏
页码:39 / 45
页数:7
相关论文
共 12 条
  • [1] 利用模式噪声主分量信息的源相机辨识技术
    胡永健
    俞兵华
    简超
    [J]. 计算机应用, 2010, 30 (01) : 31 - 35
  • [2] Secure authentication and integrity techniques for randomized secured routing in WSN
    Kumaran, U. Senthil
    Ilango, P.
    [J]. WIRELESS NETWORKS, 2015, 21 (02) : 443 - 451
  • [3] An energy-efficient and security aware route selection protocol for wireless sensor networks
    Hayajneh, Thaier
    Doomun, Razvi
    Al-Mashaqbeh, Ghada
    Mohd, Bassam J.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2015 - 2038
  • [4] Unmanned Aircraft Capture and Control Via GPS Spoofing
    Kerns, Andrew J.
    Shepard, Daniel P.
    Bhatti, Jahshan A.
    Humphreys, Todd E.
    [J]. JOURNAL OF FIELD ROBOTICS, 2014, 31 (04) : 617 - 636
  • [5] A Trust-Aware and Location-Based Secure Routing Protocol for WSN[J] . Xiao Rong Zhou,Meng Tian Song,Gan Wei Cai.Applied Mechanics and Materials . 2013 (373)
  • [6] A novel pairing-free certificateless authenticated key agreement protocol with provable security[J] . Haiyan Sun,Qiaoyan Wen,Hua Zhang,Zhengping Jin.Frontiers of Computer Science . 2013 (4)
  • [7] GPS-denied Indoor and Outdoor Monocular Vision Aided Navigation and Control of Unmanned Aircraft
    Chowdhary, Girish
    Johnson, Eric N.
    Magree, Daniel
    Wu, Allen
    Shein, Andy
    [J]. JOURNAL OF FIELD ROBOTICS, 2013, 30 (03) : 415 - 438
  • [8] Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks[J] . Daniel P. Shepard,Todd E. Humphreys,Aaron A. Fansler.International Journal of Critical Infrastructure Protection . 2012 (3-4)
  • [9] Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications[J] . Rachel L. Finn,David Wright.Computer Law and Security Review: The International Journal of Technology and Practice . 2012 (2)
  • [10] Elliptic curve cryptography-based access control in sensor networks[J] . Haodong Wang,Bo,Sheng,Qun,Li.Int. J. of Security and Networks . 2006 (3/4)