当前位置: X-MOL 学术Ad Hoc Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques
Ad Hoc Networks ( IF 4.4 ) Pub Date : 2020-10-10 , DOI: 10.1016/j.adhoc.2020.102324
Vinay Chamola , Pavan Kotesh , Aayush Agarwal , Naren , Navneet Gupta , Mohsen Guizani

Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening on making UAVs more robust using energy harvesting techniques to have a better battery lifetime, network performance and to secure against attackers. UAV networks are many times used for unmanned missions. There have been many attacks on civilian, military, and industrial targets that were carried out using remotely controlled or automated UAVs. This continued misuse has led to research in preventing unauthorized UAVs from causing damage to life and property. In this paper, we present a literature review of UAVs, UAV attacks, and their prevention using anti-UAV techniques. We first discuss the different types of UAVs, the regulatory laws for UAV activities, their use cases, recreational, and military UAV incidents. After understanding their operation, various techniques for monitoring and preventing UAV attacks are described along with case studies.



中文翻译:

无人机攻击与中和技术综述

在这十年中,无人驾驶飞机(UAV)彻底改变了飞机工业。无人机现在能够执行遥感,远程监控,快递交付等等。为了使无人机具有更强大的功能,使用能量收集技术以延长电池寿命,提高网络性能并防止攻击者的安全,正在进行大量研究。无人机网络多次用于无人任务。使用远程控制或自动无人机对民用,军事和工业目标进行了许多攻击。这种持续的滥用已经导致了研究,以防止未经授权的无人机造成生命和财产损失。在本文中,我们对无人飞行器,无人飞行器攻击及其使用反无人机技术的预防进行了文献综述。我们首先讨论不同类型的无人机,无人机活动,其使用案例,娱乐和军事无人机事件的法规。了解它们的操作后,将介绍各种监视和预防无人机攻击的技术以及案例研究。

更新日期:2020-11-17
down
wechat
bug