A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques
Author | Chamola, V. |
Author | Pavan, Kotesh |
Author | Aayush, Agarwal |
Author | Naren, Naren |
Author | Navneet, Gupta |
Author | Mohsen, Guizani |
Available date | 2022-11-09T07:58:02Z |
Publication Date | 2021-02-01 |
Publication Name | Ad Hoc Networks |
Identifier | http://dx.doi.org/10.1016/j.adhoc.2020.102324 |
Citation | Chamola, V., Kotesh, P., Agarwal, A., Gupta, N., & Guizani, M. (2021). A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques. Ad hoc networks, 111, 102324. |
ISSN | 15708705 |
Abstract | Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening on making UAVs more robust using energy harvesting techniques to have a better battery lifetime, network performance and to secure against attackers. UAV networks are many times used for unmanned missions. There have been many attacks on civilian, military, and industrial targets that were carried out using remotely controlled or automated UAVs. This continued misuse has led to research in preventing unauthorized UAVs from causing damage to life and property. In this paper, we present a literature review of UAVs, UAV attacks, and their prevention using anti-UAV techniques. We first discuss the different types of UAVs, the regulatory laws for UAV activities, their use cases, recreational, and military UAV incidents. After understanding their operation, various techniques for monitoring and preventing UAV attacks are described along with case studies. |
Language | en |
Publisher | Elsevier B.V. |
Subject | Attacks Drone Jamming Neutralization UAV |
Type | Article |
Volume Number | 111 |
Check access options
Files in this item
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]