A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions
Links to Files
Author/Creator ORCID
Date
Type of Work
Department
Program
Citation of Original Publication
M. Adil, M. A. Jan, Y. Liu, H. Abulkasim, A. Farouk and H. Song, "A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions," in IEEE Transactions on Intelligent Transportation Systems, 2022, doi: 10.1109/TITS.2022.3220043.
Rights
© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Subjects
Abstract
Unmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful communication paradigm
for different Internet of Things (IoT) applications. Following the
operational capabilities of IoTs, this emerging technology could
be extremely helpful in the area, where human access is not
possible. Because IoT devices are employed in an infrastructureless environment, where they communicate with each other via
the wireless medium to share accumulated data in network
topological order. However, the unstructured deployment with
wireless and dynamic communication make them disclosed to
various security threats, which need to be addressed for their
efficient results. Therefore, the primary objective of this work is
to present a comprehensive survey of the theoretical literature
associated with security concerns of this emerging technology
from 2015-to-2022. To follow up this, we have overviewed
different security threats of UAV-aided IoT applications followed
by their countermeasures techniques to identify the current challenges and requirements of this emerging technology paradigm
that must be addressed by researchers, enterprise market, and
industry stakeholders. In light of underscored constrains, we have
highlighted the open security challenges that could be assumed
a move forward step toward setting the future research insights.
By doing this, we set a preface for the answer to a question, why
this paper is needed in the presence of published review articles.
