A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions

dc.contributor.authorAdil, Muhammad
dc.contributor.authorJan, Mian Ahmad
dc.contributor.authorLiu, Yongxin
dc.contributor.authorAbulkasim, Hussein
dc.contributor.authorFarouk, Ahmed
dc.contributor.authorSong, Houbing
dc.date.accessioned2022-12-22T18:48:42Z
dc.date.available2022-12-22T18:48:42Z
dc.date.issued2022-11-11
dc.description.abstractUnmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful communication paradigm for different Internet of Things (IoT) applications. Following the operational capabilities of IoTs, this emerging technology could be extremely helpful in the area, where human access is not possible. Because IoT devices are employed in an infrastructureless environment, where they communicate with each other via the wireless medium to share accumulated data in network topological order. However, the unstructured deployment with wireless and dynamic communication make them disclosed to various security threats, which need to be addressed for their efficient results. Therefore, the primary objective of this work is to present a comprehensive survey of the theoretical literature associated with security concerns of this emerging technology from 2015-to-2022. To follow up this, we have overviewed different security threats of UAV-aided IoT applications followed by their countermeasures techniques to identify the current challenges and requirements of this emerging technology paradigm that must be addressed by researchers, enterprise market, and industry stakeholders. In light of underscored constrains, we have highlighted the open security challenges that could be assumed a move forward step toward setting the future research insights. By doing this, we set a preface for the answer to a question, why this paper is needed in the presence of published review articles.en_US
dc.description.sponsorshipThis work was supported by the National Science Foundation under Grant 2229975, Grant 2150213, and Grant 1956193.en_US
dc.description.urihttps://ieeexplore.ieee.org/abstract/document/9946859en_US
dc.format.extent19 pagesen_US
dc.genrejournal articlesen_US
dc.genrepostprintsen_US
dc.identifierdoi:10.13016/m2upw1-m1gb
dc.identifier.citationM. Adil, M. A. Jan, Y. Liu, H. Abulkasim, A. Farouk and H. Song, "A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions," in IEEE Transactions on Intelligent Transportation Systems, 2022, doi: 10.1109/TITS.2022.3220043.en_US
dc.identifier.urihttps://doi.org/10.1109/TITS.2022.3220043
dc.identifier.urihttp://hdl.handle.net/11603/26498
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rights© 2022 IEEE.  Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.titleA Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directionsen_US
dc.typeTexten_US
dcterms.creatorhttps://orcid.org/0000-0003-2631-9223en_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A_Systematic_Survey_Security_Threats_to_UAV-Aided_IoT_Applications_Taxonomy_Current_Challenges_and_Requirements_With_Future_Research_Directions.pdf
Size:
4.37 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: