网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (3): 39-45.doi: 10.11959/j.issn.2909-109x.2016.00037
收稿日期:
2016-02-17
修回日期:
2016-03-01
出版日期:
2016-12-01
发布日期:
2016-04-20
作者简介:
刘炜(1985-),男,广西南宁人,暨南大学博士生,主要研究方向为无人机安全、密码学。|冯丙文(1985-),男,四川蓬溪人,暨南大学博士生,主要研究方向为信息隐藏、多媒体安全。|翁健(1976-),男,广东茂名人,暨南大学教授、博士生导师,主要研究方向为密码学与信息安全。
基金资助:
Wei LIU,Bing-wen FENG,Jian WENG()
Received:
2016-02-17
Revised:
2016-03-01
Online:
2016-12-01
Published:
2016-04-20
Supported by:
摘要:
近年来,随着制造成本的降低和技术的发展,小型无人机正逐渐从军用和高端商用走向大众消费级市场,并引起了学界较为广泛的关注。小型无人机在给人们生活带来便利的同时,也面临日益严峻的安全问题。从小型无人机面临的安全威胁、利用小型无人机发起的攻击以及无人机的认证和溯源等方面总结和分析了国内外无人机安全领域的研究现状,并对小型无人机安全的未来发展趋势进行了展望。
中图分类号:
刘炜,冯丙文,翁健. 小型无人机安全研究综述[J]. 网络与信息安全学报, 2016, 2(3): 39-45.
Wei LIU,Bing-wen FENG,Jian WENG. Survey on research of mini-drones security[J]. Chinese Journal of Network and Information Security, 2016, 2(3): 39-45.
[1] | 2016年3·15 晚会[EB/OL]. . |
The 3·15 gala of China 2016[EB/OL]. . | |
[2] | CES 2015: why the future of drones is up in the air[EB/OL]. . |
[3] | EVTank. 2015年度民用无人机市场研究[EB/OL]. . |
EVTank. 2015 market research on civilian drones[EB/OL]. . | |
[4] | 2015?2020 年中国无人机行业市场分析与投资前景预测报告[EB/OL]. . |
Market research and prediction on China’s drone industry of 2015-2020[EB/OL]. . | |
[5] | 关于无人机,你需要知道的都在这里了[EB/OL]. . |
All you need to know about drones[EB/OL]. . | |
[6] | CHILDERS B . Hacking the Parrot AR drone[J]. Linux Journal, 2014, 2014 (241): 1. |
[7] | PLEBAN J S , BAND R CREUTZBURG R . Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy[C]// SPIE International Conference on Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications, San Francisco.c 2014 (9030): 271-283. |
[8] | 3·15 晚会报道的无人机是怎么被劫持的?[EB/OL]. . |
The 3·15 gala of China report on how did drones got hijacked[EB/OL]. . | |
[1] | WON J , SEO S H BERTINO E . A secure communication protocol for drones and smart objects[C]// The 10th ACM Symposium on Information, Computer and Communications Security, New York.c 2015: 249-260. |
[10] | BIRNBAUM Z , DOLGIKH A SKORMIN V , et al. Unmanned aerial vehicle security using recursive parameter estimation[C]// 2014 IEEE International Conference on Unmanned Aircraft Systems (ICUAS), Orlando.c 2014: 692-702. |
[11] | CABANISS R , KUMAR V , MADRIA S . Multi-party encryption (MPE): secure communications in delay tolerant networks[J]. Wireless Networks, 2015, 21 (4): 1243-1258. |
[12] | HUMPHREYS T E , LEDVINA B M , PSIAKI M L , et al. Assessing the spoofing threat: development of a portable GPS civilian spoofer[C]// The ION GNSS International Technical Meeting of the Satellite Division, Savannah.c 2008: 55-56. |
[13] | SHEPARD D . Characterization of receiver response to spoofing attacks[D] Austin: University of Tenas at Austin, 2011. |
[14] | SHEPARD D P , HUMPHREYS T E , FANSLER A A . Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks[J]. International Journal of Critical Infrastructure Protection, 2012, 5 (3): 146-153. |
[15] | KERNS A J , SHEPARD D P , BHATTI J A et al. Unmanned aircraft capture and control via GPS spoofing[J]. Journal of Field Robotics, 2014, 31 (4): 617-636. |
[16] | BROUMANDAN A , JAFARNIA-JAHROMI A , DEHGAHANIAN V et al. GNSS spoofing detection in handheld receivers based on signal spatial correlation[C]// The IEEE/ION Position Location and Navigation Symposium (PLANS), Myrtle Beach.c 2012: 479-487. |
[17] | DELORENZO D S , GAUTIER J , RIFE J , et al. Adaptive array processing for GPS interference rejection[C]// The 18th International Technical Meeting of the Satellite Division of the Institute of Navigation, Long Beach.c 2005: 618-627. |
[18] | MONTGOMERY P Y , HUMPHREYS T E , LEDVINA B M . A multi-antenna defense: receiver-autonomous GPS spoofing detection[J]. Inside GNSS, 2009, 4 (2): 40-46. |
[19] | DEHGHANIAN V , NIELSEN J , LACHAPELLE G . GNSS spoofing detection based on receiver C/No estimates[C]// The 25th International Technical Meeting of the Satellite Division of the Institute of Navigation, Nashville.c 2012: 2878-2884. |
[20] | WEISS S , SCARAMUZZA D , SIEGWART R . MonocularSLAM-based navigation for autonomous micro helicopters in GPS-denied environments[J]. Journal of Field Robotics, 2011, 28 (6): 854-874. |
[21] | WESSON K D , EVANS B L , HUMPHREYS T E . A combined symmetric difference and power monitoring GNSS anti-spoofing technique[C]// 2013 IEEE Global Conference on Signal and Information Processing, Austin.c 2013: 217-220. |
[22] | CHOWDHARY G , JOHNSON E N , MAGREE D et al. GPS-denied indoor and outdoor monocular vision aided navigation and control of unmanned aircraft[J]. Journal of Field Robotics, 2013, 30 (3): 415-438. |
[23] | PATHANA K , LEE H W , HONG C S . Security in wireless sensor networks: issues and challenges[C]// The 8th IEEE International Conference on Advanced Communication Technology, Phoenix Park.c 2007, 6-1048. |
[24] | NEWSOME J , SHI E , SONG D et al. The sybil attack in sensor networks: analysis & defenses[C]// The ACM 3rd International Symposium on Information Processing in Sensor Networks, New York.c 2004: 259-268. |
[25] | GURA N , PATEL A , WANDER A et al. Comparing elliptic curvecryptography and RSA on 8 bit CPUs[C]// The 6th Springer International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin.c 2004: 119-132. |
[1] | MALAN P T , WEISH M , SMITH M D . A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]// The 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara.c 2004: 58-67. |
[27] | WANG H , SHENG B , LI Q . Elliptic curve cryptography-based access control in sensor networks[J]. International Joural of Security and Networks, 2006, 1 (3): 127-137. |
[28] | PERRIG A , SIEWCZYK R , JYGAR J D . SPINS: security protocols for sensor networks[J]. Wireless Networks Journal (WINE), 2002, 8 (5): 521-534. |
[29] | ZHOU Y , LI L . A trust-aware and location-based secure routing protocol for WSN[J]. Applied Mechanics and Materials, 2013, 373-375: 1931-1934. |
[30] | KANG H S , KIM S R , KIM P . Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network[J]. Computer Science and Information Systems, 2013, 10 (2) 685-701. |
[31] | HAYAJNEH T , DOOMUN R , AL-MASHAQBEH G , et al. An energy-efficient and security aware route selection protocol for wireless sensor networks[J]. Security & Communication Networks, 2014, 7: 2015-2038. |
[32] | SANGEETHA R , YUVARAJU M . Secure energy-aware multipath routing protocol with transmission range adjustment for wireless sensor networks[C]// The 2012 IEEE International Conference on Computational Intelligence & Computing Research (ICCIC), Coimbatore.c 2012: 1-4. |
[33] | LOTF J J , HOSSEINZADEH M , ALGULIEV R M . Hierarchical routing in wireless sensor networks: a survey[C]// The 2nd International Conference on Computer Engineering and Technology, Chengdu.c 2010: 650-654. |
[34] | CHEN X , MAKKI K , YEN K , et al. Sensor network security: a survey[J]. IEEE Communications Surveys & Tutorials, 2009, 11 (2): 52-73. |
[35] | HU T , FEI Y . QELAR: a machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks[J]. IEEE Transactions on Mobile Computing, 2010, 9 (6): 796-809. |
[36] | KORSHUNOV P , EBRAHIMI T . Using warping for privacy protection in video surveillance[C]// The 18th IEEE International Conference on Digital Signal Processing (DSP), Fira.c 2013: 1-6. |
[37] | KORSHUNOV P , EBRAHIMI T . Using face morphing to protect privacy[C]// The 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Krakow.c 2013: 208-213. |
[38] | SCHMIDT M , SHEAR M . A drone, too small for radar to detect, rattles the White House[EB/OL]. . |
[39] | GORMLEY D M . UAVs and cruise missiles as possible terrorist weapons[EB/OL]. . |
[40] | GORMLEY D M , SPEIER R . Controlling unmanned air vehicles:new challenges[J]. The Nonproliferation Review, 2003, 10 (2): 66-79. |
[41] | SIRAK M . Air force studies how to counter hostile UAVs[J]. Helicopter News, 2006, 1: 1-2. |
无人机不乏黑暗面成天空监管一大隐患[EB/OL]. . | |
The bad influences drone might brought to the sky surveillance[EB/OL]. . | |
[43] | PITT J , PERAKSLIS C , MICHAEL K . Drones humanus introduction to the special issue[J]. Technology and Society Magazine, 2014, 33 (2) 38-39. |
[44] | WILSON R L . Ethical issues with use of drone aircraft[C]// The 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering, Chicago.c 2014, 1-4. |
[45] | VILLASENOR J . “Drones”and the future of domestic aviation[J]. Proceedings of the IEEE, 2014, 102 (3) 235-238. |
[1] | FINN R L , WRIGHT D . Unmanned aircraft systems: surveillance, ethics and privacy in civil applications[J]. Computer Law &Security Review, 2012, 28 (2): 184-194. |
[47] | VILLASENOR J . Observations from above: unmanned aircraft systems and privacy[J]. Harvard Journal of Law & Public Policy, 2013, 36: 457. |
[48] | LIU Z , LI Z , LIU B , et al. Rise of mini-drones: applications and issues[C]// Workshop on Privacy-Aware Mobile Computing.c 2015: 7-12. |
[49] | MAO H , YANG C , ABOUSLEMAN G P , et al. Automated multiple target detection and tracking in UAV videos[C]// SPIE-The International Society for Optical Engineering.c 2010. |
[50] | MEJIAS L , SARIPALLI S , CAMPOY P , et al. Visual servoing of an autonomous helicopter in urban areas using feature tracking[J]. Journal of Field Robotics, 2006, 23 (3-4): 185-199. |
[51] | HERISSé B , HAMEL T , MAHONY R , et al. Landing a VTOL unmanned aerial vehicle on a moving platform using optical flow[J]. IEEE Transactions on Robotics, 2012, 28 (1): 77-89. |
[52] | 安全飞行指引飞行区域限制[EB/OL]. . |
Safety guide on aircraft movement area restrictions[EB/OL]. . | |
[53] | 美国人这样阻止无人机窥探住宅隐私[EB/OL]. . |
What Americans did to protect residents’ privacy from drones[EB/OL]. . | |
[54] | NoFlyZone[EB/OL]. . |
[55] | BONETTO M , KORSHUNOV P , RAMPONI G , et al. Privacy in mini-drone based video surveillance[C]// The 2015 IEEE International Conference on Image Processing (ICIP), Quebec City.c 2015: 2464-2469. |
[56] | MEZEI J , FIASKA V , MOLNAR A . Drone sound detection[C]// The 16th IEEE International Symposium on Computational Intelligence and Informatics (CINTI), Budapest.c 2015: 333-338. |
[1] | MOSES A , RUTHERFORD M J , VALAVANIS K P . Radar-based detection and identification for miniature air vehicles[C]// The 2011 IEEE International Conference on Control Applications (CCA), Denver.c 2011: 933-940. |
[58] | 航天科工披露反无人机系统已执行多次任务[EB/OL]. . |
China Aerospace Science & Industry Corporation has revealed assignments carried out by anti-drone system[EB/OL]. . | |
[59] | ILANGO P . Secure authentication and integrity techniques for randomized secured routing in WSN[J]. Wireless Networks, 2015, 21 (2): 443-451. |
[60] | 盘点12起引发争议的无人机事故[EB/OL]. . |
View points on 12 controversial drone accidents[EB/OL]. . | |
[61] | YANG G , TAN C H . Strongly secure certificateless key exchange without pairing[C]// The 6th ACM Symposium on Information, Computer and Communications Security, New York,c 2011: 71-79. |
[62] | SUN H , WEN Q , ZHANG H , et al. A novel pairing-free certificateless authenticated key agreement protocol with provable security[J]. Frontiers of Computer Science, 2013, 7 (4): 544-557. |
[63] | SEO S , BERTINO E . Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing[R]. CERIAS, West Lafayette, IN, USA, 2013. |
[64] | LUKAS J , FRIDRICH J , GOLJAN M . Digital camera identification from sensor pattern noise[J]. IEEE Transactions on Information Forensics and Security, 2006, 1 (2): 205-214. |
[65] | CHEN M , FRIDRICH J , GOLJAN M , et al. Determining image origin and integrity using sensor noise[J]. IEEE Transactions on Information Forensics and Security, 2008, 3 (1): 74-90. |
[66] | GOLJAN M , FRIDRICH J , FILLER T . Managing a large database of camera fingerprints[C]// IS&T/SPIE Electronic Imaging Symposium, San Jose.c 2010. |
[67] | GOLJAN M , FRIDRICH J , FILLER T . Large scale test of sensor fingerprint camera identification[C]// IS & T/SPIE Electronic Imaging Symposium, San Jose.c 2009. |
[68] | HU Y , YU B , JIAN C . Source camera identification technique using large components of imaging sensor pattern noise[J]. Journal of Computer Applications, 2010, 9: 31-35. |
[69] | LIU B B , HU Y , LEE H K . Source camera identification from significant noise residual regions[C]// The 17th IEEE International Conference on Image Processing(ICIP), HongKong.c 2010: 1749-1752. |
[1] | 刘国杰,张建标. 基于TPCM的服务器可信PXE启动方法[J]. 网络与信息安全学报, 2020, 6(6): 105-111. |
[2] | 张效林,谷大武,张驰. 移动平台典型应用的身份认证问题研究[J]. 网络与信息安全学报, 2020, 6(6): 137-151. |
[3] | 王昊,吴天昊,朱孔林,张琳. 交叉口场景下基于区块链技术的匿名车辆身份认证方案[J]. 网络与信息安全学报, 2020, 6(5): 27-35. |
[4] | 韩磊,刘吉强,王健,石波,和旭东. 高安全属性价值设备威胁态势量化评估方法[J]. 网络与信息安全学报, 2020, 6(5): 54-66. |
[5] | 张勖,马欣. 基于区块链的轻量化移动自组网认证方案[J]. 网络与信息安全学报, 2020, 6(4): 14-22. |
[6] | 钱思杰,陈立全,王诗卉. 基于改进PBFT算法的PKI跨域认证方案[J]. 网络与信息安全学报, 2020, 6(4): 37-44. |
[7] | 胡桥,胡玉鹏,廖鑫,秦拯,孙建华,张吉良. 湖南大学信息安全专业本科培养计划修订调查分析及改进思路[J]. 网络与信息安全学报, 2020, 6(4): 153-158. |
[8] | 鲁迁迁,朱友文,蒋炎. 无须重注册的单向通信动态口令认证[J]. 网络与信息安全学报, 2020, 6(3): 99-107. |
[9] | 段广晗,马春光,宋蕾,武朋. 深度学习中对抗样本的构造及防御研究[J]. 网络与信息安全学报, 2020, 6(2): 1-11. |
[10] | 牛玉坤,魏凌波,张驰,张霞,GustavoVejarano. 基于比特币区块链的公共无线局域网接入控制隐私保护研究[J]. 网络与信息安全学报, 2020, 6(2): 56-66. |
[11] | 陈盈盈,章峰,蒋文保,周旭. 基于可信联盟的P2P网络身份认证机制[J]. 网络与信息安全学报, 2020, 6(2): 77-86. |
[12] | 高国强,李子臣. 基于AES轮函数认证加密算法研究与设计[J]. 网络与信息安全学报, 2020, 6(2): 106-115. |
[13] | 曲强,于洪涛,黄瑞阳. 基于注意力机制的社交垃圾文本检测方法[J]. 网络与信息安全学报, 2020, 6(1): 54-61. |
[14] | 谢绒娜,毛卫华,史国振. 基于签名认证的电子发票真伪性验证方案[J]. 网络与信息安全学报, 2019, 5(6): 105-112. |
[15] | 刘亮,郭文博,杨昱威,郭怀宇. 基于分段加密和时效控制的QR码物流隐私保护方案[J]. 网络与信息安全学报, 2019, 5(4): 63-70. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|