Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (3): 39-45.doi: 10.11959/j.issn.2909-109x.2016.00037
• summarize • Previous Articles Next Articles
Wei LIU,Bing-wen FENG,Jian WENG()
Received:
2016-02-17
Revised:
2016-03-01
Online:
2016-12-01
Published:
2016-04-20
Supported by:
CLC Number:
Wei LIU,Bing-wen FENG,Jian WENG. Survey on research of mini-drones security[J]. Chinese Journal of Network and Information Security, 2016, 2(3): 39-45.
[1] | 2016年3·15 晚会[EB/OL]. . |
The 3·15 gala of China 2016[EB/OL]. . | |
[2] | CES 2015: why the future of drones is up in the air[EB/OL]. . |
[3] | EVTank. 2015年度民用无人机市场研究[EB/OL]. . |
EVTank. 2015 market research on civilian drones[EB/OL]. . | |
[4] | 2015?2020 年中国无人机行业市场分析与投资前景预测报告[EB/OL]. . |
Market research and prediction on China’s drone industry of 2015-2020[EB/OL]. . | |
[5] | 关于无人机,你需要知道的都在这里了[EB/OL]. . |
All you need to know about drones[EB/OL]. . | |
[6] | CHILDERS B . Hacking the Parrot AR drone[J]. Linux Journal, 2014, 2014 (241): 1. |
[7] | PLEBAN J S , BAND R CREUTZBURG R . Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy[C]// SPIE International Conference on Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications, San Francisco.c 2014 (9030): 271-283. |
[8] | 3·15 晚会报道的无人机是怎么被劫持的?[EB/OL]. . |
The 3·15 gala of China report on how did drones got hijacked[EB/OL]. . | |
[1] | WON J , SEO S H BERTINO E . A secure communication protocol for drones and smart objects[C]// The 10th ACM Symposium on Information, Computer and Communications Security, New York.c 2015: 249-260. |
[10] | BIRNBAUM Z , DOLGIKH A SKORMIN V , et al. Unmanned aerial vehicle security using recursive parameter estimation[C]// 2014 IEEE International Conference on Unmanned Aircraft Systems (ICUAS), Orlando.c 2014: 692-702. |
[11] | CABANISS R , KUMAR V , MADRIA S . Multi-party encryption (MPE): secure communications in delay tolerant networks[J]. Wireless Networks, 2015, 21 (4): 1243-1258. |
[12] | HUMPHREYS T E , LEDVINA B M , PSIAKI M L , et al. Assessing the spoofing threat: development of a portable GPS civilian spoofer[C]// The ION GNSS International Technical Meeting of the Satellite Division, Savannah.c 2008: 55-56. |
[13] | SHEPARD D . Characterization of receiver response to spoofing attacks[D] Austin: University of Tenas at Austin, 2011. |
[14] | SHEPARD D P , HUMPHREYS T E , FANSLER A A . Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks[J]. International Journal of Critical Infrastructure Protection, 2012, 5 (3): 146-153. |
[15] | KERNS A J , SHEPARD D P , BHATTI J A et al. Unmanned aircraft capture and control via GPS spoofing[J]. Journal of Field Robotics, 2014, 31 (4): 617-636. |
[16] | BROUMANDAN A , JAFARNIA-JAHROMI A , DEHGAHANIAN V et al. GNSS spoofing detection in handheld receivers based on signal spatial correlation[C]// The IEEE/ION Position Location and Navigation Symposium (PLANS), Myrtle Beach.c 2012: 479-487. |
[17] | DELORENZO D S , GAUTIER J , RIFE J , et al. Adaptive array processing for GPS interference rejection[C]// The 18th International Technical Meeting of the Satellite Division of the Institute of Navigation, Long Beach.c 2005: 618-627. |
[18] | MONTGOMERY P Y , HUMPHREYS T E , LEDVINA B M . A multi-antenna defense: receiver-autonomous GPS spoofing detection[J]. Inside GNSS, 2009, 4 (2): 40-46. |
[19] | DEHGHANIAN V , NIELSEN J , LACHAPELLE G . GNSS spoofing detection based on receiver C/No estimates[C]// The 25th International Technical Meeting of the Satellite Division of the Institute of Navigation, Nashville.c 2012: 2878-2884. |
[20] | WEISS S , SCARAMUZZA D , SIEGWART R . MonocularSLAM-based navigation for autonomous micro helicopters in GPS-denied environments[J]. Journal of Field Robotics, 2011, 28 (6): 854-874. |
[21] | WESSON K D , EVANS B L , HUMPHREYS T E . A combined symmetric difference and power monitoring GNSS anti-spoofing technique[C]// 2013 IEEE Global Conference on Signal and Information Processing, Austin.c 2013: 217-220. |
[22] | CHOWDHARY G , JOHNSON E N , MAGREE D et al. GPS-denied indoor and outdoor monocular vision aided navigation and control of unmanned aircraft[J]. Journal of Field Robotics, 2013, 30 (3): 415-438. |
[23] | PATHANA K , LEE H W , HONG C S . Security in wireless sensor networks: issues and challenges[C]// The 8th IEEE International Conference on Advanced Communication Technology, Phoenix Park.c 2007, 6-1048. |
[24] | NEWSOME J , SHI E , SONG D et al. The sybil attack in sensor networks: analysis & defenses[C]// The ACM 3rd International Symposium on Information Processing in Sensor Networks, New York.c 2004: 259-268. |
[25] | GURA N , PATEL A , WANDER A et al. Comparing elliptic curvecryptography and RSA on 8 bit CPUs[C]// The 6th Springer International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin.c 2004: 119-132. |
[1] | MALAN P T , WEISH M , SMITH M D . A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]// The 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara.c 2004: 58-67. |
[27] | WANG H , SHENG B , LI Q . Elliptic curve cryptography-based access control in sensor networks[J]. International Joural of Security and Networks, 2006, 1 (3): 127-137. |
[28] | PERRIG A , SIEWCZYK R , JYGAR J D . SPINS: security protocols for sensor networks[J]. Wireless Networks Journal (WINE), 2002, 8 (5): 521-534. |
[29] | ZHOU Y , LI L . A trust-aware and location-based secure routing protocol for WSN[J]. Applied Mechanics and Materials, 2013, 373-375: 1931-1934. |
[30] | KANG H S , KIM S R , KIM P . Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network[J]. Computer Science and Information Systems, 2013, 10 (2) 685-701. |
[31] | HAYAJNEH T , DOOMUN R , AL-MASHAQBEH G , et al. An energy-efficient and security aware route selection protocol for wireless sensor networks[J]. Security & Communication Networks, 2014, 7: 2015-2038. |
[32] | SANGEETHA R , YUVARAJU M . Secure energy-aware multipath routing protocol with transmission range adjustment for wireless sensor networks[C]// The 2012 IEEE International Conference on Computational Intelligence & Computing Research (ICCIC), Coimbatore.c 2012: 1-4. |
[33] | LOTF J J , HOSSEINZADEH M , ALGULIEV R M . Hierarchical routing in wireless sensor networks: a survey[C]// The 2nd International Conference on Computer Engineering and Technology, Chengdu.c 2010: 650-654. |
[34] | CHEN X , MAKKI K , YEN K , et al. Sensor network security: a survey[J]. IEEE Communications Surveys & Tutorials, 2009, 11 (2): 52-73. |
[35] | HU T , FEI Y . QELAR: a machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks[J]. IEEE Transactions on Mobile Computing, 2010, 9 (6): 796-809. |
[36] | KORSHUNOV P , EBRAHIMI T . Using warping for privacy protection in video surveillance[C]// The 18th IEEE International Conference on Digital Signal Processing (DSP), Fira.c 2013: 1-6. |
[37] | KORSHUNOV P , EBRAHIMI T . Using face morphing to protect privacy[C]// The 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Krakow.c 2013: 208-213. |
[38] | SCHMIDT M , SHEAR M . A drone, too small for radar to detect, rattles the White House[EB/OL]. . |
[39] | GORMLEY D M . UAVs and cruise missiles as possible terrorist weapons[EB/OL]. . |
[40] | GORMLEY D M , SPEIER R . Controlling unmanned air vehicles:new challenges[J]. The Nonproliferation Review, 2003, 10 (2): 66-79. |
[41] | SIRAK M . Air force studies how to counter hostile UAVs[J]. Helicopter News, 2006, 1: 1-2. |
无人机不乏黑暗面成天空监管一大隐患[EB/OL]. . | |
The bad influences drone might brought to the sky surveillance[EB/OL]. . | |
[43] | PITT J , PERAKSLIS C , MICHAEL K . Drones humanus introduction to the special issue[J]. Technology and Society Magazine, 2014, 33 (2) 38-39. |
[44] | WILSON R L . Ethical issues with use of drone aircraft[C]// The 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering, Chicago.c 2014, 1-4. |
[45] | VILLASENOR J . “Drones”and the future of domestic aviation[J]. Proceedings of the IEEE, 2014, 102 (3) 235-238. |
[1] | FINN R L , WRIGHT D . Unmanned aircraft systems: surveillance, ethics and privacy in civil applications[J]. Computer Law &Security Review, 2012, 28 (2): 184-194. |
[47] | VILLASENOR J . Observations from above: unmanned aircraft systems and privacy[J]. Harvard Journal of Law & Public Policy, 2013, 36: 457. |
[48] | LIU Z , LI Z , LIU B , et al. Rise of mini-drones: applications and issues[C]// Workshop on Privacy-Aware Mobile Computing.c 2015: 7-12. |
[49] | MAO H , YANG C , ABOUSLEMAN G P , et al. Automated multiple target detection and tracking in UAV videos[C]// SPIE-The International Society for Optical Engineering.c 2010. |
[50] | MEJIAS L , SARIPALLI S , CAMPOY P , et al. Visual servoing of an autonomous helicopter in urban areas using feature tracking[J]. Journal of Field Robotics, 2006, 23 (3-4): 185-199. |
[51] | HERISSé B , HAMEL T , MAHONY R , et al. Landing a VTOL unmanned aerial vehicle on a moving platform using optical flow[J]. IEEE Transactions on Robotics, 2012, 28 (1): 77-89. |
[52] | 安全飞行指引飞行区域限制[EB/OL]. . |
Safety guide on aircraft movement area restrictions[EB/OL]. . | |
[53] | 美国人这样阻止无人机窥探住宅隐私[EB/OL]. . |
What Americans did to protect residents’ privacy from drones[EB/OL]. . | |
[54] | NoFlyZone[EB/OL]. . |
[55] | BONETTO M , KORSHUNOV P , RAMPONI G , et al. Privacy in mini-drone based video surveillance[C]// The 2015 IEEE International Conference on Image Processing (ICIP), Quebec City.c 2015: 2464-2469. |
[56] | MEZEI J , FIASKA V , MOLNAR A . Drone sound detection[C]// The 16th IEEE International Symposium on Computational Intelligence and Informatics (CINTI), Budapest.c 2015: 333-338. |
[1] | MOSES A , RUTHERFORD M J , VALAVANIS K P . Radar-based detection and identification for miniature air vehicles[C]// The 2011 IEEE International Conference on Control Applications (CCA), Denver.c 2011: 933-940. |
[58] | 航天科工披露反无人机系统已执行多次任务[EB/OL]. . |
China Aerospace Science & Industry Corporation has revealed assignments carried out by anti-drone system[EB/OL]. . | |
[59] | ILANGO P . Secure authentication and integrity techniques for randomized secured routing in WSN[J]. Wireless Networks, 2015, 21 (2): 443-451. |
[60] | 盘点12起引发争议的无人机事故[EB/OL]. . |
View points on 12 controversial drone accidents[EB/OL]. . | |
[61] | YANG G , TAN C H . Strongly secure certificateless key exchange without pairing[C]// The 6th ACM Symposium on Information, Computer and Communications Security, New York,c 2011: 71-79. |
[62] | SUN H , WEN Q , ZHANG H , et al. A novel pairing-free certificateless authenticated key agreement protocol with provable security[J]. Frontiers of Computer Science, 2013, 7 (4): 544-557. |
[63] | SEO S , BERTINO E . Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing[R]. CERIAS, West Lafayette, IN, USA, 2013. |
[64] | LUKAS J , FRIDRICH J , GOLJAN M . Digital camera identification from sensor pattern noise[J]. IEEE Transactions on Information Forensics and Security, 2006, 1 (2): 205-214. |
[65] | CHEN M , FRIDRICH J , GOLJAN M , et al. Determining image origin and integrity using sensor noise[J]. IEEE Transactions on Information Forensics and Security, 2008, 3 (1): 74-90. |
[66] | GOLJAN M , FRIDRICH J , FILLER T . Managing a large database of camera fingerprints[C]// IS&T/SPIE Electronic Imaging Symposium, San Jose.c 2010. |
[67] | GOLJAN M , FRIDRICH J , FILLER T . Large scale test of sensor fingerprint camera identification[C]// IS & T/SPIE Electronic Imaging Symposium, San Jose.c 2009. |
[68] | HU Y , YU B , JIAN C . Source camera identification technique using large components of imaging sensor pattern noise[J]. Journal of Computer Applications, 2010, 9: 31-35. |
[69] | LIU B B , HU Y , LEE H K . Source camera identification from significant noise residual regions[C]// The 17th IEEE International Conference on Image Processing(ICIP), HongKong.c 2010: 1749-1752. |
[1] | Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU. Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 29-38. |
[2] | Jun LIU, Lin YUAN, Zhishang FENG. Survey of key management schemes for cluster networks [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69. |
[3] | Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE. Survey on explainable knowledge graph reasoning methods [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 1-25. |
[4] | Jie QIU, Rui HAN, Zhifeng WEI, Zhiyang WANG. Research of public infrastructure system and security policy in cyberspace [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 56-67. |
[5] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[6] | Jin LI, Jin CAO, Yueyu ZHANG, Meiru ZHANG, Hui LI. Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 166-174. |
[7] | Fan CHAO, Zhi YANG, Xuehui DU, Bing HAN. Classified risk assessment method of Android application based on multi-factor clustering selection [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 161-173. |
[8] | Guojie LIU,Jianbiao ZHANG. TPCM-based trusted PXE boot method for servers [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 105-111. |
[9] | Lei HAN,Jiqiang LIU,Jian WANG,Bo SHI,Xudong HE. Quantitative threat situational assessment method for higher secure attribute value device [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 54-66. |
[10] | Qiao HU,Yupeng HU,Xin LIAO,Zheng QIN,Jianhua SUN,Jiliang ZHANG. Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 153-158. |
[11] | Guanghan DUAN,Chunguang MA,Lei SONG,Peng WU. Research on structure and defense of adversarial example in deep learning [J]. Chinese Journal of Network and Information Security, 2020, 6(2): 1-11. |
[12] | Qiang QU,Hongtao YU,Ruiyang HUANG. Attention-based approach of detecting spam in social networks [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61. |
[13] | JIA Chunfu,LI Ruiqi,TIAN Meiqi,CHENG Xiaoyang. Discuss on cultivating mode of information security and law inter-disciplinary talents [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 31-35. |
[14] | Jinxin ZUO,Ziyu GUO,Jin LI,Jie ZHANG,Yueming LU. Security evaluation method for confidential and stable complex systems [J]. Chinese Journal of Network and Information Security, 2019, 5(2): 58-65. |
[15] | Shudi CHEN,Youwen ZHU. Shoulder-surfing resistant PIN-entry method [J]. Chinese Journal of Network and Information Security, 2019, 5(1): 87-93. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|