网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (3): 39-45.doi: 10.11959/j.issn.2909-109x.2016.00037
收稿日期:
2016-02-17
修回日期:
2016-03-01
出版日期:
2016-12-01
发布日期:
2016-04-20
作者简介:
刘炜(1985-),男,广西南宁人,暨南大学博士生,主要研究方向为无人机安全、密码学。|冯丙文(1985-),男,四川蓬溪人,暨南大学博士生,主要研究方向为信息隐藏、多媒体安全。|翁健(1976-),男,广东茂名人,暨南大学教授、博士生导师,主要研究方向为密码学与信息安全。
基金资助:
Wei LIU,Bing-wen FENG,Jian WENG()
Received:
2016-02-17
Revised:
2016-03-01
Online:
2016-12-01
Published:
2016-04-20
Supported by:
摘要:
近年来,随着制造成本的降低和技术的发展,小型无人机正逐渐从军用和高端商用走向大众消费级市场,并引起了学界较为广泛的关注。小型无人机在给人们生活带来便利的同时,也面临日益严峻的安全问题。从小型无人机面临的安全威胁、利用小型无人机发起的攻击以及无人机的认证和溯源等方面总结和分析了国内外无人机安全领域的研究现状,并对小型无人机安全的未来发展趋势进行了展望。
中图分类号:
刘炜,冯丙文,翁健. 小型无人机安全研究综述[J]. 网络与信息安全学报, 2016, 2(3): 39-45.
Wei LIU,Bing-wen FENG,Jian WENG. Survey on research of mini-drones security[J]. Chinese Journal of Network and Information Security, 2016, 2(3): 39-45.
[1] | 2016年3·15 晚会[EB/OL]. . |
The 3·15 gala of China 2016[EB/OL]. . | |
[2] | CES 2015: why the future of drones is up in the air[EB/OL]. . |
[3] | EVTank. 2015年度民用无人机市场研究[EB/OL]. . |
EVTank. 2015 market research on civilian drones[EB/OL]. . | |
[4] | 2015?2020 年中国无人机行业市场分析与投资前景预测报告[EB/OL]. . |
Market research and prediction on China’s drone industry of 2015-2020[EB/OL]. . | |
[5] | 关于无人机,你需要知道的都在这里了[EB/OL]. . |
All you need to know about drones[EB/OL]. . | |
[6] | CHILDERS B . Hacking the Parrot AR drone[J]. Linux Journal, 2014, 2014 (241): 1. |
[7] | PLEBAN J S , BAND R CREUTZBURG R . Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy[C]// SPIE International Conference on Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications, San Francisco.c 2014 (9030): 271-283. |
[8] | 3·15 晚会报道的无人机是怎么被劫持的?[EB/OL]. . |
The 3·15 gala of China report on how did drones got hijacked[EB/OL]. . | |
[1] | WON J , SEO S H BERTINO E . A secure communication protocol for drones and smart objects[C]// The 10th ACM Symposium on Information, Computer and Communications Security, New York.c 2015: 249-260. |
[10] | BIRNBAUM Z , DOLGIKH A SKORMIN V , et al. Unmanned aerial vehicle security using recursive parameter estimation[C]// 2014 IEEE International Conference on Unmanned Aircraft Systems (ICUAS), Orlando.c 2014: 692-702. |
[11] | CABANISS R , KUMAR V , MADRIA S . Multi-party encryption (MPE): secure communications in delay tolerant networks[J]. Wireless Networks, 2015, 21 (4): 1243-1258. |
[12] | HUMPHREYS T E , LEDVINA B M , PSIAKI M L , et al. Assessing the spoofing threat: development of a portable GPS civilian spoofer[C]// The ION GNSS International Technical Meeting of the Satellite Division, Savannah.c 2008: 55-56. |
[13] | SHEPARD D . Characterization of receiver response to spoofing attacks[D] Austin: University of Tenas at Austin, 2011. |
[14] | SHEPARD D P , HUMPHREYS T E , FANSLER A A . Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks[J]. International Journal of Critical Infrastructure Protection, 2012, 5 (3): 146-153. |
[15] | KERNS A J , SHEPARD D P , BHATTI J A et al. Unmanned aircraft capture and control via GPS spoofing[J]. Journal of Field Robotics, 2014, 31 (4): 617-636. |
[16] | BROUMANDAN A , JAFARNIA-JAHROMI A , DEHGAHANIAN V et al. GNSS spoofing detection in handheld receivers based on signal spatial correlation[C]// The IEEE/ION Position Location and Navigation Symposium (PLANS), Myrtle Beach.c 2012: 479-487. |
[17] | DELORENZO D S , GAUTIER J , RIFE J , et al. Adaptive array processing for GPS interference rejection[C]// The 18th International Technical Meeting of the Satellite Division of the Institute of Navigation, Long Beach.c 2005: 618-627. |
[18] | MONTGOMERY P Y , HUMPHREYS T E , LEDVINA B M . A multi-antenna defense: receiver-autonomous GPS spoofing detection[J]. Inside GNSS, 2009, 4 (2): 40-46. |
[19] | DEHGHANIAN V , NIELSEN J , LACHAPELLE G . GNSS spoofing detection based on receiver C/No estimates[C]// The 25th International Technical Meeting of the Satellite Division of the Institute of Navigation, Nashville.c 2012: 2878-2884. |
[20] | WEISS S , SCARAMUZZA D , SIEGWART R . MonocularSLAM-based navigation for autonomous micro helicopters in GPS-denied environments[J]. Journal of Field Robotics, 2011, 28 (6): 854-874. |
[21] | WESSON K D , EVANS B L , HUMPHREYS T E . A combined symmetric difference and power monitoring GNSS anti-spoofing technique[C]// 2013 IEEE Global Conference on Signal and Information Processing, Austin.c 2013: 217-220. |
[22] | CHOWDHARY G , JOHNSON E N , MAGREE D et al. GPS-denied indoor and outdoor monocular vision aided navigation and control of unmanned aircraft[J]. Journal of Field Robotics, 2013, 30 (3): 415-438. |
[23] | PATHANA K , LEE H W , HONG C S . Security in wireless sensor networks: issues and challenges[C]// The 8th IEEE International Conference on Advanced Communication Technology, Phoenix Park.c 2007, 6-1048. |
[24] | NEWSOME J , SHI E , SONG D et al. The sybil attack in sensor networks: analysis & defenses[C]// The ACM 3rd International Symposium on Information Processing in Sensor Networks, New York.c 2004: 259-268. |
[25] | GURA N , PATEL A , WANDER A et al. Comparing elliptic curvecryptography and RSA on 8 bit CPUs[C]// The 6th Springer International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin.c 2004: 119-132. |
[1] | MALAN P T , WEISH M , SMITH M D . A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]// The 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara.c 2004: 58-67. |
[27] | WANG H , SHENG B , LI Q . Elliptic curve cryptography-based access control in sensor networks[J]. International Joural of Security and Networks, 2006, 1 (3): 127-137. |
[28] | PERRIG A , SIEWCZYK R , JYGAR J D . SPINS: security protocols for sensor networks[J]. Wireless Networks Journal (WINE), 2002, 8 (5): 521-534. |
[29] | ZHOU Y , LI L . A trust-aware and location-based secure routing protocol for WSN[J]. Applied Mechanics and Materials, 2013, 373-375: 1931-1934. |
[30] | KANG H S , KIM S R , KIM P . Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network[J]. Computer Science and Information Systems, 2013, 10 (2) 685-701. |
[31] | HAYAJNEH T , DOOMUN R , AL-MASHAQBEH G , et al. An energy-efficient and security aware route selection protocol for wireless sensor networks[J]. Security & Communication Networks, 2014, 7: 2015-2038. |
[32] | SANGEETHA R , YUVARAJU M . Secure energy-aware multipath routing protocol with transmission range adjustment for wireless sensor networks[C]// The 2012 IEEE International Conference on Computational Intelligence & Computing Research (ICCIC), Coimbatore.c 2012: 1-4. |
[33] | LOTF J J , HOSSEINZADEH M , ALGULIEV R M . Hierarchical routing in wireless sensor networks: a survey[C]// The 2nd International Conference on Computer Engineering and Technology, Chengdu.c 2010: 650-654. |
[34] | CHEN X , MAKKI K , YEN K , et al. Sensor network security: a survey[J]. IEEE Communications Surveys & Tutorials, 2009, 11 (2): 52-73. |
[35] | HU T , FEI Y . QELAR: a machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks[J]. IEEE Transactions on Mobile Computing, 2010, 9 (6): 796-809. |
[36] | KORSHUNOV P , EBRAHIMI T . Using warping for privacy protection in video surveillance[C]// The 18th IEEE International Conference on Digital Signal Processing (DSP), Fira.c 2013: 1-6. |
[37] | KORSHUNOV P , EBRAHIMI T . Using face morphing to protect privacy[C]// The 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Krakow.c 2013: 208-213. |
[38] | SCHMIDT M , SHEAR M . A drone, too small for radar to detect, rattles the White House[EB/OL]. . |
[39] | GORMLEY D M . UAVs and cruise missiles as possible terrorist weapons[EB/OL]. . |
[40] | GORMLEY D M , SPEIER R . Controlling unmanned air vehicles:new challenges[J]. The Nonproliferation Review, 2003, 10 (2): 66-79. |
[41] | SIRAK M . Air force studies how to counter hostile UAVs[J]. Helicopter News, 2006, 1: 1-2. |
无人机不乏黑暗面成天空监管一大隐患[EB/OL]. . | |
The bad influences drone might brought to the sky surveillance[EB/OL]. . | |
[43] | PITT J , PERAKSLIS C , MICHAEL K . Drones humanus introduction to the special issue[J]. Technology and Society Magazine, 2014, 33 (2) 38-39. |
[44] | WILSON R L . Ethical issues with use of drone aircraft[C]// The 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering, Chicago.c 2014, 1-4. |
[45] | VILLASENOR J . “Drones”and the future of domestic aviation[J]. Proceedings of the IEEE, 2014, 102 (3) 235-238. |
[1] | FINN R L , WRIGHT D . Unmanned aircraft systems: surveillance, ethics and privacy in civil applications[J]. Computer Law &Security Review, 2012, 28 (2): 184-194. |
[47] | VILLASENOR J . Observations from above: unmanned aircraft systems and privacy[J]. Harvard Journal of Law & Public Policy, 2013, 36: 457. |
[48] | LIU Z , LI Z , LIU B , et al. Rise of mini-drones: applications and issues[C]// Workshop on Privacy-Aware Mobile Computing.c 2015: 7-12. |
[49] | MAO H , YANG C , ABOUSLEMAN G P , et al. Automated multiple target detection and tracking in UAV videos[C]// SPIE-The International Society for Optical Engineering.c 2010. |
[50] | MEJIAS L , SARIPALLI S , CAMPOY P , et al. Visual servoing of an autonomous helicopter in urban areas using feature tracking[J]. Journal of Field Robotics, 2006, 23 (3-4): 185-199. |
[51] | HERISSé B , HAMEL T , MAHONY R , et al. Landing a VTOL unmanned aerial vehicle on a moving platform using optical flow[J]. IEEE Transactions on Robotics, 2012, 28 (1): 77-89. |
[52] | 安全飞行指引飞行区域限制[EB/OL]. . |
Safety guide on aircraft movement area restrictions[EB/OL]. . | |
[53] | 美国人这样阻止无人机窥探住宅隐私[EB/OL]. . |
What Americans did to protect residents’ privacy from drones[EB/OL]. . | |
[54] | NoFlyZone[EB/OL]. . |
[55] | BONETTO M , KORSHUNOV P , RAMPONI G , et al. Privacy in mini-drone based video surveillance[C]// The 2015 IEEE International Conference on Image Processing (ICIP), Quebec City.c 2015: 2464-2469. |
[56] | MEZEI J , FIASKA V , MOLNAR A . Drone sound detection[C]// The 16th IEEE International Symposium on Computational Intelligence and Informatics (CINTI), Budapest.c 2015: 333-338. |
[1] | MOSES A , RUTHERFORD M J , VALAVANIS K P . Radar-based detection and identification for miniature air vehicles[C]// The 2011 IEEE International Conference on Control Applications (CCA), Denver.c 2011: 933-940. |
[58] | 航天科工披露反无人机系统已执行多次任务[EB/OL]. . |
China Aerospace Science & Industry Corporation has revealed assignments carried out by anti-drone system[EB/OL]. . | |
[59] | ILANGO P . Secure authentication and integrity techniques for randomized secured routing in WSN[J]. Wireless Networks, 2015, 21 (2): 443-451. |
[60] | 盘点12起引发争议的无人机事故[EB/OL]. . |
View points on 12 controversial drone accidents[EB/OL]. . | |
[61] | YANG G , TAN C H . Strongly secure certificateless key exchange without pairing[C]// The 6th ACM Symposium on Information, Computer and Communications Security, New York,c 2011: 71-79. |
[62] | SUN H , WEN Q , ZHANG H , et al. A novel pairing-free certificateless authenticated key agreement protocol with provable security[J]. Frontiers of Computer Science, 2013, 7 (4): 544-557. |
[63] | SEO S , BERTINO E . Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing[R]. CERIAS, West Lafayette, IN, USA, 2013. |
[64] | LUKAS J , FRIDRICH J , GOLJAN M . Digital camera identification from sensor pattern noise[J]. IEEE Transactions on Information Forensics and Security, 2006, 1 (2): 205-214. |
[65] | CHEN M , FRIDRICH J , GOLJAN M , et al. Determining image origin and integrity using sensor noise[J]. IEEE Transactions on Information Forensics and Security, 2008, 3 (1): 74-90. |
[66] | GOLJAN M , FRIDRICH J , FILLER T . Managing a large database of camera fingerprints[C]// IS&T/SPIE Electronic Imaging Symposium, San Jose.c 2010. |
[67] | GOLJAN M , FRIDRICH J , FILLER T . Large scale test of sensor fingerprint camera identification[C]// IS & T/SPIE Electronic Imaging Symposium, San Jose.c 2009. |
[68] | HU Y , YU B , JIAN C . Source camera identification technique using large components of imaging sensor pattern noise[J]. Journal of Computer Applications, 2010, 9: 31-35. |
[69] | LIU B B , HU Y , LEE H K . Source camera identification from significant noise residual regions[C]// The 17th IEEE International Conference on Image Processing(ICIP), HongKong.c 2010: 1749-1752. |
[1] | 朱春陶, 尹承禧, 张博林, 殷琪林, 卢伟. 基于多域时序特征挖掘的伪造人脸检测方法[J]. 网络与信息安全学报, 2023, 9(3): 123-134. |
[2] | 曹进, 石小平, 马如慧, 李晖. 融合双层卫星网络的星地和星间AKA协议[J]. 网络与信息安全学报, 2023, 9(1): 18-31. |
[3] | 郭辉, 罗勇, 郭晓潞. 基于国密算法的车载以太网控制器身份认证方法[J]. 网络与信息安全学报, 2022, 8(6): 20-28. |
[4] | 刘赣秦, 李晖, 朱辉, 黄煜坤, 刘兴东. 低功耗嵌入式平台的SM2国密算法优化实现[J]. 网络与信息安全学报, 2022, 8(6): 29-38. |
[5] | 刘军, 袁霖, 冯志尚. 集群网络密钥管理方案研究综述[J]. 网络与信息安全学报, 2022, 8(6): 52-69. |
[6] | 肖敏, 姚涛, 刘媛妮, 黄永洪. 具有隐私保护的动态高效车载云管理方案[J]. 网络与信息安全学报, 2022, 8(6): 70-83. |
[7] | 夏毅, 兰明敬, 陈晓慧, 罗军勇, 周刚, 何鹏. 可解释的知识图谱推理方法综述[J]. 网络与信息安全学报, 2022, 8(5): 1-25. |
[8] | 姜奇, 冯茹, 张瑞杰, 王金花, 陈婷, 魏福山. 基于GRU的智能手机多场景步态认证[J]. 网络与信息安全学报, 2022, 8(5): 26-39. |
[9] | 易聪, 胡军. 新的基于鼠标行为的持续身份认证方法[J]. 网络与信息安全学报, 2022, 8(5): 179-188. |
[10] | 陈立全, 李潇, 杨哲懿, 钱思杰. 基于区块链的高透明度PKI认证协议[J]. 网络与信息安全学报, 2022, 8(4): 1-11. |
[11] | 牛建林, 任志宇, 杜学绘. 基于联盟链的跨域认证方案[J]. 网络与信息安全学报, 2022, 8(3): 123-133. |
[12] | 张伟成, 卫红权, 刘树新, 普黎明. 5G移动边缘计算场景下的快速切换认证方案[J]. 网络与信息安全学报, 2022, 8(3): 154-168. |
[13] | 徐子钧, 刘建伟, 李耕. 面向5G mMTC的网络切片安全研究[J]. 网络与信息安全学报, 2022, 8(1): 95-105. |
[14] | 邱洁, 韩瑞, 魏志丰, 王志洋. 网络空间公共基础设施体系及安全策略研究[J]. 网络与信息安全学报, 2021, 7(6): 56-67. |
[15] | 杨冠群, 刘荫, 徐浩, 邢宏伟, 张建辉, 李恩堂. 基于区块链的电网可信分布式身份认证系统[J]. 网络与信息安全学报, 2021, 7(6): 88-98. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|