
Research Article
A Design Scheme of Data Security for Unmanned Aerial Vehicles
@INPROCEEDINGS{10.1007/978-3-031-28787-9_13, author={Dongyu Yang and Yue Zhao and Zhongqiang Yi and Dandan Yang and Shanxiang He}, title={A Design Scheme of Data Security for Unmanned Aerial Vehicles}, proceedings={Advanced Hybrid Information Processing. 6th EAI International Conference, ADHIP 2022, Changsha, China, September 29-30, 2022, Proceedings, Part I}, proceedings_a={ADHIP}, year={2023}, month={3}, keywords={UAV Data security Network security}, doi={10.1007/978-3-031-28787-9_13} }
- Dongyu Yang
Yue Zhao
Zhongqiang Yi
Dandan Yang
Shanxiang He
Year: 2023
A Design Scheme of Data Security for Unmanned Aerial Vehicles
ADHIP
Springer
DOI: 10.1007/978-3-031-28787-9_13
Abstract
Since the 21st century, informatization, modernization and intellectualization have become an important direction of science and technology development, especially in recent years, with the continuous improvement and perfection of artificial intelligence, 5G, edge computing and autonomous unmanned technology, the UAV industry has made unprecedented development and has been applied to many fields of social life. However, with the development and popularity of UAVs, the development of emerging technologies such as autonomous analysis, unmanned traffic control, UAV swarms, and artificial intelligence continue to increase the complexity of the unmanned systems domain, making cyber attacks against UAVs more and more frequent, and the chances of security threats and potential hazards are increasing. Currently, UAV cyber security has become a very important issue, especially UAV data security, but there are few papers that give systematic solutions for UAV data security. This paper first provides a systematic analysis of UAV security threats from a data security perspective. Next, the existing UAV security protection strategies are analyzed from three aspects: UAV platform security, communication network security, and ground station security. Then, the proposed UAV data security design scheme is introduced in detail. Finally, the full paper is summarized and suggestions for the development of UAV security are given.