A Comprehensive Survey of Security and Privacy in UAV Systems
The proliferation of unmanned aerial vehicles (UAVs) across diverse applications, from photography to critical infrastructure inspection, has raised significant security and privacy challenges. This comprehensive survey presents a systematic analysis of UAV security vulnerabilities, privacy concerns...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | Bryce Cordill, Dongfeng Fang, Shengjie Xu |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11053760/ |
Similar Items
Survey of big-data-analysis-resistant privacy protection
by: Wei TONG, et al.
Published: (2016-04-01)
by: Wei TONG, et al.
Published: (2016-04-01)
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
by: Shiwen Zhang, et al.
Published: (2022-08-01)
by: Shiwen Zhang, et al.
Published: (2022-08-01)
Privacy self-correlation privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2019-05-01)
by: Weihao LI, et al.
Published: (2019-05-01)
Privacy self-correlation privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2019-05-01)
by: Weihao LI, et al.
Published: (2019-05-01)
An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
by: Vasiliki Demertzi, et al.
Published: (2023-08-01)
by: Vasiliki Demertzi, et al.
Published: (2023-08-01)
Trajectory differential privacy protection mechanism based on prediction and sliding window
by: Ayong YE, et al.
Published: (2020-04-01)
by: Ayong YE, et al.
Published: (2020-04-01)
Trajectory differential privacy protection mechanism based on prediction and sliding window
by: Ayong YE, et al.
Published: (2020-04-01)
by: Ayong YE, et al.
Published: (2020-04-01)
Efficient scheme for user's trajectory privacy
by: Feng-hua LI, et al.
Published: (2015-12-01)
by: Feng-hua LI, et al.
Published: (2015-12-01)
Efficient scheme for user's trajectory privacy
by: Feng-hua LI, et al.
Published: (2015-12-01)
by: Feng-hua LI, et al.
Published: (2015-12-01)
Survey of the context-aware location privacy-preserving techniques
by: Dian-hui MAO, et al.
Published: (2013-08-01)
by: Dian-hui MAO, et al.
Published: (2013-08-01)
Survey of the context-aware location privacy-preserving techniques
by: Dian-hui MAO, et al.
Published: (2013-08-01)
by: Dian-hui MAO, et al.
Published: (2013-08-01)
An Efficient Privacy Protection Mechanism for Blockchain-Based Federated Learning System in UAV-MEC Networks
by: Chaoyang Zhu, et al.
Published: (2024-02-01)
by: Chaoyang Zhu, et al.
Published: (2024-02-01)
Security and Privacy for Mobile IoT Applications Using Blockchain
by: Kevin Carvalho, et al.
Published: (2021-09-01)
by: Kevin Carvalho, et al.
Published: (2021-09-01)
Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy
by: Mengmeng Yang, et al.
Published: (2018-01-01)
by: Mengmeng Yang, et al.
Published: (2018-01-01)
Research on protection technology for location privacy in VANET
by: Jian-ming ZHANG, et al.
Published: (2012-08-01)
by: Jian-ming ZHANG, et al.
Published: (2012-08-01)
Research on protection technology for location privacy in VANET
by: Jian-ming ZHANG, et al.
Published: (2012-08-01)
by: Jian-ming ZHANG, et al.
Published: (2012-08-01)
Survey of artificial intelligence data security and privacy protection
by: Kui REN, et al.
Published: (2021-02-01)
by: Kui REN, et al.
Published: (2021-02-01)
Research progress on location privacy-preserving techniques
by: Sheng WAN, et al.
Published: (2016-12-01)
by: Sheng WAN, et al.
Published: (2016-12-01)
Research progress on location privacy-preserving techniques
by: Sheng WAN, et al.
Published: (2016-12-01)
by: Sheng WAN, et al.
Published: (2016-12-01)
A localized differential privacy-based location preservation method using a hidden Markov model in vehicular networks
by: Jiwei Li, et al.
Published: (2025-10-01)
by: Jiwei Li, et al.
Published: (2025-10-01)
Security and Privacy in Cloud Computing: Technical Review
by: Yunusa Simpa Abdulsalam, et al.
Published: (2021-12-01)
by: Yunusa Simpa Abdulsalam, et al.
Published: (2021-12-01)
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement
by: Ioannis Paspatis, et al.
Published: (2024-02-01)
by: Ioannis Paspatis, et al.
Published: (2024-02-01)
Location privacy preservation approach towards to content sharing on mobile online social network
by: Chao LI, et al.
Published: (2016-11-01)
by: Chao LI, et al.
Published: (2016-11-01)
Location privacy preservation approach towards to content sharing on mobile online social network
by: Chao LI, et al.
Published: (2016-11-01)
by: Chao LI, et al.
Published: (2016-11-01)
European Trends in Privacy: How can we increase internet security and protect individual privacy?
by: Soren Duus Ostergaard
Published: (2004-04-01)
by: Soren Duus Ostergaard
Published: (2004-04-01)
Is the Privacy Paradox a Domain-Specific Phenomenon
by: Ron S. Hirschprung
Published: (2023-08-01)
by: Ron S. Hirschprung
Published: (2023-08-01)
A blockchain-based secure path planning in UAVs communication network
by: Shubhani Aggarwal, et al.
Published: (2025-02-01)
by: Shubhani Aggarwal, et al.
Published: (2025-02-01)
Towards Understanding Location Privacy Awareness on Geo-Social Networks
by: Alia I. Abdelmoty, et al.
Published: (2017-04-01)
by: Alia I. Abdelmoty, et al.
Published: (2017-04-01)
Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix
by: Wen Chen
Published: (2015-06-01)
by: Wen Chen
Published: (2015-06-01)
Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach
by: Abdel-Shakour Abuzneid, et al.
Published: (2015-03-01)
by: Abdel-Shakour Abuzneid, et al.
Published: (2015-03-01)
Survey of Personalized Location Privacy Protection Technologies
by: CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao
Published: (2025-05-01)
by: CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao
Published: (2025-05-01)
Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey
by: Shawal Khan, et al.
Published: (2021-04-01)
by: Shawal Khan, et al.
Published: (2021-04-01)
Continuous location privacy protection mechanism based on differential privacy
by: Hongtao LI, et al.
Published: (2021-08-01)
by: Hongtao LI, et al.
Published: (2021-08-01)
Continuous location privacy protection mechanism based on differential privacy
by: Hongtao LI, et al.
Published: (2021-08-01)
by: Hongtao LI, et al.
Published: (2021-08-01)
Spatio-temporal aware privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2018-05-01)
by: Weihao LI, et al.
Published: (2018-05-01)
Spatio-temporal aware privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2018-05-01)
by: Weihao LI, et al.
Published: (2018-05-01)
Context-aware Location Privacy Protection Method
by: Haohua Qing, et al.
Published: (2024-10-01)
by: Haohua Qing, et al.
Published: (2024-10-01)
A Comprehensive Location-Privacy-Awareness Task Selection Mechanism in Mobile Crowd-Sensing
by: Ke Yan, et al.
Published: (2019-01-01)
by: Ke Yan, et al.
Published: (2019-01-01)
An Efficient Differential Privacy-Based Method for Location Privacy Protection in Location-Based Services
by: Bo Wang, et al.
Published: (2023-05-01)
by: Bo Wang, et al.
Published: (2023-05-01)
Survey of differentially private methods for trajectory data
by: SUN Xinyue, et al.
Published: (2025-06-01)
by: SUN Xinyue, et al.
Published: (2025-06-01)
Similar Items
-
Survey of big-data-analysis-resistant privacy protection
by: Wei TONG, et al.
Published: (2016-04-01) -
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
by: Shiwen Zhang, et al.
Published: (2022-08-01) -
Privacy self-correlation privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2019-05-01) -
Privacy self-correlation privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2019-05-01) -
An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
by: Vasiliki Demertzi, et al.
Published: (2023-08-01)
