•  
  •  
 

Document Type

Review

Keywords

Computer Engineering

Abstract

Unmanned aerial vehicles, or UAVs, are gaining significant attention becauseof the strategic and financial information and value inVolved in aerial applications, as wellas the sensitive data collected through embedded sensors. UAVs are rapidly developing invarious fields and find widespread utility in military applications for effective targettracking, battlefield surveillance, radiation monitoring, and sports. UAVs are useful andadvantageous, but they can also be attacked by a variety of techniques, including jamming,fuzzing, false data injection, and zero attacks. Researchers were looking on robust securitymechanisms to protect UAVs from attackers in order to combat such security risks.However, there is a large number of vulnerabilities in designed protocols that hackerscould take advantage of. For the identification and addressing of those vulnerabilities andweaknesses, it is becoming highly important to study and analyze current security protocolsthat are used in the UAVs. In this study, a thorough survey will be introduced onauthentication and cryptography that are used in the UAV protocols, as well as describingarchitecture, procedure, and security of Micro Aerial Vehicle Link (MavLink) protocol. Wewill explain as well the cryptography and authentication approach that has beendeveloped by the use of the MavLink protocol.

Share

COinS