TY - GEN
T1 - Privacy Preserving Techniques and Deployment Types in Unmanned Aerial Systems
AU - Sudhina Kumar, G. K.
AU - Krishna Prakasha, K.
AU - Muniyal, Balachandra
AU - Boiarkin, Veniamin
AU - Rajarajan, Muttukrishnan
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Unmanned Aerial Vehicles (UAVs) have garnered significant attention within the research community in recent years, with applications spanning from civilian to military use cases. The data generated by UAVs is susceptible and vulnerable to privacy breaches. Consequently, preserving privacy is crucial to safeguard this data against unauthorized access, and service providers must address this concern. This article establishes classification categories based on the required level of privacy preservation and provides an overview of the privacy-preserving techniques employed in Unmanned Aerial Systems (UAS). Additionally, the article offers insights into implementing privacy-preserving strategies across different levels, namely Type1, Type2, and Type3 in UAS. These deployment types can be combined to achieve a heightened level of privacy per the specific requirements. Lastly, the article compiles a table listing the attacks that privacy-preserving techniques can address and highlights the future challenges in this field.
AB - Unmanned Aerial Vehicles (UAVs) have garnered significant attention within the research community in recent years, with applications spanning from civilian to military use cases. The data generated by UAVs is susceptible and vulnerable to privacy breaches. Consequently, preserving privacy is crucial to safeguard this data against unauthorized access, and service providers must address this concern. This article establishes classification categories based on the required level of privacy preservation and provides an overview of the privacy-preserving techniques employed in Unmanned Aerial Systems (UAS). Additionally, the article offers insights into implementing privacy-preserving strategies across different levels, namely Type1, Type2, and Type3 in UAS. These deployment types can be combined to achieve a heightened level of privacy per the specific requirements. Lastly, the article compiles a table listing the attacks that privacy-preserving techniques can address and highlights the future challenges in this field.
UR - http://www.scopus.com/inward/record.url?scp=85182919779&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85182919779&partnerID=8YFLogxK
U2 - 10.1109/ICRAIS59684.2023.10367059
DO - 10.1109/ICRAIS59684.2023.10367059
M3 - Conference contribution
AN - SCOPUS:85182919779
T3 - 2023 International Conference on Recent Advances in Information Technology for Sustainable Development, ICRAIS 2023 - Proceedings
SP - 112
EP - 117
BT - 2023 International Conference on Recent Advances in Information Technology for Sustainable Development, ICRAIS 2023 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1st International Conference on Recent Advances in Information Technology for Sustainable Development, ICRAIS 2023
Y2 - 6 November 2023 through 7 November 2023
ER -