DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8959
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGupta, Navneet-
dc.contributor.authorChamola, Vinay-
dc.date.accessioned2023-02-04T06:31:30Z-
dc.date.available2023-02-04T06:31:30Z-
dc.date.issued2021-02-
dc.identifier.urihttps://www.sciencedirect.com/science/article/pii/S1570870520306788-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8959-
dc.description.abstractUnmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening on making UAVs more robust using energy harvesting techniques to have a better battery lifetime, network performance and to secure against attackers. UAV networks are many times used for unmanned missions. There have been many attacks on civilian, military, and industrial targets that were carried out using remotely controlled or automated UAVs. This continued misuse has led to research in preventing unauthorized UAVs from causing damage to life and property. In this paper, we present a literature review of UAVs, UAV attacks, and their prevention using anti-UAV techniques. We first discuss the different types of UAVs, the regulatory laws for UAV activities, their use cases, recreational, and military UAV incidents. After understanding their operation, various techniques for monitoring and preventing UAV attacks are described along with case studies.en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.subjectEEEen_US
dc.subjectUAVen_US
dc.subjectDroneen_US
dc.subjectAttacksen_US
dc.subjectNeutralizationen_US
dc.subjectJammingen_US
dc.titleA Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniquesen_US
dc.typeArticleen_US
Appears in Collections:Department of Electrical and Electronics Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.