When the Base Station Flies: Rethinking Security for UAV-Based 6G Networks
- URL: http://arxiv.org/abs/2512.21574v1
- Date: Thu, 25 Dec 2025 08:37:09 GMT
- Title: When the Base Station Flies: Rethinking Security for UAV-Based 6G Networks
- Authors: Ammar El Falou,
- Abstract summary: 6G networks are crucial for achieving seamless global coverage, particularly in underserved and disaster-prone regions.<n>Among platforms, unmanned aerial vehicles (UAVs) are especially promising due to their rapid deployability.<n>This paper identifies several attack surfaces of UAV-BS systems and outlines principles for mitigating their threats.
- Score: 0.324890820102255
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The integration of non-terrestrial networks (NTNs) into 6G systems is crucial for achieving seamless global coverage, particularly in underserved and disaster-prone regions. Among NTN platforms, unmanned aerial vehicles (UAVs) are especially promising due to their rapid deployability. However, this shift from fixed, wired base stations (BSs) to mobile, wireless, energy-constrained UAV-BSs introduces unique security challenges. Their central role in emergency communications makes them attractive candidates for emergency alert spoofing. Their limited computing and energy resources make them more vulnerable to denial-of-service (DoS) attacks, and their dependence on wireless backhaul links and GNSS navigation exposes them to jamming, interception, and spoofing. Furthermore, UAV mobility opens new attack vectors such as malicious handover manipulation. This paper identifies several attack surfaces of UAV-BS systems and outlines principles for mitigating their threats.
Related papers
- An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks [0.0]
Intrusion Detection System plays vital role in identifying potential security attacks to ensure the secure operation of UAV swarm networks.<n>This research aims to address these challenges by developing a novel lightweight and federated continuous learning-based IDS scheme.
arXiv Detail & Related papers (2025-11-27T22:37:06Z) - When UAV Swarm Meets IRS: Collaborative Secure Communications in Low-altitude Wireless Networks [68.45202147860537]
Low-altitude wireless networks (LAWNs) provide enhanced coverage, reliability, and throughput for diverse applications.<n>These networks face significant security vulnerabilities from both known and potential unknown eavesdroppers.<n>We propose a novel secure communication framework for LAWNs where the selected UAVs within a swarm function as a virtual antenna array.
arXiv Detail & Related papers (2025-10-25T02:02:14Z) - Quantitative Analysis of UAV Intrusion Mitigation for Border Security in 5G with LEO Backhaul Impairments [0.8427427828815586]
Uncooperative unmanned aerial vehicles pose emerging threats to critical infrastructure and border protection.<n>This paper analyzes detect-to-mitigate latency of such intrusions in a hybrid terrestrial-nonterrestrial satellite 5G system.
arXiv Detail & Related papers (2025-10-15T20:13:48Z) - Flying Drones to Locate Cyber-Attackers in LoRaWAN Metropolitan Networks [0.7926382740035383]
FOLLOWME project investigates the feasibility of using UAV to locate and even chase attackers during illicit usage of the radio spectrum.<n>The main objective is to develop a cyber-physical security framework that integrates network telemetry with wireless localization.
arXiv Detail & Related papers (2025-09-19T07:56:48Z) - An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks [49.605335601285496]
6G space-air-ground integrated networks (SAGINs) offer ubiquitous coverage for various mobile applications.<n>We propose a novel security framework for SAGINs based on Large Language Models (LLMs)<n>Our framework produces highly accurate security strategies that remain robust against a variety of unknown attacks.
arXiv Detail & Related papers (2025-05-06T04:14:13Z) - SSD: A State-based Stealthy Backdoor Attack For Navigation System in UAV Route Planning [22.04239473697645]
Unmanned aerial vehicles (UAVs) are increasingly employed to perform high-risk tasks.<n>UAVs face escalating cybersecurity threats, particularly from spoofing attacks.
arXiv Detail & Related papers (2025-02-27T15:17:58Z) - Toward Mixture-of-Experts Enabled Trustworthy Semantic Communication for 6G Networks [82.3753728955968]
We introduce a novel Mixture-of-Experts (MoE)-based SemCom system.
This system comprises a gating network and multiple experts, each specializing in different security challenges.
The gating network adaptively selects suitable experts to counter heterogeneous attacks based on user-defined security requirements.
A case study in vehicular networks demonstrates the efficacy of the MoE-based SemCom system.
arXiv Detail & Related papers (2024-09-24T03:17:51Z) - Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective [53.24281798458074]
Face Recognition Systems (FRS) have increasingly integrated into critical applications, including surveillance and user authentication.
Recent studies have revealed vulnerabilities in FRS to adversarial (e.g., adversarial patch attacks) and backdoor attacks (e.g., training data poisoning)
arXiv Detail & Related papers (2024-05-21T13:34:23Z) - 5G Network on Wings: A Deep Reinforcement Learning Approach to the
UAV-based Integrated Access and Backhaul [11.197456628712846]
Unmanned aerial vehicle (UAV) based aerial networks offer a promising alternative for fast, flexible, and reliable wireless communications.
In this paper, we study how to control multiple UAV-BSs in both static and dynamic environments.
Deep reinforcement learning algorithm is developed to jointly optimize the three-dimensional placement of these multiple UAV-BSs.
arXiv Detail & Related papers (2022-02-04T07:45:06Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From
Communications to Sensing and Intelligence [152.89360859658296]
5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC)
On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in 3D space.
On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference.
arXiv Detail & Related papers (2020-10-19T08:56:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.