2021
DOI: 10.14569/ijacsa.2021.0120584
|View full text |Cite
|
Sign up to set email alerts
|

Drone Security: Issues and Challenges

Abstract: Recent advancements in drone technology are opening new opportunities and applications in various fields of life especially in the form of small drones. However, these advancements are also causing new challenges in terms of security, adaptability, and consistency. This research discusses the drone technology, area of usages, citizen multi-objective uses, drones security, protection, and secrecy apprehensions, drone current intimidations and susceptibilities, existing approaches for drone cyber-security method… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 45 publications
0
9
0
Order By: Relevance
“…Drowns with embedded machine-learning capabilities enable the prediction of jamming attacks by applying Q-learning [10,11] and DQN [12]. Attacks such as intrusion, DDOS, and traffic blockage are managed by a variety of algorithms [13][14][15]; while other research focuses on threats to private and agencies [16,17].…”
Section: Attack Detection and Mitigation Systems For Smart Citiesmentioning
confidence: 99%
“…Drowns with embedded machine-learning capabilities enable the prediction of jamming attacks by applying Q-learning [10,11] and DQN [12]. Attacks such as intrusion, DDOS, and traffic blockage are managed by a variety of algorithms [13][14][15]; while other research focuses on threats to private and agencies [16,17].…”
Section: Attack Detection and Mitigation Systems For Smart Citiesmentioning
confidence: 99%
“…Their overview, however, lacks sensor-based vulnerabilities and attacks. In [73], the authors categorized cyber-security threats into four categories: protocol, sensor, compromised component, and jammers. Their work, however, does not describe individual attacks and countermeasures against them.…”
Section: Related Workmentioning
confidence: 99%
“…Drones, while used for the betterment of society, can also be used by the intruders to undertake cyber and physical threats in the network. As the number of drones increase in the network, it becomes very difficult and challenging to identify the harmful drones that may further cause severe threats to the network [14][15][16][17].…”
Section: Motivationmentioning
confidence: 99%