2015
DOI: 10.1177/1548512915617252
|View full text |Cite
|
Sign up to set email alerts
|

Security of unmanned aerial vehicle systems against cyber-physical attacks

Abstract: The federal aviation administration has estimated that by the year 2020, the United States will have over 30,000 drones. Nowadays, drones, also known as unmanned aerial vehicles (UAVs), are ubiquitous and have numerous uses beyond military applications. This is because UAVs can be used in hazardous missions, since they exclude the risk factors involved in manned vehicles. Despite their benefits, UAVs are prone to attacks as they are equipped with numerous on-board sensors to gather data and this exposes them t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(42 citation statements)
references
References 31 publications
0
41
0
1
Order By: Relevance
“…Similar to power systems, transportation systems experience a wide range of impact depending on the specific subsystem that is targeted. Unmanned aerial vehicles and their vulnerabilities are addressed in [54]. General transportation systems have been examined in [55]- [67], and industrial systems in [68]- [71].…”
Section: B Current State Of the Art In Cps Securitymentioning
confidence: 99%
“…Similar to power systems, transportation systems experience a wide range of impact depending on the specific subsystem that is targeted. Unmanned aerial vehicles and their vulnerabilities are addressed in [54]. General transportation systems have been examined in [55]- [67], and industrial systems in [68]- [71].…”
Section: B Current State Of the Art In Cps Securitymentioning
confidence: 99%
“…Rani et al [13] reviewed the UAV vulnerabilities against attacks. To do so, they provided a general overview over the common hacking methods and the existing defensive, preventive, and trust strategies to avoid damages caused by attacks.…”
Section: Detection Schemesmentioning
confidence: 99%
“…• Need for additional hardware • low robustness • high complexity [13] The design uses the neural network techniques to defend against Wireshark attacks, password theft, Trojan virus and so on to have a safe UAV system [9] In this design, various security threats for UAV systems have been analyzed cyber-security threat model have been proposed to detect possible paths affected by the attack. This model uses three important communication components in aircraft carriers.…”
Section: Security Schemesmentioning
confidence: 99%
“…Examples and events like that raise concerns regarding the state of UAV-based communication security. Some indicative mechanisms in order to detect and/or defend against the hacking of the UAVs are: encryption and cryptography, anomaly detection, defense techniques against DDoS attacks, and the development of intrusion detection and intrusion ejection systems [23].…”
Section: Related Work and Motivationmentioning
confidence: 99%