Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT

Version 1 : Received: 5 March 2024 / Approved: 6 March 2024 / Online: 6 March 2024 (11:59:34 CET)

How to cite: Alquwayzani, A.A.; Albuali, A.A. A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT. Preprints 2024, 2024030349. https://doi.org/10.20944/preprints202403.0349.v1 Alquwayzani, A.A.; Albuali, A.A. A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT. Preprints 2024, 2024030349. https://doi.org/10.20944/preprints202403.0349.v1

Abstract

Over the years, the need for autonomous systems such as drones, also known as unmanned aerial vehicles (UAVs), has significantly increased in popularity across several industries, including the military. The Internet of Battlefield Things (IoBT) represents a modern technological advancement that significantly enhances the operational efficacy of defense systems. It establishes an integrated military force by connecting individuals to intelligent technology in drones, radios, equipment, antennas and ground stations. This is achieved through the utilization of cloud and edge computing, sensors, mobile devices, embedded systems, and IoT-based systems. However, IoBT security is significantly compromised by enemies that exploit the vulnerabilities and malicious intrusions that specifically target the external environment or to obtain sensitive data. In addition, a comprehensive understanding of cyberattacks and countermeasures is essential for assuring the security of IoBT. On the other hand, as cyber threats get more complicated, trust becomes increasingly important for the security of digital systems. Within this context, the zero trust architecture contends that the security of a complex network is inherently vulnerable to internal and external threats. In defense, UAV security system applications, for example, the primary purpose of the zero trust architecture is to limit the vulnerability of military UAV systems to cyberattacks, hence reducing the possibility of data breaches and illegal entry. This study conducts a systematic review aimed at identifying different aspects of cybersecurity strategies for protecting UAV systems within the IoBT domain. Furthermore, zero trust architecture is presented in the study as an effective prospective solution to the security issues that develop in defense UAV systems.

Keywords

Security; Zero Trust Architecture (ZTA); Drone; UAV, UAV Security; Internet of Battlefield Things (IoBT); Cybersecurity; Suspicious Behavior

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.