Version 1
: Received: 5 March 2024 / Approved: 6 March 2024 / Online: 6 March 2024 (11:59:34 CET)
How to cite:
Alquwayzani, A. A.; Albuali, A. A. A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT. Preprints2024, 2024030349. https://doi.org/10.20944/preprints202403.0349.v1
Alquwayzani, A. A.; Albuali, A. A. A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT. Preprints 2024, 2024030349. https://doi.org/10.20944/preprints202403.0349.v1
Alquwayzani, A. A.; Albuali, A. A. A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT. Preprints2024, 2024030349. https://doi.org/10.20944/preprints202403.0349.v1
APA Style
Alquwayzani, A. A., & Albuali, A. A. (2024). A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT. Preprints. https://doi.org/10.20944/preprints202403.0349.v1
Chicago/Turabian Style
Alquwayzani, A. A. and Abdullah Abdulrahman Albuali. 2024 "A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT" Preprints. https://doi.org/10.20944/preprints202403.0349.v1
Abstract
Over the years, the need for autonomous systems such as drones, also known as unmanned aerial vehicles (UAVs), has significantly increased in popularity across several industries, including the military. The Internet of Battlefield Things (IoBT) represents a modern technological advancement that significantly enhances the operational efficacy of defense systems. It establishes an integrated military force by connecting individuals to intelligent technology in drones, radios, equipment, antennas and ground stations. This is achieved through the utilization of cloud and edge computing, sensors, mobile devices, embedded systems, and IoT-based systems. However, IoBT security is significantly compromised by enemies that exploit the vulnerabilities and malicious intrusions that specifically target the external environment or to obtain sensitive data. In addition, a comprehensive understanding of cyberattacks and countermeasures is essential for assuring the security of IoBT. On the other hand, as cyber threats get more complicated, trust becomes increasingly important for the security of digital systems. Within this context, the zero trust architecture contends that the security of a complex network is inherently vulnerable to internal and external threats. In defense, UAV security system applications, for example, the primary purpose of the zero trust architecture is to limit the vulnerability of military UAV systems to cyberattacks, hence reducing the possibility of data breaches and illegal entry. This study conducts a systematic review aimed at identifying different aspects of cybersecurity strategies for protecting UAV systems within the IoBT domain. Furthermore, zero trust architecture is presented in the study as an effective prospective solution to the security issues that develop in defense UAV systems.
Keywords
Security; Zero Trust Architecture (ZTA); Drone; UAV, UAV Security; Internet of Battlefield Things (IoBT); Cybersecurity; Suspicious Behavior
Subject
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.