Preprint
Essay

This version is not peer-reviewed.

The Cybersecurity Risks Threatening Drones: Innovative Solutions in the Digital Age

Submitted:

06 January 2025

Posted:

09 January 2025

You are already at the latest version

Abstract

Unmanned Aerial Vehicles (UAVs), or drones, were initially developed for military purposes, primarily for surveillance and military operations. Over time, their use expanded into various civilian sectors, including delivery and monitoring. This rapid proliferation has sparked growing concerns about cybersecurity. This article explores the cybersecurity risks faced by drones in an increasingly interconnected digital landscape and proposes innovative solutions to mitigate these threats. The analysis is structured into two main parts: the first examines the latest technological trends and the cybersecurity challenges confronting UAVs, while the second focuses on technical solutions to address these risks, as well as the role of local and international regulations in ensuring the safe deployment of this technology.

Keywords: 
;  ;  ;  ;  
Subject: 
Social Sciences  -   Other

1. Introduction

Unmanned aerial vehicles (UAVs), initially used for military purposes, began to transition into civilian applications during the first decade of the new millennium (Koç, 2023, p. 1). Over time, their numbers have increased significantly, driven by a growing global demand for their diverse applications. The widespread adoption of drones is attributed to their ability to fulfill a variety of needs. They provide users with aerial views that can be accessed virtually anywhere and at any time, in addition to their ability to fly and transport goods. UAVs are also utilized by law enforcement and border surveillance teams. In disaster scenarios, such as nuclear accidents, hazardous material spills, floods, earthquakes, and wildfires, drones are employed to gather information or deliver essential supplies (Yaacoub et al., 2020; Restas, A., 2015). These drones continue to evolve rapidly, playing a prominent role in social media and corporate competition (Koç, 2023, p. 1). Moreover, UAVs have become a vital part of modern military arsenals, representing unmanned aerial systems capable of performing a wide range of missions, from surveillance and reconnaissance to precision strikes and supporting military operations (Grigore & Cristescu, 2024; Majeed, R., et al., 2021).
However, the rapid proliferation of drones has raised significant concerns regarding privacy and security. This growth demands the implementation of essential regulations and controls to prevent accidents and other issues related to overuse and loss of control (Koç, 2023, p. 1). Against this backdrop, this article addresses the cyber risks threatening drones and explores advanced solutions designed to mitigate these risks.

1.1. Importance of the Topic

The subject of “Cybersecurity Challenges of Drones: Innovative Solutions in the Digital Age” is a highly relevant and pressing issue in today’s world. As drones are increasingly used in sensitive civilian and military sectors, including transportation, security, logistics, and defense, the risks they face from cybersecurity threats are growing. This study aims to shed light on these threats, particularly as drones become more integrated into critical infrastructure. It also focuses on exploring innovative solutions to strengthen drone security, including methods to protect data, detect cyberattacks, and ensure the safety of embedded systems. By doing so, the study seeks to promote the safe and secure use of drones and offer regulatory frameworks that align with ongoing digital advancements.

1.2. Research Problem

As drones continue to be deployed across various sectors, they encounter significant security challenges in the digital age. Drones are increasingly vulnerable to sophisticated cyber threats, including hacking, unauthorized communication, and cyberattacks that could lead to their hijacking or malicious exploitation. At the same time, emerging technologies such as artificial intelligence and encryption offer potential solutions to bolster drone security and mitigate these risks. However, the dual nature of these technologies presents a complex challenge: developing security solutions that protect drones from escalating threats, while ensuring these solutions are applied safely and effectively without compromising privacy or public security. This leads to several key research questions.

1.3. Research Questions

-What are the latest technological trends in drone development?
-What cybersecurity risks do drones face in the digital age?
-How can modern technologies, such as artificial intelligence and encryption, enhance drone security?
-How can innovative security solutions be developed to protect drones from cyber threats?
-How can legislative and regulatory measures ensure the safe and responsible use of drones at local and international levels?

1.4. Objectives of the Study

The study of “Cybersecurity Challenges of Drones: Innovative Solutions in the Digital Age” aims to explore the increasing security threats faced by drones due to rapid technological advancements. It seeks to analyze the security vulnerabilities that cyberattacks could exploit, such as breaches in control systems and communication networks. The study also focuses on investigating innovative solutions, including artificial intelligence and advanced encryption techniques, to enhance security and protect drones from potential threats. Furthermore, the study aims to assess the legislative and regulatory frameworks that govern drone security, considering the influence of both international and local policies in shaping or disrupting the security standards for this technology.

1.5. Importance of the Study

The significance of this study lies in its focus on the security challenges drones encounter in the digital era and its exploration of innovative solutions to bolster the security of this technology. The study aims to identify security gaps and cyber threats that could target drones, contributing to the improvement of security policies and technologies used to protect them. Additionally, the study seeks to provide novel solutions that promote the safe use of drones across various sectors and foster the development of effective legislative and regulatory frameworks that evolve alongside technological advancements in this field.

1.6. Methodology of the Study

This study will adopt a descriptive-analytical approach to detail the cybersecurity challenges drones face. It will emphasize the importance of developing innovative security solutions that leverage modern technologies such as artificial intelligence and encryption to enhance drone security, enabling them to effectively and efficiently combat emerging cyber threats.

1.7. Research Framework

The study of “Cybersecurity Challenges of Drones: Innovative Solutions in the Digital Age” is divided into two main sections:
The first section focuses on drones within the context of modern technological trends and the cybersecurity risks they face. It covers the latest technological trends in drones and the security threats they encounter in the digital age, including breaches in systems and communications, software attacks, and unauthorized control of drones. This section also examines the security vulnerabilities that attackers could exploit for malicious purposes and the impact of these threats on public safety.
The second section explores the management of cybersecurity risks that threaten drone security by investigating innovative technical solutions aimed at enhancing drone security. These solutions include the application of artificial intelligence, advanced encryption techniques, and early attack detection systems. This section also addresses the role of international and local legislative and regulatory frameworks in ensuring the safe use of this technology.

3. Managing Cybersecurity Risks Threatening UAV Security

Cybersecurity has become a crucial aspect of our increasingly digital world, impacting various fields and technologies. Among these technologies, Unmanned Aerial Vehicles (UAVs), also known as drones, have emerged as a sophisticated tool with a wide range of applications in surveillance, delivery services, disaster management, and military missions. As UAVs continue to develop and gain greater autonomy, ensuring their cybersecurity has become essential. Cyberattacks pose significant risks to their integrity and functionality. This is why the field of UAV cybersecurity has gained increasing attention in recent years (Wasswa, S., et al., 2023, pp. 1-2). To be effective, UAV cybersecurity requires a comprehensive approach that integrates both legal and technical measures. Addressing these challenges necessitates strategies aimed at protecting systems from potential cyberattacks, whether through the implementation of strict regulations governing UAV use or by adopting advanced technologies to enhance the cybersecurity of these systems.

3.1. Legal Measures for Managing Cybersecurity Risks Threatening UAV Security

In this section, we present examples of legal regulations related to UAVs (drones), with particular emphasis on the legal framework in the United States and the Budapest Convention adopted by the Council of Europe. We will also explore how these models can be used to develop and improve national legislation in other countries (Kutynska, A., & Dei, M., 2023, p. 39).
Among the leading countries in regulating UAV use is the United States, which has implemented comprehensive rules through the Federal Aviation Administration (FAA) to regulate drone operations (Kutynska, A., & Dei, M., 2023, p. 42). In the U.S., the government has issued several laws and directives to address cybersecurity threats to UAVs. For example, the “Drone Cybersecurity Analysis Act” (DETECT Act) requires the National Institute of Standards and Technology (NIST) to develop cybersecurity guidelines for UAVs used by federal agencies. This legislation aims to protect UAVs from cyberattacks and strengthen security standards in this field. UAVs have the capability to collect sensitive information, and with their increasing use, ensuring the security of this technology has become of paramount importance. The DETECT Act seeks to address cybersecurity concerns by directing NIST to develop a set of guidelines. Senator Warner stated, “Drones and unmanned systems have the potential to transform how we operate, manage infrastructure, and deliver life-saving medicines. As the role of drones grows in our society, it’s crucial that we ensure their safety and security. This legislation will provide clear cybersecurity guidelines for drones used by the federal government to protect sensitive information while we continue to invest in this emerging technology.” Senator Thune added, “As drone capabilities evolve and their use grows within both the federal government and the private sector, it’s essential that these systems operate safely. This legislation will require the federal government to follow strict cybersecurity protocols and guidelines for drones and unmanned systems” (McNabb, M. 2024).
The General Data Protection Regulation (GDPR), adopted by EU countries in 2016 and enforced in 2018, also represents a significant advancement in protecting drones by safeguarding the personal data they collect. GDPR is the most significant shift in data privacy regulation over the past two decades, fundamentally transforming how personal data is processed across various sectors, from healthcare to banking, both within the EU and globally (Spalevic, Z., & Vićentijević, K., 2022, pp. 55-56). For the drone industry, GDPR is particularly relevant when drones are used to collect or process personal data, such as through aerial photography, surveillance, and mapping, which may capture identifiable individuals. Compliance with GDPR is essential to avoid hefty fines and to ensure the protection of privacy rights (Stoner, J. 2024)). Additionally, compliance is crucial for safeguarding the data collected by drones against potential cyberattacks.
At the international level, one of the most significant forms of cooperation is the Council of Europe’s Convention on Cybercrime (Convention sur la cybercriminalité—Conseil de l’Europe), adopted by the Committee of Ministers of the Council of Europe during its 109th session on November 23, 2001. It was the first international treaty on cybercrime, entering into force on July 1, 2004, and is known as the Budapest Convention. This convention is not limited to Council of Europe member states; it also allows countries outside the Council to sign it, making it an international mechanism to combat crimes committed through or against information technology (Al-Razi, S. M. A., 2019, p. 31). The convention aims to harmonize national laws on cybercrime, enhance national capacities to investigate these crimes, and promote international cooperation. It focuses on gathering digital evidence for various types of crimes, not just cybercrimes (Al-Bidri, A. W., 2021, pp. 105-106). As of 2024, 75 countries have ratified the convention.
The convention was designed to intensify international cooperation and, as a priority, to achieve the common goal of protecting society from cybercrimes by adopting and enhancing appropriate legislation to facilitate effective international cooperation. Although the signing of this convention began in late 2001, it remains the most important treaty in discussions about any international agenda regarding cooperation and the fight against digital crime (Martins dos Santos, B. 2022, p. 4).
The European Convention on Cybercrime marked a pioneering step in international cooperation among nations to address this growing threat. It is still the only agreement of its kind in terms of the number of participating countries and its broad scope (Al-Ashqar Jbour, M., 2016, pp. 106-115). The central principle of this convention is “protecting you and your rights in cyberspace” (Seger, A. 2012). The convention consists of four chapters: (a) terminology, (b) measures to be adopted at the national level, (c) international cooperation, and (d) final provisions. While it was initially discussed and formulated within the context of the Council of Europe, the Budapest Convention has established itself as a primary legal text for international cooperation in prosecuting and preventing cybercrimes (Martins dos Santos, B. 2022, pp. 6-7). The convention classifies internet crimes into four main categories: the first involves crimes against the privacy, integrity, and availability of systems and data; the second includes fraud and forgery; the third covers crimes related to content, such as producing, distributing, and possessing child pornography; and the fourth concerns crimes related to intellectual property rights and associated rights (Al-Ashqar Jbour, M., 2016, pp. 106-115). Based on the outcomes of this convention, it can be considered a successful example of balancing law enforcement with human rights, democracy, and the rule of law. Initially, the Budapest Convention aimed to harmonize cybercrime laws and address the limited number of cross-border investigations into internet crimes and the prosecution of offenders. In recent years, the focus has shifted to addressing challenges in collecting digital evidence (Klynge, C. 2021).
The success of this convention and its protocol is also evident in the participation of many non-European countries, such as the United States, Japan, Australia, South Africa, and Canada. As the convention is implemented in all signatory countries, it becomes a tool for managing cybersecurity risks and threats. The convention’s effectiveness lies in its practical measures, which require signatory countries to incorporate them into their national laws (Al-Ashqar Jbour, M., 2016, pp. 106).
International cooperation is also facilitated through other mechanisms, such as cooperation between judicial authorities or via the International Criminal Police Organization (INTERPOL). Various forms of cooperation between police departments have emerged, including the establishment of the International Web Police in 1986 to receive complaints from network users, track down cybercriminals, search for evidence, and bring offenders to trial. Additionally, the Internet Fraud Complaint Center was established in the U.S. in 2000 to collaborate with the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (Al-Ashqar Jbour, M., 2016, pp. 106).
However, these efforts face several challenges. For example, the Budapest Convention has two major limitations: first, its geographic reach, as only 75 countries have ratified it; second, its applicability in the deep and dark web, where forums are specifically designed to facilitate the use of malicious computing tools and services, making it particularly difficult to control misuse (Gery, A. 2018). Moreover, international cooperation in cyberspace is currently limited to addressing cybercrimes and does not extend to tackling state-sponsored cyber threats. Major powers that adopt offensive strategies to meet their goals often do not benefit from framing such attacks, further complicating the regulation of cyberspace (Antar, Y. 2019, pp. 22-23).
The lack of trust between major countries, exemplified by the United States and China, has significantly delayed the conclusion of many international agreements (Abis Nima Al-Fatlawi, A., 2018, p. 105). To overcome these delays in finalizing international agreements, it is important to identify the obstacles to cooperation. These challenges can be summarized as follows: (Suleiman, Q. 2022, p. 21):
-The absence of a unified model for criminal activity, due to differences in legal systems and lack of consensus on the definition of criminal activities, stemming from inadequate legislation that has not kept pace with rapid technological advancements and cybercrime;
-The lack of bilateral or multilateral treaties that allow effective cooperation in the cybersecurity domain. Even when such agreements exist, they often fail to provide the necessary protection.
Countries may manipulate laws to serve their own interests, and international law is often criticized for its lack of clarity and decisiveness. Efforts should be made to improve the outdated legal system to align with developments in cybersecurity, artificial intelligence, and drone warfare (Khan, A. 2023, p. 54). To prevent worsening existing gaps in legal procedures concerning UAVs, adopting innovative and effective technical solutions is essential, which will be discussed in the final section of this article.

3.2. Technical Mechanisms for Managing Cybersecurity Risks Threatening UAV Security

With the rapid pace of technological advancement, Unmanned Aerial Vehicles (UAVs), commonly known as drones, have become integral to various sectors, including security, transportation, agriculture, and photography. As their use expands, significant cybersecurity challenges emerge, with potential risks threatening the stability of these systems and exposing them to increasing cyberattacks. To protect these systems and ensure their security, it has become crucial to implement sophisticated and effective technical solutions. These solutions include leveraging artificial intelligence, blockchain technology, machine learning, fog computing, and encryption to secure data and defend against cyber threats.

3.2.1. Artificial Intelligence (AI) for Threat Detection

In UAV technology development, researchers and engineers have found that integrating AI systems can greatly enhance the autonomy and functionality of these devices. AI empowers UAVs to make decisions based on data analysis from sensors and cameras, optimize flight paths, adapt to environmental changes, and perform tasks autonomously without operator intervention. However, the inclusion of AI in UAVs also introduces new vulnerabilities and risks. According to analysis from “Web of Science” over the past five years, there has been considerable focus on cybersecurity research for artificial intelligence to protect UAV assets. However, studies specifically addressing the safety of UAVs through AI techniques are considerably less frequent (Veprytska, O., & Kharchenko, V., 2024, p. 2).

AI Functions in UAV Systems

UAVs (drones) operate autonomously using various advanced learning algorithms, including supervised and unsupervised learning, reinforcement learning, and federated learning. AI models play a vital role in enhancing UAV performance across a range of operational tasks, as these systems execute diverse functions at multiple levels (Veprytska, O., & Kharchenko, V., 2024, pp. 8-9);
-Optimal Deployment Mission: This involves strategically placing ground stations to minimize energy consumption by UAVs while reducing the load on the Ground Control System (GCS). It also aims to create an organized radio map, especially in areas with complex terrain, to ensure effective network coverage.
-Communication Efficiency Enhancement Mission: This focuses on improving communication between UAVs and base stations, particularly in conditions where wind may affect signal stability. Recurrent Neural Network (RNN) techniques are used to predict the future position and tilt angles of the UAV based on past data.
-Path Loss Prediction Mission: This mission addresses signal loss in wireless communication systems. Algorithms such as “K-Nearest Neighbors” and “Random Forests” are used to predict signal loss based on factors such as distance and elevation angle.
-Anomaly Detection and Monitoring Mission: This mission aims to detect malfunctions or anomalies that may occur during operation by using techniques such as deep learning, image analysis, and GPS data. It also involves using sensors to measure vibrations and temperatures in the UAV’s motors, helping to assess its condition and anticipate failures.
-Computer Vision Mission: This enhances the UAV’s ability to detect safe landing sites in emergencies and to detect and classify objects in the surrounding environment using visual analysis and imaging technologies.
-Path Planning Mission: Reinforcement Learning (RL) is utilized for path planning in unknown environments, where the UAV learns how to interact with its surroundings through sensor data to achieve its objectives.
-Collision Avoidance Mission: This mission focuses on developing techniques to avoid collisions using technologies such as GPS and sensors like LiDAR, sonar, and radar, enabling the UAV to navigate safely in complex environments.
-Temporary Content Storage Mission: This involves storing data locally on the UAV to facilitate model training, reducing the need for continuous communication with the central network.
-Energy Distribution Optimization Mission: This requires optimizing the use of network resources through comprehensive data analysis, supporting effective decision-making for resource management and task execution within the required timeframe. Federated learning algorithms are used to distribute resources optimally based on the data from each device.
These missions are part of a broad range of applications where artificial intelligence enhances the efficiency of UAVs, making them more adaptable to changing operational environments and technical challenges.

3.2.2. Blockchain Technology for Enhancing UAV Communication Security

Blockchain is a cutting-edge technology designed to store data in a manner that makes modification, corruption, or tampering virtually impossible. It functions as a decentralized digital ledger where transaction records are replicated and shared across a network of computers and devices within a chain of blocks. Each block contains a series of transactions, and when new transactions occur, matching records are added to the local copies of all participants in the network. Distributed Ledger Technology (DLT) refers to a decentralized database managed by a wide range of participants (Krichen, M., 2022, pp. 5-7).
Blockchain has the potential to set new security standards in the UAV industry by addressing critical security challenges. Even if a drone is compromised, the data it holds remains secure due to encryption. Blockchain bolsters UAV communication security across multiple dimensions:

Real-Time Location Updates

Blockchain enables continuous updates of a drone’s location, providing other drones with real-time positioning information to avoid accidents. It can also update restricted area data in real-time, preventing drones from entering these zones (Krichen, M., 2022, pp. 5-7);

Blockchain-Based Identification System

This system tracks the flights of registered drones and generates reports that can be investigated by authorities without compromising the drone owner’s privacy. Information marked as confidential is fully protected (Krichen, M., 2022, pp. 5-7);

Encrypted Data Transmission

DLT ensures that data transmitted from drones is encrypted, safeguarding the information and making it suitable for use in sensitive missions and activities (Krichen, M., 2022, pp. 5-7).
Moreover, blockchain offers effective solutions to secure the Internet of Drones (IoD) environment in several ways. It enables the creation of unique digital identities for drones, helping to prevent identity spoofing, while ensuring the confidentiality and integrity of data through advanced encryption and access control mechanisms. The data transmitted is encrypted with sophisticated algorithms, and only entities possessing the correct decryption keys can access the original data. Blockchain also secures communication between drones and control stations, preventing attacks, enforcing strict access control, and improving the system’s resilience against security threats (Tychola, K. A., et al., 2024).
However, despite its potential, blockchain technology still faces several challenges, including: (Krichen, M., 2022, pp. 5-7)
-Limited Transaction Capacity: The number of transactions that can be processed per time unit is constrained.
-Limited Scalability: Blockchain systems do not provide the same scalability as centralized systems.
-High Energy Consumption: Blockchain technology requires significant amounts of energy, making it impractical for certain UAV applications.

3.2.3. Machine Learning Techniques to Enhance the Security of Drone Communications: (Krichen, M., 2022, pp. 6-10)

Machine learning is a branch of artificial intelligence that enables computers to learn and improve autonomously, without the need for explicit programming. This field is dedicated to developing software that can independently read and analyze data, then adapt its behavior based on the insights it gains.
Machine learning techniques are applied in various key areas within drone technology, including:
-Reducing Latency and Enhancing Data Reliability: Machine learning techniques are used to optimize data transmission to the cloud, reduce latency, and improve the overall reliability of the process.
-Detecting Denial-of-Service Attacks: Support Vector Machines (SVM) and neural networks are employed to detect denial-of-service attacks through machine learning-based models.
-Identifying Adversaries and Avoiding Malicious Attacks: Machine learning models, particularly Recurrent Neural Networks (RNN) and Convolutional Neural Networks (CNN), are used to detect adversaries and mitigate the risk of malicious attacks.
-Improving Radar Detection: Machine learning techniques can address issues related to recognition and tracking, enhancing traditional radar detection methods.
-Preventing Privacy Leakage: Recent studies have explored machine learning methods to reduce privacy leakage in drone communications.

3.2.4. Fog Computing Technology to Enhance Drone Communication Security

Fog computing is a distributed computing framework designed to allocate resources such as data and programs across logical locations between the data source and the cloud. Its primary objective is to provide critical analytical services at the network edge, improving performance by positioning computational resources closer to where they are needed, thus enhancing overall network efficiency. Fog computing can also serve security purposes by segmenting bandwidth flow and incorporating multiple firewalls into the network, thereby bolstering security levels(Krichen, M., 2022, pp. 6-10).
Here are some examples of how fog computing can improve drone communication security: (Krichen, M., 2022, pp. 6-10)
-Ensuring Data Privacy: Security operations, including key generation and encryption tasks, are offloaded to more powerful nodes at the network edge.
-Intrusion Detection and Prevention: A system for detecting and preventing intrusions has been introduced, enabling management of “man-in-the-middle” attacks at the fog computing layer.
-Counteracting Threats and Attacks: A fog computing system, leveraging military-grade anti-drone technology, has been implemented to detect jamming and GPS spoofing attacks.
-Latency Reduction: A fog computing solution has been proposed to reduce latency in drone communications, enhancing real-time network speed and responsiveness.

3.2.5. Encryption for Information Security

The core principles of information security revolve around three key concepts: (Aissaoui, R., et al. 2023, pp. 10-11) ;
-Confidentiality: Ensures that unauthorized users cannot access the information.
-Integrity: Ensures the information remains unaltered and uncorrupted during use.
-Availability: Ensures authorized users can access and use the information when needed.
Various methods are available to enhance security in communication links. Since wireless links and the network structure in Unmanned Aerial Systems (UAS) are dynamic, physically securing the links becomes impractical. Therefore, encryption remains the most effective method for securing communication links in these environments.
Encryption technologies have been studied for centuries to ensure information security, leading to the development of proven solutions for data protection. In the field of encryption, four primary properties ensure data security: (Aissaoui, R., et al. 2023, pp. 10-11);
-Confidentiality: Guarantees that only authorized users can access the information.
-Integrity: Verifies that the information has not been altered or corrupted during its use.
-Authentication: Establishes trust in the identities of the parties exchanging the information.
-Non-repudiation: Prevents parties from denying the origin of the information.
When encryption techniques are implemented correctly, using best practices and standards, they ensure that information remains confidential, reliable, and non-repudiable while maintaining its integrity. According to Kerckhoffs’s principle, system security should depend solely on the secrecy of the random transactions (the key) rather than the secrecy of the algorithm itself. In fact, all system algorithms should be publicly known, and they should only be used by legitimate users who possess the secret key. The One-Time Pad (OTP) system is the only one that has been proven to be perfectly secure, relying on the use of a random secret key of the same length as the plaintext (which will be encrypted) and used only once. However, this system is impractical due to the challenges in transmitting and storing the key. For systems where perfect security cannot be established, the security level is defined by the complexity of the best-known attack against it. For instance, if the best-known attack on an encryption algorithm requires 280 computational cycles, the system’s security level is considered 80 bits (equivalent to a system where an attack using brute force would involve an 80-bit key). However, as of 2022, encryption tools providing 80-bit security or less are considered vulnerable to efficient attacks using modern computers(Aissaoui, R., et al. 2023, pp. 10-11).
There are three main types of essential tools in modern encryption: (Aissaoui, R., et al. 2023, pp. 10-11);
-Encryption (Symmetric or Asymmetric): Ensures confidentiality and authentication.
-Hash Functions: Ensure data integrity.
-Digital Signatures: Ensure authentication and non-repudiation.
When these tools are combined, they ensure that all necessary properties for securing any type of information are achieved. For example, a hash-based message authentication code (HMAC) ensures both authentication and integrity, while adding a hash function to an encrypted message guarantees integrity.
Hybrid encryption is a structure that widely incorporates these tools, where an asymmetric encryption algorithm is used to establish a shared key between two entities, providing authentication, and then using this temporary key for communication via symmetric encryption. The initial step in this system, known as the Authenticated Key Exchange (AKE) or Authenticated Key Agreement (AKA), is critical. If this step is compromised, the entire system’s security is at risk(Aissaoui, R., et al. 2023, pp. 10-11).
The transition to symmetric encryption offers key advantages: First, leaking the session key does not affect other sessions, meaning that the compromise of a secret key only impacts past and future communications. Second, symmetric encryption is more efficient, faster, and has less impact on bandwidth. The Transport Layer Security (TLS) protocol, which uses this structure, is fundamental to securing internet communications (Aissaoui, R., et al. 2023, pp. 10-11).

4. Conclusion

In conclusion, cybersecurity challenges for unmanned aerial vehicles (UAVs) remain a critical issue in the rapidly evolving digital age, as these aircraft face a range of cyber threats that could impact their security and core functions. Despite the availability of advanced technical solutions, such as sophisticated encryption and the use of artificial intelligence, there is still an urgent need for clear and comprehensive legal and regulatory frameworks. Governments and organizations must establish legal structures that protect UAV data and define legal responsibilities in the event of breaches or cyberattacks. Additionally, fostering cooperation among various stakeholders through both international and local laws is crucial to ensuring the security of these systems.
This study highlights the security vulnerabilities in UAV systems, stressing the importance of implementing comprehensive security measures. These should focus on strengthening encryption, securing communication channels, ensuring the security of software and firmware, and adhering to established standards and regulations. By combining these technical measures with robust legal and regulatory frameworks, the protection of UAVs from increasing cyber threats can be significantly enhanced, ensuring their safe and reliable use across various sectors. Effectively addressing these challenges requires an integrated approach that combines advanced technological solutions with effective legislation, which will contribute to the continued security and protection of UAVs in the future.

5. Research Findings

The key findings of this research are as follows:
-Reliance on AI and Machine Learning Technologies for Real-Time Anomaly and Intrusion Detection: These technologies enhance security in sensitive environments, such as military surveillance, and are essential for providing an immediate and effective response to cyberattacks;
-Development of Secure Wireless Communication Protocols for UAVs: It is critical to ensure reliable and secure communication, even in hostile environments, protecting UAVs from interception and jamming;
-Development of Resilient UAVs: These UAVs should be capable of autonomously adapting to and mitigating cyberattacks, ensuring operational continuity in emergency situations such as search and rescue missions;
-Need to Strengthen Encryption and Authentication Protocols: Enhancing these protocols is essential to secure communication channels and protect UAVs from cyberattacks;
-Regular Software Updates and Secure Coding Practices: These practices help reduce vulnerabilities and improve the overall security of UAVs;
-Threat Intelligence and Forensic Investigations: These efforts contribute to proactive defense against cyberattacks and provide valuable insights for post-attack analysis and recovery;
-Enhancing Physical Security of UAVs: Implementing tamper-resistant technologies and access control measures can prevent unauthorized tampering with the UAVs;
-Compliance with Security and Legal Standards: Adherence to security standards and legal regulations is essential to protect UAVs, ensure their integration with existing security systems, and foster public and regulatory trust while reducing risks;
-Raising Awareness Among Operators About the Risks of Cyberattacks: Training programs and awareness campaigns should be implemented to ensure that operators follow safe and effective practices;
-Monitoring Internal Activities and Preventing Potential Threats from Authorized Personnel: It is crucial to monitor internal activities and prevent threats that may arise from within the organization or from authorized individuals.

References

  1. Aissaoui, R., et al. (2023, February 28). A survey on cryptographic methods to secure communications for UAV traffic management. ENAC, French Civil Aviation University, Toulouse, France. (pp. 10-11) . [CrossRef]
  2. 2-Benkraouda, H., et al. (2018). Cyber-attacks on the data communication of drones monitoring critical infrastructure. Academy & Industry Research Collaboration Center (AIRCC), (pp.87-89). [CrossRef]
  3. Caballero-Martin, D., et al. (2024). Artificial intelligence applied to drone control: A state of the art. MDPI. (pp. 23-24). Retrieved from https://tinyurl.com/3m9rrrzs.
  4. Cosar, M. (2022). Cyber attacks on unmanned aerial vehicles and cyber security measures. The Eurasia Proceedings of Science Technology Engineering and Mathematics, (p.264). Retreived from https://tinyurl.com/ycxmc2m4.
  5. Custers, B. (2016). Flying to new destinations: The future of drones. In The future of drone use: Opportunities and threats from ethical and legal perspectives (Chapter 19, p. 370). Springer. [CrossRef]
  6. Grigore, L., & Cristescu, C. (2024). The use of drones in tactical military operations in the integrated and cybernetic battle field. Land Forces Academy Review, 29(2), (pp.269–273). [CrossRef]
  7. Gupta, Y., et al. (2022, February 16). DRONES: The smart technology in modern agriculture. SSRN. https://tinyurl.com/69yx43rt.
  8. Herrera Velasco, J. A., & Delgado Guevara, H. S. (2024). Development of UAVs/drones equipped with thermal sensors for the search of individuals lost under rubble due to earthquake collapses or any eventuality requiring such capabilities. International Council of the Aeronautical Sciences, (p.1). Retreived from https://tinyurl.com/29jjwc3b.
  9. Kallenborn, Z. (2022, May). InfoSwarms: Drone swarms and information warfare. The US Army War College Quarterly Parameters, (p.87-88). [CrossRef]
  10. Khan, A. (2023). The ambiguity in international law and its effect on drone warfare and cyber security. Western University. (p.54). Retrieved from https://tinyurl.com/4arca62x.
  11. Kim, K., et al. (2024). Drone-assisted multimodal logistics: Trends and research issues. Drones, 8(12), 757. (pp. 1-2). [CrossRef]
  12. Klynge, C. (2021, 16 novembre). Cooperating against cybercrime: 20 years on from the Budapest Convention. Retrieved from https://tinyurl.com/4hcez787.
  13. Koç, M. T. (2023). Drone technologies and applications. In Drones—Various applications (p. 1). Retrieved from https://bit.ly/4g6DZtU.
  14. Kutynska, A., & Dei, M. (2023, March). Legal regulation of the use of drones: Human rights and privacy challenges. Journal of International Legal Communication, (p.39). Retrieved from https://tinyurl.com/5c2efpu9.
  15. Lynn, S. K., & al. (2020, May). Drone swarms: A transformational technology. ResearchGate, (p.3). Retrieved from https://tinyurl.com/2s4jxjme.
  16. Malik, S. (2024, August 1). Security of unmanned aerial vehicle systems through advanced penetration testing. TechRegsiv,( p. 5). Retreived from https://tinyurl.com/ch9c3jmt.
  17. Majeed, R., et al. (2021). Drone security: Issues and challenges. International Journal of Advanced Computer Science and Applications, 12(5), 720. [CrossRef]
  18. Márquez Díaz, J. E. (2023, June 21). Technological developments and implications of autonomous military drones: Prospects in global geopolitics. Revista Tecnológica ESPOL—RTE, (p.138). Retrieved from https://tinyurl.com/yehvyfm2.
  19. Martins dos Santos, B. (2022, May). Budapest Convention on Cybercrime in Latin America: A brief analysis of adherence and implementation in Argentina, Brazil, Chile, Colombia, and Mexico. Derechos Digitales América Latina (English Translation: Gonzalo Bernabó), (p.4). Retrieved from https://tinyurl.com/32sd9nej.
  20. McNabb, M. (2024, March 27). Clarifying cybersecurity guidelines for drones: The DETECT Act. DroneLife. Retrieved from https://tinyurl.com/4avjsxpz.
  21. National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA). (2018, May 22). Cybersecurity risks posed by unmanned aircraft systems. Homeland Security Digital Library. https://www.dhs.gov/sites/default/files/publications/uas-ci-drone-pocket-card-112017-508.
  22. Ngoc-Bao-Van, et Al. (2024). Recent development of drone technology software engineering: A systematic survey. IEEE Access, (pp.19-20). [CrossRef]
  23. Niyonsaba, S., et al. (2023). A survey on cybersecurity in unmanned aerial vehicles: Cyberattacks, defense techniques, and future research directions. International Journal of Computer Networks and Applications (IJCNA), 10(5), (p.688). [CrossRef]
  24. Quamar, M. M., & al., et. (2023, October 20). Advancements and applications of drone-integrated geographic information system technology—A review. MDPI. [CrossRef]
  25. Restas, A. (2015). Drone applications for supporting disaster management. World Journal of Engineering and Technology, 3(3), (p.316-321). [CrossRef]
  26. Seger, A. (2012, 16 février). The Budapest Convention on Cybercrime: A framework for capacity building. Global Forum on Cyber Expertise. Retrieved from https://rm.coe.int/16802fa3e0.
  27. Shah, K. (2024, March 8). The evolution and future of drone battery technology. Drones Technology. Retrieved from https://tinyurl.com/yhp8bs3v.
  28. Sharma, V. (2019, February 23). Advances in drone communications, state-of-the-art and architectures. MDPI. Retrieved from https://tinyurl.com/57ucd7p3.
  29. Spalevic, Z., & Vićentijević, K. (2022). GDPR and challenges of personal data protection. The European Journal of Applied Economics, 19, (pp.55-56). [CrossRef]
  30. Stoner, J. (2024, August 27). What is GDPR (General Data Protection Regulation)? Flyeye. Retrieved from https://tinyurl.com/25a6kesn.
  31. 26-Tychola, K. A., et al. (2024). Beyond flight: Enhancing the Internet of Drones with blockchain technologies. Drones, 8(6), 219. [CrossRef]
  32. Vaheed, M., et al. (2023). Drone technology for smart agriculture. In Emerging trends in biosciences (pp. 105-106). InfoCapsule LLP. https://tinyurl.com/jwc9tyf5.
  33. Veprytska, O., & Kharchenko, V. (2023). Analysis of AI powered attacks and protection of UAV assets: Quality model-based assessing cybersecurity of mobile system for demining. CEUR-WS, (pp.3-9). Retrieved from https://tinyurl.com/jkkz2ek8.
  34. Veprytska, O., & Kharchenko, V. (2024,March 28). Analysis of AI powered attacks and protection of UAV assets: Quality model-based assessing cybersecurity of mobile system for demining. CEUR-WS. (p. 2) Retrieved from https://tinyurl.com/jkkz2ek8.
  35. Wasswa, S., et al. (2023). Cybersecurity in unmanned aerial vehicles: A review. International Journal on Smart Sensing and Intelligent Systems, (p.1-2). Retrieved from https://tinyurl.com/yajf2ft3.
  36. Yaacoub, J.-P., et al. (2020, May 8). Security analysis of drone systems: Attacks, limitations, and recommendations. Internet of Things. (p. 1). Retrieved from https://tinyurl.com/3632ch5u.
  37. Yassine Mekdad, et al., “Exploring Jamming and Hijacking Attacks for Micro Aerial Drones”, arXiv, 6 Mar 2024 17, link: . [CrossRef]
  38. Amrami, D. (2023, avril 13). Drones: Sécurité, vulnérabilité, exploitation, sensibilisation et atténuation (Translated by the author). LinkedIn. https://bit.ly/4fUPCnV.
  39. Krichen, M. (2022). Défis de sécurité pour les communications par drones: Menaces, attaques et contre-mesures possibles(Translated by the author). HAL Open Science, (p. 5). https://tinyurl.com/3uv63psu.
  40. Gery, A. (2018). Droit international et prolifération des cyber armes (Translated by the author). Institut Français des Relations Internationales (IFRI), 83(2), (p.47). https://tinyurl.com/mtx6w9yb.
  41. Al-Ashqar Jbour, M. (2016), Cybersecurity: The Concern of the Era (Translated by the author), Arab Center for Legal and Judicial Research. (pp. 106-115). Retrieved from https://tinyurl.com/mrymuhaa.
  42. Abis, N. F. (2018). Cyberattacks: A Legal Analytical Study on the Challenges of Their Contemporary Regulation (Translated by the author). Zen Legal and Literary Publications, p. 105.
  43. Al-Radhi, S. M. A. (2019, August). Cybercrime and the Integration of National, Regional, and International Texts (Translated by the author). Journal of Law and International Business, Series of Publications and Works of Hassan II University, Morocco, (23), p. 31.
  44. Al-Bidri, A. W. (2021). Cybersecurity Strategy: A Case Study of Morocco (Translated by the author). Journal of Strategic and Military Studies, Democratic Arab Center for Strategic, Political, and Economic Studies, Berlin, (1st ed.), pp. 105-106.
  45. Antar, Y. (2019). Moroccan Digital Security in the Face of Growing Cyberattacks (Translated by the author). Moroccan Journal of International and Strategic Studies, (01), pp. 22-23.
  46. Suleiman, Q. (2022, May 3). Combating Cybercrime in Light of International Agreements (Translated by the author). Research Laboratory in Law and Political Science, Ammar Thliji University, Algeria. (p. 82). Retrieved from https://tinyurl.com/4e8st9zk.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated