Unmanned Aerial Systems (UAS), or drones, are among the most significant technological innovations of recent years, revolutionizing various fields, from security and surveillance to transportation and logistics. With rapid technological advancements, the use of drones has become more diverse and widespread, reflecting global trends toward improving efficiency and reducing costs. As drones have become easier and more affordable to purchase, it is generally expected that both private and public usage of drones by individuals, businesses, and governmental authorities will significantly increase in the coming years (Custers, B., 2016). However, despite the many benefits this technology offers, it faces significant challenges, particularly the cybersecurity risks that threaten its security and functionality (National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA), 2018). Drones face multiple threats, including cyberattacks such as jamming and hijacking, which could lead to their disruption or misuse for harmful purposes (Yassine Mekdad, et al., 2024). Therefore, it is crucial to examine these modern technological trends within the context of cybersecurity and analyze the associated risks to ensure the safe use of this innovative technology in the future.
2.1. Modern Technological Trends for Drones
Drone software engineering has garnered significant attention, leading to notable advancements. The rapid evolution of drone technology can be attributed to its ability to dramatically improve efficiency and open new opportunities compared to traditional operational methods in several fields. Many advanced technologies, such as artificial intelligence, computer science, and obstacle avoidance technology, have been developed in tandem to enhance drone operations. Drones are equipped with sensors such as accelerometers, gyroscopes, and GPS devices to gather environmental data and adjust flight status. This data is then sent to the simulation unit for decision-making, while the main system controls essential flight functions, including altitude, direction, and speed. The control system incorporates algorithms and methods that ensure flight stability, as well as a communication unit that transmits data between the drone and remote control systems via technologies like radio waves, Wi-Fi, LTE, or military-grade communication systems (Ngoc-Bao-Van et al., 2024, pp. 19-20).
Modern technological trends for drones are evolving rapidly, enhancing their capabilities and expanding their applications across various sectors. Some of the most significant trends include:
-Modern drones are equipped with state-of-the-art technology, with their capabilities continuously improving. Drones are now utilized in a broad range of fields, such as construction, defense, photography, marketing, delivery, agriculture, rescue operations, and entertainment. It is anticipated that drones will soon enter new sectors based on emerging needs (Koç, M. T., 2023, pp. 21-22);
-Drones equipped with thermal sensors represent a major advancement in search and rescue operations, especially in locating individuals trapped under rubble following natural disasters such as earthquakes (Herrera Velasco & Delgado Guevara, 2024). Additionally, drones outfitted with infrared sensors, night vision cameras, and transmitters serve as highly effective tools for providing real-time information on the locations of individuals in challenging and elevated terrains. Furthermore, these drones play a crucial role in monitoring illegal hunting activities by tracking wildlife in forests and protected areas without disturbing the animals (Koç, 2023, pp. 21-22);
-Unmanned Aerial Vehicles (UAVs), also known as drones, have found a wide range of applications due to their affordability, ease of use, vertical takeoff and landing capabilities, and ability to operate in high-risk or difficult-to-reach areas (Quamar, M. M., & al., et. 2023). Among their many uses, drones play a crucial role in ensuring crowd safety during protests, marches, and public events. Drones equipped with high-definition cameras are also successfully used in aerial photography of sporting events. Thermal sensors and gyroscopes, along with their high maneuverability, compact size, and power, improve the accuracy of regional and national weather forecasts by enabling scientists to monitor weather events in detail. Their use is expected to grow in early warning systems and precautionary measures, offering valuable insights into the trajectory of large-scale weather events such as hurricanes (Koç, M. T, 2023, pp. 21-22).
-To enhance agricultural production and optimize food management, the agricultural sector requires an advanced monitoring system based on unmanned aerial vehicles (UAVs) (Gupta, Y., et al., 2022). UAVs offer a unique solution to the problem of damage caused by heavy machinery used in large-scale, efficient, and economical production. This technology is particularly significant within the context of Agriculture 4.0, where Internet of Things (IoT) applications enable the rapid collection of data from expansive agricultural areas through UAVs and unmanned ground vehicles (UGVs). UAVs communicate with one another, improving the ability to map land and execute agricultural operations based on the data collected (Koç, M. T, 2023, pp. 21-22).
-Drones significantly benefit from advanced technologies, which enhance their ability to perform a wide range of tasks with precision and efficiency. Below are examples of how drones leverage cutting-edge technology:
2.1.1. Artificial Intelligence (AI) and Machine Learning
The integration of artificial intelligence (AI) with drones represents a dynamic and promising field of innovation. Originally designed for unmanned aerial operations, drones have undergone significant transformation with the incorporation of AI algorithms. The increasing availability of onboard computational power, combined with continuous improvements in AI algorithms, allows drones to perform tasks that adapt to changing environments and make complex, real-time decisions (Caballero-Martin, D., et al., 2024, pp. 23-24).
Given the limitations of drone resources—such as battery life, payload capacity, energy consumption, weather conditions, data storage, connectivity, and response time—AI algorithms have the potential to process and analyze data in real-time. This enables drones to make informed decisions about optimizing their limited resources. For instance, machine learning algorithms can predict energy consumption patterns and optimize flight paths, thereby extending the drone’s range. Additionally, AI’s ability to adapt to environmental changes or specific tasks ensures more efficient resource utilization, enhancing the practical applications of drones (Caballero-Martin, D., et al., 2024, pp. 23-24).
In terms of sustainability and energy efficiency, there is an urgent need to develop more efficient, lightweight batteries and explore alternative energy sources to reduce environmental impact. To address these challenges, leveraging AI capabilities is essential. Moreover, from a regulatory standpoint, the collection of big data for AI models presents ethical and legal challenges. Issues surrounding privacy, autonomy in decision-making, and accountability require clear standards and robust regulation to foster trust and interoperability among drone systems. In this regard, AI can help address these challenges by improving fleet coordination, optimizing energy use, and ensuring operational safety (Caballero-Martin, D., et al., 2024, pp. 23-24).
2.1.2. Advanced Communications
Unmanned Aerial Vehicle (UAV) networks and drone communications are emerging research areas that focus on achieving high productivity, long range, and extensive coverage compared to current networks. With autonomous operation potential, drones can be tailored for critical missions. There is growing interest from both industry and academia to integrate UAV systems with traditional networks, focusing on enhancing service quality, deployment strategies, and ensuring reliable communication. Moreover, drones play a crucial role in distributing vital information and extending LTE networks to remote locations. UAVs are expected to be a key component of 5G and beyond deployments, significantly boosting coverage and capacity (Sharma, V., 2019).
Drones offer significant benefits in providing timely services, particularly during or after disasters, by improving communication capabilities for public safety. Wireless communication through UAVs can save lives and protect ecosystems by managing crises effectively (Sharma, V., 2019).
Another example of drone-supported communication is integrated network formations. The coordination between UAVs and wireless sensor networks (WSNs) can support a wide range of civilian and military applications, including search and rescue, navigation, control, and reconnaissance (Sharma, V., 2019).
2.1.3. Energy and Efficient Design
Drone batteries are more than just power sources; they are essential to the drone’s capabilities, whether for aerial photography or critical search-and-rescue operations. Over the years, battery technology has undergone significant advancements, unlocking the full potential of drones. As drones continue to integrate into various sectors, they increasingly rely on Lithium Polymer (LiPo) batteries, known for their light weight and high energy output. These batteries consist of cells with a polymer electrolyte, allowing for higher energy density in a smaller package. Additionally, LiPo batteries are flexible in shape, allowing for customization to fit the varied and compact designs of drones (Shah, K., 2024).
2.1.4. Drones in Smart Agriculture
Advanced drone technologies present significant opportunities to address numerous challenges in agriculture. Key applications include irrigation management and crop monitoring. The first use of aerial vehicles in agriculture dates back to 1921, when the U.S. Department of Agriculture (USDA), in collaboration with the U.S. Army, used aircraft to distribute pesticides. A major event occurred in 2017 in South Africa, where the fall armyworm destroyed over 100,000 hectares of maize in Zambia. The Zambian Air Force assisted the Ministry of Agriculture and Disaster Management by using aircraft to apply pesticides to pest hotspots across the country. Recently, Israel has made significant strides in drone use for agriculture. Initially adopted by the military, drones were quickly embraced by other sectors as their broad applications became evident (Vaheed, M., et al., 2023, pp. 105-106).
Today, agricultural drones enhance crop production and provide valuable insights into disease management through imaging and sensor technologies. They also assist in monitoring irrigation systems and water supplies, helping predict water availability from glaciers. If UAVs and Wireless Sensor Networks (WSN) are widely implemented in the near future, millions of farmers could gain access to real-time data about their farms. This would reduce the need for farmers to spend extensive time collecting data and provide them with early warnings of disasters and weather changes (Vaheed, M., et al., 2023, pp. 105-106).
2.1.5. Drones in Military and Security Fields
Unmanned Aerial Vehicles (UAVs) have been a staple in military operations for years, gaining popularity due to their ability to conduct surveillance, reconnaissance, and strike missions without risking soldiers’ lives. These drones are remotely controlled, allowing for prolonged flight times, which makes them ideal for exploratory and monitoring tasks. UAVs are especially valuable for accessing areas that may be too dangerous or unreachable for human soldiers.
Military drones are equipped with specialized features that set them apart from civilian models. For example, they can be outfitted with high-resolution cameras and advanced surveillance systems to gather intelligence on terrain and enemy positions. Some UAVs are also fitted with precision-guided weapons, enabling them to strike specific targets with remarkable accuracy. Despite the numerous benefits they offer in military operations, their use has sparked debates, especially concerning privacy and ethical implications, particularly when military strikes are conducted without direct human intervention. There are also concerns about the security of these drones, as they could potentially be shot down or hacked by adversaries (Márquez Díaz, J. E., 2023, p. 138).
Autonomous drones, viewed as low-cost, high-impact weapons, are expected to revolutionize future battlefields. This evolution calls for a reevaluation of their role in global security, especially as modern warfare continues to evolve, intensifying the arms race in response to emerging military requirements. Additionally, the integration of technologies such as artificial intelligence (AI), the Internet of Things (IoT), and quantum computing is enhancing the autonomy, combat capabilities, and data processing power of these drones (Márquez Díaz, J. E., 2023, p. 138).
2.1.6. Swarming Technology
Drone swarms are advanced, information-dependent weapons designed to operate in diverse environments, including land, sea, air, and space. A fundamental characteristic of these swarms is their reliance on stable communication links and efficient data processing to achieve coordinated objectives. The effectiveness of a drone swarm stems from its ability to exchange information, with key advantages derived from three core factors: size, customization, and diversity. Each of these factors necessitates precise information management. Larger swarms, equipped with more sensors and munitions, possess greater capabilities for executing large-scale collective attacks. In contrast, more agile swarms can adapt and form smaller, focused units for precise strikes. Additionally, diverse swarms can integrate various sensors and munitions, improving coordination across multiple domains, but this integration also introduces coordination challenges. These capabilities enable new tactical approaches, such as concentrating fire on specific targets or quickly reconfiguring to counter a threat, all of which require robust and efficient communication for success (Kallenborn, Z., 2022, pp. 87-88).
Drone swarms have already proven their presence on modern battlefields. For instance, in the 2021 conflict between Israel and Gaza, the Israeli military became the first to deploy a swarm of drones in active combat. Similarly, during the ongoing conflict between Russia and Ukraine, Russia introduced the “Kalashnikov KUB-BLA” lethal drone munitions, which have the potential to form swarms. Russia also possesses “Lancet-3” munitions capable of creating airborne minefields to target drones and other aircraft. Both the United States and its allies, as well as their adversaries, are heavily investing in the development of swarm technologies. This pursuit is unsurprising, given that drone swarms have numerous applications across all branches of the military, from infantry and logistics support to nuclear deterrence (Kallenborn, Z., 2022, pp. 87-88).
What distinguishes drone swarms from previous technologies is their ability to communicate autonomously, allowing them to adjust their collective behavior based on real-time data collected from sensors on each individual drone. As new information is gathered, the swarm can dynamically adjust its movements or tactics. This responsiveness can either be pre-programmed into the swarm’s control system or managed by a single operator, who oversees the swarm as a unified entity. To enhance resilience and reduce vulnerabilities, each drone in the swarm can be programmed to take on “leadership roles,” or the swarm’s behavior may emerge from the decentralized coordination of its members, eliminating the need for centralized command (Lynn, S. K., & al., 2020, p. 3).
Furthermore, drone swarms represent a truly transformative technology. They have the potential to replace humans in hazardous or hostile environments. When deployed in sufficient numbers, they can gather and integrate data from multiple perspectives and locations, generating insights that would be otherwise unattainable. This information can then be used to guide decision-makers who cannot physically access the environment or who require intelligence from a variety of angles and viewpoints (Lynn, S. K., & al., 2020, p. 4).
2.1.7. Drones in Transport and Logistics
The rapid advancements in Unmanned Aerial Vehicle (UAV) technology, commonly known as drones, over the past decade have led to their widespread adoption across various industries. In particular, the logistics sector has increasingly relied on drones, transforming these advanced devices from experimental tools into vital components of modern logistics systems, especially in delivery services. For instance, some countries have integrated drones into last-mile delivery operations to improve efficiency and speed in both urban and rural areas. Amazon, a key player in this technology, has begun delivering parcels across various regions of the United States, including both urban and rural locations. Furthermore, postal services in South Korea are enhancing public delivery systems by testing drones to deliver packages to remote islands facing logistical challenges. Consequently, numerous academic studies have emerged that explore the integration of drones into last-mile delivery. The role of drones in logistics is being increasingly affirmed, not only through their integration with vehicles in last-mile operations but also through innovative models that connect drones with delivery personnel. These transformations have been accompanied by significant advancements in related technologies, such as improved battery life, autonomous mobility, and sophisticated sensing and control systems (Kim, K., et al., 2024, pp. 1-2).
As these trends progress, unmanned aerial vehicles (UAVs) are expected to take on an increasingly diverse and important role in the future, expanding into advanced areas such as artificial intelligence, renewable energy, and sustainable transportation. However, this rapid technological advancement is accompanied by several risks. The primary threat comes from cyberattacks, including jamming, spoofing, and malware. Jamming and spoofing disrupt communication and navigation in UAVs, respectively, while malware infiltrates the UAV’s software, granting unauthorized access and causing system malfunctions. These attacks could also result in the theft of sensitive UAV data or the reverse engineering of its technology. Furthermore, unauthorized surveillance of UAVs and data breaches represent significant privacy threats, as sensitive information is exposed through intercepted data (Malik, S., 2024).
2.2. Cybersecurity Risks of Drones
Unmanned Aerial Vehicles (UAVs), commonly referred to as drones, have become widely used technologies in both civilian and military sectors. In the civilian realm, their applications include agriculture, logistics, aerial surveillance, forest monitoring, and more. In the military sector, drones are employed for tasks such as surveillance of military zones, combat, intelligence gathering, and bomb detection. Despite their cost-effectiveness and performance advantages, the security of drones remains a significant challenge. Drones are vulnerable to various types of cyberattacks, including eavesdropping, Distributed Denial of Service (DDoS) attacks, and GPS spoofing, all of which threaten the confidentiality, integrity, and availability of data. These attacks can result in data loss, operational disruptions, or even hijacking of the drone (Niyonsaba, S., et al., 2023, p. 688).
With the rapid advancement of UAV technology, ensuring the security and safety of these systems has become crucial. UAVs are exposed to several cybersecurity risks, such as unauthorized access, system takeovers, or manipulation, which threaten both their safety and the integrity of the data they handle. Additionally, these vehicles face challenges due to limited computational resources, wireless communication vulnerabilities, system weaknesses, evolving technical threats, regulatory compliance issues, and human factor influences (Wasswa, S., et al., 2023, pp. 1-2). Below is a summary of some of the key cybersecurity risks:
2.2.1. Attacks on Drone Control and Communication Systems
Communication is a vital component of drone systems, as it facilitates flight control and data transmission. Most drones rely on Wi-Fi to communicate with ground control stations, but the complexity and dynamic nature of these wireless networks can create vulnerabilities, exposing the system to significant risks (Krichen, M., 2022, pp. 5-7).
Moreover, small UAVs, such as quadcopters, heavily rely on GPS for navigation, making them susceptible to GPS signal spoofing attacks. These attacks involve broadcasting counterfeit GPS signals that deceive the drone’s GPS receiver into accepting false location data, allowing attackers to redirect the drone to an unintended location, which could result in crashes or hijacking. GPS spoofing can also disrupt the drone’s operations entirely, rendering it unable to navigate and exposing it to greater risks (Amrami, D., 2023).
2.2.2. Attacks on Data
Cyberattacks targeting UAV systems primarily focus on three categories of data: confidentiality, integrity, and availability (Benkraouda, H., et al., 2018, pp. 87-89).
-Availability Attacks: These attacks attempt to seize control of the drone or cut off its communication with the Ground Control Station (GCS). In one scenario, an attacker may take control of the drone or the ground station to disable sensors, such as surveillance cameras, or alter the drone’s location, thereby corrupting the data and creating a false impression of the environment. In another scenario, the communication link between the drone and the ground station can be severed using techniques like jamming or GPS spoofing, disrupting operations and preventing the transmission of legitimate data. Furthermore, DoS/DDoS attacks can flood the network with fake requests, rendering the system unavailable and preventing the transmission of legitimate data packets. DoS attacks can be carried out through flooding, spoofing, or buffer overflow (Benkraouda, H., et al., 2018, pp. 87-89).
-Integrity Attacks: These attacks involve the modification or replacement of transmitted data with false information. In one example, an attacker might replay previously recorded video to avoid detection. In another scenario, fake sensor data can be generated through a “man-in-the-middle” attack, leading to incorrect decisions by the security team (Benkraouda, H., et al., 2018, pp. 87-89).
-Confidentiality Attacks: These attacks focus on intercepting sensitive data. A passive attack may involve the attacker eavesdropping on communications between the drone and the ground station, such as video streams from surveillance cameras. Alternatively, an active attack might involve intercepting and redirecting data for financial or intelligence purposes, such as selling the intercepted information on the black market (Benkraouda, H., et al., 2018, pp. 87-89).
2.2.3. Software Attacks
Software plays a crucial role in the operation of Unmanned Aerial Vehicles (UAVs) by managing flight operations and controlling the systems connected to the drone. Before each mission, the computer responsible for the UAV exports the necessary data for its operation. The primary security threats in these systems include attacks on drone operators, the Ground Control Station (GCS), drone components, communications, and cloud services. Operators are responsible for controlling the flight, navigation, imaging, or exploration tasks and ensuring the mission’s safety. However, they are exposed to threats such as unauthorized access, social engineering, privilege escalation, and insider attacks. The GCS, responsible for mission planning and communication with the drone, is vulnerable to the accidental upload of viruses, which could compromise the drone’s security (Veprytska, O., & Kharchenko, V., 2023, pp. 3-5).
Attacks targeting drone components include backdoor attacks, aimed at inserting malicious software into the control system; flooding attacks, which deplete the drone’s resources; and selfish node attacks, which harm other drones in the network. Other threats include GPS manipulation (GPS spoofing) and telemetry spoofing, which corrupt data collected from sensors (Veprytska, O., & Kharchenko, V., 2023, pp. 3-5).
Regarding communication, threats include eavesdropping on data transmitted over unencrypted channels, jamming wireless communication channels, and man-in-the-middle (MITM) attacks, where the attacker intercepts and modifies messages. Replay attacks also occur when encrypted messages are intercepted and retransmitted (Veprytska, O., & Kharchenko, V., 2023, pp. 3-5).
When drones communicate with each other, they are susceptible to Sybil attacks, where multiple fake drones are created to control the network, and impersonation attacks, where a malicious drone pretends to be part of the legitimate network. For cloud-to-drone communication, threats include black hole attacks that disrupt communication with the cloud, deauthentication attacks that sever the connection between the drone and the cloud system, and data manipulation during transmission (Veprytska, O., & Kharchenko, V., 2023, pp. 3-5).
Despite advancements in cybersecurity, UAV systems remain vulnerable to various attacks, making it essential to strengthen regulations and security standards to ensure their protection (Veprytska, O., & Kharchenko, V., 2023, pp. 3-9).
2.2.4. Attacks Related to Artificial Intelligence: Vulnerabilities and Attacks on Artificial Intelligence Systems in UAVs
Attacks on AI technology encompass a wide range of threats designed to affect the security and reliability of information systems. These attacks exploit vulnerabilities in AI systems, threatening the confidentiality, integrity, and availability of data. These attacks can be classified into three main types: adversarial attacks, poisoning attacks, and model extraction attacks (Veprytska, O., & Kharchenko, V., 2023, pp. 3-9).
Adversarial Attacks
These attacks aim to cause classification errors by making minimal changes to input data, leading the model to misclassify it.
Poisoning Attacks: These involve introducing malicious samples during the training process, increasing classification errors and reducing model accuracy (Veprytska, O., & Kharchenko, V., 2023, pp. 3-9).