Submitted:
06 January 2025
Posted:
09 January 2025
You are already at the latest version
Abstract
Unmanned Aerial Vehicles (UAVs), or drones, were initially developed for military purposes, primarily for surveillance and military operations. Over time, their use expanded into various civilian sectors, including delivery and monitoring. This rapid proliferation has sparked growing concerns about cybersecurity. This article explores the cybersecurity risks faced by drones in an increasingly interconnected digital landscape and proposes innovative solutions to mitigate these threats. The analysis is structured into two main parts: the first examines the latest technological trends and the cybersecurity challenges confronting UAVs, while the second focuses on technical solutions to address these risks, as well as the role of local and international regulations in ensuring the safe deployment of this technology.
Keywords:
1. Introduction
1.1. Importance of the Topic
1.2. Research Problem
1.3. Research Questions
1.4. Objectives of the Study
1.5. Importance of the Study
1.6. Methodology of the Study
1.7. Research Framework
2. Drones in Light of Modern Technological Trends and the Cybersecurity Risks They Face
2.1. Modern Technological Trends for Drones
2.1.1. Artificial Intelligence (AI) and Machine Learning
2.1.2. Advanced Communications
2.1.3. Energy and Efficient Design
2.1.4. Drones in Smart Agriculture
2.1.5. Drones in Military and Security Fields
2.1.6. Swarming Technology
2.1.7. Drones in Transport and Logistics
2.2. Cybersecurity Risks of Drones
2.2.1. Attacks on Drone Control and Communication Systems
2.2.2. Attacks on Data
2.2.3. Software Attacks
2.2.4. Attacks Related to Artificial Intelligence: Vulnerabilities and Attacks on Artificial Intelligence Systems in UAVs
Adversarial Attacks
Model Extraction Attacks
3. Managing Cybersecurity Risks Threatening UAV Security
3.1. Legal Measures for Managing Cybersecurity Risks Threatening UAV Security
3.2. Technical Mechanisms for Managing Cybersecurity Risks Threatening UAV Security
3.2.1. Artificial Intelligence (AI) for Threat Detection
AI Functions in UAV Systems
3.2.2. Blockchain Technology for Enhancing UAV Communication Security
Real-Time Location Updates
Blockchain-Based Identification System
Encrypted Data Transmission
3.2.3. Machine Learning Techniques to Enhance the Security of Drone Communications: (Krichen, M., 2022, pp. 6-10)
3.2.4. Fog Computing Technology to Enhance Drone Communication Security
3.2.5. Encryption for Information Security
4. Conclusion
5. Research Findings
References
- Aissaoui, R., et al. (2023, February 28). A survey on cryptographic methods to secure communications for UAV traffic management. ENAC, French Civil Aviation University, Toulouse, France. (pp. 10-11) . [CrossRef]
- 2-Benkraouda, H., et al. (2018). Cyber-attacks on the data communication of drones monitoring critical infrastructure. Academy & Industry Research Collaboration Center (AIRCC), (pp.87-89). [CrossRef]
- Caballero-Martin, D., et al. (2024). Artificial intelligence applied to drone control: A state of the art. MDPI. (pp. 23-24). Retrieved from https://tinyurl.com/3m9rrrzs.
- Cosar, M. (2022). Cyber attacks on unmanned aerial vehicles and cyber security measures. The Eurasia Proceedings of Science Technology Engineering and Mathematics, (p.264). Retreived from https://tinyurl.com/ycxmc2m4.
- Custers, B. (2016). Flying to new destinations: The future of drones. In The future of drone use: Opportunities and threats from ethical and legal perspectives (Chapter 19, p. 370). Springer. [CrossRef]
- Grigore, L., & Cristescu, C. (2024). The use of drones in tactical military operations in the integrated and cybernetic battle field. Land Forces Academy Review, 29(2), (pp.269–273). [CrossRef]
- Gupta, Y., et al. (2022, February 16). DRONES: The smart technology in modern agriculture. SSRN. https://tinyurl.com/69yx43rt.
- Herrera Velasco, J. A., & Delgado Guevara, H. S. (2024). Development of UAVs/drones equipped with thermal sensors for the search of individuals lost under rubble due to earthquake collapses or any eventuality requiring such capabilities. International Council of the Aeronautical Sciences, (p.1). Retreived from https://tinyurl.com/29jjwc3b.
- Kallenborn, Z. (2022, May). InfoSwarms: Drone swarms and information warfare. The US Army War College Quarterly Parameters, (p.87-88). [CrossRef]
- Khan, A. (2023). The ambiguity in international law and its effect on drone warfare and cyber security. Western University. (p.54). Retrieved from https://tinyurl.com/4arca62x.
- Kim, K., et al. (2024). Drone-assisted multimodal logistics: Trends and research issues. Drones, 8(12), 757. (pp. 1-2). [CrossRef]
- Klynge, C. (2021, 16 novembre). Cooperating against cybercrime: 20 years on from the Budapest Convention. Retrieved from https://tinyurl.com/4hcez787.
- Koç, M. T. (2023). Drone technologies and applications. In Drones—Various applications (p. 1). Retrieved from https://bit.ly/4g6DZtU.
- Kutynska, A., & Dei, M. (2023, March). Legal regulation of the use of drones: Human rights and privacy challenges. Journal of International Legal Communication, (p.39). Retrieved from https://tinyurl.com/5c2efpu9.
- Lynn, S. K., & al. (2020, May). Drone swarms: A transformational technology. ResearchGate, (p.3). Retrieved from https://tinyurl.com/2s4jxjme.
- Malik, S. (2024, August 1). Security of unmanned aerial vehicle systems through advanced penetration testing. TechRegsiv,( p. 5). Retreived from https://tinyurl.com/ch9c3jmt.
- Majeed, R., et al. (2021). Drone security: Issues and challenges. International Journal of Advanced Computer Science and Applications, 12(5), 720. [CrossRef]
- Márquez Díaz, J. E. (2023, June 21). Technological developments and implications of autonomous military drones: Prospects in global geopolitics. Revista Tecnológica ESPOL—RTE, (p.138). Retrieved from https://tinyurl.com/yehvyfm2.
- Martins dos Santos, B. (2022, May). Budapest Convention on Cybercrime in Latin America: A brief analysis of adherence and implementation in Argentina, Brazil, Chile, Colombia, and Mexico. Derechos Digitales América Latina (English Translation: Gonzalo Bernabó), (p.4). Retrieved from https://tinyurl.com/32sd9nej.
- McNabb, M. (2024, March 27). Clarifying cybersecurity guidelines for drones: The DETECT Act. DroneLife. Retrieved from https://tinyurl.com/4avjsxpz.
- National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA). (2018, May 22). Cybersecurity risks posed by unmanned aircraft systems. Homeland Security Digital Library. https://www.dhs.gov/sites/default/files/publications/uas-ci-drone-pocket-card-112017-508.
- Ngoc-Bao-Van, et Al. (2024). Recent development of drone technology software engineering: A systematic survey. IEEE Access, (pp.19-20). [CrossRef]
- Niyonsaba, S., et al. (2023). A survey on cybersecurity in unmanned aerial vehicles: Cyberattacks, defense techniques, and future research directions. International Journal of Computer Networks and Applications (IJCNA), 10(5), (p.688). [CrossRef]
- Quamar, M. M., & al., et. (2023, October 20). Advancements and applications of drone-integrated geographic information system technology—A review. MDPI. [CrossRef]
- Restas, A. (2015). Drone applications for supporting disaster management. World Journal of Engineering and Technology, 3(3), (p.316-321). [CrossRef]
- Seger, A. (2012, 16 février). The Budapest Convention on Cybercrime: A framework for capacity building. Global Forum on Cyber Expertise. Retrieved from https://rm.coe.int/16802fa3e0.
- Shah, K. (2024, March 8). The evolution and future of drone battery technology. Drones Technology. Retrieved from https://tinyurl.com/yhp8bs3v.
- Sharma, V. (2019, February 23). Advances in drone communications, state-of-the-art and architectures. MDPI. Retrieved from https://tinyurl.com/57ucd7p3.
- Spalevic, Z., & Vićentijević, K. (2022). GDPR and challenges of personal data protection. The European Journal of Applied Economics, 19, (pp.55-56). [CrossRef]
- Stoner, J. (2024, August 27). What is GDPR (General Data Protection Regulation)? Flyeye. Retrieved from https://tinyurl.com/25a6kesn.
- 26-Tychola, K. A., et al. (2024). Beyond flight: Enhancing the Internet of Drones with blockchain technologies. Drones, 8(6), 219. [CrossRef]
- Vaheed, M., et al. (2023). Drone technology for smart agriculture. In Emerging trends in biosciences (pp. 105-106). InfoCapsule LLP. https://tinyurl.com/jwc9tyf5.
- Veprytska, O., & Kharchenko, V. (2023). Analysis of AI powered attacks and protection of UAV assets: Quality model-based assessing cybersecurity of mobile system for demining. CEUR-WS, (pp.3-9). Retrieved from https://tinyurl.com/jkkz2ek8.
- Veprytska, O., & Kharchenko, V. (2024,March 28). Analysis of AI powered attacks and protection of UAV assets: Quality model-based assessing cybersecurity of mobile system for demining. CEUR-WS. (p. 2) Retrieved from https://tinyurl.com/jkkz2ek8.
- Wasswa, S., et al. (2023). Cybersecurity in unmanned aerial vehicles: A review. International Journal on Smart Sensing and Intelligent Systems, (p.1-2). Retrieved from https://tinyurl.com/yajf2ft3.
- Yaacoub, J.-P., et al. (2020, May 8). Security analysis of drone systems: Attacks, limitations, and recommendations. Internet of Things. (p. 1). Retrieved from https://tinyurl.com/3632ch5u.
- Yassine Mekdad, et al., “Exploring Jamming and Hijacking Attacks for Micro Aerial Drones”, arXiv, 6 Mar 2024 17, link: . [CrossRef]
- Amrami, D. (2023, avril 13). Drones: Sécurité, vulnérabilité, exploitation, sensibilisation et atténuation (Translated by the author). LinkedIn. https://bit.ly/4fUPCnV.
- Krichen, M. (2022). Défis de sécurité pour les communications par drones: Menaces, attaques et contre-mesures possibles(Translated by the author). HAL Open Science, (p. 5). https://tinyurl.com/3uv63psu.
- Gery, A. (2018). Droit international et prolifération des cyber armes (Translated by the author). Institut Français des Relations Internationales (IFRI), 83(2), (p.47). https://tinyurl.com/mtx6w9yb.
- Al-Ashqar Jbour, M. (2016), Cybersecurity: The Concern of the Era (Translated by the author), Arab Center for Legal and Judicial Research. (pp. 106-115). Retrieved from https://tinyurl.com/mrymuhaa.
- Abis, N. F. (2018). Cyberattacks: A Legal Analytical Study on the Challenges of Their Contemporary Regulation (Translated by the author). Zen Legal and Literary Publications, p. 105.
- Al-Radhi, S. M. A. (2019, August). Cybercrime and the Integration of National, Regional, and International Texts (Translated by the author). Journal of Law and International Business, Series of Publications and Works of Hassan II University, Morocco, (23), p. 31.
- Al-Bidri, A. W. (2021). Cybersecurity Strategy: A Case Study of Morocco (Translated by the author). Journal of Strategic and Military Studies, Democratic Arab Center for Strategic, Political, and Economic Studies, Berlin, (1st ed.), pp. 105-106.
- Antar, Y. (2019). Moroccan Digital Security in the Face of Growing Cyberattacks (Translated by the author). Moroccan Journal of International and Strategic Studies, (01), pp. 22-23.
- Suleiman, Q. (2022, May 3). Combating Cybercrime in Light of International Agreements (Translated by the author). Research Laboratory in Law and Political Science, Ammar Thliji University, Algeria. (p. 82). Retrieved from https://tinyurl.com/4e8st9zk.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).