Submitted:
29 March 2026
Posted:
31 March 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Problem Statement
1.2. Contribution
- Provides fundamental knowledge on UAV-based technologies, applications, and related risks. This is beneficial for future research as it comprehensively serves as a resource for UAV-related hazards, weaknesses and challenges, which is an essential prerequisite for identifying and assessing risks of aerial platforms;
- Gives an insight into the association of the components of a drone-assisted system and the identified vulnerabilities and threat sources. This perspective allows practitioners to better understand interactions between systems’ components, environmental factors, structural limitations and operational uncertainties. It also empowers experts to identify and quantify dynamically changing failure scenarios;
- Illustrates a feasible risk assessment approach directed towards and tailored for drone-assisted services, by integrating established risk assessment standards and a multi-criteria hierarchy approach following the principals of pairwise comparisons. The goal is to decompose the identified hazards into risk elements, establish the dependencies among them, assign numerical values and quantify them;
- Verifies and classifies risk elements leading to the identified risks along with the relationships and dependencies between them. The aim is to empower evaluators to verify and evaluate those risk elements that made the greatest contribution to system’s operation, and quantify possible failure scenarios;
- Presents a use case considering a drone-assisted delivery system as a testbed to verify the applicability and suitability of the proposed methodology. The goal is to provide a useful tool for practitioners and operators, during the planning phase, to identify possible risks, evaluate their impact according to the mission’s parameters (e.g., services, type of aerial platform, area of operation, weather, regulations and operator’s skills) and proactively take measures to mitigate them.
2. Literature Review and Background
2.1. Concept of Risk Assessment – Definition of Risk
- Asset is any tangible or intangible valuable unit of a system including hardware, software, interfaces, data and information, system mission, processes, person support, image or reputation, system and data criticality and sensitivity [51]. Also, environment/environmental conditions that the system resides in and the dependencies among the other assets should be considered as assets, as well bullet;
- Impact from a threat event defines the magnitude of harm that can be expected to result from the consequences [21]. Such impact is assessed in terms of the system’s performance and resilience.
2.2. Selecting the Most Appropriate Risk Assessment Approach
2.3. NIST – ISO Standards for Risk Assessment
2.4. Analytic Hierarchy Process for Risk Assessment
3. Proposed Risk Assessment Methodology
3.1. Qualitative Component
- Aerial Component-related risks: These are the risks associated with the aircraft and sensors mounted on it [48]. Inappropriate pre-flight inspection is a reason leading to a system’s failure [73]. Furthermore, deterioration in the performance of the aircraft due to sensors malfunction should be considered as an aircraft-related risk [17]. Other risk sources related to the aerial component include, errors in navigation system [1], flying close to buildings or at a low altitude [16,47,74], lack of necessary and high-performing technical features [48] and rotor failures [74,75];
- Power efficiency-related risks: Ineffective power source is an issue under investigation. Current types of drones carry batteries for short-time flights [76]. So, energy consumption is an important challenge facing drone-assisted systems [77]. Also, since aerial systems are battery powered, limited energy or unreliable power management poses risks such as power loss, limited fight range, limited processing capabilities and restrictions in flight time [2,78];
- Environment-related risks: Environmental conditions pose a challenge to aerial systems and have become a tough and cardinal challenge (wind, temperature, icing, precipitation, hurricanes, etc.) [1,2,74,75]. The environment can negatively impact system’s performance by creating situations that can lead to disruptions and mission failures [2,79]. Harsh weather conditions significantly increase the possibility of failure [12,14,15]. Rain, snow and extreme temperatures can threaten components such as sensors, frame and propellers causing malfunctions, failure or navigation problems [47]. Also, high illumination could disrupt the vision of both the operator and the system’s sensors leading to accidents [48];
- Human operator-related risks: Proper utilisation and safe operation during a system’s deployment is highly dependent on the skills of the operator [74,75] Despite that operator’s role can be limited to commanding and monitoring the system’s activities, this does not make the system immune from human-triggered disruptions [79]. Lack of experience could make operators nervous, potentially leading to unsuccessful navigation. In addition, insufficient training might cause improper utilization and navigation of the system [73]. Moreover, lack of awareness, fatigue and stress are factors that lead to accidents [1,74];
- Area of operation-related risks: Airspace density is an important factor that might lead to hazardous events. Flying objects could strike the aircraft and cause damage or even worse lead to crashes [48]. Additionally, deploying an aerial system over unknown zones or diverse environments poses risks such as physical attacks, usurp control by malicious entities or cyber-attacks from hackers to gather data or steal the equipment. Furthermore, operating a drone-assisted system over non-segregated airspace increases the risk of mid-air collisions resulting in fatal accidents [80];
- Mission-related risks: These are harmful incidents that might arise from specific type of operation. For instance, operating to accomplish sensitive missions such as border patrolling or intelligence, surveillance and reconnaissance require the implementation of additional countermeasures to safeguard sensitive information; violation of such measures could lead to mission failure. Additionally, faulty operation leading to aerial systems falling from higher altitudes or flying very close to people could have a greater adverse effect on people or structures on the ground. Similarly, the absence of predefined operating procedures could cause misunderstanding and concerns to the operators [48];
- Communication-related risks: Aerial systems are extremely dependent on wireless transmissions for navigation and information exchange [81]. Wireless communication is a primary target for cyberattacks [13]. These attacks aim at intercepting information or to gain access to the system. [82,83]. Lack of efficient security mechanisms, inadequate protection measures or authentication techniques carry risks such as inappropriate control, breaking the encryption of the communication to capture data [1,82,84];
- Regulation-related risks: In protecting safety, security and privacy, specific regulations should be put in place. Safeguarding citizens’ lives, drones’ free circulation within specific boundaries should be the primary target of regulations [78]. Non-compliance with existing regulations such as unauthorised trespassing or flying below the minimum altitude or even carrying a payload heavier than the required are essential risk factors that should increase the probability of lethal consequences [47,48,73,74]. Moreover, unregulated drone traffic densities entail high risk of collision with other flying objects [85].
- Asset identification: Asset analysis is performed by counting the entire system. Relationships between assets and importance on the mission accomplishment are also defined. Comprehensive illustration and justification should be presented in a forthcoming section;
- Vulnerability Identification: Assets are examined separately and a list of vulnerabilities that could be exploited is defined. The product of this phase should be applied to the evaluation of the importance and criticality of each vulnerability. Lists provided by [22] could be used as supportive material and guideline;
- Threat’s identification: Identified risk hazards are decomposed, and relevant threats are documented. Threats are classified into the categories listed in Table 1. This allows experts to correlate threats and vulnerabilities and to establish the required relationships and dependencies. The lists of typical threats provided by [21,22] help with the identification and documentation of the drone-related threats;
- Impact Determination: The adverse impact of threat events on a specific asset is determined. According to [21,86] impact on an information system is characterized by a set of security requirements. However, visiting the issues surrounding aerial platforms’ performance an extensive set of requirements is defined: Confidentiality, Integrity, Availability, Reliability, Safety, Survivability and Maintainability.
3.2. Quantitative Component
3.2.1. Qualitative Outputs are Organized in a Hierarchical Manner
3.2.2. Schematic Representation of the Decision Hierarchy
3.2.3. Establishment of Relationships
- Assets have vulnerabilities. Vulnerabilities are exploited by threats, which in turn have an adverse impact thus affecting systems’ requirements;
- A single vulnerability could be exploited by more than one threats [21];
- Risk materializes because of a series of threat events, each of which might take advantage of one or more vulnerabilities [21];
- Each threat event, according to its associated vulnerabilities, affects one or more of the system’s assets;
- A threat source could have an adverse impact and affect the system in multiple ways, regarding the specified requirements. Similarly, every requirement can be affected by more than one adversarial threat source (many-to-many relationship;
3.2.4. Pair-wise Comparison Matrices
3.2.5. Scaling Pair-wise Comparison Matrices
- The importance of every asset is evaluated based on its criticality, the way it contributes to mission accomplishment and the level of its susceptibility to threats (the more susceptible it is to multiple threat sources, the greater the possibility of failure; thus, it is considered more critical;
- A vulnerability is considered to be greater importance than another based on the ease of its exposure and exploitation, and on the level of its possible impact. Hence, its importance, over the other vulnerabilities, is weighted based on the number and criticality of the affected assets and also on the related threat sources; the more threat events are exposing a specific vulnerability, the higher is the level of concern;
- Every threat event is characterized by a level of effectiveness and capability [21], which is used to evaluate the threat’s criticality. Therefore, is brought about that the more assets are affected by the initiation of a threat event the higher is the level of criticality of this specific threat source (higher criticality, more importance);
- According to [21], the likelihood of a threat event is not defined as a function in the statistical sense. Instead, assessors assign a score based on available evidence, experience and expert judgment. Consequently, in this study the likelihood of a threat event is embedded and evaluated through pair-wise comparisons of the elements of Layers 3 and 4;
- Impact is categorised by performance and resilience objectives and assessed based on the level of adverse effect [21,86]. Following the dynamic flow of information through the different layers of the hierarchy the level of impact is power-driven by the number of vulnerabilities exploited, the number of threat events intimidating the mission, and the quantity of requirements that are exposed.
3.2.6. Calculating Priority Vector and Consistency Ratio
3.2.7. Calculating Local Weights
3.2.8. Calculating Global Weights
3.3. Define Risk Chains
3.4. Cumulative Risk Contribution – Risk Ranking
- Compute local weights, following the steps of in Section 3.2.6 and Section 3.2.7;
- Estimate Global Weights, through the application of Equations (8) to (10);
- The desired risk chain is selected from the outcomes of the previous procedure conducted for the risk chain definition;
- The amount of influence of each element is defined which is attributable to its connected elements. To obtain a common numeric range/scale, and to allow aggregation into a final score, linear data normalization is selected [94]; each risk element influences and is influenced equally by its connected elements, thus in case of multiple parent nodes linear data normalization is applied [95]. Equation (12) expresses a general form of the function of the influence of a risk element on the elements of a lower layer. The influence of each factor is related to its importance (local or global weight). GW stands for global weight and stands for the summation of the global weights, in the case of multiple elements of a higher layer connected to a single element of a lower layer:
- Multiply all proportional influences across a single pathway, starting from the assets layer and concluding to requirements layer. To better understand the above process numerical examples are provided in the following section of the study, based on the illustrative use case scenario.
4. Proposed Methodology Application – Illustrative Use Case
4.1. Use-Case Qualitative Component
- Assets’ Identification: This is the primary and most important step in an asset-based approach [21,22]. An aerial system is an interconnected system of systems, composed of a ground control system, airborne unit (including embedded sensors and subsystems) and a communication link [13,19,103,104]. In addition, human administration is considered a component of this system [17,77]. In addition, environmental conditions (weather), area of operation, and regulations are external elements outside the boundaries of the system but are capable of influencing its state. These should be considered as significant elements in governing the utilisation of an aerial system and potential sources of hazardous event. Consequently, for this study, the system’s assets are: Airborne Component (Drone), Ground Control Station (Controller), Communication Links (Wireless medium), Regulations/Policies, Environmental Conditions, Operator and Area of Operation;
- Vulnerabilities’ Identification: The outlined vulnerabilities denote the system’s limitations and susceptibilities due to the lack of or ineffectiveness of controls. Through the analysis, the potential vulnerabilities are as follows: Ineffective Power Source, Power Consumption, Defective Components, Wrong Handling, Susceptibility to Wireless Attacks, Susceptibility to Weather Conditions, Lack or Violation of policies/regulations, Faulty Operation, Lack of Operators’ Skills, and Susceptibility to Adversarial Actions. The identified vulnerabilities associated with the system’s assets are presented in Table 4 (see also Supplementary Material S1, for reference). As shown, several vulnerabilities are linked to multiple assets. Weaknesses are expected to be exploited sequentially or simultaneously; therefore, it is important to record multiple interconnections;
- Threats’ Identification: Possible attacks, failures, man-made and natural events that compromise the system’s functioning are defined along with their association with the identified vulnerabilities. Table 5 presents the threats intimidating system’s performance along with the exploited vulnerabilities (see also Supplementary Material S1, for reference) [22]. Each threat is classified into one of the categories listed in Table 1. The identified threats are not limited to those that have been highlighted. For simplicity, the most frequently mentioned in the literature have been selected: Power Failure, Equipment Failure, Control Loss, Wireless Attacks, Extreme Weather Conditions, Collision with Objects, Unsuccessful Navigation, and Physical Attacks (Unauthorised Access);
- Likelihood Determination: Likelihood is treated as a score based on judgment; therefore, its estimation is embedded in the pair-wise comparisons of vulnerability and threat importance. Comparisons are analysed at the next step of the framework, through the utilisation of the quantitative component;
- Impact Determination: Impact of a threat event is the magnitude of harm expected to occur in the system after the exploitation of vulnerability. According to [21] the adverse impact of a threat might be capable of harming anyone of the system’s sources: for the system’s mission, a possible impact could be the inability to perform a specific function, for an asset could be a damage to it or the loss of the asset, for a human admin could be the damage of image or reputation due to lack of proper education or policies’ violation, to the relationships could be any relational harm. The association between the identified threats and their potential impact on the related requirements of Confidentiality, Integrity, Availability, Reliability, Safety, Survivability and Maintainability is demonstrated in Table 5. Additionally, Supplementary Material S1 (Tables S3 and S4) provides information and a comprehensive explanation of the established requirements.
4.2. Use-Case Quantitave Component
4.2.1. Hierarchy Construction
4.2.2. Dependencies Definition
4.2.3. Pair-Wise Comparison
- Drone (Airborne Component): It refers to the aircraft and the flying element of the system [78]. It consists of various subsystems such as the frame, motors, propellers, flight controller, battery, flight controller and sensors [77,78]. It is the central component and enabling technology; therefore, it is likely to be perceived as the most important asset [98]. Regarding its comparison with the communication medium, it can be said that the drone itself is the actual asset performing the operation; thus, it is considered of moderate importance over the medium. Similarly, compared to the environment, despite the fact that it heavily influences the drone's performance, the drone slightly favors it, owing to the mechanisms that allow the operation of the system under extreme weather conditions.
- Ground Control Stations: It is a land-based system equipped with specialized software and hardware [13]. It is the primary interface to communicate with, remotely control, and exchange data with the airborne component [78]. It plays a critical role either the aircraft is controlled automatically or manually by the human operator [11,98,100]. Therefore, compared with the communication medium, both are considered to be of equal importance. Additionally, compared to operators, the controller is the primary interface between the human and drone therefore, it is considered to be of equal importance. However, one can assess the operator as more important than the controller, if unskilled and untrained personnel can result in mission failure. In addition, compared to the environment, the latter is generally considered to be more crucial for drone performance.
- Communication Link: As mentioned in Section 4.1 the communication medium is an asset of the aerial system, enabling bidirectional data exchange between the airborne component and controller [105]. However, environmental conditions (rain, temperature and wind) can affect the connection between the aerial component and controller consequently, between them, environment favors over communications. Additionally, different wireless attacks can violate communication links, [2,15,84]. Regarding a possible drone crash, reference states a percentage of 11% while [1] mentioning a considerable failure rate of up to 14%, owing to degraded communication quality.
- Regulations/Policies: Relevant policies have been developed to ensure that drone operators, whether recreational or professional, have a clear understanding of what is allowed under certain conditions [2,107,108]. The examination of regulations and policies as independent components is critical because violation of these rules might lead to the loss of the drone’s management, unauthorised access to the equipment or a probable crash. Regulations govern the way the drone operates; thus, the operator slightly favors them because he is the admin, ensuring that the drone functions within regulations. Under specific scenario assumptions, regulations are not considered a significant factor compared with other assets.
- Environmental Conditions: Several studies have revealed that weather robustness is an essential gap and of high priority that may affect the ambitions to expand drone operations. [109]. High wind speeds, rain, snow, and changeable weather might have adverse impact on the drone’s frame, and disturb its electronic circuits, sensors, and communication channels [14,15,16]. It is well noted that bad weather conditions mean that there are no flies for the system. Also, the capability to resist certain weather conditions is determined by the specifications of the drone [2]. Therefore, compared to other assets, environmental conditions favor them, expect for the aerial component.
- Operators: These people perform activities related to the drone’s mission [78]. As a system asset, the human operator involves skills, expertise, mental - physical health and training [47]. Unskilled and untrained operators, who are unable to adapt to area limitations might result in mishandling and mission failure. Therefore, the operator is typically considered as equally important as the area of operation. However, the operator should adapt to and work within the constraints of the area of operation; hence the operator’s importance is assessed slightly higher.
- Area of Operation: Area of operation is an external element that can influence the system’s performance. Areas of operation should be urban or suburban, mountainous or lowland, friendly or hostile. Different characteristics result in an assessment of hazardous events in another way. However, according to [106], changes in the operating environment have a minimal effect on the system operation (5%). Regarding the tested scenario, for a drone-based system utilised under relatively controlled conditions the area of deployment has little to no effect on the pairwise-comparison. However, regarding unknown zones or diverse environments, the area of operation should have been considered a vital factor for successful deployment; therefore, its importance should be evaluated accordingly.
- Ineffective Power Source: The power source of drones is a key challenge under investigation [77]. According to several professionals [110], battery efficiency varies based on the battery chemistry, manufacturer specifications and operational conditions (discharge rates, environment, airflow, etc.). Temperature is the most influential indicator for lithium-ion batteries [90,91]. As [111] revealed, the optimal operating temperature of lithium-ion battery is 20–50 °C. However, outside this range, the capacity should decrease by 50% faster in some cases [112]. Considering that the current limitations on batteries constrict system autonomy, a power source is considered to be a vulnerability of high concern, which is more essential than almost all other possible vulnerabilities. It is no coincidence that the authors of [1,81] attributed possible drone crashes to the loss of electrical power and power propulsion at a percentage of up to 38%.
- Power Consumption: Related to the power source of the system. When an aerial system is utilised to accomplish a mission, the energy consumed by the system depends on the aircraft’s aerodynamics, weather conditions, altitude/air density, parcel weight, flying route (take-off consumes the most energy), and speed [113,114]. Testing these factors into physics-based models mentioned in [115,116,117], it is discovered that power consumption and its alteration during flight time must be considered to ensure that the drone successfully reaches its destination and accomplishes its delivery mission. For this reason, power consumption is considered to be of high importance except when compared to weather conditions, and wireless attacks.
- Defective Components: This study considers aircraft (including sensors, batteries and circuits), ground controller and communication medium as the most critical components with defects [13,79]. These components play a crucial role in the drone’s performance. Each of these may increase the attack surface, thus posing potential sources of hazardous situations. Consequently, the defective components should be weighted as unpredictable factors of major importance. References [1] and [75] provide a high percentage of failures. Reference [1] mentions a range of failure from 6% to 63% while a study in [75] indicates that the accident probability due to malfunctions or technical deficiencies related to the power source lies between 55% and 63%. In a similar way reference [107] indicates that the highest causal factor leading to loss of control is equipment failure and manufacturing failures at a rate of 34%.
- Wrong Handing: This refers to improper human intervention. In this study, it is a vulnerability associated with operators training and expertise [21,22], therefore, its importance is assessed according to the way the system is controlled. As mentioned in [2], the percentage of a possible crash due to autopilot controller failure is approximately 23%. Otherwise, in the case of manual flight control, the evaluation of wrong handling should vary from low (14% according to [106]) to medium (22% according to [81] and 35.3% according to [74]), to very high importance due to the high mishap rate of up to 65%, due to pilot error. Moreover, as mentioned by [118] human contribution to drone accidents is evaluated at 40% in case of erroneous control during ‘on task’ phase (i.e. conducting its mission) and at 55% in case that the operator aims to contribute to failure recovery. For this scenario, it is assumed that the aerial component accomplishes its mission automatically; hence, the importance of this potential vulnerability is weighted accordingly, depending on the factor that is compared with.
- Susceptibility to wireless attacks: Wireless attacks can violate communication links and sensors [12,84]. Attacks, such as GPS Spoofing or Signal Jamming, can cause deviations, erratic movements or even unexpected behaviors [119,120]. Moreover, inadequate authentication mechanisms and weak encryption protocols can cause man-in-the-middle attacks, eavesdropping attacks, denial-of-service attacks or malware attacks, thus threatening communication links [13]. Considering that countless attacks of different sophistication are threatening communication links, it should be concluded that susceptibility to wireless attacks is of essential importance. Similarly, in comparing this vulnerability with the statistical data from the two relevant studies [1,81], it is stated that at a rate of 9% and 14%, respectively, there is a possibility of a system crash due to security attacks.
- Susceptibility to weather conditions: Temperature affects the battery, wind speed can cause trajectory deviation, and rain might affect drone’s circuits [47]. According to [109], global drone flyability is the highest in warm and dry continental regions. Also, it is noted that the most limiting weather factor is precipitation and that common drones have an operational temperature range of 0 to 40 ℃, maximum wind speed resistance of 10 m/s. Furthermore, the sensors and circuits are sensitive to moisture, rain and precipitation [48]. In addition, ice and snow accretion may cause problems to propellers. The analysis in [1], indicates that the possibility for a drone to crash owing to the weather effect lies within the range of 5% to 18%. In a similar way reference [106] reveals that environmental factors have a contribution of 14%, leading to loss of control. Having said that and also that weather affects power efficiency, weather conditions are examined, at least, of moderate importance, and are consequently, capable of actively affecting successful deployment.
- Lack or violation of policies and regulations: The existence of regulations should be considered an important part of a drone-based delivery system in and around cities [121]. The violation of these rules may lead to a loss of drone management. In addition, inadequate traffic management or ineffective estimation of drone’s density in low-altitude airspaces increases the probability of lethal consequences [73]. According to [1], the percentage of possible drone crashes caused by air traffic management failure is low, ranging from 2% to 8%, or up to 9% due to inadequate regulations or violations [118]. In addition, the violation of security controls empowering physical attacks depends on the area of operation and the type of mission. For this study, it is assumed that there is no violation of any aviation or security controls, thus this vulnerability is considered to be of minimal importance.
- Faulty Operation and Lack of Operator’s Expertise: This type of weakness indicates the system’s inability to operate properly owing to external factors, such as adversarial attacks, weather conditions, or erroneous control [12,84,119,120]. Operator’s experience is a significant factor contributing to accidents. According to [106] the highest number of accidents for total flying experience within 20 – 99 hours is rated at 35% while the lowest number of accidents for total flying experience of 1,000+ hours is assessed at 3%. However, as was mentioned above about ‘Wrong Handling’, the mission of a drone-based delivery system should be achieved, through manual operation or automatically. Therefore, the possibilities of these kinds of vulnerabilities to be exploited are significantly reduced and their importance is weighted accordingly, because the examined system operates automatically.
- Susceptibility to adversarial actions: These types of attacks target hardware components and intend to compromise the system’s functionalities (i.e. bombing, gunshots, mission surveillance or reconnaissance, equipment interference or physical attacks [13,21]. The lack of control and security restrictions makes a system prone to such attacks [78]. However, in this scenario, adversarial attacks should not be considered as an important factor compared to vulnerabilities such as weather conditions, defective equipment and power consumption. Nevertheless, it could be compared with lack of expertise and policy violations and being of moderate importance in terms of the level of its impact in case of exploitation.
- Power Failure: Battery provides the necessary power for extended flight durations [13,77,105]. Any technical or structural failure is considered a threat. [22] Therefore, possible power failure is classified as a threat that, if it occurs, should directly exploit vulnerabilities such as ineffective power source or high-power consumption. In addition, power failure is indirectly associated with vulnerabilities such as susceptibility to wireless attacks and weather conditions (due to increased power consumption from deviations or erratic movements). The percentage of 38% for a possible drone crash owing to power failure should not be considered negligible [1]. The proportion of 14% stated in [106], for power loss should not be considered insignificant. Given that the limited capacity of drone batteries is considered a challenge [77] and that the effects of such a threat might involve the entire system, it is concluded that power failure is of essential or strong importance.
- Equipment Failure: It occurs depending on the durability of the system. Vulnerabilities, including defective components (battery, circuits, structure), susceptibility to weather conditions (rain, snow, temperature, or even high wind might harm the circuits, battery or structure of the drone) and adversarial actions (equipment destruction or damage) might be exploited. Consequently, a possible failure, especially a breakdown of the aerial component, might threaten the successful completion of the mission and its effects should be extensive. Therefore, ‘Equipment Failure’ should be considered as essential or strong importance, if the crash rate reported in [1] ranges from 6% to 63%.
- Control Loss: Loss control of the system is an erroneous action taken by the operator and might take advantage of vulnerabilities such as wrong handling, faulty operations and lack of expertise. In addition, high power consumption, weather conditions, susceptibility to wireless attacks and violation of aviation regulations are vulnerabilities associated with control loss. Under different circumstances, it might be of essential or strong importance, although, based on the assumptions that have been set, most of these factors are controllable. Hence, compared with other threats, control loss might be considered to be as of minor importance.
- Wireless Attacks: They might threaten communication means, controller and sensors leading to severe consequences [13,84]. Their importance is assessed in consideration of the essentiality of communication means and the fact that susceptibility to wireless attacks is evaluated as of high concern. Considering the possibility of up to 14%, for a system to crash due to security attacks, it should be concluded that susceptibility to wireless attacks is judged accordingly [119,120,122].
- Extreme Weather Conditions: Weather conditions, as a hazard threatening a system [21], should always be carefully considered. For the tested scenario, it is assumed that the weather conditions are ideal for a drone to accomplish flight. Having in mind what is already mentioned above for the susceptibility to environmental conditions, weather is evaluated at least of moderate importance, and consequently, capable of affecting the successful completion of a package to be delivered.
- Collision with objects: This is a considerable threat, particularly when deploying a system above urban area. The probability of a mid-air collision varies from 2% to 38% [1]. Also, the likelihood of a drone crashing due to its inability to avoid a collision is low up to 5%. Similarly, the probability of other aerial components approaching a drone-assisted system and leading to an accident was approximately 30% [74]. Moreover, regarding a possible accident due to a collision, reference states a percentage of 8%. As shown, the estimation varies and depends on factors such as object density, embedded collision avoidance sensor, and drone’s trajectory. Therefore, for our study, collision is considered of some importance, because the impact will have severe consequences, such as equipment damage, loss of lives and injuries to unsuspecting bystanders or package destruction.
- Unsuccessful Navigation: Linked directly to ‘Wrong Handling’, it is assumed that the aerial component accomplishes its mission automatically, hence its importance is reviewed as of minor concern. However, unsuccessful navigation of a drone-based system is indirectly associated with other vulnerabilities such as ‘Susceptibility to Weather Conditions’, ‘Susceptibility to Wireless Attacks’ or ‘High Power Consumption’ thus its importance is weighted accordingly [48,76,77].
- Physical Attacks (Unauthorised Access): These types of attacks target hardware components [13]. In addition, they aim to cause physical damage, usurp control, steal the cargo, disrupt the mission, or interfere with sensitive equipment on the system. For the examined scenario, the system is utilised under relatively controlled conditions, thus, the importance of physical attacks is lessened. It favors only over control loss and unsuccessful navigation, because the level of its impact should affect the entire mission. Under other circumstances where the system could operate for a different mission or in a diverse environment (transportation of valuable materials or for critical surveillance missions), physical attacks should have been considered an important factor for the successful accomplishment of the mission.
- Confidentiality: Unauthorised access to system’s equipment and communication links’ disclosure (due to wireless attacks [13,84]) are the identified threats capable of intimidating confidentiality. Considering the importance of these threats and the examined scenario, confidentiality does not seem to be very important in affecting the resilience and performance of the system.
- Integrity: With reference to the hardware, integrity denotes tampering with the equipment, for instance malicious or accidental destruction of components [124]. Therefore, Wireless Attacks, Unauthorized Access and Weather Conditions, are possible threats that can violate system’s integrity. Comparing the importance of confidentiality and integrity, it seems that they lag behind other requirements, by a similar level. Nevertheless, when it comes to the comparison between them, integrity favors slightly over confidentiality owing to its connection to the important factor of Weather Conditions.
- Availability: As qualitative analysis reveals, availability is an extremely important parameter for a drone-based system to be ‘ready to operate’ [125,126]. Hence, when is compared to Confidentiality and Integrity, it is considered as of essential or very strong importance. In addition, compared to Safety, when it comes to human loses or injuries ‘Safety’s’ importance favors over all the studied requirements. Also, regarding the comparison of Availability with Survivability and Maintainability, both favor over Availability, for the reasons will be explained below.
- Safety: The importance of safety relies on the fact that in the case of an accidental or adversarial threat, not only is the system itself going to be in a difficult situation but possible also human lives [123]. Therefore, the possibility of causing fatalities upgrades its importance over other requirements and makes Safety favored as of the highest possible order of affirmation.
- Reliability: This is closely related to Availability [124,125,126]. Additionally, it is a key factor that determines the operational efficiency of drones [127,128]. Based on the facts and assumptions made for the specific case study, Reliability favors over Confidentiality and Integrity, is equal to Availability and finally, it is characterized as subservient to the remaining requirements.
- Maintainability: Restored easily to normal operating conditions after a hazardous event, increases the probability of the system being available and reliable [129,130]. Considering that the hazards that are threatening the system’s normal operation are of the most highly rated ones (Equipment Failure, Wireless Attacks, Collision with Objects, Weather Conditions), it is concluded that the comparison favors maintainability over almost all the other requirements.
- Survivability: This is a subset of resilience, and indicates the capability of the system to fulfil its mission, even in the presence of any threat [131,132]. For a drone-based system, that operates in an open environment, ensuring Survivability with robust and consistent controls is considered the most important. Therefore, when it comes to compare Survivability to the other requirements, it favors all of them, thus increasing the likelihood of a successful mission accomplishment.
4.2.4. Scaling Matrices
4.2.5. Calculating Priority Vectors and Consistency Ratio
4.2.6. Calculating Local Weights
4.2.7. Calculating Global Weights
| Local Weight | Parent Nodes (Pn G W) |
Parent Nodes Global Weight |
Global Weight (L) x (∑ Pn G W) |
|
|---|---|---|---|---|
| Defective components (Vulnerability) |
0.1410 | Drone Ground Control Station Communication Links |
0.2668 0.1156 0.1422 |
0.0740 |
| Power Failure (Threat) |
0.2152 | Ineffective power source High power consumption Susceptibility to wireless attacks Susceptibility to Weather Conditions |
0,0415 0,0513 0,0167 0,0948 |
0,0440 |
| Safety (Requirement) |
0,3545 | Control Loss Collision w/ Objects Unsuccessful Navigation |
0,0112 0,0040 0,0110 |
0,0093 |
| ELEMENT | LOCAL WEIGHT | GLOBAL WEIGHT |
| ASSETS LAYER | ||
| Environmental Conditions | 0.2715 | 0.2715 |
| Drone (Airborne Component) | 0.2668 | 0.2668 |
| Communication Links | 0.1422 | 0.1422 |
| Drone Controller | 0.1156 | 0.1156 |
| Operator | 0.0936 | 0.0936 |
| Regulations/Policies | 0.0620 | 0.0620 |
| Area of Operations | 0.0483 | 0.0483 |
| VULNERABILITIES LAYER | ||
| High Susceptibility to Extreme Weather Conditions | 0.2292 | 0.0948 |
| Defective components | 0.1410 | 0.0740 |
| High power consumption | 0.0953 | 0.0513 |
| Ineffective power source | 0.1557 | 0.0415 |
| Wrong Handling | 0.0576 | 0.0274 |
| High Susceptibility to wireless attacks | 0.1173 | 0.0167 |
| Lack of Expertise/Training/Skills | 0.0523 | 0.0049 |
| Faulty Operation | 0.0512 | 0.0048 |
| Adversarial Actions | 0.0657 | 0.0031 |
| Lack or Violation policies/regulations | 0.0347 | 0.0021 |
| THREATS LAYER | ||
| Power Failure | 0.2152 | 0.0440 |
| Extreme Weather Conditions | 0.2028 | 0.0381 |
| Wireless Attack | 0.1580 | 0.0151 |
| Equipment Failure | 0.1133 | 0.0130 |
| Control Loss | 0.0552 | 0.0112 |
| Unsuccessful Navigation | 0.0542 | 0.0110 |
| Collision w/ Objects | 0.1273 | 0.0040 |
| Unauthorised Access | 0.0740 | 0.0004 |
| REQUIREMENTS LAYER | ||
| Survivability | 0.1883 | 0.0179 |
| Maintainability | 0.1682 | 0.0119 |
| Availability | 0.1004 | 0.0099 |
| Safety | 0.3545 | 0.0093 |
| Reliability | 0.1004 | 0.0093 |
| Integrity | 0.0519 | 0.0008 |
| Confidentiality | 0.0362 | 0.0006 |
4.3. Define Risk Chains
4.4. Cumulative Risk Contribution – Risk Ranking
5. Analysis of Results
6. Discussion of Results
7. Conclusions and Future Work
Supplementary Materials
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Allouch, A.; Koubâa, A.; Khalgui, M.; Abbes, T. Qualitative and Quantitative Risk Analysis and Safety Assessment of Unmanned Aerial Vehicles Missions Over the Internet. IEEE Access 2019, 7, 53392–53410. [Google Scholar] [CrossRef]
- Shakhatreh, H.; Sawalmeh, A. H.; Al-Fuqaha, A.; Dou, Z.; Almaita, E.; Khalil, I.; Othman, N. S.; Khreishah, A.; Guizani, M. Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges. IEEE Access 2019, 7, 48572–48634. [Google Scholar] [CrossRef]
- Katzis, K.; Ahmadi, H.; Shakir, M. Z. A Novel Airborne Self-Organising Architecture for 5G+ Networks. 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017; IEEE. [Google Scholar] [CrossRef]
- Join the airborne revolution. Day and night. Whatever the weather. ALLSOPP HELIKITES LTD. Available online: https://www.helikites.com/ (accessed on 2025-12-07).
- Katzis, K.; Grondoudis, A. Disaster Monitoring and Disaster Relief Using High Altitude Platforms. 1st International Conference in Safety Crisis Management, Nicosia, Cyprus, 2011. [Google Scholar]
- Reynaud, L.; Rasheed, T. Deployable Aerial Communication Networks: Challenges for Futuristic Applications. 9th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Paphos, Cyprus, 2012. [Google Scholar] [CrossRef]
- Saeed, A.; Younes, A. B.; Cai, C.; Cai, G. A Survey of Hybrid Unmanned Aerial Vehicles. Progress in Aerospace Sciences 2018, 98, 91–105. [Google Scholar] [CrossRef]
- Katzis, K.; Grondoudis, A.; Boustras, G.; Papazoglou, P. Forest Fires: Proactive and Reactive Surveillance Employing in-Situ, Aerial, and Space Technology. International Conference on Remote Sensing and Geoinformation of Environment, Paphos, Cyprus, 2013. [Google Scholar] [CrossRef]
- Helikite Airborne Surveillance Systems. Allsopp Helikites Ltd. Available online: https://www.helikites.com/aerial-surveillance-aerostats. (accessed on 2025-11-21).
- Borghetti, F.; Caballini, C.; Carboni, A.; Grossato, G.; Maja, R.; Barabino, B. The Use of Drones for Last-Mile Delivery: A Numerical Case Study in Milan, Italy. Sustainability 2022, 14(3), 1766. [Google Scholar] [CrossRef]
- Zubin, I.; Wiegmans, B.; Arem, B.; Duin, R. Using Drones in the Last-Mile Logistics Processes of Medical Product Delivery: A Feasibility Case Study in Rotterdam. The 99th Annual Meeting Transportation Research Board, Washington DC, (USA), 2020. [Google Scholar]
- Kim, A.; Wampler, B.; Goppert, J.; Hwang, I.; Aldridge, H. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles. Infotech@Aerospace 2012, 2012. [Google Scholar] [CrossRef]
- Anagnostis, I.; Kotzanikolaou, P.; Douligeris, C. Understanding and Securing the Risks of Uncrewed Aerial Vehicle Services. IEEE Access 2025, 13, 47955–47995. [Google Scholar] [CrossRef]
- Kardasz, P.; Doskocz, J.; Hejduk, M.; Wiejkut, P.; Zarzycki, H. Drones and Possibilities of Their Using. Journal of Civil and Environmental Engineering 2016, 6(3). [Google Scholar] [CrossRef]
- Hartmann, K.; Steup, C. The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment. 5th International Conference on Cyber Conflict (CyCon), Tallin, 2013; IEEE: Talin, Estonia; pp. pp 1–23. [Google Scholar]
- Barr, L. C.; Newman, R.; Ancel, E.; Belcastro, C. M.; Foster, J. V.; Evans, J.; Klyde, D. H. Preliminary Risk Assessment for Small Unmanned Aircraft Systems. In 17th AIAA Aviation Technology, Integration, and Operations Conference; AIAA: Denver, Colorado, 2017. [Google Scholar] [CrossRef]
- Rong-xiao, G.; Ji-wei, T.; Bu-hong, W.; Fu-te, S. Cyber-Physical Attack Threats Analysis for UAVs from CPS Perspective. In 2020 International Conference on Computer Engineering and Application (ICCEA); IEEE: Guangzhou, China, 2020; pp. pp 259–263. [Google Scholar] [CrossRef]
- Shakeri, R.; Al-Garadi, M. A.; Badawy, A.; Mohamed, A.; Khattab, T.; Al-Ali, A.; Harras, K. A.; Guizani, M. Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions. IEEE Communications Surveys & Tutorials 2019, 21(4), 3340–3385. [Google Scholar] [CrossRef]
- Gomes, R.; Straub, J.; Jones, A.; Morgan, J.; Tipparach, S.; Sletten, A.; Kim, K. W.; Loegering, D.; Feikema, N.; Dayananda, K.; Miryala, G.; Gass, A.; Setterstrom, K.; Mischel, J.; Shipman, D. An Interconnected Network of UAS as a System-of-Systems. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC); IEEE: St; Petersburg, FL, USA, 2017; pp. pp 1–7. [Google Scholar] [CrossRef]
- Managing Information Security Risk: Organization, Mission, and Information System View (NIST Special Publication 800-39). National Institute of Standards and Technology NIST: Gaithersburg, MD 20899-8930, 2011.
- NIST Special Publication 800-30; Guide for Conducting Risk Assessments. Gaithersburg, MD 20899-8930, 2012.
- ISO/IEC 27005; Information Security, Cybersecurity and Privacy Protection — Guidance on Managing Information Security Risks. Geneva, 2022.
- Eckmaier, R.; Fumy, W.; Mouille, S.; Quemard, J.-P.; Polemi, N.; Rumpel, R. ENISA Risk Management Standards; ENISA, 2022. [Google Scholar]
- EBIOS - Risk Manager. National Cybersecurity Agency of France (ANSSI), 2019.
- Alberts, C.; Dorofee, A.; Stevens, J.; Woody, C. PA 15213-3890; Introduction to OCTAVE Approach. Pittsburgh, 2003.
- CRAMM. Wikipedia. Available online: https://en.wikipedia.org/wiki/CRAMM.
- Risk Taxonomy. The Open Group: Berkshire, 2009.
- Talabis, M. R. M.; Martin, J. L.; Wheeler, E. Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis; Elsevier Inc: Waltham, MA 02451, USA, 2013. [Google Scholar] [CrossRef]
- SPECIFIC OPERATIONS RISK ASSESSMENT. Available online: https://drones.gov.cy/gr/sora-risk-assessment/ (accessed on 2025-10-13).
- Specific Operations Risk Assessment (SORA). Available online: https://www.easa.europa.eu/en/domains/drones-air-mobility/operating-drone/specific-category-civil-drones/specific-operations-risk-assessment-sora#group-easa-downloads. (accessed on 2025-10-14).
- Shang, K.; Hossen, Z. Applying Fuzzy Logic to Risk Assessment and Decision-Making; Casualty Actuarial Society, Canadian Institute of Actuaries, Society of Actuaries, 2013. [Google Scholar]
- Wang, J.; Fan, K.; Mo, W.; Xu, D. A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network. International Conference on Networking and Network Applications (NaNA), Hakodate, Japan, 2016; pp. pp 279–283. [Google Scholar] [CrossRef]
- Shapiro, A. F.; Marie-Claire, K. Risk Assessment Applications of Fuzzy Logic; Canadian Institute of Actuaries, Society of Actuaries, Casualty Actuarial Society, 2015. [Google Scholar]
- Sallam, H. Cyber Security Risk Assessment Using Multi Fuzzy Inference System. International Journal of Engineering and Innovative Technology (IJEIT) 2015, 4(8), 13–19. [Google Scholar]
- Lee, M.-C. Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method. International Journal of Computer Science & Information Technology (IJCSIT) 2014, 6(1), 29–45. [Google Scholar] [CrossRef]
- Safety Management Systems (SMS) for Airports and Airport Projects. Available online: https://www.faa.gov/airports/airport_safety (accessed on 2025-10-24).
- Gonçalves, P.; Sobral, J.; Ferreira, L. Unmanned Aerial Vehicle Safety Assessment Modelling through Petri Nets. Reliability Engineering and System Safety 2017, 167, 383–393. [Google Scholar] [CrossRef]
- Ferrigan, J. Safety Risk Assessment for UAV Operation. AeroTract Geospatial 2022. [Google Scholar]
- DJI Agras T30," DJI Sciences and Technologies Ltd. Available online: https://www.dji.com/global/t30 (accessed on 2025-12-22).
- Neff, P.; Garman, K. Identifying and Mitigating Human Factors Errors in Unmanned Aircraft Systems. 16th AIAA Aviation Technology, Integration, and Operations Conference, 2016. [Google Scholar] [CrossRef]
- Sankararaman, Shankar.; Krishnakumar, K. Towards A Computational Framework for Autonomous Decision-Making in Unmanned Aerial Vehicles. In AIAA Information Systems-AIAA Infotech at Aerospace; Texas, 2017. [Google Scholar] [CrossRef]
- Johnsen, S.; Evjemo, T. E. State of the Art of Unmanned Aircraft Transport Systems in Industry Related to Risks, Vulnerabilities and Improvement of Safety. 29th International European Safety and Reliability Conference, Hannover, Germany, 2019. [Google Scholar] [CrossRef]
- Ancel, E.; Capristan, F. M.; Foster, J. V. Real-Time Risk Assessment Framework for Unmanned Aircraft System (UAS) Traffic Management (UTM). 17th AIAA Aviation Technology, Integration, and Operations Conference, Denver, Colorado, 2017. [Google Scholar] [CrossRef]
- Javaid, A. Y.; Sun, W.; Devabhaktuni, V. K.; Alam, M. Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System. In IEEE Conference on Technologies for Homeland Security (HST); IEEE: Waltham, MA, USA, 2012; pp. pp 584–590. [Google Scholar] [CrossRef]
- Moud, H. I.; Shojaei, A.; Flood, I.; Zhang, X. Monte Carlo Based Risk Analysis of Unmanned Aerial Vehicle Flights over Construction Job Sites. 9th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Porto, Portugal, 2018. [Google Scholar] [CrossRef]
- Izadi, H. M.; Shojaei, A.; Flood, I.; Zhang, X.; Hatami, M. Qualitative and Quantitative Risk Analysis of Unmanned Aerial Vehicle Flights over Construction Job Sites. The Eighth International Conference on Advanced Communications and Computation (INFOCOMP) 2018, Barcelona, Spain, 2018. [Google Scholar]
- Aliyari, M.; Ashrafi, B.; Ayele, Y. Z. Hazards Identification and Risk Assessment for UAV–Assisted Bridge Inspections. Structure and Infrastructure Engineering 2021, 18(5), 421–428. [Google Scholar] [CrossRef]
- Xu, Y.; Turkan, Y. The Development of a Safety Assessment Model for Using Unmanned Aerial Systems (UAS) in Construction. Safety Science 2022, 155, 105893. [Google Scholar] [CrossRef]
- Kaplan, S.; Garrick, J. B. On the Quantitative Definition of Risk. Risk Analysis 1981, 1(1), 11–27. [Google Scholar] [CrossRef]
- Tweneboah-Koduah, S.; Buchanan, W. J. Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. The Computer Journal 2018, 61(9), 1389–1406. [Google Scholar] [CrossRef]
- Glossary, National Institute of Standards and Technology. Available online: https://csrc.nist.gov/glossary/term/asset. (accessed on 2025-10-28).
- Fikri, A. M.; Putra, F. A.; Suryanto, Y.; Ramli, Kallamullah. Risk Assessment Using NIST SP 800-30 Revision 1 and ISO 27005 Combination Technique in Profit-Based Organization: Case Study of ZZZ Information System Application in ABC Agency. Procedia Computer Science 2019, 61, 1206–1215. [Google Scholar] [CrossRef]
- Putra, A.; Soewito, B. Integrated Methodology for Information Security Risk Management Using ISO 27005:2018 and NIST SP 800-30 for Insurance Sector. International Journal of Advanced Computer Science and Applications 2023, 14(4). [Google Scholar] [CrossRef]
- Saaty, T. L. The Analytic Hierarchy Process; McGraw-Hill: New York, 1980. [Google Scholar]
- Aminbakhsh, S.; Gunduz, M. G.; Sonmez, R. Safety Risk Assessment Using Analytic Hierarchy Process (AHP) during Planning and Budgeting of Construction Projects. Journal of Safety Research 2013, 46, 99–105. [Google Scholar] [CrossRef]
- Saaty, R. W. The Analytic Hierarchy Process - What It Is and How It Is Used. Mathematical Modelling 1987, 9(3–5), 161–176. [Google Scholar] [CrossRef]
- Vaidya, O. S.; Kumar, S. Analytic Hierarchy Process: An Overview of Applications. European Journal of Operational Research 2006, 169(1), 1–29. [Google Scholar] [CrossRef]
- Cheng, E. W.; Li, H. Analytic Hierarchy Process: An Approach to Determine Measures for Business Performance. Measuring Business Excellence 2001, 5(3), 30–37. [Google Scholar] [CrossRef]
- Shin, D. Woong.; Shin, Yoonseok.; Kim, G. H. Comparison of Risk Assessment for a Nuclear Power Plant Construction Project Based on Analytic Hierarchy Process and Fuzzy Analytic Hierarchy Process. Journal of Building Construction and Planning Research 2016, 4(3), 157–171. [Google Scholar] [CrossRef]
- Siddayao, G.; Valdez, S. E.; Fernandez, P. L. Analytic Hierarchy Process (AHP) in Spatial Modeling for Floodplain Risk Assessment. International Journal of Machine Learning and Computing 2014, 4(5), 450–457. [Google Scholar] [CrossRef]
- Hsiao, L.-S.; Huang, C.-Jan.; Liu, H.-T.; Lin, I.-L. An AHP-Based Assessment of the Relative Importance of Risk Factors in Project Management: Designing a Bid Preparation Checklist. Systems 2025, 13(5), 328. [Google Scholar] [CrossRef]
- Mustafa, M. A.; Al-Bahar, J. Project Risk Assessment Using the Analytic Hierarchy Process. IEEE Transactions on Engineering Management 1991, 38(01), 46–52. [Google Scholar] [CrossRef]
- Canco, I.; Kruja, D.; Iancu, T. AHP, a Reliable Method for Quality Decision Making: A Case Study in Business. Sustainability 2021, 13(24), 13932. [Google Scholar] [CrossRef]
- Yang, H.; Chen, P.; Huang, Y.; Ma, J.; Guo, F.; Yu, H.; Xu, W.; Han, L.; Cao, H. Research on Real Time Risk Monitoring System of Airline Operation Based on AHP. In IEEE International Conference on Computer Science and Educational Informatization (CSEI); IEEE: Kunming, China, 2019. [Google Scholar] [CrossRef]
- Peng, G.; Han, L.; Liu, Z.; Guo, Y.; Yan, J.; Jia, X. Application of Fuzzy Analytic Hierarchy Process in Risk Evaluation Model. Frontiers in Psychology 2021, 12. [Google Scholar] [CrossRef]
- Calik, I.; Kerim, K.; Onur, Ş. Life Cycle Risk Management for Improving Labor Productivity in Construction Projects in Türkiye. Buildings 2025, 15(3), 484. [Google Scholar] [CrossRef]
- Bamakan, S. M. H.; Dehghanimohammadabadi, M. A Weighted Monte Carlo Simulation Approach to Risk Assessment of Information Security Management System. International Journal of Enterprise Information Systems 2016, 11(4), 63–78. [Google Scholar] [CrossRef]
- Xiao, L.; Qi, Y.; Li, Q. Information Security Risk Assessment Based on Analytic Hierarchy Process and Fuzzy Comprehensive. In International Conference on Risk Management & Engineering Management; IEEE: Beijing, China, 2008; pp. pp 404–409. [Google Scholar] [CrossRef]
- Thompson, A.; Alese, B.; Folasade, A.; Ayeni, O. Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy Comprehensive Evaluation. International Journal of Computer Science and Information Security (IJCSIS) 2020, 18(6), 36–45. [Google Scholar]
- Fu, S.; Zhou, H. The Information Security Risk Assessment Based on AHP and Fuzzy Comprehensive Evaluation. IEEE 3rd International Conference on Communication Software and Networks, Xi’an, China, 2011; pp. pp 124–128. [Google Scholar] [CrossRef]
- Tsai, H.-Y.; Huang, Y.-L. An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks. IEEE Transactions on Reliability 2011, 60(4), 801–816. [Google Scholar] [CrossRef]
- Zhao, Y.; Jiao, J.; Zhao, T. A Synthetic Risk Assessment Model Based on AHP. In Reliability and Maintainability Symposium; IEEE: Colorado Springs, CO, USA, 2014; pp. pp 1–6. [Google Scholar] [CrossRef]
- Kobaszyńska-Twardowska, A.; Łukasiewicz, J.; Sielicki, P. W. Risk Management Model for Unmanned Aerial Vehicles during Flight Operations. Materials 2022, 15(7), 2448. [Google Scholar] [CrossRef] [PubMed]
- Li, X.; Sun, X.; Fang, M. Risk Assessment of Unmanned Aerial Vehicle (UAV) Operations Based on Bayesian Network. 2022 2nd International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR), Xi’an, China, 2022; pp. pp 189–193. [Google Scholar] [CrossRef]
- Du, S.; Zhong, G.; Wang, F.; Pang, B.; Zhang, H.; Jiao, Q. Safety Risk Modelling and Assessment of Civil Unmanned Aircraft System Operations: A Comprehensive Review. Drones 2024, 8(8), 354. [Google Scholar] [CrossRef]
- Benarbia, T.; Kyamakya, K. A Literature Review of Drone-Based Package Delivery Logistics Systems and Their Implementation Feasibility. Sustainability 2022, 14(1), 360. [Google Scholar] [CrossRef]
- Mohsan, S. A. H.; Khan, M. A.; Noor, F.; Ullah, I.; Alsharif, M. H. Towards the Unmanned Aerial Vehicles (UAVs): A Comprehensive Review. Drones 2022, 6(6), 147. [Google Scholar] [CrossRef]
- Derhab, A.; Cheikhrouhou, O.; Allouch, A.; Koubaa, A.; Qureshi, B.; Ferrag, M. A.; Maglaras, L.; Khan, F. Internet of Drones Security: Taxonomies, Open Issues, and Future Directions. Vehicular Communications 2023, 39. [Google Scholar] [CrossRef]
- Ordoukhanian, E.; Madni, A. Resilient Multi-UAV Operation: Key Concepts and Challenges. AIAA Science and Technology Conference and Expo; AIAA, 2016. [Google Scholar] [CrossRef]
- Fitrikananda, B. P.; Jenie, Y. I.; Sasongko, R. A.; Muhammad, H. Risk Assessment Method for UAV’s Sense and Avoid System Based on Multi-Parameter Quantification and Monte Carlo Simulation. Aerospace 2023, 10(9), 781. [Google Scholar] [CrossRef]
- Susini, A. A Technocritical Review of Drones Crash Risk Probabilistic Consequences and Its Societal Acceptance. Risk Information Management, Risk Models and Applications (RIMMA) 2015, Vol. 7, pp 27–38. [Google Scholar]
- Ficco, M.; Granata, D.; Palmieri, F.; Rak, M. A Systematic Approach for Threat and Vulnerability Analysis of Unmanned Aerial Vehicles. Internet of Things 2024, 26. [Google Scholar] [CrossRef]
- Kumar, S.; Tiwari, A.; Ahirwar, Y.; Kumar, G.; Arafat, M. Y. The Rise of UAV-Based Smart Surveillance: A Systematic Review of Trends and Technologies. IEEE Access 2025, 13, 181553–181575. [Google Scholar] [CrossRef]
- Tsao, K.-Y.; Gilder, T.; Vassilakis, V. G. A Survey of Cyber Security Threats and Solutions for UAV Communications and Flying Ad-Hoc Networks. Ad Hoc Networks 2022, 133, 102894. [Google Scholar] [CrossRef]
- Chitta, S.; Jain, R. Last Mile Delivery Using Drones. In Technology Convergence, innovation & Decision Sciences; Seoul, South Korea, 2017. [Google Scholar]
- Saripalli, P.; Walters, B. QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security. In IEEE 3rd International Conference on Cloud Computing; IEEE: Miami, FL, USA, 2010; pp. pp 280–288. [Google Scholar] [CrossRef]
- Pant, S.; Kumar, A.; Ram, M.; Klochkov, Y.; Sharma, H. K. Consistency Indices in Analytic Hierarchy Process: A Review. Mathematics 2022, 10(8), 1206. [Google Scholar] [CrossRef]
- Koulinas, G.; Marhavilas, Panagiotis. K.; Demesouka, O.; Vavatsikos, A. Risk Analysis and Assessment in the Worksites Using the Fuzzy-Analytical Hierarchy Process and a Quantitative Technique – A Case Study for the Greek Construction Sector. Safety Science 2019, No. 112, 96–104. [Google Scholar] [CrossRef]
- Szabo, Z. K.; Szádoczki, Z.; Bozóki, S.; Stănciulescu, G. C.; Szabo, D. An Analytic Hierarchy Process Approach for Prioritisation of Strategic Objectives of Sustainable Development. Sustainability 2021, 13(4), 2254. [Google Scholar] [CrossRef]
- Li, N.; Liu, X.; Yu, B.; Li, L.; Xu, J.; Tan, Q. Study on the Environmental Adaptability of Lithium-Ion Battery Powered UAV under Extreme Temperature Conditions. Energy 2021, 219, 119481. [Google Scholar] [CrossRef]
- 4 Factors That Impact Drone Flight Times. Agri Spray Drones. Available online: https://agrispraydrones.com/blogs/news/4-factors-that-impact-drone-flight-times. (accessed on 2026-01-14).
- Callahan, M. A.; Sexton, K. If Cumulative Risk Assessment Is the Answer, What Is the Question? Environ Health Perspect 2007, 115(5), 799–806. [Google Scholar] [CrossRef]
- Callahan, M. A. Framework for Cumulative Risk Assessment; U.S. Environmental Protection Agency (EPA): Washington, DC, 2003. [Google Scholar]
- Vafaei, N.; Ribeiro, R.; Camarinha-Matos, L. M. Normalization Techniques for Multi-Criteria Decision Making: Analytical Hierarchy Process Case Study. In IFIP Advances in Information and Communication Technology; Costa de Caparica, Portugal, 2016. [Google Scholar] [CrossRef]
- Trung, D. D. Development of Data Normalization Methods for Multi-Criteria Decision Making: Applying for MARCOS Method. Manufacturing Review 2022, 9(22). [Google Scholar] [CrossRef]
- Delivery Drones Market Report 2026. Available online: https://www.thebusinessresearchcompany.com/report/delivery-drones-global-market-report. (accessed on 2026-01-22).
- Yang, H.; Lee, Y.; Jeon, S.-Y.; Lee, D. Multi-Rotor Drone Tutorial: Systems, Mechanics, Control and State Estimation. Intelligent Service Robotics 2017, 10(3), 79–93. [Google Scholar] [CrossRef]
- Alkouz, B.; Shahzaad, B.; Bouguettaya, A. Service-Based Drone Delivery. IEEE 7th International Conference on Collaboration and Internet Computing (CIC), Atlanta, GA, USA, 2021; pp. pp 68–76. [Google Scholar] [CrossRef]
- Ghamari, M.; Rangel, P.; Mehrubeoglu, M.; Tewolde, G. S.; Sherratt, R. S. Unmanned Aerial Vehicle Communications for Civil Applications: A Review. IEEE Access 2022, 10, 102492–102531. [Google Scholar] [CrossRef]
- Anbaroglu, B. Parcel Delivery In An Urban Environment Using Unmanned Aerial Systems: A Vision Paper. ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences 2017, pp 73–79. [Google Scholar] [CrossRef]
- DJI FlyCart 30: Dynamic Aerial Delivery. Available online: https://www.dji.com/global/flycart-30. (accessed on 2024-12-16).
- 30 Things to Know About DJI FlyCart 30. Available online: https://enterprise-insights.dji.com/blog/30-things-to-know-about-dji-flycart30. (accessed on 2024-12-13).
- Hossain, N. U. I.; Lutfi, M.; Ahmed, I.; Akundi, A.; Cobb, D. Modeling and Analysis of Unmanned Aerial Vehicle System Leveraging Systems Modeling Language (SysML). Systems 2022, 10(6), 264. [Google Scholar] [CrossRef]
- Barros, J.; Henriques, J.; Reis, J.; Rosado, D. P.; Melao, N. Unmanned Aerial Systems: A Systematic Literature Review. In Information Technology and Systems; Springer: Temuco, Chile, 2024; pp. pp 82–93. [Google Scholar] [CrossRef]
- Osmani, K.; Schulz, D. Comprehensive Investigation of Unmanned Aerial Vehicles (UAVs): An In-Depth Analysis of Avionics Systems. Sensors 2024, 24(10). [Google Scholar] [CrossRef] [PubMed]
- El Safany, R.; Bromfield, M. A Human Factors Accident Analysis Framework for UAV Loss of Control in Flight. The Aeronautical Journal 2025, 129, 1–27. [Google Scholar] [CrossRef]
- UAS Regulations: Common European rules for UAS. Available online: https://drones.gov.cy/regulations/ (accessed on 2026-01-26).
- Xu, C.; Liao, X.; Tan, J.; Ye, H.; Lu, H. Recent Research Progress of Unmanned Aerial Vehicle Regulation Policies and Technologies in Urban Low Altitude. IEEE Access 2020, 8, 74175–74194. [Google Scholar] [CrossRef]
- Gao, M.; Hugenholtz, C.; Fox, T.; Kucharczyk, Maya.; Barchyn, T.; Nesbit, P. Weather Constraints on Global Drone Flyability. Scientific Reports 2021, 11(1), 12092. [Google Scholar] [CrossRef]
- Why Your Drone Battery Life Is Getting Shorter (And How to Fix It). Available online: https://www.ctechigroup.com/why-your-drone-battery-life-is-getting-shorter-and-how-to-fix-it.html (accessed on 2025-01-13).
- Lv, S.; Wang, X.; Lu, W.; Zhang, J. Z.; Ni, H. The Influence of Temperature on the Capacity of Lithium Ion. Energies 2022, 15(1), 60. [Google Scholar] [CrossRef]
- Wawrzyn, D. Some Helpful Tips for Maximizing Your Drone’s Battery Life. Available online: https://www.propelleraero.com/blog/some-helpful-tips-for-maximizing-your-drones-battery-life/ (accessed on 2025-01-13).
- Zhang, J.; Campbell, J. F.; Sweeney, D. C.; Hupman, A. C. Energy Consumption Models for Delivery Drones: A Comparison and Assessment. Transportation Research Part D: Transport and Environment 2021, 90, 102668. [Google Scholar] [CrossRef]
- Akram, N.; Khoshrangbaf, M.; Challenger, M.; Dagdeviren, O. Energy Consumption Modeling and Flight Time Analysis of Micro Drones. IEEE Access 2025, 13, 109854–109866. [Google Scholar] [CrossRef]
- Benson, T. Aerodynamics Index. Available online: https://www.grc.nasa.gov/www/k-12/VirtualAero/BottleRocket/airplane/drageq.html (accessed on 2026-03-21).
- Susi, J.; Unt, K.-E.; Heering, S. Determining the Efficiency of Small-Scale Propellers via Slipstream Monitoring. Drones 2022, 7(6), 381. [Google Scholar] [CrossRef]
- Aerodynamics for Students. Available online: https://aerospace101.com/aircraft-performance/rotor-momentum-analysis.html (accessed on 2026-01-16).
- Grindley, B.; Phillips, K.; Parnell, K. J.; Cherrett, T.; Scanlan, J.; Plant, K. L. Over a decade of UAV incidents: A human factors analysis of causal factors. Applied Ergonomics 2024, 121, 104355. [Google Scholar] [CrossRef]
- Kumar, S. M.; Kasbekar, G. S.; Maity, A. Identification of GPS Spoofing as a Drone Cyber-Vulnerability and Evaluation of Efficacy of Asynchronous GPS Spoofing. 22nd IFAC Symposium on Automatic Control in Aerospace (ACA 2022), Mumbai, India, 2022; Vol. 55, pp. pp 394–399. [Google Scholar] [CrossRef]
- Drone Spoofing and Countermeasure. Available online: https://www.nqdefense.com/anti-drone-drone-spoofing-and-countermeasure/ (accessed on 2026-01-10).
- Drone Laws in Cyprus. Available online: https://uavcoach.com/drone-laws-in-cyprus/ (accessed on 2025-05-08).
- What is drone jamming and how can it be countered? Available online: https://doodlelabs.com/what-is-drone-jamming/ (accessed on 2026-01-31).
- Zhang, X.; Liu, Y.; Zhang, Y.; Guan, X.; Delahaye, D.; Tang, L. Safety Assessment and Risk Estimation for Unmanned Aerial Vehicles Operating in National Airspace System. Journal of Advanced Transportation 2018, 2, 1–11. [Google Scholar] [CrossRef]
- Petritoli, E.; Leccese, F.; Ciani, L. Reliability Assessment of UAV Systems. In IEEE International Workshop on Metrology for AeroSpace (MetroAeroSpace; IEEE: Padua, Italy, 2017; pp. pp 266–270. [Google Scholar] [CrossRef]
- Waliullah, M.; Gan, D. Wireless LAN Security Threats and Vulnerabilities. International Journal of Advanced Computer Science and Applications 2014, 5(1), 176–183. [Google Scholar] [CrossRef]
- Petritoli, E.; Leccese, F.; Ciani, L. Reliability and Maintenance Analysis of Unmanned Aerial Vehicles. Sensors 2018, 18(9), 3171. [Google Scholar] [CrossRef]
- Selvamuthu, D.; Singla, I.; Agarwal, D. Reliability and Maintainability Analysis of UAV Systems: An Analytical Approach. In IEEE Space, Aerospace and Defence Conference (SPACE); IEEE: Bangalore, India, 2025; pp. pp 1–6. [Google Scholar] [CrossRef]
- Fusaro, R.; Chiesa, S.; Cresto Aleina, S.; Fioriti, M. Ontribution To R.A.M.S Estimation in Early Design Phases of Unmanned Aerial Vehicles - UAVs. 2015, 16, 73–83. [Google Scholar]
- Maintainability. Available online: https://www.sciencedirect.com/topics/engineering/maintainability#:~:text=Maintainability%20is%20defined%20as%20the,in%20accordance%20with%20prescribed%20procedures. (accessed on 2026-01-04).
- Gudmundsson, S. Chapter 1 - The Aircraft Design Process. In General Aviation Aircraft Design; Elsevier, 2013; pp. pp 1–32. [Google Scholar] [CrossRef]
- Mohammad, A. J.; Hutchison, D.; Sterbenz, J. P. G. Towards Quantifying Metrics for Resilient and Survivable Networks. 14th IEEE International Conference on Network Protocols (ICNP 2006), Santa Barbara, California, USA, 2006. [Google Scholar]
- Ellison, R. J.; Fisher, D.; Linger, R.; Lipson, H.; Longstaff, T.; Mead, N. Survivable Network Systems: An Emerging Discipline; 1999. [Google Scholar]
- Vaezi, A.; Jones, S.; Asgary, A. Integrating Resilience into Risk Matrices: A Practical Approach to Risk Assessment with Empirical Analysis. Journal of Risk Analysis and Crisis Response 2023, 13(4), 252–272. [Google Scholar] [CrossRef]
- Jamming and Spoofing Protection for UAVs Using GNSS Signals. Available online: https://safran-navigation-timing.com/jamming-and-spoofing-protection-for-uavs-using-gnss-signals/ (accessed on 2025-12-01).




| Threats’ Category | Description |
|---|---|
| Accidental | Erroneous actions taken by individuals in the course of executing their responsibilities, e.g. erroneous operation, unsuccessful navigation/landing and loss of control. |
| Structural | Failures of equipment, environmental controls or software due to ageing, resource depletion or other circumstances, which exceed expected operating parameters. |
| Adversarial | Malicious individuals or groups that seek to exploit the system’s components such as system reconnaissance and surveillance through physical observation, hardware interception and modification, spoofing, jamming, theft, unauthorised access to the equipment, eavesdropping, etc. |
| Environmental | Natural disasters and failures of critical assets, processes and links on which the system depends on, outside of the control of the system’s users or administrators. |
| Intensity of importance | Definition | Explanation |
|---|---|---|
| 1 | Equal Importance | Two activities contribute equally to the objective. |
| 3 | Moderate importance of one over another | Experience and judgment favor one activity over another. |
| 5 | Essential or strong importance | Experience and judgment strongly favor one activity over another. |
| 7 | Very strong importance | An activity is strongly favored and its dominance demonstrated in practice. |
| 9 | Extreme importance | The evidence favoring one activity over another is of the highest possible order of affirmation. |
| 2, 4, 6, 8 | Intermediate values between the two adjacent judgments | When compromise is needed. |
| Reciprocals | If activity i has one of the above numbers assigned to it when compared with activity j, then j has the reciprocal value when compared to i. | |
| Rationals | Ratios arising from the scale | If consistency were to be forced by obtaining n numerical values to span the matrix |
| For the elements being closer together than indicated by the scale, judgments can use values such as 1.1, 1.2, …., or any other appropriate even finer value, for their pair-wise comparison. | ||
| n | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
|---|---|---|---|---|---|---|---|---|
| RI | 0 | 0 | 0.58 | 0.90 | 1.12 | 1.24 | 1.32 | 1.41 |
| n | 9 | 10 | 11 | 12 | 13 | 14 | 15 | |
| RI | 1.45 | 1.49 | 1.52 | 1.54 | 1.56 | 1.58 | 1.59 |
| Assets | Vulnerabilities |
|---|---|
| Airborne Component (Drone) | Ineffective Power Source, High Power Consumption, Defective Components, Wrong Handling |
| Controller (Ground Control Station) | Defective Components, Wrong Handling |
| Communication Links | Susceptibility to Wireless Attacks, Defective Components, Susceptibility to Weather Conditions |
| Regulations/Policies | Lack or Violation policies/regulations |
| Environmental Conditions | High power consumption, Susceptibility to Weather Conditions |
| Operators | Wrong Handling, Faulty Operation, Lack of Expertise/Training/Skills |
| Area of Operation | Lack or Violation policies/regulations, Susceptibility to Adversarial actions |
| Threats | Vulnerabilities | Impact on |
|---|---|---|
| Power Failure (Structural Threat Event) |
Ineffective power source, Susceptibility to Weather Conditions, High power consumption, Susceptibility to wireless Attacks |
Availability, Reliability, Survivability |
| Equipment Failure (Structural Threat Event) |
Ineffective power source, Defective Components |
Availability, Maintainability, Survivability |
| Control Loss (Accidental Threat Event) |
High power consumption, Wrong Handling, Susceptibility to wireless Attacks, Susceptibility to Weather Conditions, Lack or Violation policies/regulations, Faulty Operation, Lack of Expertise/Training/Skills, |
Availability, Safety |
| Wireless Attacks (Adversarial Threat Event) |
High power consumption, Susceptibility to wireless Attacks, Wrong Handling |
Confidentiality, Integrity, Availability, Maintainability |
| Extreme Weather Conditions Environmental Threat Event) |
Ineffective power source, High power consumption, Susceptibility to Weather Conditions |
Reliability, Maintainability, Survivability |
| Collision w/Objects (Accidental Threat Event) |
Susceptibility to wireless Attacks, Lack or Violation policies/regulations, Faulty Operation, Lack of Expertise/Training/Skills, Adversarial actions |
Availability, Safety, Maintainability |
| Unsuccessful Navigation (Accidental Threat Event) |
High power consumption, Wrong Handling, Susceptibility to wireless Attacks, Susceptibility to Weather Conditions, Faulty Operation, Lack of Expertise/Training/Skills, Adversarial actions |
Availability, Safety, Reliability |
| Physical Attacks (Unauthorised Access) (Adversarial Threat Event) |
Lack or Violation policies/regulations, Susceptibility to Adversarial actions | Confidentiality, Integrity, Availability, Maintainability |
| ASSETS | Drone (Airborne Component) |
Ground Control Station |
Communication Links | Regulations/ Policies |
Environmental Conditions |
Operator | Area of Operations |
|---|---|---|---|---|---|---|---|
| Drone (Airborne Component) | 1,00 | 3,00 | 2,00 | 3,00 | 2,00 | 3,00 | 3,00 |
| Ground Control Station | 0,33 | 1,00 | 1,00 | 3,00 | 0,33 | 1,00 | 3,00 |
| Communication Links | 0,50 | 1,00 | 1,00 | 3,00 | 0,25 | 3,00 | 3,00 |
| Regulations/Policies | 0,33 | 0,33 | 0,33 | 1,00 | 0,25 | 0,50 | 2,00 |
| Environmental Conditions | 0,50 | 3,00 | 4,00 | 4,00 | 1,00 | 4,00 | 4,00 |
| Operator | 0,33 | 1,00 | 0,33 | 2,00 | 0,25 | 1,00 | 3,00 |
| Area of Operations | 0,33 | 0,33 | 0,33 | 0,50 | 0,25 | 0,33 | 1,00 |
| Column Sum* | 3,3333 | 9,6667 | 9,0000 | 16,5000 | 4,3333 | 12,8333 | 19,0000 |
| ASSETS | Drone (Airborne Comp.) | Ground Control Station | Commun. Links |
Regulations/ Policies |
Environm. Conditions | Operator | Area of Operations | Priority Vector |
|---|---|---|---|---|---|---|---|---|
| Drone (Airborne Component) | 0,3000 | 0,3103 | 0,2222 | 0,1818 | 0,4615 | 0,2338 | 0,1579 | 0.2668 |
| Ground Control Station | 0,1000 | 0,1034 | 0,1111 | 0,1818 | 0,0769 | 0,0779 | 0,1579 | 0.1156 |
| Communication Links | 0,1500 | 0,1034 | 0,1111 | 0,1818 | 0,0577 | 0,2338 | 0,1579 | 0.1422 |
| Regulations/Policies | 0,1000 | 0,0345 | 0,0370 | 0,0606 | 0,0577 | 0,0390 | 0,1053 | 0.0620 |
| Environmental Conditions | 0,1500 | 0,3103 | 0,4444 | 0,2424 | 0,2308 | 0,3117 | 0,2105 | 0.2715 |
| Operator | 0,1000 | 0,1034 | 0,0370 | 0,1212 | 0,0577 | 0,0779 | 0,1579 | 0.0936 |
| Area of Operations | 0,1000 | 0,0345 | 0,0370 | 0,0303 | 0,0577 | 0,0260 | 0,0526 | 0.0483 |
| LAYERS | λmax | n | CI | CR |
|---|---|---|---|---|
| 2nd (Assets) | 7.4825 | 7 | 0.0804 | 0,0609 |
| 3rd (Vulnerabilities) | 10.7025 | 10 | 0.0781 | 0.0524 |
| 4th (Threat Sources) | 8.5162 | 8 | 0.0737 | 0.0523 |
| 5th (Requirements) | 7.6419 | 7 | 0.1070 | 0.0810 |
| Asset | Risk chains (Aggreg. Risk) |
Vulnerability | Risk chains (Aggreg. Risk) |
Threat Source | Risk chains (Aggreg. Risk) |
Requirement | Risk chains (Aggreg. Risk) |
|---|---|---|---|---|---|---|---|
| Drone (Airborne Component) |
36 (0.02046) |
High Power Consumption |
30 (0.01477) |
Unsuccessful Navigation |
33 (0.00611) |
Availability | 45 (0.00991) |
| Communication Links | 29 (0.01317) |
Wrong Handling | 27 (0.00306) |
Wireless Attacks |
24 (0.00538) |
Safety | 27 (0.00929) |
| Environmental Conditions | 26 (0.02186) |
High Susceptibility to Extreme Weather Conditions |
22 (0.02196) |
Control Loss | 22 (0.00507) |
Reliability | 22 (0.00934) |
| Operator | 25 (0.00190) |
High Susceptibility to Wireless Attacks | 15 (0.00458) |
Power Failure | 18 (0.01711) |
Maintainability | 22 (0.01188) |
| Ground Control Station | 12 (0.00159) |
Susceptibility to Adversarial Actions | 10 (0.00043) |
Extreme Weather Conditions | 15 (0.01739) |
Survivability | 15 (0.01791) |
| Area of Operation | 10 (0.00043) |
Defective Components | 9 (0.00383) |
Collision w/Objects |
15 (0.00251) |
Confidentiality | 8 (0.00056) |
| Regulations/Policies | 9 (0.00028) |
Ineffective Power Source | 9 (0.00948) |
Equipment Failure |
12 (0.00598) |
Integrity | 8 (0.00080) |
| Lack or Violation of Policies/Regulations |
9 (0.00028) |
Physical Attacks |
8 (0.00014) |
||||
| Faulty Operation | 8 (0.00064) |
||||||
| Lack of Expertise/ Training/Skills |
8 (0.00066) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.