A review on cybersecurity vulnerabilities for unmanned aerial vehicles

CGL Krishna, RR Murphy - 2017 IEEE international symposium …, 2017 - ieeexplore.ieee.org
This paper surveys the scientific and trade literature on cybersecurity for unmanned aerial
vehicles (UAV), concentrating on actual and simulated attacks, and the implications for small …

A survey of cyberattack countermeasures for unmanned aerial vehicles

PY Kong - IEEE Access, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial
and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a …

Multi-UAV optimal mission assignment and path planning for disaster rescue using adaptive genetic algorithm and improved artificial bee colony method

H Liu, J Ge, Y Wang, J Li, K Ding, Z Zhang, Z Guo, W Li… - Actuators, 2021 - mdpi.com
An optimal mission assignment and path planning method of multiple unmanned aerial
vehicles (UAVs) for disaster rescue is proposed. In this application, the UAVs include the …

On perception and reality in wireless air traffic communication security

M Strohmeier, M Schäfer, R Pinheiro… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
More than a dozen wireless technologies are used by air traffic communication systems
during different flight phases. From a conceptual perspective, all of them are insecure, as …

Multi-drone optimal mission assignment and 3D path planning for disaster rescue

T **ong, F Liu, H Liu, J Ge, H Li, K Ding, Q Li - Drones, 2023 - mdpi.com
In a three-dimensional (3D) disaster rescue mission environment, multi-drone mission
assignments and path planning are challenging. Aiming at this problem, a mission …

Adversarial reinforcement learning framework for benchmarking collision avoidance mechanisms in autonomous vehicles

V Behzadan, A Munir - IEEE Intelligent Transportation Systems …, 2019 - ieeexplore.ieee.org
With the rapidly growing interest in autonomous navigation, the body of research on motion
planning and collision avoidance techniques has enjoyed an accelerating rate of novel …

Wireless attacks on aircraft landing systems

H Sathaye, D Schepers, A Ranganathan… - Proceedings of the 12th …, 2019 - dl.acm.org
Modern aircraft heavily rely on several wireless technologies for communications, control,
and navigation. In this work, we demonstrate the vulnerability of aircraft instrument landing …

UAV collision avoidance exploitation for noncooperative trajectory modification

P Pierpaoli, A Rahmani - Aerospace Science and Technology, 2018 - Elsevier
Distributed collision-free trajectories are generally obtained through a continuous sharing of
information between vehicles. With the intent of investigating possible sources of …

Security in next generation air traffic communication networks

M Strohmeier - 2016 - ora.ox.ac.uk
A multitude of wireless technologies are used by air traffic communication systems during
different flight phases. From a conceptual perspective, all of them are insecure as security …

IoTDL2AIDS: Towards IoT-Based System Architecture Supporting Distributed LSTM Learning for Adaptive IDS on UAS

A Rasheed, M Baza, G Srivastava… - … on Network and …, 2024 - ieeexplore.ieee.org
The rapid proliferation of Unmanned Aircraft Systems (UAS) introduces new threats to
national security. UAS technologies have dramatically revolutionized legitimate business …