Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions

MR Manesh, N Kaabouch - Computers & Security, 2019 - Elsevier
For an unmanned aerial system (UAS) to operate successfully, it has to communicate
reliably with different entities within its network. These entities include other aircraft and …

Cybersecurity of unmanned aerial vehicles: A survey

Z Yu, Z Wang, J Yu, D Liu, HH Song… - IEEE Aerospace and …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are unmanned aircrafts operated by radio remote control
and programmed control equipment. Due to their small size, low cost, and high flexibility …

A survey on cybersecurity attacks and defenses for unmanned aerial systems

Z Wang, Y Li, S Wu, Y Zhou, L Yang, Y Xu… - Journal of Systems …, 2023 - Elsevier
In recent years, unmanned aerial systems (UAS) have been widely used in both military and
civilian fields. However, their open-source software and protocols have made their security …

A survey of cyberattack countermeasures for unmanned aerial vehicles

PY Kong - IEEE Access, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial
and civilian applications. As an advanced cyber-physical system, UAVs are exposed to a …

Unmaned aerial vehicles threats and defence solutions

A Hamza, U Akram, A Samad, SN Khosa… - 2020 IEEE 23rd …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicles likely know as drones have become the most optimistic solution
with a bundle of applications in the field of monitoring environment, transportation, media …

Test methodologies for evaluating the effectiveness of suas communication links for operation in indoor and subterranean environments

E Meriaux, J Weitzen, N Yoni… - Journal of Testing …, 2023 - asmedigitalcollection.asme.org
This article presents a set of nondestructive test methodologies designed to evaluate and
compare performance of the communication links used for control and telemetry of small …

Performance comparison of machine learning algorithms in detecting jamming attacks on ADS-B devices

MR Manesh, MS Velashani, E Ghribi… - … on Electro Information …, 2019 - ieeexplore.ieee.org
Aviation communities are nowadays deploying automatic dependent surveillance-broadcast
(ADS-B) systems on aircraft to have more accurate and reliable air traffic control. This system …

Cybersecurity trends in low-altitude air traffic management

Y **e, A Gardi, R Sabatini - 2022 IEEE/AIAA 41st Digital …, 2022 - ieeexplore.ieee.org
Cybersecurity is a well-recognised issue in the aviation system but effective protection
measures have not been implemented yet. Moreover, Artificial Intelligence (AI) algorithms …

Drones: Architecture, vulnerabilities, attacks and countermeasures

NA Sabuwala, RD Daruwala - International Conference on Intelligent …, 2022 - Springer
There is significant surge in the popularity of Unmanned Aerial Vehicles (UAVs), often called
drones, with an ongoing increase in demand due to their multi-functional uses. The capacity …