A Comprehensive Survey: Cybersecurity Challenges and Futures of Autonomous Drones

Nyles Durfey, S. Sajal
{"title":"A Comprehensive Survey: Cybersecurity Challenges and Futures of Autonomous Drones","authors":"Nyles Durfey, S. Sajal","doi":"10.1109/ietc54973.2022.9796881","DOIUrl":null,"url":null,"abstract":"Unmanned Aircraft Systems (UAS) also known as drones are changing the world [1]. Whether it’s military, medicine, agriculture, city planning, surveillance, package delivery or sports. These machines are useful in ways that haven’t been discovered yet. Making dangerous work safe by putting something between people and potential risks. Increasing the amount of land that can be searched in search and rescues. Drones are making difficult jobs easier. Conversely the danger they pose is also being discovered. Everyday a new danger is presented by the growing number of drones being used, and as we rely more on them the problem grows. This research paper looks into the current security issues that are found in drones and what is being done to lessen the risk that drones pose to countries, businesses, and civilians. Looking to find what works best to protect drones from cyber threats, and how to protect against them. This is done by reading research journals, news articles, watching videos done by professors/news organizations then analyzing the data found. Two frames of mind are used when analyzing the problems found from research. First, will be how to protect the drone from cyber threats. Second will be how to protect from drone cyber attacks. The results of this research found that drones are extremely unsafe against cyber attacks, and are powerful weapons to finding and exploiting holes in a systems defense. Research on defending drones found insufficient authentication, encryption, signal verification, defined access privileges, and threat reporting. These problems exist from hobby pilots to [2]Department of Defense (DOD) drones. The greatest tool a drone has when attacking a system is stealth and mobility. It can attack multiple targets with only a few fly bys. Because of this the best defense against drone cyber threats is detection. Once detected the drone could be dealt with physically or by exploiting security holes commonly found in drones. Resulting from the cybersecurity threat posed both to drones, and from drones [3, 4, 5, 6] laws are being written in multiple countries. These laws are designed to limit their usage or ban them completely. To solve this problem, there are three key steps to eliminating a majority of the threats. [7] Implementing authentication, encryption, and a threat reporting system would allow drones to continue to change the world safely.","PeriodicalId":251518,"journal":{"name":"2022 Intermountain Engineering, Technology and Computing (IETC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Intermountain Engineering, Technology and Computing (IETC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ietc54973.2022.9796881","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Unmanned Aircraft Systems (UAS) also known as drones are changing the world [1]. Whether it’s military, medicine, agriculture, city planning, surveillance, package delivery or sports. These machines are useful in ways that haven’t been discovered yet. Making dangerous work safe by putting something between people and potential risks. Increasing the amount of land that can be searched in search and rescues. Drones are making difficult jobs easier. Conversely the danger they pose is also being discovered. Everyday a new danger is presented by the growing number of drones being used, and as we rely more on them the problem grows. This research paper looks into the current security issues that are found in drones and what is being done to lessen the risk that drones pose to countries, businesses, and civilians. Looking to find what works best to protect drones from cyber threats, and how to protect against them. This is done by reading research journals, news articles, watching videos done by professors/news organizations then analyzing the data found. Two frames of mind are used when analyzing the problems found from research. First, will be how to protect the drone from cyber threats. Second will be how to protect from drone cyber attacks. The results of this research found that drones are extremely unsafe against cyber attacks, and are powerful weapons to finding and exploiting holes in a systems defense. Research on defending drones found insufficient authentication, encryption, signal verification, defined access privileges, and threat reporting. These problems exist from hobby pilots to [2]Department of Defense (DOD) drones. The greatest tool a drone has when attacking a system is stealth and mobility. It can attack multiple targets with only a few fly bys. Because of this the best defense against drone cyber threats is detection. Once detected the drone could be dealt with physically or by exploiting security holes commonly found in drones. Resulting from the cybersecurity threat posed both to drones, and from drones [3, 4, 5, 6] laws are being written in multiple countries. These laws are designed to limit their usage or ban them completely. To solve this problem, there are three key steps to eliminating a majority of the threats. [7] Implementing authentication, encryption, and a threat reporting system would allow drones to continue to change the world safely.
综合调查:自主无人机的网络安全挑战和未来
无人驾驶飞机系统(UAS)也被称为无人机正在改变世界[1]。无论是军事、医药、农业、城市规划、监控、包裹递送还是体育。这些机器的用途还没有被发现。通过在人们和潜在风险之间放置一些东西,使危险的工作变得安全。增加搜索和救援中可以搜索的土地数量。无人机让困难的工作变得更容易。相反,它们所构成的危险也正在被发现。每天都有越来越多的无人机被使用,这带来了新的危险,随着我们越来越依赖它们,问题也越来越严重。这篇研究论文探讨了目前在无人机中发现的安全问题,以及正在采取哪些措施来减少无人机对国家、企业和平民构成的风险。寻找最能保护无人机免受网络威胁的方法,以及如何保护它们。这是通过阅读研究期刊,新闻文章,观看由教授/新闻机构制作的视频,然后分析发现的数据来完成的。在分析从研究中发现的问题时,使用两种思维框架。首先,将是如何保护无人机免受网络威胁。其次是如何防范无人机网络攻击。研究结果表明,无人机在网络攻击中非常不安全,是发现和利用系统防御漏洞的强大武器。对防御无人机的研究发现,身份验证、加密、信号验证、定义访问权限和威胁报告不足。从业余飞行员到[2]国防部(DOD)无人机,这些问题都存在。无人机攻击系统时最强大的工具是隐身和机动性。它可以在几次飞行中攻击多个目标。正因为如此,防范无人机网络威胁的最好办法就是检测。一旦检测到无人机,就可以进行物理处理,或者利用无人机常见的安全漏洞。由于对无人机和无人机构成的网络安全威胁[3,4,5,6],许多国家正在制定法律。这些法律旨在限制它们的使用或完全禁止它们。要解决这个问题,有三个关键步骤可以消除大多数威胁。[7]实施认证、加密和威胁报告系统将使无人机继续安全地改变世界。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信