Cyber Attacks on Commercial Drones: A Review

IF 3.4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Bruno Branco;José Silvestre Serra Silva;Miguel Correia
{"title":"Cyber Attacks on Commercial Drones: A Review","authors":"Bruno Branco;José Silvestre Serra Silva;Miguel Correia","doi":"10.1109/ACCESS.2025.3527698","DOIUrl":null,"url":null,"abstract":"s, also known as drones, are increasingly used in several applications and a variety of cyber attacks can be performed on them using several tools. Some examples of these attacks include breaking the connection between the drone and the controller with deauthentication attacks, discovering a password or cryptographic key used in a communication protocol, gaining control of the drone through command/code injection, and attacks. This paper covers drone attacks by analyzing different components of the drone, including the remote controller and communication protocols. The main purpose is to provide an overview of the possible ways in which cyber attacks can be executed. This analysis concludes that drones, designed for diverse purposes, are vulnerable to a range of cyber attacks. The paper also reviews existing penetration testing methodologies for UAVs, which provide a logical framework for their realization. This review covers the different cyber attack methods and tools used against a UAV, intending to improve defense mechanisms.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"9566-9577"},"PeriodicalIF":3.4000,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10835757","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Access","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10835757/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

s, also known as drones, are increasingly used in several applications and a variety of cyber attacks can be performed on them using several tools. Some examples of these attacks include breaking the connection between the drone and the controller with deauthentication attacks, discovering a password or cryptographic key used in a communication protocol, gaining control of the drone through command/code injection, and attacks. This paper covers drone attacks by analyzing different components of the drone, including the remote controller and communication protocols. The main purpose is to provide an overview of the possible ways in which cyber attacks can be executed. This analysis concludes that drones, designed for diverse purposes, are vulnerable to a range of cyber attacks. The paper also reviews existing penetration testing methodologies for UAVs, which provide a logical framework for their realization. This review covers the different cyber attack methods and tools used against a UAV, intending to improve defense mechanisms.
商业无人机的网络攻击:综述
无人机,也被称为无人机,越来越多地用于多种应用,可以使用几种工具对它们进行各种网络攻击。这些攻击的一些例子包括通过去认证攻击打破无人机和控制器之间的连接,发现通信协议中使用的密码或加密密钥,通过命令/代码注入获得对无人机的控制,以及攻击。本文通过分析无人机的不同组件,包括远程控制器和通信协议,涵盖了无人机攻击。主要目的是提供网络攻击可能实施方式的概述。该分析得出的结论是,为各种目的而设计的无人机很容易受到一系列网络攻击。本文还回顾了现有的无人机渗透测试方法,为其实现提供了逻辑框架。本文综述了针对无人机的不同网络攻击方法和工具,旨在改进防御机制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Access
IEEE Access COMPUTER SCIENCE, INFORMATION SYSTEMSENGIN-ENGINEERING, ELECTRICAL & ELECTRONIC
CiteScore
9.80
自引率
7.70%
发文量
6673
审稿时长
6 weeks
期刊介绍: IEEE Access® is a multidisciplinary, open access (OA), applications-oriented, all-electronic archival journal that continuously presents the results of original research or development across all of IEEE''s fields of interest. IEEE Access will publish articles that are of high interest to readers, original, technically correct, and clearly presented. Supported by author publication charges (APC), its hallmarks are a rapid peer review and publication process with open access to all readers. Unlike IEEE''s traditional Transactions or Journals, reviews are "binary", in that reviewers will either Accept or Reject an article in the form it is submitted in order to achieve rapid turnaround. Especially encouraged are submissions on: Multidisciplinary topics, or applications-oriented articles and negative results that do not fit within the scope of IEEE''s traditional journals. Practical articles discussing new experiments or measurement techniques, interesting solutions to engineering. Development of new or improved fabrication or manufacturing techniques. Reviews or survey articles of new or evolving fields oriented to assist others in understanding the new area.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信