Security analysis of drone systems: Attacks, limitations, and recommendations is a report by Jean-Paul Yaacoub, Hassan Noura, Ola Salman, and Ali Chehab.
Recently, there has been a notable surge in the utilization of drones globally, driven by an increasing demand for their versatile applications. The widespread adoption of drones can be attributed to their capacity to address diverse user needs, offering a bird’s-eye view that can be activated in nearly any location and at any time. However, this surge in drone usage has brought about a concerning trend – the malicious use of drones by both criminals and cyber-criminals. The likelihood and frequency of such attacks are high, posing potentially dangerous and devastating consequences. Consequently, there is a pressing need for comprehensive detective, protective, and preventive countermeasures.
This survey explores the emerging threats associated with using drones in cyber-attacks and identifies countermeasures to mitigate these risks. The paper examines various nefarious applications of drones, detailing possible detection methods. It analyzes the exploitation of drone vulnerabilities within communication links, smart devices, and hardware, encompassing smartphones and tablets. Additionally, the paper provides an in-depth review of drone/Unmanned Aerial Vehicle (UAV) usage across multiple domains, including civilian, military, and terrorism, outlining different purposes.
Furthermore, the paper outlines a realistic attack scenario, illustrating how the authors executed a simulated attack on a specific drone following the hacking cycle. This review serves as a valuable resource for ethical hackers, offering insights into existing UAV vulnerabilities in both military and civilian domains and enabling the development of new techniques and technologies for enhanced UAV attack detection and protection. The document reviews various civilian and military anti-drone/UAV (detective and preventive) countermeasures.
Publication Date– May 2020
Security analysis of drone systems: Attacks, limitations, and recommendations contains the following major sections:
- Background and overview
- Domains of use
- Drone security, safety and privacy concerns
- Drone existing threats & vulnerabilities
- Drone existing cyber-countermeasures
- Anti-drone countermeasures
- Limitations and recommendations
C-UAS Hub does not own this content and provides a link for users at the bottom of the page to access it in its original location. This allows the author(s) to track important article metrics related to their work. All credit goes to its rightful owner.
Authors- Jean-Paul Yaacoub, Hassan Noura, Ola Salman, and Ali Chehab
Post Image Credit: envatoelements by lzf