Security analysis of drones systems: Attacks, limitations, and recommendations

JP Yaacoub, H Noura, O Salman, A Chehab - Internet of Things, 2020 - Elsevier
Recently, the world witnessed a significant increase in the number of used drones, with a
global and continuous rise in the demand for their multi-purpose applications. The pervasive …

Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies

G Lykou, D Moustakas, D Gritzalis - Sensors, 2020 - mdpi.com
As the fastest growing segment of aviation, unmanned aerial systems (UAS) continue to
increase in number, technical complexity and capabilities. Numerous civilian and …

Cyber threats facing autonomous and connected vehicles: Future challenges

S Parkinson, P Ward, K Wilson… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Vehicles are currently being developed and sold with increasing levels of connectivity and
automation. As with all networked computing devices, increased connectivity often results in …

The flying sidekick traveling salesman problem: Optimization of drone-assisted parcel delivery

CC Murray, AG Chu - Transportation Research Part C: Emerging …, 2015 - Elsevier
Once limited to the military domain, unmanned aerial vehicles are now poised to gain
widespread adoption in the commercial sector. One such application is to deploy these …

Attacks on self-driving cars and their countermeasures: A survey

A Chowdhury, G Karmakar, J Kamruzzaman… - IEEE …, 2020 - ieeexplore.ieee.org
Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or
connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …

Deep learning for unmanned aerial vehicles detection: A review

N Al-lQubaydhi, A Alenezi, T Alanazi, A Senyor… - Computer Science …, 2024 - Elsevier
As a new type of aerial robotics, drones are easy to use and inexpensive, which has
facilitated their acquisition by individuals and organizations. This unequivocal and …

A review on cybersecurity vulnerabilities for unmanned aerial vehicles

CGL Krishna, RR Murphy - 2017 IEEE international symposium …, 2017 - ieeexplore.ieee.org
This paper surveys the scientific and trade literature on cybersecurity for unmanned aerial
vehicles (UAV), concentrating on actual and simulated attacks, and the implications for small …

Known vulnerabilities of global navigation satellite systems, status, and potential mitigation techniques

RT Ioannides, T Pany, G Gibbons - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Global navigation satellite systems (GNSS) like GPS but also Galileo, GLONASS, and
Beidou represent an important infrastructure to our society. They provide position and timing …

Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks

DP Shepard, TE Humphreys, AA Fansler - International Journal of Critical …, 2012 - Elsevier
Results of Global Positioning System (GPS) spoofing tests against phasor measurement
units (PMUs) are presented, which demonstrate that PMUs are vulnerable to spoofing …

Drone-assisted public safety networks: The security aspect

D He, S Chan, M Guizani - IEEE Communications Magazine, 2017 - ieeexplore.ieee.org
Public safety networks are based on wireless communication technologies, and are
particularly important in field operations to support the mobility of first responders. With …