DS Journal of Cyber Security (DS-CYS)

Research Article | Open Access | Download Full Text

Volume 2 | Issue 2 | Year 2024 | Article Id: CYS-V2I2P102 DOI: https://doi.org/10.59232/CYS-V2I2P102

Appraise the Desideratum of Cyber Security for Armed Drone

Udaya Kumar Giri, Shrish Kumar Tiwari

ReceivedRevisedAcceptedPublished
06 Apr 202408 May 202430 May 202412 Jun 2024

Citation

Udaya Kumar Giri, Shrish Kumar Tiwari. “Appraise the Desideratum of Cyber Security for Armed Drone.” DS Journal of Cyber Security, vol. 2, no. 2, pp. 9-19, 2024.

Abstract

Industrial and technological advancement has paved the way for the emergence of highly sophisticated and modernized arms and ammunition in the defence sector. Unmanned aerial vehicles, popularly known as drones, emerged as a force multiplier technology that makes intelligence, surveillance, and target acquisition easier. The technological processes that include the airframe, propulsion system, embedded computing system, ground control system, and autopilot systems of drones can run through networking or by connecting the GPS systems. That makes drone technology vulnerable because its networking and dispersed physical systems located in remote places make it easier for cyber-attacks on control loops. For instance, GPS spoofing, fuzzing attacks, hijacking, immobilization, and gain scheduling attacks are most common for cyber attackers, which cannot deny the operability of the UAVs but pose security threats to the host countries. So, in this premise, this paper examines the necessity and role of cyber security for unmanned aerial systems or armed drones. Further, this paper analyses various methods to protect armed drones from cyber-attacks.

Keywords

Cyber-attack, Armed drone, Spoofing, Hijacking, Information corruption.

References

[1] Amina Khan, “The Ambiguity in International Law and Its Effect on Drone Warfare and Cyber Security,” Thesis, Western University, pp. 1-61, 2023.

[Google Scholar] [Publisher Link]

[2] Ankit Kumar, “Drone Proliferation and Security Threats,” Indian Journal of Asian Affairs, vol. 33, no. 1/2, pp. 43-62, 2020.

[Google Scholar] [Publisher Link]

[3] Apoorvaa Singh, Chandana Priya Nivarthi, and K.B. Akhilesh, “Implementing IoT in India-A Look at Macro Issues and a Framework for Recommendations,” Smart Technologies, pp. 35-52, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[4] Bora Ly, and Romny Ly, “Cybersecurity in Unmanned Aerial Vehicles (UAVs),” Journal of Cyber Security Technology, vol. 5, no. 2, pp. 120-137, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[5] B. Siddappaji, Pinosh Kumar Hajoary, and K.B. Akhilesh, “UAVs/Drones-Based IoT Services,” Smart Technologies, pp. 159-167, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[6] Elham Kariri, “IoT Powered Agricultural Cyber-Physical System: Security Issue Assessment,” IETE Journal of Research, pp. 1-11, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[7] Edwin Vattapparamban et al., “Drones for Smart Cities: Issues in Cybersecurity, Privacy, and Public Safety,” 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, pp. 216-221, 2016.

[CrossRef] [Google Scholar] [Publisher Link]

[8] Fallou Thiobane, “Cybersecurity and Drones,” Ph.D. Thesis, Utica College, 2015.

[Google Scholar] [Publisher Link]

[9] Hanna Martyniuk et al., “Analysis of Threat Models for Unmanned Aerial Vehicles from Different Spheres of Life,” Advances in Computer Science for Engineering and Education VI, pp. 595-604, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[10] Jay Gundlach, Designing Unmanned Aircraft Systems, Aerospace Research Central, 2014.

[CrossRef] [Google Scholar] [Publisher Link]

[11] James Johnson, “The AI-Cyber Nexus: Implications for Military Escalation, Deterrence and Strategic Stability,” Journal of Cyber Policy, vol. 4, no. 3, pp. 442-460, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[12] Jeppe Teglskov Jacobsen, and Jens Ringsmose, “Cyber-Bombing ISIS: Why Disclose what is Better Kept Secret?,” Global Affairs, vol. 3, no. 2, pp. 125-137, 2017.

[CrossRef] [Google Scholar] [Publisher Link]

[13] Jonathan Walatkiewicz, and Omar Darwish, “A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence,” Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23), pp. 523-532, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[14] Jean-Paul A. Yaacoub et al., “Robotics Cyber Security: Vulnerabilities, Attacks, Countermeasures, and Recommendations,” International Journal of Information Security, vol. 21, pp. 115-158, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[15] Jean-Paul Yaacoub et al., “Security Analysis of Drones Systems: Attacks, Limitations, and Recommendations,” Internet of Things, vol. 11, pp. 1-39, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[16] Kim Hartmann, and Christoph Steup, “The Vulnerability of UAVs to Cyber Attacks Approach to the Risk Assessment,” 2013 5th International Conference on Cyber Conflict (CYCON 2013), Tallinn, Estonia, pp. 1-23, 2013.

[Google Scholar] [Publisher Link]

[17] Mary Ellen O'Connell, “21st-Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, and WMDs,” 13th Global Studies Law Review, vol. 515, pp. 1-21, 2014.

[Google Scholar] [Publisher Link]

[18]  Martti Lehto, “Drones in the Cyber Security Environment,” Cyberwatch Magazine, vol. 2019, no. 4, pp. 8-17, 2019.

[Google Scholar] [Publisher Link]

[19] Manimaran Mohan, “Cybersecurity in Drones,” Ph.D. Thesis, Utica College, 2016.

[Google Scholar] [Publisher Link]

[20] Mariusz Pyzynski, and Tomasz Balcerzak, “Cybersecurity of the Unmanned Aircraft System (UAS),” Journal of Intelligent & Robotic Systems, vol. 102, pp. 1-13, 2021.

[CrossRef] [Google Scholar] [Publisher Link]             

[21] Moritz Weiss, “The Rise of Cybersecurity Warriors?,” Small Wars & Insurgencies, vol. 33, no. 1–2, pp. 272–293, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[22] Nader S. Labib et al., “The Rise of Drones in the Internet of Things: A Survey on the Evolution, Prospects and Challenges of Unmanned Aerial Vehicles,” IEEE Access, vol. 9, pp. 115466-115487, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[23] Paolo Crippa, “Cyber Security and Drones,” Handbook of Security Science, pp. 619-633, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[24] Rizwan Majeed et al., “Intelligent Cyber-Security System for IoT-Aided Drones Using a Voting Classifier,” Electronics, vol. 10, no. 23, pp. 1-19, 2021.

[CrossRef] [Google Scholar] [Publisher Link]            

[25] Ryan Shaffer, “Drone Activity and Cyber Terrorism,” Terrorism and Political Violence, pp. 1-6, 2023.

[CrossRef] [Google Scholar] [Publisher Link]          

[26] Arnolnt Spyros, “A Study of Cybersecurity Threats in UAVs and Threat Model Approaches,” Master Thesis, School of Science & Technology, International Hellenic University, 2023.

[Google Scholar] [Publisher Link]  

[27] Susheela Dahiya, and Manik Garg, “Unmanned Aerial Vehicles: Vulnerability to Cyber Attacks,” Proceedings of UASG 2019, pp. 201-211, 2020.

[CrossRef] [Google Scholar] [Publisher Link]    

[28] Vikas Sihag et al., “Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones,” Drones, vol. 7, no. 7, pp. 1-29, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[29] Wojdan BinSaeedan et al., “Security Challenges for UAV Systems Communications: Potential Attacks and Countermeasures,” Unmanned Aerial Vehicles Applications: Challenges and Trends, pp. 269-288, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[30] Wasswa Shafik, S. Mojtaba Matinkhah, and Fawad Shokoor, “Cybersecurity in Unmanned Aerial Vehicles: A Review,” International Journal on Smart Sensing and Intelligent Systems, vol. 16, no. 1, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

Appraise the Desideratum of Cyber Security for Armed Drone