Research Article | Open Access | Download Full Text
Volume 2 | Issue 2 | Year 2024 | Article Id: CYS-V2I2P102 DOI: https://doi.org/10.59232/CYS-V2I2P102
Appraise the Desideratum of Cyber Security for Armed Drone
Udaya Kumar Giri, Shrish Kumar Tiwari
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 06 Apr 2024 | 08 May 2024 | 30 May 2024 | 12 Jun 2024 |
Citation
Udaya Kumar Giri, Shrish Kumar Tiwari. “Appraise the Desideratum of Cyber Security for Armed Drone.” DS Journal of Cyber Security, vol. 2, no. 2, pp. 9-19, 2024.
Abstract
Keywords
Cyber-attack, Armed drone, Spoofing, Hijacking, Information corruption.
References
[1] Amina Khan, “The Ambiguity in International Law and Its Effect on Drone Warfare and Cyber Security,” Thesis, Western University, pp. 1-61, 2023.
[Google Scholar] [Publisher Link]
[2] Ankit Kumar, “Drone Proliferation and Security Threats,” Indian Journal of Asian Affairs, vol. 33, no. 1/2, pp. 43-62, 2020.
[Google Scholar] [Publisher Link]
[3] Apoorvaa Singh, Chandana Priya Nivarthi, and K.B. Akhilesh, “Implementing IoT in India-A Look at Macro Issues and a Framework for Recommendations,” Smart Technologies, pp. 35-52, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Bora Ly, and Romny Ly, “Cybersecurity in Unmanned Aerial Vehicles (UAVs),” Journal of Cyber Security Technology, vol. 5, no. 2, pp. 120-137, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] B. Siddappaji, Pinosh Kumar Hajoary, and K.B. Akhilesh, “UAVs/Drones-Based IoT Services,” Smart Technologies, pp. 159-167, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Elham Kariri, “IoT Powered Agricultural Cyber-Physical System: Security Issue Assessment,” IETE Journal of Research, pp. 1-11, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Edwin Vattapparamban et al., “Drones for Smart Cities: Issues in Cybersecurity, Privacy, and Public Safety,” 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, pp. 216-221, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Fallou Thiobane, “Cybersecurity and Drones,” Ph.D. Thesis, Utica College, 2015.
[Google Scholar] [Publisher Link]
[9] Hanna Martyniuk et al., “Analysis of Threat Models for Unmanned Aerial Vehicles from Different Spheres of Life,” Advances in Computer Science for Engineering and Education VI, pp. 595-604, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Jay Gundlach, Designing Unmanned Aircraft Systems, Aerospace Research Central, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[11] James Johnson, “The AI-Cyber Nexus: Implications for Military Escalation, Deterrence and Strategic Stability,” Journal of Cyber Policy, vol. 4, no. 3, pp. 442-460, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Jeppe Teglskov Jacobsen, and Jens Ringsmose, “Cyber-Bombing ISIS: Why Disclose what is Better Kept Secret?,” Global Affairs, vol. 3, no. 2, pp. 125-137, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Jonathan Walatkiewicz, and Omar Darwish, “A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence,” Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23), pp. 523-532, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Jean-Paul A. Yaacoub et al., “Robotics Cyber Security: Vulnerabilities, Attacks, Countermeasures, and Recommendations,” International Journal of Information Security, vol. 21, pp. 115-158, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Jean-Paul Yaacoub et al., “Security Analysis of Drones Systems: Attacks, Limitations, and Recommendations,” Internet of Things, vol. 11, pp. 1-39, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Kim Hartmann, and Christoph Steup, “The Vulnerability of UAVs to Cyber Attacks Approach to the Risk Assessment,” 2013 5th International Conference on Cyber Conflict (CYCON 2013), Tallinn, Estonia, pp. 1-23, 2013.
[Google Scholar] [Publisher Link]
[17] Mary Ellen O'Connell, “21st-Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, and WMDs,” 13th Global Studies Law Review, vol. 515, pp. 1-21, 2014.
[Google Scholar] [Publisher Link]
[18] Martti Lehto, “Drones in the Cyber Security Environment,” Cyberwatch Magazine, vol. 2019, no. 4, pp. 8-17, 2019.
[Google Scholar] [Publisher Link]
[19] Manimaran Mohan, “Cybersecurity in Drones,” Ph.D. Thesis, Utica College, 2016.
[Google Scholar] [Publisher Link]
[20] Mariusz Pyzynski, and Tomasz Balcerzak, “Cybersecurity of the Unmanned Aircraft System (UAS),” Journal of Intelligent & Robotic Systems, vol. 102, pp. 1-13, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Moritz Weiss, “The Rise of Cybersecurity Warriors?,” Small Wars & Insurgencies, vol. 33, no. 1–2, pp. 272–293, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Nader S. Labib et al., “The Rise of Drones in the Internet of Things: A Survey on the Evolution, Prospects and Challenges of Unmanned Aerial Vehicles,” IEEE Access, vol. 9, pp. 115466-115487, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Paolo Crippa, “Cyber Security and Drones,” Handbook of Security Science, pp. 619-633, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Rizwan Majeed et al., “Intelligent Cyber-Security System for IoT-Aided Drones Using a Voting Classifier,” Electronics, vol. 10, no. 23, pp. 1-19, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Ryan Shaffer, “Drone Activity and Cyber Terrorism,” Terrorism and Political Violence, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Arnolnt Spyros, “A Study of Cybersecurity Threats in UAVs and Threat Model Approaches,” Master Thesis, School of Science & Technology, International Hellenic University, 2023.
[Google Scholar] [Publisher Link]
[27] Susheela Dahiya, and Manik Garg, “Unmanned Aerial Vehicles: Vulnerability to Cyber Attacks,” Proceedings of UASG 2019, pp. 201-211, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Vikas Sihag et al., “Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones,” Drones, vol. 7, no. 7, pp. 1-29, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Wojdan BinSaeedan et al., “Security Challenges for UAV Systems Communications: Potential Attacks and Countermeasures,” Unmanned Aerial Vehicles Applications: Challenges and Trends, pp. 269-288, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Wasswa Shafik, S. Mojtaba Matinkhah, and Fawad Shokoor, “Cybersecurity in Unmanned Aerial Vehicles: A Review,” International Journal on Smart Sensing and Intelligent Systems, vol. 16, no. 1, 2023.