Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.20998/2522-9052.2022.4.10
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Studies of Methods for Improving the Cyber Security of Unmanned Aerial Vehicles With the Built-in Ads-B System

Abstract: The subject of study in the article is methods for improving the cybersecurity of unmanned aerial vehicles with an integrated ADS-B system. The aim is to analyze and compare methods for improving the cybersecurity of unmanned aerial vehicles with an embedded ADS-B system. Particular scientific tasks: analysis and comparative studies of the main types of cyber threats and methods for improving the cybersecurity of unmanned aerial vehicles with an integrated ADS-B system, the development of an appropriate taxono… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Works [11,12] predict the load in an intelligent network based on long-term and short-term memory. The results obtained make it possible to solve the problem of predicting the state of the system, but do not allow solving the problem of self-healing of the system in the event of failure of its elements.…”
Section: Analysis Of Recent Research and Publicationsmentioning
confidence: 99%
“…Works [11,12] predict the load in an intelligent network based on long-term and short-term memory. The results obtained make it possible to solve the problem of predicting the state of the system, but do not allow solving the problem of self-healing of the system in the event of failure of its elements.…”
Section: Analysis Of Recent Research and Publicationsmentioning
confidence: 99%
“…Article [5] presents the classification of UAV cyber threats with a built-in ADS-B system. A generalized assessment of cryptographic protection methods adapted to solving the problems of improving the security of UAVs with an integrated ADS-B system is also given.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Taking into account the structural features of the UAV ADS-B format [5,10] made it possible to put forward a hypothesis: steganographic coding and decoding of ADS-B data can be performed on the basis of transformations:…”
Section: A Model Of Steganographic Data Transformation Operations Bas...mentioning
confidence: 99%
“…Work [2] presents the results of comparative studies of methods to improve cybersecurity of UAVs with embedded ADS-B system. It analyzes the main types of cyber attacks on UAVs with embedded ADS-B system, developed a taxonomy of cyber attacks of modification and forced implementation of ADS-B messages.…”
Section: Literature Reviewmentioning
confidence: 99%