2023
DOI: 10.1007/s00521-023-08857-7
|View full text |Cite
|
Sign up to set email alerts
|

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

Abiodun Esther Omolara,
Moatsum Alawida,
Oludare Isaac Abiodun
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 234 publications
0
1
0
1
Order By: Relevance
“…This method makes it difficult for attackers to jam the signal effectively, as they would need to jam multiple frequencies simultaneously to disrupt communication. Additionally, frequency hopping can provide a level of encryption by using a unique hopping sequence known only to the drone and its controller, further enhancing the security of the communication link [108,109]. By implementing frequency hopping as a countermeasure against signal jamming, drone operators can significantly enhance the resilience of their communication systems, as it enables drones to adapt to changing interference conditions and maintain reliable connectivity in challenging environments [110].…”
Section: Attacks Based On Security and Privacy Requirementsmentioning
confidence: 99%
“…This method makes it difficult for attackers to jam the signal effectively, as they would need to jam multiple frequencies simultaneously to disrupt communication. Additionally, frequency hopping can provide a level of encryption by using a unique hopping sequence known only to the drone and its controller, further enhancing the security of the communication link [108,109]. By implementing frequency hopping as a countermeasure against signal jamming, drone operators can significantly enhance the resilience of their communication systems, as it enables drones to adapt to changing interference conditions and maintain reliable connectivity in challenging environments [110].…”
Section: Attacks Based On Security and Privacy Requirementsmentioning
confidence: 99%
“…Авторами в роботі [7] представлено огляд існуючих результатів досліджень у галузі безпеки БПЛА, включаючи різні типи атак, уразливості та методи захисту, і підкреслюється важливість захисту БПЛА від кібератак.…”
Section: вступunclassified