Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2021
DOI: 10.4018/978-1-7998-7646-5.ch013
|View full text |Cite
|
Sign up to set email alerts
|

Drone Security

Abstract: This chapter explores the security challenges of the drone ecosystem. Drones raise significant security and safety concerns, both design-time and run-time (e.g., supply-chain, technical design, standardization). Two broad classes of threats are considered, on drones and using drones (e.g., to attack critical infrastructures or vehicles). They involve both professional and non-professional drones and lead to various types of attacks (e.g., IoT-type vulnerabilities, GPS spoofing, spying, kinetic attacks). Trade-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 34 publications
0
1
0
Order By: Relevance
“…b) Supply Chain Attacks: Concerns regarding the supply chain extend to vulnerabilities in components like flight controllers, speed controllers, propellers, aircraft frames, and anything involving open-source elements. The attackers can exploit these vulnerabilities to modify component designs, reducing their lifespan or introducing malicious code into critical hardware components [92]. In either case, the final product delivered to the customer may be compromised without their knowledge.…”
Section: B Cyber Attacksmentioning
confidence: 99%
“…b) Supply Chain Attacks: Concerns regarding the supply chain extend to vulnerabilities in components like flight controllers, speed controllers, propellers, aircraft frames, and anything involving open-source elements. The attackers can exploit these vulnerabilities to modify component designs, reducing their lifespan or introducing malicious code into critical hardware components [92]. In either case, the final product delivered to the customer may be compromised without their knowledge.…”
Section: B Cyber Attacksmentioning
confidence: 99%