2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) 2022
DOI: 10.1109/csde56538.2022.10089255
|View full text |Cite
|
Sign up to set email alerts
|

Security of Internet of Things Devices: Ethical Hacking a Drone and its Mitigation Strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
0
0
Order By: Relevance
“…The hacker could also bring down the drone, resulting in property damage and the loss of the aircraft. In addition, the hacker could take control of the drone for malicious purposes, or integrate his own drone into the fleet, thus disrupting delivery and causing a denial-ofservice issue [26].…”
Section: B Fleet Of Drones 1) Definition Of a Fleet Of Dronesmentioning
confidence: 99%
“…The hacker could also bring down the drone, resulting in property damage and the loss of the aircraft. In addition, the hacker could take control of the drone for malicious purposes, or integrate his own drone into the fleet, thus disrupting delivery and causing a denial-ofservice issue [26].…”
Section: B Fleet Of Drones 1) Definition Of a Fleet Of Dronesmentioning
confidence: 99%