Cybersecurity Testing in Drones Domain: A Systematic Literature Review

被引:0
作者
Marchetti, Eda [1 ]
Waheed, Tauheed [1 ]
Calabro, Antonello [1 ]
机构
[1] CNR, ISTI, I-56124 Pisa, Italy
关键词
Drones; Computer security; Testing; Surveys; Proposals; Global Positioning System; Libraries; Data privacy; Autonomous aerial vehicles; Protection; UAV; cybersecurity; testing; VEHICLES; ISSUES; UAVS;
D O I
10.1109/ACCESS.2024.3495994
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of unmanned aerial vehicles (UAVs) drone cybersecurity testing is becoming an emerging and evolving research area for cybersecurity and privacy issues avoidance and prevention. This paper contributes to guiding the research activity by systematically surveying the commonly adopted solutions and proposals for cybersecurity testing in the drone research domain. It highlights the research challenges and issues, classifies the current proposal, methodologies, and techniques, and suggests future directions. After gathering a collection of papers using automated inquiry of well-known digital libraries and snowballing techniques, a classification schema has been proposed and applied to the identified research works. Furthermore, research questions have been identified and answered through the performed classification. The paper provides an outlook on cybersecurity testing in drone environments. It also lists current criticalities, challenges, gaps, and future directions useful to improve drone quality and increase cybersecurity. The analysis reveals that the collected results point to a meaningful evolution and innovative approaches in cybersecurity testing within current research activities.
引用
收藏
页码:171166 / 171184
页数:19
相关论文
共 50 条
[21]   Web application testing: A systematic literature review [J].
Dogan, Serdar ;
Betin-Can, Aysu ;
Garousi, Vahid .
JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 91 :174-201
[22]   Systematic Review on Civilian Drones in Safety and Security Applications [J].
AL-Dosari, Khalifa ;
Hunaiti, Ziad ;
Balachandran, Wamadeva .
DRONES, 2023, 7 (03)
[23]   A Systematic Literature Review of Blockchain Technology for Internet of Drones Security [J].
Yasmine Harbi ;
Khedidja Medani ;
Chirihane Gherbi ;
Oussama Senouci ;
Zibouda Aliouat ;
Saad Harous .
Arabian Journal for Science and Engineering, 2023, 48 :1053-1074
[24]   Cybersecurity maturity model: Systematic literature review and a proposed model [J].
Buyukozkan, Gulcin ;
Guler, Merve .
TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2025, 213
[25]   The impact of time pressure on cybersecurity behaviour: a systematic literature review [J].
Chowdhury, Noman H. ;
Adam, Marc T. P. ;
Skinner, Geoffrey .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 38 (12) :1290-1308
[26]   Cybersecurity Awareness Through Serious Games: A Systematic Literature Review [J].
Moumouh, Chaimae ;
Chkouri, Mohamed Yassin ;
Fernandez-Aleman, Jose L. .
EMERGING TRENDS IN INTELLIGENT SYSTEMS & NETWORK SECURITY, 2023, 147 :190-199
[27]   Cybersecurity Analysis via Process Mining: A Systematic Literature Review [J].
Macak, Martin ;
Daubner, Lukas ;
Sani, Mohammadreza Fani ;
Buhnova, Barbora .
ADVANCED DATA MINING AND APPLICATIONS, ADMA 2021, PT I, 2022, 13087 :393-407
[28]   Building a thematic framework of cybersecurity: a systematic literature review approach [J].
Khaw T.Y. ;
Amran A. ;
Teoh A.P. .
Journal of Systems and Information Technology, 2024, 26 (02) :234-256
[29]   Machine Learning and Big Data for Cybersecurity: Systematic Literature Review [J].
El Bouchtioui, En Naji ;
Bentaleb, Asmae ;
Abouchabaka, Jaafar .
DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 1, 2024, 1098 :97-106
[30]   The social contract theory meets cybersecurity: systematic literature review [J].
Kleiner, Jan .
DIGITAL POLICY REGULATION AND GOVERNANCE, 2025, 27 (04) :446-465