Security analysis of drones systems: Attacks, limitations, and recommendations

被引:343
作者
Yaacoub, Jean-Paul [1 ]
Noura, Hassan [1 ]
Salman, Ola [1 ]
Chehab, Ali [1 ]
机构
[1] AUB, Bliss St, Beirut, Lebanon
关键词
UAV; UAS; UUV; Armed drones; Drone/UAV warfare; Terrorism/counter-Terrorism; Drones security; Drones threats and vulnerabilities; Drones attacks; Drones security countermeasures techniques; Drones forensics; UNMANNED AERIAL VEHICLES; NETWORKS; SURVEILLANCE; AIRCRAFT; DESIGN; UAVS; INTERVENTION; INTELLIGENCE; WARFARE; CHINA;
D O I
10.1016/j.iot.2020.100218
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people's needs. Drones are providing users with a bird's eye that can be activated and used almost anywhere and at any time. However, recently, the malicious use of drones began to emerge among criminals and cyber-criminals alike. The probability and frequency of these attacks are both high and their impact can be very dangerous with devastating effects. Therefore, the need for detective, protective and preventive counter-measures is highly required. The aim of this survey is to investigate the emerging threats of using drones in cyber-attacks, along the countermeasures to thwart these attacks. The different uses of drones for malicious purposes are also reviewed, along the possible detection methods. As such, this paper analyzes the exploitation of drones vulnerabilities within communication links, as well as smart devices and hardware, including smart-phones and tablets. Moreover, this paper presents a detailed review on the drone/Unmanned Aerial Vehicle (UAV) usage in multiple domains (i.e civilian, military, terrorism, etc.) and for different purposes. A realistic attack scenario is also presented, which details how the authors performed a simulated attack on a given drone following the hacking cycle. This review would greatly help ethical hackers to understand the existing vulnerabilities of UAVs in both military and civilian domains. Moreover, it allows them to adopt and come up with new techniques and technologies for enhanced UAV attack detection and protection. As a result, various civilian and military anti-drones/UAVs (detective and preventive) countermeasures will be reviewed. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:39
相关论文
共 406 条
[1]  
A. IAI's, SUCCESSES ISRAELS DE
[2]   A Neural Adaptive Approach for Active Fault-Tolerant Control Design in UAV [J].
Abbaspour, Alireza ;
Yen, Kang K. ;
Forouzannezhad, Parisa ;
Sargolzaei, Arman .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (09) :3401-3411
[3]   Efficient Security Scheme for Disaster Surveillance UAV Communication Networks [J].
Abdallah, Asmaa ;
Ali, M. Zulfiker ;
Misic, Jelena ;
Misic, Vojislav B. .
INFORMATION, 2019, 10 (02)
[4]  
Abid M.E., 2014, DRONES UAVS RPAS ANA
[5]   Digital Forensics of Wireless Systems and Devices Technical and Legal Challenges [J].
Achi, H. ;
Hellany, A. ;
Nagrial, M. .
2009 6TH INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET 2009), 2009, :43-46
[6]  
Afzal U, 2013, PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013)
[7]   The Ongoing Campaign of Terror in Nigeria: Boko Haram versus the State [J].
Agbiboa, Daniel .
STABILITY-INTERNATIONAL JOURNAL OF SECURITY AND DEVELOPMENT, 2013, 2 (03)
[8]  
Allen J., 2019, TESTING EFFECTS US A
[9]  
Almohammad A., 2017, INT CTR STUDY VIOLEN, V5
[10]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy R. ;
Youssef A.M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)