Abstract
The use of drones has been steadily growing over the past few years, not only in a variety of businesses and governmental organizations but also among private individuals. This is due to the rapid deployment of drones for a variety of applications, which can be accomplished by merely attaching the application-specific devices to drones, which are typically controlled by a remote or a smartphone. However, the breakthroughs that have been made in the use of drones have also opened up security challenges. In many applications, the orders that are sent to the drones and the data that is transmitted from the drones are not encrypted. As a result of the fact that drones are also used for illegal and criminal activities by bad actors, it is necessary to add technology for attack detection, protection, and preventive countermeasures in drones, in addition to regulation on the usage of drones through law enforcement by the government agencies. In this chapter, we will analyze the exploiting of drone vulnerabilities such as GPS spoofing, Downlink intercept, and Data exploitation. Additionally, we will examine how to neutralize threats and countermeasures that should be addressed for the safety of the drones.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yaacoub JPA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2019) Securing internet of medical things systems: limitations, issues and recommendations. Fut Gener Comput Syst 105:581–606
Park J, Kim S, Suh K (2018) A comparative analysis of the environmental benefits of drone-based delivery services in urban and rural areas. Sustainability 10(3):888
Humphreys T (2012) Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing. University Texas Austin, Austin
Canis B (2015) Unmanned aircraft systems (UAS): commercial outlook for a new industry
Stocker C, Bennett R, Nex F, Gerke M, Zevenbergen J (2017) Review of the current state of UAV regulations. Remote Sens 9(5):459
Barfield F (2002) Autonomous collision avoidance: the technical requirements. In: Proceedings of the IEEE national aerospace and electronics conference, pp 808–813
Sharma R, Ghose D (2009) Collision avoidance between UAV clusters using swarm intelligence techniques. Int J Syst Sci 40(5):521–538
Johnson LK, Dorn AW, Webb S, Kreps S, Krieger W, Schwarz E, Shpiro S, Walsh PF, Wirtz JJ (2017) An INS special forum: intelligence and drones/eyes in the sky for peacekeeping: the emergence of UAVs in UN operations/the democratic deficit on drones/the German approach to drone warfare/pursuing peace: the strategic limits of drone warfare/seeing but unseen: intelligence drones in Israel/drone paramilitary operations against suspected global terrorists: us and Australian perspectives/the ‘terminator conundrum’ and the future of drone warfare. Int Natl Sec 32(4):411–440
Thiels CA, Aho JM, Zietlow SP, Jenkins DH (2015) Use of unmanned aerial vehicles for medical product transport. Air Med J 34(2):104–108
Rango A, Laliberte A, Steele C, Herrick JE, Bestelmeyer B, Schmugge T, Roanhorse A, Jenkins V (2006) Using unmanned aerial vehicles for rangelands: current applications and future potentials. Environ Pract 8(3):159–168
Sedjelmaci H, Senouci SM (2018) Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. J Supercomput 57:1–17
Mushtaq MF, Jamel S, Mohamad KM, Khalid SKA, Deris MM (2017) Key generation technique based on triangular coordinate extraction for hybrid cubes. J Telecommun Electron Comput Eng 9(3–4):195–200
Du H, Heldeweg MA (2017) Responsible design of drones and drone services: legal perspective synthetic report
Ueno S, Higuchi T (2011) Collision avoidance law using information amount. In: Numerical analysis-theory and application. InTech, Allithurai
Hamza A, Akram U, Samad A, Khosa SN, Fatima R, Mushtaq MF (2020) Unmaned aerial vehicles threats and defence solutions. In: IEEE 23rd international multi-topic conference (INMIC)
Israelsen J, Beall M, Bareiss D, Stuart D, Keeney E, Berg J (2014) Automatic collision avoidance for manually tele-operated unmanned aerial vehicles. In: IEEE international conference on robotics and automation (ICRA), pp 6638–6643
Boulos MNK, Geraghty EM (2020) Geographical tracking and mapping of coronavirus disease covid-19/severe acute respiratory syndrome coronavirus 2 (sars-cov-2) epidemic and associated events around the world: how 21st century GIS technologies are supporting the global fight against outbreaks and epidemics. Int J Health Geogr 19:1–12
Finn RL, Wright D (2012) Unmanned aircraft systems: surveillance, ethics and privacy in civil applications. Comput Law Sec 28(2):184–194
Cavoukian A (2012) Privacy and drones: unmanned aerial vehicles. Information and Privacy Commissioner of Ontario, Ontario
Jumaat N, Ahmad B, Dutsenwai HS (2018) Land cover change mapping using high resolution satellites and unmanned aerial vehicle. In: IOP conference series: earth and environmental science
Wackwitz K, Boedecker H (2015) Safety risk assessment for UAV operation. In: Drone industry insights, safe airspace integration project, part one, Hamburg
Finn RL, Wright D, Friedewald M (2013) Seven types of privacy. In: European data protection: coming of age. Springer, New York
Ramon Soria P, Bevec R, Arrue B, Ude A, Ollero A (2016) Extracting objects for aerial manipulation on UAVs using low cost stereo sensors. Sensors 16(5):700
Clarke R (2014) The regulation of civilian drones’ impacts on behavioural privacy. Comput Law Sec Rev 30(3):286–305
Shepard DP, Bhatti JA, Humphreys TE, Fansler AA (2012) Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. Proc ION GNSS Meet 3:3591–3605
Yanmaz E, Kuschnig R, Quaritsch M, Bettstetter C, Rinner B (2011) On path planning strategies for networked unmanned aerial vehicles. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 212–216
Hernandez LH, Tsourdos A, Shin HS, Waldock A (2014) Multi-objective UAV routing. In: IEEE international conference on unmanned aircraft systems (ICUAS), pp 534–542
Vattapparamban E, Guvenc I, Yurekli AI, Akkaya K, Uluagac S (2016) Drones for smart cities: issues in cybersecurity, privacy, and public safety. In: IEEE international wireless communications and mobile computing conference (IWCMC), pp 216–221
Carr EB (2014) Unmanned aerial vehicles: examining the safety, security, privacy and regulatory issues of integration into us airspace. Natl Centre Policy Anal 23:2014
Lin X, Wiren R, Euler S, Sadam A, Maattanen HL, Muruganathan SD, Gao S, Wang YPE, Kauppi J, Zou Z (2018) Mobile networks connected drones: field trials, simulations, and design insights. arXiv Preprint arXiv:1801.10508
Abdallah A, Ali MZ, Misic J, Misi VB (2019) Efficient security scheme for disaster surveillance UAV communication networks. Information 10(2):43
Kim SJ, Lim GJ, Cho J (2018) Drone flight scheduling under uncertainty on battery duration and air temperature. Comput Ind Eng 117:291–302
Tseng CM, Chau CK, Elbassioni K, Khonji M (2017) Autonomous recharging and flight mission planning for battery-operated autonomous drones. arXiv preprint arXiv:1703.10049
Basan E, Basan A, Nekrasov A, Fidge C, Sushkin N, Peskova O (2022) GPS-spoofing attack detection technology for UAVs based on Kullback-Leibler divergence. Drones 6:8. https://doi.org/10.3390/drones6010008
Khan SZ, Mohsin M, Iqbal W (2021) On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions. PeerJComput Sci 7:e507. https://doi.org/10.7717/peerj-cs.507
Chan K, Nirmal U, Cheaw W (2018) Progress on drone technology and their applications: a comprehensive review. In: AIP conference proceedings, 2030. AIP Publishing, College Park, p 020308
Liu Z, Li Z, Liu B, Fu X, Raptis I, Ren K (2015) Rise of mini-drones: applications and issues. In: Proceedings of the 2015 workshop on privacy-aware mobile computing. ACM, New York, pp 7–12
Altawy R, Youssef AM (2017) Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans Cyber Phys Syst 1(2):7
He D, Chan S, Guizani M (2017) Drone-assisted public safety networks: the security aspect. IEEE Commun Mag 55(8):218–223
Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y, Sztipanovits J (2013) Taxonomy for description of cross-domain attacks on CPS. In: Proceedings of the 2nd ACM international conference on high confidence networked systems. ACM, New York, pp 135–142
Guvenc I, Ozdemir O, Yapici Y, Mehrpouyan H, Matolak D (2017) Detection, localization, and tracking of unauthorized UAS and jammers. In: Proceedings of the 2017 IEEE/AIAA 36th digital avionics systems conference (DASC), IEEE, pp 1–10
Sturdivant RL, Chong EK (2017) Systems engineering baseline concept of a multispectral drone detection solution for airports. IEEE Access 5:7123–7138
Shi X, Yang C, Xie W, Liang C, Shi Z, Chen J (2018) Anti-drone system with multiple surveillance technologies: architecture, implementation, and challenges. IEEE Commun Mag 56(4):68–74
Nassi B, Shabtai A, Masuoka R, Elovici T (2019) Sok-security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps. arXiv Preprint arXiv:1903.05155
Atherton KD (2016) The FAA says there will be 7 million drones flying over America by 2020. Popular Sci
Vattapparamban E, Guvenc I, Yurekli AI, Akkaya K, Uluagac S (2016) Drones for smart cities: issues in cybersecurity, privacy, and public safety. In: Wireless communications and mobile computing conference (IWCMC), 2016 international, IEEE, pp 216–221
Dalamagkidis K, Valavanis KP, Piegl LA (2012) Aviation history and unmanned flight. on integrating unmanned aircraft systems into the national airspace system. Springer, New York, pp 11–42
Juul M (2015) Civil drones in the European Union, Eur. Parliament. Res. Serv. (ed.). Eur. Union
Stopforth R (2017) Drone licenses-necessities and requirements. II. Ponte 73(1):149–156
Campos VS (2018) European union policies and civil drones. Ethics and civil drones. Springer, Cham, pp 35–41
Miah A (2020) Regulating drones. In: Drones: the brilliant, the bad and the beautiful. Emerald Publishing Limited, Bingley
Wright S (2020) Ethical and safety implications of the growing use of civilian drone. UK Parliament Website (Sci. Technol. Committee)
Lowbridge C (2015) Are drones dangerous or harmless fun? BBC News, London. https://www.bbc.com/news/uk-england-34269585. Accessed 07 Sept 2018
Cress JJ, Sloan JL, Hutt ME (2011) Implementation of unmanned aircraft systems by the US geological survey. Geocarto Int 26(2):133–140
Lipsitch M, Swerdlow DL, Finelli L (2020) Defining the epidemiology of covid-19—studies needed. N Engl J Med 382(13):1194–1196
Jiang F, Deng L, Zhang L, Cai Y, Cheung CW, Xia Z (2020) Review of the clinical characteristics of coronavirus disease 2019 (covid-19). J Gen Intern Med 35:1–5
Majeed R, Abdullah NA, Ashraf I, Zikria YB, Mushtaq MF, Umer M (2020) An intelligent, secure, and smart home automation system. Sci Program 57:1–14
Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. arXiv preprintarXiv:1602.03602
Rudinskas D, Goraj Z, Stankunas J (2009) Security analysis of UAV radio communication system. Aviation 13(4):116–121
Kerns AJ, Shepard DP, Bhatti JA, Humphreys TE (2014) Unmanned aircraft capture and control via GPS spoofing. J Field Rob 31(4):617–636
Seo SH, Lee BH, Im SH, Jee GI (2015) Effect of spoofing on unmanned aerial vehicle using counterfeited GPS signal. J Posit Navig Timing 4(2):57–65
Shafique A, Mehmood A, Elhadef M (2021) Survey of security protocols and vulnerabilities in unmanned aerial vehicles. IEEE Access 9:46927–46948. https://doi.org/10.1109/ACCESS.2021.3066778
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Srirangam, D.P., Hemalatha, K., Vajravelu, A., Ashok Kumar, N. (2023). Safety and Security Issues in Employing Drones. In: Jahankhani, H., El Hajjar, A. (eds) Wireless Networks . Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-33631-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-33631-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33630-0
Online ISBN: 978-3-031-33631-7
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)