Skip to main content

Safety and Security Issues in Employing Drones

  • Chapter
  • First Online:
Wireless Networks

Abstract

The use of drones has been steadily growing over the past few years, not only in a variety of businesses and governmental organizations but also among private individuals. This is due to the rapid deployment of drones for a variety of applications, which can be accomplished by merely attaching the application-specific devices to drones, which are typically controlled by a remote or a smartphone. However, the breakthroughs that have been made in the use of drones have also opened up security challenges. In many applications, the orders that are sent to the drones and the data that is transmitted from the drones are not encrypted. As a result of the fact that drones are also used for illegal and criminal activities by bad actors, it is necessary to add technology for attack detection, protection, and preventive countermeasures in drones, in addition to regulation on the usage of drones through law enforcement by the government agencies. In this chapter, we will analyze the exploiting of drone vulnerabilities such as GPS spoofing, Downlink intercept, and Data exploitation. Additionally, we will examine how to neutralize threats and countermeasures that should be addressed for the safety of the drones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yaacoub JPA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2019) Securing internet of medical things systems: limitations, issues and recommendations. Fut Gener Comput Syst 105:581–606

    Article  Google Scholar 

  2. Park J, Kim S, Suh K (2018) A comparative analysis of the environmental benefits of drone-based delivery services in urban and rural areas. Sustainability 10(3):888

    Article  Google Scholar 

  3. Humphreys T (2012) Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing. University Texas Austin, Austin

    Google Scholar 

  4. Canis B (2015) Unmanned aircraft systems (UAS): commercial outlook for a new industry

    Google Scholar 

  5. Stocker C, Bennett R, Nex F, Gerke M, Zevenbergen J (2017) Review of the current state of UAV regulations. Remote Sens 9(5):459

    Article  Google Scholar 

  6. Barfield F (2002) Autonomous collision avoidance: the technical requirements. In: Proceedings of the IEEE national aerospace and electronics conference, pp 808–813

    Google Scholar 

  7. Sharma R, Ghose D (2009) Collision avoidance between UAV clusters using swarm intelligence techniques. Int J Syst Sci 40(5):521–538

    Article  MathSciNet  MATH  Google Scholar 

  8. Johnson LK, Dorn AW, Webb S, Kreps S, Krieger W, Schwarz E, Shpiro S, Walsh PF, Wirtz JJ (2017) An INS special forum: intelligence and drones/eyes in the sky for peacekeeping: the emergence of UAVs in UN operations/the democratic deficit on drones/the German approach to drone warfare/pursuing peace: the strategic limits of drone warfare/seeing but unseen: intelligence drones in Israel/drone paramilitary operations against suspected global terrorists: us and Australian perspectives/the ‘terminator conundrum’ and the future of drone warfare. Int Natl Sec 32(4):411–440

    Google Scholar 

  9. Thiels CA, Aho JM, Zietlow SP, Jenkins DH (2015) Use of unmanned aerial vehicles for medical product transport. Air Med J 34(2):104–108

    Article  Google Scholar 

  10. Rango A, Laliberte A, Steele C, Herrick JE, Bestelmeyer B, Schmugge T, Roanhorse A, Jenkins V (2006) Using unmanned aerial vehicles for rangelands: current applications and future potentials. Environ Pract 8(3):159–168

    Article  Google Scholar 

  11. Sedjelmaci H, Senouci SM (2018) Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. J Supercomput 57:1–17

    Google Scholar 

  12. Mushtaq MF, Jamel S, Mohamad KM, Khalid SKA, Deris MM (2017) Key generation technique based on triangular coordinate extraction for hybrid cubes. J Telecommun Electron Comput Eng 9(3–4):195–200

    Google Scholar 

  13. Du H, Heldeweg MA (2017) Responsible design of drones and drone services: legal perspective synthetic report

    Google Scholar 

  14. Ueno S, Higuchi T (2011) Collision avoidance law using information amount. In: Numerical analysis-theory and application. InTech, Allithurai

    Google Scholar 

  15. Hamza A, Akram U, Samad A, Khosa SN, Fatima R, Mushtaq MF (2020) Unmaned aerial vehicles threats and defence solutions. In: IEEE 23rd international multi-topic conference (INMIC)

    Google Scholar 

  16. Israelsen J, Beall M, Bareiss D, Stuart D, Keeney E, Berg J (2014) Automatic collision avoidance for manually tele-operated unmanned aerial vehicles. In: IEEE international conference on robotics and automation (ICRA), pp 6638–6643

    Google Scholar 

  17. Boulos MNK, Geraghty EM (2020) Geographical tracking and mapping of coronavirus disease covid-19/severe acute respiratory syndrome coronavirus 2 (sars-cov-2) epidemic and associated events around the world: how 21st century GIS technologies are supporting the global fight against outbreaks and epidemics. Int J Health Geogr 19:1–12

    Google Scholar 

  18. Finn RL, Wright D (2012) Unmanned aircraft systems: surveillance, ethics and privacy in civil applications. Comput Law Sec 28(2):184–194

    Article  Google Scholar 

  19. Cavoukian A (2012) Privacy and drones: unmanned aerial vehicles. Information and Privacy Commissioner of Ontario, Ontario

    Google Scholar 

  20. Jumaat N, Ahmad B, Dutsenwai HS (2018) Land cover change mapping using high resolution satellites and unmanned aerial vehicle. In: IOP conference series: earth and environmental science

    Google Scholar 

  21. Wackwitz K, Boedecker H (2015) Safety risk assessment for UAV operation. In: Drone industry insights, safe airspace integration project, part one, Hamburg

    Google Scholar 

  22. Finn RL, Wright D, Friedewald M (2013) Seven types of privacy. In: European data protection: coming of age. Springer, New York

    Google Scholar 

  23. Ramon Soria P, Bevec R, Arrue B, Ude A, Ollero A (2016) Extracting objects for aerial manipulation on UAVs using low cost stereo sensors. Sensors 16(5):700

    Article  Google Scholar 

  24. Clarke R (2014) The regulation of civilian drones’ impacts on behavioural privacy. Comput Law Sec Rev 30(3):286–305

    Article  Google Scholar 

  25. Shepard DP, Bhatti JA, Humphreys TE, Fansler AA (2012) Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. Proc ION GNSS Meet 3:3591–3605

    Google Scholar 

  26. Yanmaz E, Kuschnig R, Quaritsch M, Bettstetter C, Rinner B (2011) On path planning strategies for networked unmanned aerial vehicles. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 212–216

    Google Scholar 

  27. Hernandez LH, Tsourdos A, Shin HS, Waldock A (2014) Multi-objective UAV routing. In: IEEE international conference on unmanned aircraft systems (ICUAS), pp 534–542

    Google Scholar 

  28. Vattapparamban E, Guvenc I, Yurekli AI, Akkaya K, Uluagac S (2016) Drones for smart cities: issues in cybersecurity, privacy, and public safety. In: IEEE international wireless communications and mobile computing conference (IWCMC), pp 216–221

    Google Scholar 

  29. Carr EB (2014) Unmanned aerial vehicles: examining the safety, security, privacy and regulatory issues of integration into us airspace. Natl Centre Policy Anal 23:2014

    Google Scholar 

  30. Lin X, Wiren R, Euler S, Sadam A, Maattanen HL, Muruganathan SD, Gao S, Wang YPE, Kauppi J, Zou Z (2018) Mobile networks connected drones: field trials, simulations, and design insights. arXiv Preprint arXiv:1801.10508

  31. Abdallah A, Ali MZ, Misic J, Misi VB (2019) Efficient security scheme for disaster surveillance UAV communication networks. Information 10(2):43

    Article  Google Scholar 

  32. Kim SJ, Lim GJ, Cho J (2018) Drone flight scheduling under uncertainty on battery duration and air temperature. Comput Ind Eng 117:291–302

    Article  Google Scholar 

  33. Tseng CM, Chau CK, Elbassioni K, Khonji M (2017) Autonomous recharging and flight mission planning for battery-operated autonomous drones. arXiv preprint arXiv:1703.10049

  34. Basan E, Basan A, Nekrasov A, Fidge C, Sushkin N, Peskova O (2022) GPS-spoofing attack detection technology for UAVs based on Kullback-Leibler divergence. Drones 6:8. https://doi.org/10.3390/drones6010008

    Article  Google Scholar 

  35. Khan SZ, Mohsin M, Iqbal W (2021) On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions. PeerJComput Sci 7:e507. https://doi.org/10.7717/peerj-cs.507

    Article  Google Scholar 

  36. Chan K, Nirmal U, Cheaw W (2018) Progress on drone technology and their applications: a comprehensive review. In: AIP conference proceedings, 2030. AIP Publishing, College Park, p 020308

    Google Scholar 

  37. Liu Z, Li Z, Liu B, Fu X, Raptis I, Ren K (2015) Rise of mini-drones: applications and issues. In: Proceedings of the 2015 workshop on privacy-aware mobile computing. ACM, New York, pp 7–12

    Google Scholar 

  38. Altawy R, Youssef AM (2017) Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans Cyber Phys Syst 1(2):7

    Article  Google Scholar 

  39. He D, Chan S, Guizani M (2017) Drone-assisted public safety networks: the security aspect. IEEE Commun Mag 55(8):218–223

    Article  Google Scholar 

  40. Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y, Sztipanovits J (2013) Taxonomy for description of cross-domain attacks on CPS. In: Proceedings of the 2nd ACM international conference on high confidence networked systems. ACM, New York, pp 135–142

    Google Scholar 

  41. Guvenc I, Ozdemir O, Yapici Y, Mehrpouyan H, Matolak D (2017) Detection, localization, and tracking of unauthorized UAS and jammers. In: Proceedings of the 2017 IEEE/AIAA 36th digital avionics systems conference (DASC), IEEE, pp 1–10

    Google Scholar 

  42. Sturdivant RL, Chong EK (2017) Systems engineering baseline concept of a multispectral drone detection solution for airports. IEEE Access 5:7123–7138

    Article  Google Scholar 

  43. Shi X, Yang C, Xie W, Liang C, Shi Z, Chen J (2018) Anti-drone system with multiple surveillance technologies: architecture, implementation, and challenges. IEEE Commun Mag 56(4):68–74

    Article  Google Scholar 

  44. Nassi B, Shabtai A, Masuoka R, Elovici T (2019) Sok-security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps. arXiv Preprint arXiv:1903.05155

  45. Atherton KD (2016) The FAA says there will be 7 million drones flying over America by 2020. Popular Sci

    Google Scholar 

  46. Vattapparamban E, Guvenc I, Yurekli AI, Akkaya K, Uluagac S (2016) Drones for smart cities: issues in cybersecurity, privacy, and public safety. In: Wireless communications and mobile computing conference (IWCMC), 2016 international, IEEE, pp 216–221

    Google Scholar 

  47. Dalamagkidis K, Valavanis KP, Piegl LA (2012) Aviation history and unmanned flight. on integrating unmanned aircraft systems into the national airspace system. Springer, New York, pp 11–42

    Chapter  Google Scholar 

  48. Juul M (2015) Civil drones in the European Union, Eur. Parliament. Res. Serv. (ed.). Eur. Union

    Google Scholar 

  49. Stopforth R (2017) Drone licenses-necessities and requirements. II. Ponte 73(1):149–156

    Article  Google Scholar 

  50. Campos VS (2018) European union policies and civil drones. Ethics and civil drones. Springer, Cham, pp 35–41

    Chapter  Google Scholar 

  51. Miah A (2020) Regulating drones. In: Drones: the brilliant, the bad and the beautiful. Emerald Publishing Limited, Bingley

    Google Scholar 

  52. Wright S (2020) Ethical and safety implications of the growing use of civilian drone. UK Parliament Website (Sci. Technol. Committee)

    Google Scholar 

  53. Lowbridge C (2015) Are drones dangerous or harmless fun? BBC News, London. https://www.bbc.com/news/uk-england-34269585. Accessed 07 Sept 2018

  54. Cress JJ, Sloan JL, Hutt ME (2011) Implementation of unmanned aircraft systems by the US geological survey. Geocarto Int 26(2):133–140

    Article  Google Scholar 

  55. Lipsitch M, Swerdlow DL, Finelli L (2020) Defining the epidemiology of covid-19—studies needed. N Engl J Med 382(13):1194–1196

    Article  Google Scholar 

  56. Jiang F, Deng L, Zhang L, Cai Y, Cheung CW, Xia Z (2020) Review of the clinical characteristics of coronavirus disease 2019 (covid-19). J Gen Intern Med 35:1–5

    Article  Google Scholar 

  57. Majeed R, Abdullah NA, Ashraf I, Zikria YB, Mushtaq MF, Umer M (2020) An intelligent, secure, and smart home automation system. Sci Program 57:1–14

    Google Scholar 

  58. Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. arXiv preprintarXiv:1602.03602

  59. Rudinskas D, Goraj Z, Stankunas J (2009) Security analysis of UAV radio communication system. Aviation 13(4):116–121

    Article  Google Scholar 

  60. Kerns AJ, Shepard DP, Bhatti JA, Humphreys TE (2014) Unmanned aircraft capture and control via GPS spoofing. J Field Rob 31(4):617–636

    Article  Google Scholar 

  61. Seo SH, Lee BH, Im SH, Jee GI (2015) Effect of spoofing on unmanned aerial vehicle using counterfeited GPS signal. J Posit Navig Timing 4(2):57–65

    Article  Google Scholar 

  62. Shafique A, Mehmood A, Elhadef M (2021) Survey of security protocols and vulnerabilities in unmanned aerial vehicles. IEEE Access 9:46927–46948. https://doi.org/10.1109/ACCESS.2021.3066778

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashok Vajravelu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Srirangam, D.P., Hemalatha, K., Vajravelu, A., Ashok Kumar, N. (2023). Safety and Security Issues in Employing Drones. In: Jahankhani, H., El Hajjar, A. (eds) Wireless Networks . Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-33631-7_4

Download citation

Publish with us

Policies and ethics