Warning: file_get_contents(https://eutils.ncbi.nlm.nih.gov/entrez/eutils/elink.fcgi?dbfrom=pubmed&id=38620271
&cmd=llinks): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
in C:\Inetpub\vhosts\kidney.de\httpdocs\pget.php on line 215
Security analysis of drones systems: Attacks, limitations, and recommendations
#MMPMID38620271
Yaacoub JP
; Noura H
; Salman O
; Chehab A
Internet Things (Amst)
2020[Sep]; 11
(?): 100218
PMID38620271
show ga
Recently, the world witnessed a significant increase in the number of used
drones, with a global and continuous rise in the demand for their multi-purpose
applications. The pervasive aspect of these drones is due to their ability to
answer people's needs. Drones are providing users with a bird's eye that can be
activated and used almost anywhere and at any time. However, recently, the
malicious use of drones began to emerge among criminals and cyber-criminals
alike. The probability and frequency of these attacks are both high and their
impact can be very dangerous with devastating effects. Therefore, the need for
detective, protective and preventive counter-measures is highly required. The aim
of this survey is to investigate the emerging threats of using drones in
cyber-attacks, along the countermeasures to thwart these attacks. The different
uses of drones for malicious purposes are also reviewed, along the possible
detection methods. As such, this paper analyzes the exploitation of drones
vulnerabilities within communication links, as well as smart devices and
hardware, including smart-phones and tablets. Moreover, this paper presents a
detailed review on the drone/Unmanned Aerial Vehicle (UAV) usage in multiple
domains (i.e civilian, military, terrorism, etc.) and for different purposes. A
realistic attack scenario is also presented, which details how the authors
performed a simulated attack on a given drone following the hacking cycle. This
review would greatly help ethical hackers to understand the existing
vulnerabilities of UAVs in both military and civilian domains. Moreover, it
allows them to adopt and come up with new techniques and technologies for
enhanced UAV attack detection and protection. As a result, various civilian and
military anti-drones/UAVs (detective and preventive) countermeasures will be
reviewed.