Cyber Attacks on Unmanned Aerial Vehicles and Cyber Security Measures

Authors

  • Mustafa Cosar Author

DOI:

https://doi.org/10.55549/epstem.1226251

Keywords:

Cyber threat and attack, Risk analysis, Cyber security

Abstract

Unmanned Aerial Vehicles (UAVs) are air vehicles that can be controlled by themselves or via aground station, can operate with mission-route definition, and can stay in the air in a limited range and time.Today, UAVs are used for various missions in line with military and civilian purposes such as reconnaissance,observation, research, search, control and transportation. In the models used for military purposes, the gun canbe mounted and turned into an armed UAV. Attacks on hardware and software systems of UAVs, which areincreasingly used in line with developing life conditions and technologies, are also increasing. Especially attackson communication systems and coordinate information come to the fore. Cyber attacks on UAV systems ingeneral include Data transmission link attacks, GPS (Global Positioning System) Scam attack, authenticationattacks such as Brute Force, attacks against source code vulnerabilities, and hardware port and protocol attacks.It is known that attacks on UAV systems cause loss of life and property. It also results in other damages such astask delay, data breach, task failure, and loss of prestige. In this study, after the components, features andintroduction of UAV systems, security threats to UAV systems and cyber attacks are defined. Then, theprecautions to be taken against threats and attacks are listed. Some of these, importance are subjecting UAVsoftware, hardware and transmission systems to vulnerability and risk scanning, ensuring the security oftransmission with data encryption methods, controlling data traffic with a firewall application and makingaccess control secure.

Downloads

Published

2022-12-31

Issue

Section

Articles

How to Cite

Cyber Attacks on Unmanned Aerial Vehicles and Cyber Security Measures. (2022). The Eurasia Proceedings of Science, Technology, Engineering and Mathematics, 21, 258-265. https://doi.org/10.55549/epstem.1226251