Cargando…
Security analysis of drones systems: Attacks, limitations, and recommendations
Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier B.V.
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7206421/ http://dx.doi.org/10.1016/j.iot.2020.100218 |
_version_ | 1783530413382172672 |
---|---|
author | Yaacoub, Jean-Paul Noura, Hassan Salman, Ola Chehab, Ali |
author_facet | Yaacoub, Jean-Paul Noura, Hassan Salman, Ola Chehab, Ali |
author_sort | Yaacoub, Jean-Paul |
collection | PubMed |
description | Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere and at any time. However, recently, the malicious use of drones began to emerge among criminals and cyber-criminals alike. The probability and frequency of these attacks are both high and their impact can be very dangerous with devastating effects. Therefore, the need for detective, protective and preventive counter-measures is highly required. The aim of this survey is to investigate the emerging threats of using drones in cyber-attacks, along the countermeasures to thwart these attacks. The different uses of drones for malicious purposes are also reviewed, along the possible detection methods. As such, this paper analyzes the exploitation of drones vulnerabilities within communication links, as well as smart devices and hardware, including smart-phones and tablets. Moreover, this paper presents a detailed review on the drone/Unmanned Aerial Vehicle (UAV) usage in multiple domains (i.e civilian, military, terrorism, etc.) and for different purposes. A realistic attack scenario is also presented, which details how the authors performed a simulated attack on a given drone following the hacking cycle. This review would greatly help ethical hackers to understand the existing vulnerabilities of UAVs in both military and civilian domains. Moreover, it allows them to adopt and come up with new techniques and technologies for enhanced UAV attack detection and protection. As a result, various civilian and military anti-drones/UAVs (detective and preventive) countermeasures will be reviewed. |
format | Online Article Text |
id | pubmed-7206421 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Elsevier B.V. |
record_format | MEDLINE/PubMed |
spelling | pubmed-72064212020-05-08 Security analysis of drones systems: Attacks, limitations, and recommendations Yaacoub, Jean-Paul Noura, Hassan Salman, Ola Chehab, Ali Internet of Things Article Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere and at any time. However, recently, the malicious use of drones began to emerge among criminals and cyber-criminals alike. The probability and frequency of these attacks are both high and their impact can be very dangerous with devastating effects. Therefore, the need for detective, protective and preventive counter-measures is highly required. The aim of this survey is to investigate the emerging threats of using drones in cyber-attacks, along the countermeasures to thwart these attacks. The different uses of drones for malicious purposes are also reviewed, along the possible detection methods. As such, this paper analyzes the exploitation of drones vulnerabilities within communication links, as well as smart devices and hardware, including smart-phones and tablets. Moreover, this paper presents a detailed review on the drone/Unmanned Aerial Vehicle (UAV) usage in multiple domains (i.e civilian, military, terrorism, etc.) and for different purposes. A realistic attack scenario is also presented, which details how the authors performed a simulated attack on a given drone following the hacking cycle. This review would greatly help ethical hackers to understand the existing vulnerabilities of UAVs in both military and civilian domains. Moreover, it allows them to adopt and come up with new techniques and technologies for enhanced UAV attack detection and protection. As a result, various civilian and military anti-drones/UAVs (detective and preventive) countermeasures will be reviewed. Elsevier B.V. 2020-09 2020-05-08 /pmc/articles/PMC7206421/ http://dx.doi.org/10.1016/j.iot.2020.100218 Text en © 2020 Elsevier B.V. All rights reserved. Since January 2020 Elsevier has created a COVID-19 resource centre with free information in English and Mandarin on the novel coronavirus COVID-19. The COVID-19 resource centre is hosted on Elsevier Connect, the company's public news and information website. Elsevier hereby grants permission to make all its COVID-19-related research that is available on the COVID-19 resource centre - including this research content - immediately available in PubMed Central and other publicly funded repositories, such as the WHO COVID database with rights for unrestricted research re-use and analyses in any form or by any means with acknowledgement of the original source. These permissions are granted for free by Elsevier for as long as the COVID-19 resource centre remains active. |
spellingShingle | Article Yaacoub, Jean-Paul Noura, Hassan Salman, Ola Chehab, Ali Security analysis of drones systems: Attacks, limitations, and recommendations |
title | Security analysis of drones systems: Attacks, limitations, and recommendations |
title_full | Security analysis of drones systems: Attacks, limitations, and recommendations |
title_fullStr | Security analysis of drones systems: Attacks, limitations, and recommendations |
title_full_unstemmed | Security analysis of drones systems: Attacks, limitations, and recommendations |
title_short | Security analysis of drones systems: Attacks, limitations, and recommendations |
title_sort | security analysis of drones systems: attacks, limitations, and recommendations |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7206421/ http://dx.doi.org/10.1016/j.iot.2020.100218 |
work_keys_str_mv | AT yaacoubjeanpaul securityanalysisofdronessystemsattackslimitationsandrecommendations AT nourahassan securityanalysisofdronessystemsattackslimitationsandrecommendations AT salmanola securityanalysisofdronessystemsattackslimitationsandrecommendations AT chehabali securityanalysisofdronessystemsattackslimitationsandrecommendations |