Understanding and Securing the Risks of Uncrewed Aerial Vehicle Services

Uncrewed Aerial Vehicles (UAV), are rapidly advancing across various sectors. However, this growth is accompanied by escalating security risks, as UAV become prime targets for sophisticated cyber and physical attacks. Although several surveys on UAV security exist in the literature, there is a lack...

Full description

Saved in:
Bibliographic Details
Main Authors: Ioannis Anagnostis, Panayiotis Kotzanikolaou, Christos Douligeris
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10918966/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Uncrewed Aerial Vehicles (UAV), are rapidly advancing across various sectors. However, this growth is accompanied by escalating security risks, as UAV become prime targets for sophisticated cyber and physical attacks. Although several surveys on UAV security exist in the literature, there is a lack of a practical guide to assist stakeholders in assessing and mitigating security risks in diverse UAV application sectors. Motivated by this gap, the main contribution of this tutorial is to describe a hands-on security assessment methodology for UAV services, by integrating fundamental background knowledge of UAV technology with actionable security strategies. The methodology is based on established standards, combining risk assessment with penetration testing. The goal is to assist practitioners and stakeholders of UAV services in understanding threat modeling, vulnerability analysis, and targeted risk mitigation. Initially, the underlying UAV technologies, architectures, and applications are presented. Then, a taxonomy of security attacks and countermeasures for UAV is provided. Based on the presented UAV characteristics and security needs, a practical step-by-step security assessment methodology for UAV services is presented. To demonstrate the practicality of the presented methodology, it is applied to a real-world-inspired scenario, showcasing its effectiveness in identifying attack vectors, assessing risks, and deploying countermeasures.
ISSN:2169-3536