IEEE Access (Jan 2024)
Who is Watching Whom? Military and Civilian Drone: Vision Intelligence Investigation and Recommendations
Abstract
In recent years, there has been a marked increase in the use of drones, with a global surge in the demand for diverse applications. This widespread adoption is largely due to drones’ ability to meet various user needs, offering an aerial perspective that can be utilized almost anywhere and at any time. However, the rise in drone usage has also resulted in an increase in malicious use by criminals and cybercriminals. These malicious activities are not only frequent but also potentially harmful, necessitating effective measures for detection, protection, and prevention. This survey aimed to explore the emerging threats posed by drones in cyber-attacks and countermeasures designed to thwart these attacks. It reviews various malicious uses of drones and the possible methods for their detection. Specifically, this study examines vulnerabilities in drone communication links and smart devices, including smartphones and tablets. In addition, it provides a comprehensive review of drone/UAV usage across multiple domains, such as civilian and military activities, highlighting their purposes. A realistic attack scenario is presented, detailing a simulated attack on a drone following a hacking cycle. This review is intended to assist security professionals in understanding the existing vulnerabilities of UAVs in both military and civilian contexts. Furthermore, it aims to inspire the development of new techniques and technologies for enhanced UAV attack detection and protection. As a result, the paper also reviews various civilian and military countermeasures for detecting and preventing drone/UAV threats. This survey differentiates itself by offering a holistic view of drone security, mapping each type of attack onto the corresponding defense mechanisms. It provides a comprehensive review that can serve as a valuable resource for future drone engineers and researchers, helping them to understand the landscape of drone security and develop more effective countermeasures.
Keywords