Cybersecurity Threats to Networked Unmanned Systems: A Desk Study of Vulnerabilities and Countermeasures

Sakthivel Velusamy, Hemawathi Somasundaram

Abstract


The increasing connectivity and autonomy of unmanned systems create expanding attack surfaces for cyber threats that can compromise mission success, endanger human safety, and enable adversarial exploitation of critical capabilities. This comprehensive desk study systematically examines cybersecurity vulnerabilities in networked unmanned systems and analyzes countermeasures spanning prevention, detection, and recovery. We categorize cyber threats by attack vector: communication link exploitation including jamming, spoofing, and man-in-the-middle attacks; sensor spoofing through GPS falsification or adversarial perturbations to camera inputs; software vulnerabilities enabling unauthorized access; supply chain compromises introducing malicious components; and insider threats from malicious personnel. Attack objectives are analyzed spanning denial of service, hijacking for unauthorized control, data exfiltration, and physical damage through malicious commands. Particular emphasis is placed on attacks exploiting autonomy features including adversarial machine learning crafting inputs causing misclassification, poisoning attacks corrupting training data, and logic exploitation inducing unsafe behaviors. Vulnerabilities specific to multi-vehicle systems are examined including consensus protocol attacks, Sybil attacks with fake identities, and Byzantine attacks with compromised agents. Countermeasures are comprehensively reviewed organized by defense layer: physical layer security including spread spectrum communications and quantum key distribution; network layer protections including authentication protocols and intrusion detection; application layer defenses including secure coding and runtime monitoring; and architecture approaches including defense-in-depth and least privilege access. Cryptographic approaches are analyzed balancing security with computational constraints. Anomaly detection techniques are examined including statistical methods, specification-based approaches, and machine learning classifiers. Resilient control architectures maintaining safe operation despite attacks are discussed including attack-resilient state estimation and secure control protocols. The study critically assesses unique challenges including resource constraints, real-time requirements, and physical accessibility. Case studies from documented incidents are synthesized including GPS spoofing and ransomware attacks.

Keywords


cybersecurity, unmanned systems, vulnerability analysis, threat mitigation.

References


Choudhary, Gaurav, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, and Jin-Hee Cho. “Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey”. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), 560–65, 2018. https://doi.org/10.1109/IWCMC.2018.8450305.

Condomines, Jean-Philippe, Ruohao Zhang, and Nicolas Larrieu. “Network Intrusion Detection System for UAV Ad-Hoc Communication: From Methodology Design to Real Test Validation”. Ad Hoc Networks 90 (2019): 101759. https://doi.org/10.1016/j.adhoc.2018.09.004.

Dey, Vishal, Vikramkumar Pudi, Anupam Chattopadhyay, and Yuval Elovici. “Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study”. In 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), 398–403, 2018. https://doi.org/10.1109/VLSID.2018.97.

Fotohi, Reza, Eslam Nazemi, and Fereidoon Shams Aliee. “An Agent-Based Self-Protective Method to Secure Communication between UAVs in Unmanned Aerial Vehicle Networks”. Vehicular Communications 26 (2020): 100267. https://doi.org/10.1016/j.vehcom.2020.100267.

Kong, Peng-Yong. “A Survey of Cyberattack Countermeasures for Unmanned Aerial Vehicles”. IEEE Access 9 (2021): 148244–63. https://doi.org/10.1109/ACCESS.2021.3124996.

Krishna, C. G. Leela, and Robin R. Murphy. “A Review on Cybersecurity Vulnerabilities for Unmanned Aerial Vehicles”. In 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR), 194–99, 2017. https://doi.org/10.1109/SSRR.2017.8088163.

Ly, Bora, and Romny Ly. “Cybersecurity in Unmanned Aerial Vehicles (UAVs)”. Journal of Cyber Security Technology 5, no. 2 (3 April 2021): 120–37. https://doi.org/10.1080/23742917.2020.1846307.

Pyzynski, Mariusz, and Tomasz Balcerzak. “Cybersecurity of the Unmanned Aircraft System (UAS)”. Journal of Intelligent & Robotic Systems 102, no. 2 (17 May 2021): 35. https://doi.org/10.1007/s10846-021-01399-x.

Riahi Manesh, Mohsen, and Naima Kaabouch. “Cyber-Attacks on Unmanned Aerial System Networks: Detection, Countermeasure, and Future Research Directions”. Computers & Security 85 (2019): 386–401. https://doi.org/10.1016/j.cose.2019.05.003.

Sorbelli, Francesco Betti, Mauro Conti, Cristina M. Pinotti, and Giulio Rigoni. “UAVs Path Deviation Attacks: Survey and Research Challenges”. In 2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops), 1–6, 2020. https://doi.org/10.1109/SECONWorkshops50264.2020.9149780.


Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.