Drones in cyber security environment
dc.contributor.author | Lehto, Martti | |
dc.date.accessioned | 2021-03-03T12:20:16Z | |
dc.date.available | 2021-03-03T12:20:16Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Lehto, M. (2019). Drones in cyber security environment. <i>Cyberwatch Magazine</i>, <i>2019</i>(4), 8-17. <a href="https://issuu.com/cyberwatchfinland.fi/docs/cyberwatch_2019-4_eng" target="_blank">https://issuu.com/cyberwatchfinland.fi/docs/cyberwatch_2019-4_eng</a> | |
dc.identifier.other | CONVID_51745791 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/74487 | |
dc.description.abstract | Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely focused on exploitable vulnerabilities in either the communication channels or the hardware/software stack on the vehicle. Such ttacs have focused on exploiting unencrypted communication over wireless media to implement eaves-dropping, cross-layer attacks, signal jamming, denial of service, and dropping Wi-Fi communication with ground control. Other attacks on drones involve GPS (Global Positioning System) spoofing attacks to fool the drone into moving to a different destination (possibly with the intention of hijacking the drone). In the same time UAV or drone can be a cyber attack platform. Specially equipped drone can track signals based on Wi-Fi, radio frequency identification (RFID) and the Bluetooth and 802.15 specifications (PAN/WPAN communication). Combined with a GPS capability drone correlates signals to the location where they're detected. So, the drone spy not only on phones, tablets, and computers, but also, potentially, on pacemakers, fitness bracelets, smart cards, and other electronics. Additionally, drone can function as visual tracking platforms even without the use of beacons or GPS. Swarms of small drones could soon become an important part of the modern military arsenal. The swarm idea inherently drives drones towards autonomy which allows many different kinetic and non-kinetic operations. | en |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | Cyberwatch Finland Oy | |
dc.relation.ispartofseries | Cyberwatch Magazine | |
dc.relation.uri | https://issuu.com/cyberwatchfinland.fi/docs/cyberwatch_2019-4_eng | |
dc.rights | In Copyright | |
dc.subject.other | droonit | |
dc.subject.other | cyber security | |
dc.subject.other | unmanned aerial vehicles | |
dc.subject.other | cyber attacks | |
dc.subject.other | intelligence and reconnaissance | |
dc.subject.other | surveillance | |
dc.title | Drones in cyber security environment | |
dc.type | contributionToPeriodical | |
dc.identifier.urn | URN:NBN:fi:jyu-202103031849 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2cd9 | |
dc.description.reviewstatus | nonPeerReviewed | |
dc.format.pagerange | 8-17 | |
dc.relation.issn | 2490-0753 | |
dc.relation.numberinseries | 4 | |
dc.relation.volume | 2019 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2019 Cyberwatch Finland Oy | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | elektroninen sodankäynti | |
dc.subject.yso | kybersodankäynti | |
dc.subject.yso | tiedustelu | |
dc.subject.yso | miehittämättömät ilma-alukset | |
dc.subject.yso | tarkkailu | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p10373 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27779 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p13152 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24149 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4714 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | D1 |