Show simple item record

dc.contributor.authorLehto, Martti
dc.date.accessioned2021-03-03T12:20:16Z
dc.date.available2021-03-03T12:20:16Z
dc.date.issued2019
dc.identifier.citationLehto, M. (2019). Drones in cyber security environment. <i>Cyberwatch Magazine</i>, <i>2019</i>(4), 8-17. <a href="https://issuu.com/cyberwatchfinland.fi/docs/cyberwatch_2019-4_eng" target="_blank">https://issuu.com/cyberwatchfinland.fi/docs/cyberwatch_2019-4_eng</a>
dc.identifier.otherCONVID_51745791
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/74487
dc.description.abstractAerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely focused on exploitable vulnerabilities in either the communication channels or the hardware/software stack on the vehicle. Such ttacs have focused on exploiting unencrypted communication over wireless media to implement eaves-dropping, cross-layer attacks, signal jamming, denial of service, and dropping Wi-Fi communication with ground control. Other attacks on drones involve GPS (Global Positioning System) spoofing attacks to fool the drone into moving to a different destination (possibly with the intention of hijacking the drone). In the same time UAV or drone can be a cyber attack platform. Specially equipped drone can track signals based on Wi-Fi, radio frequency identification (RFID) and the Bluetooth and 802.15 specifications (PAN/WPAN communication). Combined with a GPS capability drone correlates signals to the location where they're detected. So, the drone spy not only on phones, tablets, and computers, but also, potentially, on pacemakers, fitness bracelets, smart cards, and other electronics. Additionally, drone can function as visual tracking platforms even without the use of beacons or GPS. Swarms of small drones could soon become an important part of the modern military arsenal. The swarm idea inherently drives drones towards autonomy which allows many different kinetic and non-kinetic operations.en
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherCyberwatch Finland Oy
dc.relation.ispartofseriesCyberwatch Magazine
dc.relation.urihttps://issuu.com/cyberwatchfinland.fi/docs/cyberwatch_2019-4_eng
dc.rightsIn Copyright
dc.subject.otherdroonit
dc.subject.othercyber security
dc.subject.otherunmanned aerial vehicles
dc.subject.othercyber attacks
dc.subject.otherintelligence and reconnaissance
dc.subject.othersurveillance
dc.titleDrones in cyber security environment
dc.typecontributionToPeriodical
dc.identifier.urnURN:NBN:fi:jyu-202103031849
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2cd9
dc.description.reviewstatusnonPeerReviewed
dc.format.pagerange8-17
dc.relation.issn2490-0753
dc.relation.numberinseries4
dc.relation.volume2019
dc.type.versionpublishedVersion
dc.rights.copyright© 2019 Cyberwatch Finland Oy
dc.rights.accesslevelopenAccessfi
dc.subject.ysoelektroninen sodankäynti
dc.subject.ysokybersodankäynti
dc.subject.ysotiedustelu
dc.subject.ysomiehittämättömät ilma-alukset
dc.subject.ysotarkkailu
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p10373
jyx.subject.urihttp://www.yso.fi/onto/yso/p27779
jyx.subject.urihttp://www.yso.fi/onto/yso/p13152
jyx.subject.urihttp://www.yso.fi/onto/yso/p24149
jyx.subject.urihttp://www.yso.fi/onto/yso/p4714
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmD1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright