A Comprehensive Survey of Unmanned Aerial Systems' Risks and Mitigation Strategies

📅 2025-06-12
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
The widespread deployment of unmanned aircraft systems (UAS) in communications, defense, and transportation has exposed critical cybersecurity vulnerabilities across their operational lifecycle. Method: This study systematically identifies and analyzes lifecycle security weaknesses using integrated threat modeling, risk matrix assessment, standards compliance mapping (e.g., ISO/IEC 27001, DO-362), and a comprehensive systematic literature review. It pioneers the cross-domain adaptation of mature security solutions from non-UAS domains to UAS contexts. Contribution/Results: The research quantifies the likelihood and impact of vulnerabilities in key domains—communications, command-and-control, and perception—and establishes a “risk–mitigation” mapping framework. It proposes concrete adaptation pathways for established security standards within UAS architectures and identifies several high-priority research gaps. Collectively, this work provides both theoretical foundations and actionable guidance for developing robust, standards-aligned UAS cybersecurity frameworks.

Technology Category

Application Category

📝 Abstract
In the last decade, the rapid growth of Unmanned Aircraft Systems (UAS) and Unmanned Aircraft Vehicles (UAV) in communication, defense, and transportation has increased. The application of UAS will continue to increase rapidly. This has led researchers to examine security vulnerabilities in various facets of UAS infrastructure and UAVs, which form a part of the UAS system to reinforce these critical systems. This survey summarizes the cybersecurity vulnerabilities in several phases of UAV deployment, the likelihood of each vulnerability's occurrence, the impact of attacks, and mitigation strategies that could be applied. We go beyond the state-of-the-art by taking a comprehensive approach to enhancing UAS security by performing an analysis of both UAS-specific and non-UAS-specific mitigation strategies that are applicable within the UAS domain to define the lessons learned. We also present relevant cybersecurity standards and their recommendations in the UAS context. Despite the significant literature in UAS security and the relevance of cyberphysical and networked systems security approaches from the past, which we identify in the survey, we find several critical research gaps that require further investigation. These form part of our discussions and recommendations for the future exploration by our research community.
Problem

Research questions and friction points this paper is trying to address.

Identify cybersecurity vulnerabilities in UAV deployment phases
Analyze UAS-specific and non-UAS-specific mitigation strategies
Address critical research gaps in UAS security
Innovation

Methods, ideas, or system contributions that make the work stand out.

Analyzing UAS-specific and non-UAS-specific mitigation strategies
Summarizing cybersecurity vulnerabilities in UAV deployment phases
Presenting relevant cybersecurity standards for UAS
🔎 Similar Papers
No similar papers found.
S
Sharad Shrestha
Department of Computer Science at New Mexico State University (NMSU)
M
Mohammed Ababneh
Department of Computer Science at New Mexico State University (NMSU)
S
S. Misra
Department of Computer Science and Department of Electrical and Computer Engineering at New Mexico State University (NMSU)
H
H. Cathey, Jr.
Physical Science Laboratory at NMSU
Roopa Vishwanathan
Roopa Vishwanathan
Assistant Professor, Computer Science Dept., New Mexico State University
CryptographySecurity
M
Matt Jansen
Department of Computer Science at Oregon State University
J
Jinhong Choi
Department of Computer Science at Oregon State University
R
Rakesh Bobba
Department of Computer Science at Oregon State University
Y
Yeongjin Jang
Samsung Research