A Survey of Security Challenges and Solutions for UAS Traffic Management (UTM) and Small Unmanned Aerial Systems (sUAS)

📅 2026-01-08
🏛️ AIAA SCITECH 2026 Forum
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study addresses the vulnerability of communications, navigation, and surveillance (CNS) subsystems in small unmanned aircraft systems (sUAS) to cyber threats—such as spoofing, jamming, and data tampering—under resource-constrained conditions, which jeopardize the safety of unmanned traffic management (UTM) ecosystems. The work systematically catalogs security vulnerabilities across the entire sUAS-UTM stack, spanning CNS, datalinks, perception layers, cloud interfaces, and software integrity. It proposes a unified threat and defense taxonomy tailored for resource-limited platforms, structurally mapping attack vectors and countermeasures according to technical objectives and operational impacts. By integrating lightweight cryptography, adaptive intrusion detection, and secure firmware management, the paper evaluates the scalability and practical efficacy of these mechanisms, thereby addressing gaps in existing surveys regarding systematicity and deployability, and identifying key open challenges for achieving secure, reliable, and scalable sUAS operations.

Technology Category

Application Category

📝 Abstract
The rapid growth of small Unmanned Aerial Systems (sUAS) for civil and commercial missions has intensified concerns about their resilience to cyber-security threats. Operating within the emerging UAS Traffic Management (UTM) framework, these lightweight and highly networked platforms depend on secure communication, navigation, and surveillance (CNS) subsystems that are vulnerable to spoofing, jamming, hijacking, and data manipulation. While prior reviews of UAS security addressed these challenges at a conceptual level, a detailed, system-oriented analysis for resource-constrained sUAS remains lacking. This paper presents a comprehensive survey of cyber-security vulnerabilities and defenses tailored to the sUAS and UTM ecosystem. We organize existing research across the full cyber-physical stack, encompassing CNS, data links, sensing and perception, UTM cloud access, and software integrity layers, and classify attack vectors according to their technical targets and operational impacts. Correspondingly, we review defense mechanisms ranging from classical encryption and authentication to adaptive intrusion detection, lightweight cryptography, and secure firmware management. By mapping threats to mitigation strategies and evaluating their scalability and practical effectiveness, this work establishes a unified taxonomy and identifies open challenges for achieving safe, secure, and scalable sUAS operations within future UTM environments.
Problem

Research questions and friction points this paper is trying to address.

UAS Traffic Management
small Unmanned Aerial Systems
cyber-security threats
communication navigation and surveillance
resource-constrained systems
Innovation

Methods, ideas, or system contributions that make the work stand out.

sUAS security
UTM
lightweight cryptography
cyber-physical stack
intrusion detection
🔎 Similar Papers
No similar papers found.
Iman Sharifi
Iman Sharifi
PhD Student at the George Washington University
Neurosymbolic AIReinforcement LearningAdvanced Air MobilityIntelligent Transportation System
M
Mahyar Ghazanfari
The George Washington University, Washington, DC, 20052, USA
A
Abenezer Taye
The George Washington University, Washington, DC, 20052, USA
Peng Wei
Peng Wei
George Washington University
AviationControlOptimizationMachine LearningArtificial Intelligence
Maheed H. Ahmed
Maheed H. Ahmed
PhD Student, Purdue University
Reinforcement learningMulti-agent systemsArtificial IntelligenceDeep Learning
H
Hyeong Tae Kim
Purdue University, West Lafayette, IN, 47907, USA
Mahsa Ghasemi
Mahsa Ghasemi
Assistant Professor of Electrical and Computer Engineering, Purdue University
Machine LearningControl TheoryFormal MethodsArtificial Intelligence
Vijay Gupta
Vijay Gupta
Electrical and Computer Engineering, Purdue University
Estimation and controllearninggame theory
N
Noah Dahle
Vanderbilt University, Nashville, TN, 37212, USA
R
Robert Canady
Vanderbilt University, Nashville, TN, 37212, USA
Abel Diaz Gonzalez
Abel Diaz Gonzalez
Assistant Professor, Organisation, Strategy and Entrepreneurship, SBE at Maastricht University
Social EntrepreneurshipSupport EcosystemsAcademic EntrepreneurshipSustainable Business Models
A
Austin Coursey
Vanderbilt University, Nashville, TN, 37212, USA
B
Bryce Bjorkman
Vanderbilt University, Nashville, TN, 37212, USA
Cailani Lemieux-Mack
Cailani Lemieux-Mack
Vanderbilt University
Cyber SecurityCyber Physical Systems
Bryan C. Ward
Bryan C. Ward
Vanderbilt University
Systems securityreal-time systemscyber-physical systemsscheduling theory
Xenofon Koutsoukos
Xenofon Koutsoukos
Vanderbilt University
Gautam Biswas
Gautam Biswas
Cornelius Vanderbilt Professor of Engineering; Professor of Computer Science and Engineering
Artificial Intelligence in EducationReinforcement LearningMultimodal AnalyticsLearning Tech
H
Heber Herencia-Zapana
Advanced Research & Technology, Collins Aerospace, Cedar Rapids, IA, 52498, USA
S
Saqib Hasan
Advanced Research & Technology, Collins Aerospace, Cedar Rapids, IA, 52498, USA
I
Isaac Amundson
Advanced Research & Technology, Collins Aerospace, Cedar Rapids, IA, 52498, USA
Filippos Fotiadis
Filippos Fotiadis
Postdoctoral Researcher, The University of Texas at Austin
Cyber-Physical SystemsGame TheoryControl TheoryReinforcement Learning
Ufuk Topcu
Ufuk Topcu
The University of Texas at Austin
autonomycontrolsformal methodslearning
J
Junchi Lu
University of California, Irvine, Irvine, CA, 92697, USA
Q
Qi Alfred Chen
University of California, Irvine, Irvine, CA, 92697, USA
N
Nischal Aryal
Tennessee State University, Nashville, TN, 37221, USA
A
Amer Ibrahim
Tennessee State University, Nashville, TN, 37221, USA
A
Abdul Karim Ras
Tennessee State University, Nashville, TN, 37221, USA
A
Amir Shirkhodaie
Tennessee State University, Nashville, TN, 37221, USA