Cybersecurity Challenges in Autonomous Unmanned Aerial Vehicle Networks
-
https://doi.org/10.14419/vr9xzy19
Received date: May 2, 2025
Accepted date: May 26, 2025
Published date: July 8, 2025
-
Vehicles; Cyber Security; Threats; UAV Network; Rick; Security -
Abstract
The use of autonomous unmanned aerial vehicles (UAVs) can offer innovative solutions to various problems, providing operational and financial benefits, as well as agricultural and military advantages in surveillance and logistics. Since they depend on wireless networks for real-time data processing and distributed control, UAVs have become so ubiquitous that they present serious cybersecurity risks. Poorly designed UAV systems offer hackers fresh possibilities to launch cyberattacks, while GIS spoofing opens channels for data breach exploits that result in communication failures. Critical applications needing exact data and control parameters suffer operational hazards on system performance, reliability, and safety standards, given the dependence on unmanned aerial vehicles. The different risks to UAV networks with respect to cybersecurity and their effects on operations are covered in this article. Using an analytical approach, researchers found risks and evaluated them to design security measures suitable for the unmanned aerial vehicle system. The research explains why unauthorized access to UAV communications and data accuracy must be defended by encryption algorithms, together with more rigorous authentication methods and intruder detection systems. The paper proposes a series of realistic security procedures that companies from several sectors can implement to counter growing threats and maintain UAV networks in a state of operational safety and system flexibility.
-
References
- Zhang, Z., & Shu, Z. (2024). Unmanned aerial vehicle (UAV)-assisted damage detection of wind turbine blades: A review. Energies, 17(15), 3731. https://doi.org/10.3390/en17153731.
- Santoso, J. T., Raharjo, B., & Wibowo, A. (2024). Combination of Alphanumeric Password and Graphic Authentication for Cyber Security. Journal of Internet Services and Information Security, 14(1), 16-36. https://doi.org/10.58346/JISIS.2024.I1.002.
- Babu, C. S., & Pal, A. (2024). Enhancing Security for Unmanned Aircraft Systems in IoT Environments: Defense Mechanisms and Mitigation Strate-gies. Unmanned Aircraft Systems, 429-476. https://doi.org/10.1002/9781394230648.ch11.
- Cvijić, R., Milošević, A., Čelebić, M., & Kovačević, Ž. (2018). Geological and Economic Assessment of the Perspective of the Mining in Ljubija Ore Region. Archives for Technical Sciences, 1(18), 1–8. https://doi.org/10.7251/afts.2018.1018.001C.
- Shah, I. A. (2024). Privacy and security challenges in unmanned aerial vehicles (UAVs). Cybersecurity in the Transportation Industry, 93-115. https://doi.org/10.1002/9781394204472.ch5.
- Juma, J., Mdodo, R. M., & Gichoya, D. (2023). Multiplier Design Using Machine Learning Algorithms for Energy Efficiency. Journal of VLSI Cir-cuits and Systems, 5(1), 28–34. https://doi.org/10.31838/jvcs/05.01.04.
- Mykytyn, P., Brzozowski, M., Dyka, Z., & Langendoerfer, P. (2024). A Survey on Sensor-and Communication-Based Issues of Autonomous UAVs. CMES-Computer Modeling in Engineering & Sciences, 138(2). https://doi.org/10.32604/cmes.2023.029075.
- Papadopoulos, N. A., & Konstantinou, E. A. (2025). SoC solutions for automotive electronics and safety systems for revolutionizing vehicle technol-ogy. Journal of Integrated VLSI, Embedded and Computing Technologies, 2(2), 36–43.
- Chen, J., & Zhang, C. (2024, September). A UAV Communication System with Anti-Interference and Covert Communication Capabilities Using Two Antennas. In 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC) (pp. 1-4). IEEE. https://doi.org/10.1109/DASC62030.2024.10748965.
- Talaei Khoei, T., Al Shamaileh, K., Devabhaktuni, V. K., & Kaabouch, N. (2025). Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles. International Journal of Information Security, 24(1), 62. https://doi.org/10.1007/s10207-024-00978-x.
- Kostopoulos, N., Stamatiou, Y. C., Halkiopoulos, C., & Antonopoulou, H. (2025). Blockchain Applications in the Military Domain: A Systematic Re-view. Technologies, 13(1), 23. https://doi.org/10.3390/technologies13010023.
- Tychola, K. A., & Rantos, K. (2025). Cyberthreats and Security Measures in Drone-Assisted Agriculture. Electronics, 14(1), 149. https://doi.org/10.3390/electronics14010149.
- Prasath, C. A. (2023). The role of mobility models in MANET routing protocols efficiency. National Journal of RF Engineering and Wireless Com-munication, 1(1), 39-48.
- Abdullahi, S. M., & Lazarova-Molnar, S. (2025). On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances. International Journal of Information Security, 24(1), 53. https://doi.org/10.1007/s10207-024-00951-8.
- Tlili, F., Ayed, S., & Fourati, L. C. (2024). Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future di-rections. Internet of Things, 101281. https://doi.org/10.1016/j.iot.2024.101281.
- Usikalu, M. R., Alabi, D., & Ezeh, G. N. (2025). Exploring emerging memory technologies in modern electronics. Progress in Electronics and Com-munication Engineering, 2(2), 31–40. https://doi.org/10.1109/TSUSC.2024.3443256.
- Pasdar, A., Koroniotis, N., Keshk, M., Moustafa, N., & Tari, Z. (2024). Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems. IEEE Transactions on Sustainable Computing.
- Wheeler, M. (2024). Warming Wars: The Role of Climate Change in Future National Security Challenges (Doctoral dissertation, Georgetown Univer-sity).
- Sindhu, S. (2025). Comparative Analysis of Battery-Supercapacitor Hybrids for Fast EV Charging Infrastructure. Transactions on Energy Storage Systems and Innovation, 1(1), 26-33.
- Achehboune, M., Sani, A., & Boukdir, M. (2025). A note on maximal regularity in relation with measure theory. Results in Nonlinear Analysis, 8(1), 193-203.
- S. K. Ghosh, E. Kepros, Y. Chu, B. Avireni, B. Wright and P. Chahal, "Terahertz Metasurfaces on Flex Using Aerosol Jet Printing and a Novel Parylene Lift-off Process," 2024 IEEE 74th Electronic Components and Technology Conference (ECTC), Denver, CO, USA, 2024, pp. 760-764, https://doi.org/10.1109/ECTC51529.2024.00124.
-
Downloads
-
How to Cite
Punam , S. R. ., & Nandy , M. . (2025). Cybersecurity Challenges in Autonomous Unmanned Aerial Vehicle Networks. International Journal of Basic and Applied Sciences, 14(SI-1), 22-25. https://doi.org/10.14419/vr9xzy19
