Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the matomo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/eslemanabaycom/public_html/wp-includes/functions.php on line 6131

Deprecated: mb_convert_encoding(): Handling HTML entities via mbstring is deprecated; use htmlspecialchars, htmlentities, or mb_encode_numericentity/mb_decode_numericentity instead in /home/eslemanabaycom/public_html/wp-content/plugins/fb-instant-articles/vendor/facebook/facebook-instant-articles-sdk-php/src/Facebook/InstantArticles/Transformer/Transformer.php on line 249

Deprecated: mb_convert_encoding(): Handling HTML entities via mbstring is deprecated; use htmlspecialchars, htmlentities, or mb_encode_numericentity/mb_decode_numericentity instead in /home/eslemanabaycom/public_html/wp-content/plugins/fb-instant-articles/vendor/facebook/facebook-instant-articles-sdk-php/src/Facebook/InstantArticles/Transformer/Transformer.php on line 249

Deprecated: Creation of dynamic property Facebook\InstantArticles\AMP\AMPHeader::$headerBar is deprecated in /home/eslemanabaycom/public_html/wp-content/plugins/fb-instant-articles/vendor/facebook/facebook-instant-articles-sdk-extensions-in-php/src/Facebook/InstantArticles/AMP/AMPHeader.php on line 51
Security analysis of drones systems: Attacks, limitations, and recommendations

Digital Media Trends

Security analysis of drones systems: Attacks, limitations, and recommendations

By Esleman Abay

September 30, 2022

Jean-Paul Yaacoub, Hassan Noura, and Ali Chehab

Abstract

Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere and at any time. However, recently, the malicious use of drones began to emerge among criminals and cyber-criminals alike. The probability and frequency of these attacks are both high and their impact can be very dangerous with devastating effects. Therefore, the need for detective, protective and preventive counter-measures is highly required. The aim of this survey is to investigate the emerging threats of using drones in cyber-attacks, along the countermeasures to thwart these attacks. The different uses of drones for malicious purposes are also reviewed, along the possible detection methods. As such, this paper analyzes the exploitation of drones vulnerabilities within communication links, as well as smart devices and hardware, including smart-phones and tablets. Moreover, this paper presents a detailed review on the drone/Unmanned Aerial Vehicle (UAV) usage in multiple domains (i.e civilian, military, terrorism, etc.) and for different purposes. A realistic attack scenario is also presented, which details how the authors performed a simulated attack on a given drone following the hacking cycle. This review would greatly help ethical hackers to understand the existing vulnerabilities of UAVs in both military and civilian domains. Moreover, it allows them to adopt and come up with new techniques and technologies for enhanced UAV attack detection and protection. As a result, various civilian and military anti-drones/UAVs (detective and preventive) countermeasures will be reviewed.

Keywords: UAV, UAS, UUV, Armed drones, Drone/UAV warfare, Terrorism/counter-Terrorism, Drones security, Drones threats and vulnerabilities, Drones attacks, Drones security countermeasures techniques, Drones forensics

1. Introduction

The reliance and use of drones is constantly rising in numerous domains. This is due to the drones’ ability to offer a live-stream, real-time video and image capture, along with the ability to fly and transport goods [1]. As a result, more than 10,000 drones will be operational for commercial use within the next five years. This is mainly due to their advantages over commercial helicopters when it comes to costs and budget [2]. Moreover, the technological advancement enables easy manipulations via smart-phones to fly mini-drones instead of using remote controllers. In fact, the use of drones is not limited to commercial and personal aims. Drones are being used by law enforcement and border control surveillance teams. In case of natural disasters, search and rescue teams employ them to gather information or to drop essential supplies. However, drones are not being used exclusively by ”good guys”; ”bad guys” are leveraging drones to achieve their malicious objectives. Being easy to control, drones can be used to perform different attacks. On the other hand, drones expose security vulnerabilities that make them prone to hijacking. In this paper, we review the attacks from/to drones, along with their existing countermeasures.

1.1. Motivation

The reliance on wireless communications makes drones vulnerable to various attacks. These attacks can have drastic effects, including commercial and non-commercial losses. In this context, there is a lack of proper understanding on how hackers perform their attacks and hijack a drone, in order to intercept it or even crash it. In fact, drones can also be compromised for malicious purposes. Hence, there is a need to detect them and prevent them from causing any damage.

1.2. Related work

The security of civilian drones was reviewed in [3]. Also, different security attacks on drones were analyzed in [4][5][6][7][8]. Drones detection methods were reviewed in [9][10][11][12]. However, a main limitation of the previous work is the lack of a comprehensive analysis of the drones security vulnerabilities and the attack life cycle. Moreover, only one aspect of drones’ security threats was addressed, attacks on drones. The existing countermeasures need to be analyzed, and new techniques need to be proposed to overcome the limitations of the existing security solutions.

1.3. Contributions

In this work, we conduct a comprehensive review of the different aspects of drones’ cyber-security including two main aspects: drones’ security vulnerabilities, and the security concerns associated with compromised drones. Then, we review the countermeasures to secure drone systems, and to detect malicious ones. These contributions are summarized below:

1.4. Organization

This paper is organized as follows: in Section 2, an overview of drones regulations, architecture, communication types, and classification is presented. Section 3 discusses drones’ applications and domains of use. In Section 4, the drones security concerns and the effects of security breaches are analysed. Section 5 reviews the main drones security vulnerabilities and threats. The existing solutions and countermeasures for securing drones are reviewed in Section 6. In Section 7, the anti-drones countermeasures are presented. The current limitations, and recommendations for future research directions are included in Section 8. Finally, we conclude our work in Section 9.

2. Background and overview

According to the Federal Aviation Administration (FAA), more than 2.5 million drones are currently flying over the United States (U.S.) alone. In fact, this number is expected to reach 7 million active drones by 2020 [13]. Moreover, the technological and economical growth of e-commerce enabled many applications that leverage the use of drones [14]. On the other hand, this gives rise to opportunities for cyber-criminals to compromise or even exploit drones availability and capability for malicious purposes.

Since the early introduction of Unmanned Aerial Vehicles (UAVs), drones are looked upon as being associated with major security issues [15], rendering them legitimate targets that are prone to various cyber-attack types. Moreover, they can also be used as a potential attack vector for malicious users. Thus, boosting the chances for a new asymmetric type of warfare. In fact, drones operate at different wireless communication frequencies, as illustrated in Table 1 , which compares the two main drones communication frequencies, 2.4 GHz and 5GHz.

Table 1

Comparison between 2.4 GHz and 5GHz.

2.1. Regulations

Many governments including EU State members, the US, United Kingdom (UK) and South Africa [16][17][18][19][20] have so far issued a warning for drone owners, urging them to get official licenses in order to fly their photography drones. The statement warned against the ”threats of flying UAVs over private territories, especially military centers, and sensitive locations without a license issued by the orientation directorate.” In Lebanon, the Lebanese Army stated that any drone being flown illegally without meeting the requirements ”will be brought down whilst its owners will be legally prosecuted”, due to the fact that they impose a ”serious risk to the official institutions, the security, and public safety.” As part of a constant reminder, the army’s command of each country reminds all citizens to obtain the legally required certificates and to request a permit in order to use a drone; such requests can be made online using official websites. According to British Broadcasting Corporation (BBC) News [21], the civil aviation authority launched its drone-code to clarify the rules that each drone owner must follow and comply to

Many of these rules already came into effect by the end of July 2018, restricting all drones from flying above 400 ft. In fact, violators could be punished with unlimited fines or/and up to five years in jail. For this reason, this paper presents and classifies the main regulations applied in different countries per continent as illustrated in Table 2 , while relying on a series of conducted surveys, reviews and comparative studies in [22][23][24][25][26].

Table 2

World-Wide UAS regulations.

2.2. Drone architecture

Typically, any UAV or drone architecture consists of three main elements: Unmanned Aircraft (UmA), Ground Control Station (GCS), and Communication Data-Link (CDL) [3][27]. These components are briefly described in the following:

2.3. Drones communications types

Drone communications can be classified into four main types, Drone-to-Drone (D2D), Drone-to-Ground Station (D2GS), Drone-to-Network (D2N), and Drone-to-Satellite (D2S). The communication framework is illustrated in Fig. 1 .

Fig. 1

The different possible drone communication

2.3.1. Drone-To-Drone 

Such communication is not yet standardized. In fact, Machine Learning can be leveraged in order to design and optimize a smart UAV-based wireless communication system [28]. In most cases, D2D communications can be modeled as Peer-to-Peer (P2P) communication. This would make it vulnerable to various types of P2P attacks including jamming (i.e Distributed Denial of Service (D-DoS) and sybil attacks) [29][30][31].

2.3.2. Drone-To-Ground station 

This communication type is based on the already known and standardized industrial protocols, which are based on wireless communications such as Bluetooth and Wi-Fi 802.11 including 2.4 GHz and 5 GHz. However, most drone-to-ground communications are public and not secure, using a single factor authentication, which can be easily broken, making them vulnerable to passive (eavesdropping) and active (man-in-the-middle) attacks.

2.3.3. Drone-To-Network 

This communication type allows the choice of the network based on the required security level. It may also include cellular communications, which means relying on 3 GHz, 4 GHz, 4G+ (LTE) and 5 GHz. It is essential to secure such wireless communications networks when being used.

2.3.4. Drone-To-Satellite 

This is the type of communication needed for sending real-time coordinates via the Global Positioning System (GPS). This allows any drone to be called back to its initial station in case it went beyond the line of control or outside the line of sight. Satellite communications are deemed secure and safe. However, they exhibit a high cost and maintenance requirements. This is why they are heavily used by armed forces.

2.4. UAV Types

All UAVs are drones, however, not all drones are UAVs. This paper details the difference between drones, UAVs, and Unmanned Aircraft Systems (UAS); Fig. 2 presents a classification of UAVs.

Fig. 2

UAV classification

2.4.1. Drones 

This term is commonly used to refer to remotely (autonomously) guided aircraft. This term also describes various vehicles including submarines or land-based autonomous vehicles. In fact, drones can be classified into three main types, according to their flying mechanisms [32], as described next.

2.4.2. UAVs 

A UAV can fly remotely/autonomously using a controller, mobile phone, computer or even a tablet [36]. They are characterised by their autonomous flight capabilities and ability to operate over long distances with a secure live feed transmission. Moreover, UAVs control can be classified and divided into three main categories [3]:

2.4.3. UAS 

These include UAVs and drones, and the operators controlling them [37]. A UAV is a type of UAS since it refers to a controlled vehicle or aircraft [38].

2.4.4. RPA 

RPA stands for Remotely Piloted Aircraft, which requires intensive skills and training over a long period of time (a couple of years) to operate and control these complex flights [37].

2.5. Crash avoidance methods

Various drone types are now equipped with crash avoidance systems, to navigate around objects and to return back to base on a programmed route. This is possible using Radio-Frequency Identification (RFIDs) and low power Radio-Frequency (RF) transmitters continually broadcasting their identities. This ensures that the asset is protected, and located at legitimate entry points at all times.

2.6. Collision avoidance (CA) methods

Due to the continuous and close encounters between aircraft and UAVs, it is critical to avoid any collision between them. As a result, in [39], several methods were discussed along the modeling and evaluation of drones safety, and by applying these methods on Unmanned Aircraft Systems (UASs). The aim was to develop a UA-Sense-and-Avoid (SAA) system, based on the ability to sense and avoid obstacles, in coordination with the Federal Aviation Administration (FAA) standard (RTCA SC-203) [40]. Another method for SAA was also presented by Barfield in [41]. The method is based on an autonomous CA system that offers protection to prevent any collision. This was successfully done without causing any failure in the flight operation. In fact, CA algorithms were developed in [42] to perform certain tasks including Individual Collision Avoidance (ICA) in 2D and Group Collision Avoidance (GCA) in the 3D plane. Another method was presented by Yang et al. in [43] and it is based on the UAV 3D path planning, which consists of locating a collision-free path in a 3D cluttered environment based on three main constraints, geometric, physical and temporal.

2.7. Obstacle-Collision avoidance methods

Different obstacle-collision avoidance methods were also presented to overcome any obstacle facing the UAVs. In [44], Ueno et al. presented a law that enables an aircraft to accurately localize objects in its vicinity. In [45], Brandt et al. stated that quad-rotors are more suitable to operate indoors due to their flexible operations in small and confined areas. Furthermore, an algorithm was presented by Israelsen et al. in [46] to manually tele-operate UAVs using automatic Obstacle Collision Avoidance (OCA).

2.8. UAV Routing

It is important to ensure a safe routing path for drones to avoid accidents, damage or/and injuries. To do that, one must take into consideration the threat, risk, target, and terrain, along with the UAV restrictions. As a result, in [47], Tulum et al. introduced an agent-based approach for the UAV mission route planning problem, by using situation awareness algorithms. Moreover, deterministic and probabilistic path planning strategies for autonomous UAV networks were followed through the exploration of obstacles in an area [48]. In [49], Hernández et al. applied a graph-based method for a multi-objective route planning of a simulated UAV to adhere to the required safety considerations.

This section described briefly the drone architecture, communications types, and UAV types. Also, the difference between drones, UAV, and UAS. Note that firmer regulations are still needed to ensure a safer use of UAV and UAS, especially with the recent encounters between drones/UAVs and other aircrafts. In the next section, the security of main UAV applications will be presented.

3. Domains of use

Drones will play a major role in the near future, by delivering goods and merchandise, or even serving as flying mobile hot-spots for broadband wireless access. In fact, when drones are deployed as hot-spots, the most suitable solution for bandwidth allocation is the Binomial and Poisson cluster processes, as presented in [50]. The main goal is to serve a massive number of users in a specific area. Moreover, drones can be used to maintain all the needed security and surveillance techniques, which are implemented to ensure the usage of these drones safely, securely and properly according to [14].

Therefore, the focus is on the multi-purpose usage of these drones, both in the civilian and military domains. The multi-purpose uses of drones are illustrated in Fig. 3 and discussed next.

Fig. 3

Drone multi-purpose usage

3.1. Civilian multi-Purpose use cases

Lately, drones have been used in various civilian domains [3]. Many of these domains are mentioned and discussed in [51], including search and rescue, and disaster management. The main civilian applications of drones include:

3.2. Police multi-Purpose usage

Drones are used to track down suspects using the aerial bird watch view. This proved to be cheaper and more maneuverable than a helicopter. In fact, drones will soon have the ability to contain thermal, motion, and night vision detection, which can be used to track down suspects at any time of the day. Furthermore, drones can be used to enhance traffic efficiency by offering quick response and identification of road conditions. This helps in avoiding traffic congestion, and in responding to a traffic accident or emergency. Moreover, these drones can be used for surveillance purposes, with the ability to detect suspicious targets hidden within public domains, which proved to be more flexible than fixed cameras. The reason is due to their capability in identifying and recognizing suspects from their height, size, and facial recognition, and thus, making it very difficult for suspects to hide in public.

In fact, according to BBC News, the UK prison service and the police are investing their resources to stop drone pilots from flying drugs, mobile phones, blades, knives, Subscriber Identity Module (SIM) cards, Universal Serial Bus (USBs) etc. into prisons [78]. These drones were being flown over walls and physical barriers. As a result, reports revealed that almost £ 3m may possibly be spent on the newly assigned task force to overcome this problem.

As a result, due to the autonomous and operational nature of drones, they became more and more adaptable and operational. This reduces and replaces the use of choppers, decreasing the response time and needed resources. Drones are capable of capturing a live bird-view of different types of incidents ranging from crimes, theft, to even riots. This leads to a firmer response with a more enhanced plan due to the ability to identify suspects while locating and tracking them down before arresting them.

Also, UAVs can be used by the police and other agencies to gather crucial information in dangerous situations with less manpower and money [79][80]; drones were used by the police 372 times across Northern Ireland since 2013. The paper explains the reasons for using drones in the case of aerial surveillance based on real-case incidents as shown below:

3.3. Military applications

UAVs became the perfect choice for military usage [91], especially for intelligence and reconnaissance purposes [92] performing Surveillance, Target Acquisition and Reconnaissance (STAR), Joint Surveillance Target Attack Radar (JSTAR), Reconnaissance, Surveillance and Target Acquisition (RSTA) [93][94][95] tasks. Their deployment is a key part to counter insurgency and terrorism, offering the ability to Track and Identify Dismounted Personnel (TIDP) in urban environments, especially in Areas of Operation (AO) [96].

Fig. 3 presents a summary about several Drone/UAV types being used in overt/covert military operations, which are described next.

Table 4

Drones/counter-drones cyber-attacks.

Table 3

Military drone/UAV classification.

After presenting the different purposes for the use of UAVs, we list the malicious usages of drones by terrorists and/or criminals to launch malicious attacks such as having drones perform some types of physical or even logical attacks. In general, UAV malicious use can be divided between criminal usage and terrorist usage as described below:

3.4. Criminal attackers

Such attacks include physical as well as logical attacks:

Finally, UAV sensor inputs may also be targeted and exploited by an attacker who would manipulate such parameters and trick the sensors.

3.5. Terrorist & insurgent attacks

After the proliferation of drones, serious threats and challenges emerged since these drones could be used by terrorists for malicious purposes [217]. Having drones in the wrong hands can lead to serious consequences [218]. Actually, drones are being used by insurgents and terrorists alike [219][220]; drones and UAVs were used by ISIS to drop bombs (i.e weaponized drones [221]) and to film propaganda videos (i.e training, battle tactics, simulated attacks, location/geography, reconnaissance etc.) [222][223] in conflict zones such as the targeting of Iraqi and Syrian military personnel [224][225][226][227]. Also, against the backdrop of its increasing use of attack drones in Iraq and Syria, ISIS has released an informative graphic detailing its attacks in February 2017 using a pro-ISIS channel known by ”Ninawa Province”, to show the footage taken prior to a terrorist attack [228].

This alarmed the whole world about the drones’ serious safety and security threats, and their devastating effects on the moral of both military and civilian personnel. Typically, the use of drones by terrorists is associated with the following purposes:

In summary, the use of drones/UAVs can be be applied into different domains. As described above, the threat of Drones/UAVs is highly alarming and taking place at an increasing rate especially as the year 2020 is unfolding, with the increasing terrorist and criminal use of drones/UAVs to conduct malicious activities. As stated in this section, drones have been employed in different domains for good purposes, but also for malicious ones. Accordingly, there are new challenges related to several security, safety and privacy concerns when drones/UAVs are employed for malicious goals, which we discuss in the next section.

4. Drones security, safety and privacy concerns

The use of drones offered advantages on so many levels, from commercial to personal. However, drone systems suffer from different security, safety, and privacy issues [259].The breaches of security and privacy led by drones should be addressed by the highest national level. Moreover, there should exist a very strict approach to limit the drones’ ability to gather images and record videos of people and properties without authorized permission. From the perspective of security and threat analysis, drone-assisted public safety network is different from traditional wireless networks such as Wireless Sensor Networks (WSNs) and Mobile Ad-hoc Networks (MANETs) [260]. This is attributed to carrying less information and requiring less power compared to a drone-assisted public safety network. Moreover, the drone’s coverage area is broader and wider than WSNs and MANETs. Therefore, security challenges are primary related to the resources constraints along with the delay constraints of UAVs. Moreover, it is essential to ensure that confidentiality, integrity, availability, authentication, and non-repudiation properties over communication channels are fulfilled. This is done in accordance to the AAA process and guidelines:

The use of drones, by malicious entities to conduct physical and cyber-attacks, threatens the society by breaching the privacy of its residents along with threatening the public’s safety. In fact, various technical and operational drone properties are being exploited and misused for potential attacks. This includes performing critical operations based on offensive reconnaissance, as well as surveillance aimed at tracking specific people and certain properties, causing safety and privacy issues [261].

On the other hand, it is essential to prevent the use of drones above residential areas, which leads to privacy breaches through reckless behaviours, since the captured footage may be used for either scamming and/or blackmailing purposes. Safety breaches may also occur in case a drone malfunctions and crashes into a nearby house, park, parked car or civilians. This would result into material loss/damage and humans casualties/fatalities.

Moreover, drones are predominantly used to target guest Wi-Fi connections and/or short-range Wi-Fi, Bluetooth and other wireless devices, such as Bluetooth-connected keyboards. Such connections are not protected due to current security measures, which assume that no one could get close enough to compromise them or to access internal networks via wireless signals. These assumptions lead to weak single factor authentication and the use of typical passwords that can be easily cracked, especially with the absence of encrypted connection. This makes it as easy to intercept information in a private building and in a public café  [262].

An attacker would leverage such vulnerabilities to breach security, safety and/or privacy.

Fig. 4 , lists the main drones security threats as well as the corresponding techniques to overcome them.

Fig. 4

Drone threats taxonomy

Next, we summarize the current and future security challenges.

4.1. Security concerns

The drones characteristics (small size, low cost, and ease of manoeuvrability and maintenance) made them a preferred choice for criminals. Also, terrorists started to divert their attention towards using these drones to carry out terrorist attacks [263], mainly due to the nature of drones that makes them less prone to detection.

In fact, drones can be armed and modified to carry deadly chemicals, or be fit with explosives to attack critical infrastructures. Moreover, drones carrying explosives may be detonated around people gathering in a hard to reach places. This makes the task easier for a terrorist to achieve, especially since drones provide the stealth of a suicide bomber with the range of an aircraft [232]. Military analysts are concerned about drones being used against the US for espionage purposes. This is due to ISIS being able to re-arm commercially available drones, and make them fit for combat roles over Iraq and Syria.

4.2. Safety concerns

Security does not always mean safety, and vice versa. Outside the military domain, civilian drones/UAVs [264] can also malfunction and crash into a nearby house or a group of people, causing property/material damage [80], and human injuries/fatalities [265], ranging from trauma/blunt force trauma, deep cut injuries (caused by drone blades) and laceration. On August 9th, 2016, a young woman lost her life in a car crash in the first non-military related drone incident after reports of a drone being flown near Wandsworth Prison in London. On November 2016, an 18-month old toddler from Stourport-on-Severn, Worcester UK, sliced his eyeball in half by the propeller of an out-of-control drone. In April 2016, a British Airways passenger jet, flight BA727 was hit by a drone before landing at Heathrow Airport. However, no injuries were reported and all 132 passengers and five crew members were safe. As a result of these incidents, we list below the main safety concerns:

4.3. Privacy concerns

People’s privacy is also at high risk of being exposed by unwanted flying guests that can record their movement and capture images at anytime, without their knowledge or permission. This is an indication of how much our privacy is vulnerable to such an emerging threat.

According to the Canadian Public Safety, UAV technologies raised a broad range of issues that relate to the collection of images and videos [269]. This was associated with blackmailing and scamming by threatening the disclosure of personal images or videos captured without the victims knowledge from an aerial position. In general, the privacy threats can be divided into three main categories.

Security, safety and privacy are key requirements for the adoption of any new IoT technology, especially drones and UAVs [272][273]. In this section, we review the main privacy, safety and security concerns that can be imposed by security breaches. These key concerns must be addressed to as soon as possible, otherwise their illegal use will remain on a constant rise, especially with the absence of firm laws, legal restrictions and sanctions. In the next section, we present the main security vulnerabilities and threats that can be exploited in order to compromise the drones security.

5. Drones existing threats & vulnerabilities

UAVs and drones are being perceived as viable and vital threats to information security. Many UAVs have serious design flaws, and most of them are designed without wireless security protection and footage encryption [274].

6. Drones existing cyber-Countermeasures

The main countermeasures that can be adopted to safeguard drones against security attacks can be classified into the following types based on an attacker’s main motives, objectives and goals. In the following, the existing solutions to secure drones’ networks, communications, and data are discussed. Moreover, the existing forensics solutions, used during the investigations of drone attacks, and aiming to identify the root causes of such attacks, are listed and described.

6.1. Securing drones/UAVs networks

Drone networks suffer from several security threats and issues. Recently, Intrusion Detection Systems (IDSes) have been deployed to detect UAVs/drones’ malicious activities and to detect suspicious attacks that may target them. Typically, an IDS monitors incoming and outgoing network traffic, and analyzes them to detect anomalies. Their aim is to detect and identify cyber-attacks by examining data audits (trails) that were collected at different network parts. In the following, we present the various IDS approaches to protect drone networks against intruders.

6.2. Securing drones/UAV communications

Due to the increase in the number of drone/UAV footage interception, different solutions were presented to secure UAV communication. In [306], Zhang et al. addressed the issue of physical-layer security in UAV communication systems and presented an iterative algorithm based on the block coordinate descent and successive convex optimization methods. The simulation results showed a significant improvement in terms of the secrecy rate of UAV communication systems. In [307], Zhang et al. applied these algorithms to tackle the issues of broadcast, line-of-sight, and air-to-ground wireless channels challenges surrounding the Fifth Generation (5G) wireless networks. The simulation results revealed an improvement of secrecy rates for UAV-to-Ground (U2G) and Ground-to-UAV (G2U) communications. In [308], Cui et al. also addressed the broadcast nature of air-to-ground line-of-sight wireless channels challenges and tackled it based on the physical layer by leveraging the trajectory design of UAVs mobility. The authors presented an iterative sub-optimal algorithm by applying the block coordinate descent method, S-procedure, and successive convex optimization method. Simulation results revealed a significant improvement in their average worst-case secrecy rate.

In [309], Zhao et al. presented a caching UAV assisted secure transmission scheme in hyper-dense Small-cell Base Stations (SBSs) based on Interference Alignment to offload traffic via wireless backhaul and to improve the coverage and rate by generating jamming signals to disrupt any potential eavesdropping attempt. The simulation results revealed the effectiveness of their methods. In [310], Lee et al. investigated the UAV-aided secure communications with a cooperative jamming UAV, and presented an iterative algorithm which provides an efficient solution for the minimum secrecy rate maximization problem by jointly optimizing the transmit power, the UAVs trajectory and the user scheduling variables. Numerical results indicated that the algorithm outperforms the baseline methods. In [311], Liu et al. examined the security issue in UAV-aided communication systems and presented a secure transmission scheme for a UAV wiretap channel using a multi-antenna source that transmits to a UAV’s single-antenna, in the presence of a full-duplex active eavesdropper. The Multi-antenna source transmits artificial noise signals together with information signals to hinder the full-duplex eavesdropper ability to eavesdrop and jam.

In [312], Cai et al. investigated the joint optimization of UAV trajectories and user scheduling for a dual-UAV enabled secure communication system and presented a novel P-CCCP based algorithm for this purpose. The algorithm was further extended to cover the case of multiple jamming UAVs to further improve the secrecy rate. Simulation results revealed a better performance than other conventional UAV-aided algorithms. In [313], Li et al. studied secure communication with imperfect channel estimation, in the case of a smart UAV attacker under different modes (i.e keeping silent, eavesdropping, jamming, and spoofing). As a result, a non-cooperative game theory technique was used to present a Q-learning based power control algorithm, using a Nash Equilibrium (NE) strategy, to obtain an adaptive policy for the transmitter. Simulation results showed an effective decrease in the UAV attack rate and an increase in the system secrecy capacity.

In addition to modulation techniques, it is essential to encrypt the communications of drones and UAVs. In this context, different cryptographic solutions were recently presented, including message encryption and authentication. Since most drone standards have to ensure secure communication, the focus became on how to design a lightweight message authentication-encryption algorithm. Also, this can be done in a way to preserve the source authentication in addition to integrity and confidentiality of the transmitted data. The existing cryptographic algorithms to secure drone communications were discussed in [314][315]. These algorithms can possibly be applied to secure the communications of drones used for civilian applications. Moreover, a secure communication protocol (eCLSC-TKEM) between drones and smart objects was presented by Won et al. in [316]. The authors claimed that their system is 1.3, 1.5 and 2.8 times better than other protocols including the protocols in Seo’s CLSC-TKEM [317], Sun’s CL-AKA [318], and Yang’s CL-AKA [319].

Additionally, in [320], Sharma et al. presented a highly secured Functional Encryption (FE) technique to secure a UAV assisted Heterogeneous Network (HetNet) in dense urban areas against malicious activities, and also to secure by encryption users’ critical data; however, this solution requires further enhancements.

On the other hand, in [321], Chen et al. presented a Traceable and Privacy-Preserving Authentication (TPPA) scheme for UAV communication control systems. TPPA integrates Elliptic Curve Cryptography (ECC), digital signature, hashing, and other cryptography mechanisms for UAV applications. This ensures privacy, confidentiality, integrity, availability, anonymity, and non-repudiation, especially against DoS and spoofing attacks, with low computational and communication costs.

Operating over long distances on battery enabled devices, the security of drone communications requires lightweight cryptographic algorithms and protocols. Recently, new cryptographic algorithms with one round functions or few number of iterations were presented in [322]. Moreover, existing privacy-preserving authentication protocols can leverage such lightweight cryptographic algorithms for a minimal delay. Also, physical layer parameters can be used for multi-factor authentication.

6.3. Securing drones data

All the data captured by drones must be aggregated to minimize the traffic being continuously sent to the base station. However, aggregation of encrypted data imposes new challenges. Accordingly, in [4], He et al. presented a Homomorphic Encryption (HE) method, and a practical data aggregation scheme based on the additive HE presented in [323]. Unfortunately, existing HE solutions suffer from security and/or performance issues. Symmetric ciphers suffer from security issues, especially in terms of chosen plaintext/ciphertext attacks, while asymmetric ciphers suffer from high computational and resources overhead, in addition to the associated storage overhead.

6.4. Forensic solutions

Digital forensics techniques are being extensively used in the UAV/drone domain. In [324], Pilli et al. presented a generic framework for Network Forensics (NF) which involves the analysis of network data traveling through firewalls or intrusion detection systems. This allows a network-based investigation to detect and identify anomalies in the traffic. The goal of such a model is to trace back the source of the attack using a six-phased chain-of-custody. Another framework was presented in [325], and it uses a Digital Investigation Process (DIP) to promote a comprehensive multi-tier hierarchical digital investigation model. This framework includes two tiers:

In [327], Bouafif et al. highlighted various drone forensics challenges and presented the results of their digital forensic analysis performed on a Parrot AR drone 2.0. The analysis included the ability to access the media file system from File Transfer Protocol (FTP) or serial connections to retrieve all required information by digital forensic investigators, including the controller’s Android ID used to establish ownership. In [328], Barton et al. reported the extraction and interpretation of important artefacts found in the UAV’s internal memory and the controlling application, and the analysis of digital media, logs and files that identify the artefacts. Experiments were conducted on a DJI Phantom 3 Professional drone, and the results showed a successful number of data retrieval methods, and the finding of important useful artefacts using open source tools. In [329], Barton et al. covered the use of open source forensics tools and developed basic scripts that aid the forensics analysis of the DJI Phantom 3 Professional and AR Drone 2 in a polymathic workstyle, by aiming to reconstruct the actions that were taken by these drones, identifying the drones’ operators, and extracting data from their associated mobile devices. This can be done by analyzing flight logs and identifying artefacts and capturing the drones’ digital media.

In [330], Clark et al. presented an open source forensics tool, DRone Open source Parser (DROP), which parses proprietary data files extracted from the DJI Phantom III nonvolatile internal storage, and text files located on the mobile device controlling the drone. Results revealed that it is possible to identify GPS locations, battery, and flight time, along the ability to link a given drone to its controlling mobile device based on its serial number. Further results revealed that data can be forensically acquired by manually extracting the drone’s Secure Digital (SD) card. In [331], Mantas et al. investigated the mostly used forensics platforms such as Ardupilot, the dataflash and telemetry logs, before presenting their own open source forensics tool, Gryphon, which focuses on the drone’s flight data logs from the perspective of the ground control station, collects, examines and analyzes the forensic artefacts to construct the corresponding timeline of events so perpetrators can be brought to justice.

In [326], Jain et al. presented an event-based digital forensic investigation framework, as a result of an investigation process based on a physical crime scene [332]. this framework aids the hypothesis’s testing and development through an event reconstruction based on the collected evidences following the readiness and deployment phase, physical crime scene investigation phase, digital crime scene investigation phase, and presentation phase.

Moreover, a UAV forensic investigation process was presented in [333], followed a step-by-step process based on three main initial phases.

Furthermore, a well-fit forensic model called ”waterfall model” was presented in [326], in response to the significant differences among commercial models. This model includes multiple phases to allow a digital investigator to recheck all previous phases during an investigation process, including the preparation and identification phase,weight measurement and customization check phase [335]fingerprints phase, memory card phase [336]geo-location phase [336][337][338], and Wi-Fi & Bluetooth phase [339].

However, recently several anti-forensics techniques have been developed to prevent investigators from finding and/or collecting evidence, which necessitates the development of efficient countermeasures to recover valid evidence. Such anti-anti-forensics solutions should be designed in a way to preserve the main functionalities of drone systems while resisting anti-forensics methods.

In summary, this section reviewed the existing security solutions for securing drone systems, including cryptographic and non cryptographic solutions. The cryptographic solutions aim essentially at securing the drones communication and the communicated data, while the non-cryptographic solutions (IDS) aim at detecting and recovering from possible security attacks.

7. Anti-Drones counter-Measures

Since the number of incidents between drones and airplanes increased from 6 to 93 in 3 years (2014 to 2017) [340], it has become essential to address the security and privacy breaches at the highest national level. This includes adopting very strict approaches that limit the drone’s ability to gather images and record videos of people and properties without a clearly authorized permission. In fact, since many people do not read the manual properly, they are incapable of reacting properly in case of a malfunction. In the UK, for example, if a drone weights more than 250 g, its users are supposed to take safety awareness tests and the police is given the authority to stop any drone when suspected of a criminal activity [341]. Also, the British government announced new rules to ban drones from flying within one kilometer of British airports to prevent any possible collisions with airplanes [342].

In Fig. 5 , we present a framework to secure the various components of a UAV system. There are different techniques to hack and/or hijack a drone, either using traditional techniques (discussed below) or using a new form called ”hack and crack”. On the other hand, due to the recent extensive use of armed drones in deadly conflicts such as in Yemen [246][343][344], Iraq and Syria by the different fighting factions [134][345][346], the adoption of non-lethal solutions to counter these threats is highly ineffective and unreliable. As such, the countermeasures are divided into civilian, government, and military countermeasures (see Fig. 6 ).

Fig. 5

Possible drone attacks and the corresponding countermeasures

Fig. 6

Drones targets and impacts

7.1. Civilian countermeasures

Civilian countermeasures are divided between physical and logical countermeasures.

7.1.1. Physical countermeasures 

When drones became widely popular, many organizations spent time and resources searching for ways to prevent their use in restricted airspace and above their buildings. This issue emerged after a drone crashed last year in front of the White House.

7.1.2. Logical countermeasures 

These measures include the use of logical equipment rather than expensive physical equipment. For example, in [349], Hooper et al. conducted pen testing on a Parrot Bebop UAV and revealed how Wi-Fi-based Parrot UAVs are prone to zero-day vulnerabilities and different attacks such as Address Resolution Protocol (ARP) and Cache Poisoning attacks. Hence, the authors presented a Multi-layer security framework as a defence-in-depth mechanism to guard UAVs against zero-day vulnerabilities. In [350], Birnbaum et al. presented a prototype UAV monitoring system that captures flight data and performs real-time estimation and tracking of the airframe and controller parameters by comparing them to previously known parameters. This was done using the Recursive Least Squares Method (RLSM) that detects cyber-attacks and incipient hardware degradation and failures. Experimental results revealed that it is possible to automatically establish UAV flight parameters while achieving an efficient anomaly detection in flight to detect significant deviations. In [351], Abbaspour et al. presented a new active Fault Tolerant Control (FTC) UAV system design, using a neural network adaptive structure for Fault Detection and Isolation (FDI). This scheme ensures real-time detection and isolation of faults in the actuators without the need to reconfigure the controller or affecting its performance. However, other security solutions were presented to counter-UAVs, as presented next.

Table 6 presents a classification of UAV attacks based of their class, and whether the target is just one or multiple security goals.

Table 6

Analytical review of drone/UAV detection methods.

7.2. Government countermeasures

The national approach adopted by the British Government to enhance its cyber-security protection against cyber-attacks includes cyber-security boot camps and the national budget:

7.3. Military countermeasures

Examples of military techniques to counter drone attacks include the use of old Soviet anti-aircraft weaponry (i.e ZSU-23-4 Shilka [365][366], and surface-to-air missiles (SAM S-300/S-400 missiles) [367][368]), to shoot down Turkish drones over Idlib and Syria [369][370]. Recent studies [371][372] revealed how terrorists are shifting towards a new asymmetric warfare called ”drone warfare” [373]. For this reason, four main different military countermeasures were suggested and implemented to overcome the UAV security threats [374][375]. According to the Cable News Network (CNN), the Pentagon issued new guidelines allowing the military to bring down any drone flying near or over a US military base [376].

Next, we list a set of the most recent real-time highly accurate anti-drone countermeasures, and in Fig. 7 , we highlight the latest generation of high-energy laser weapons targeting UAVs [377].

Fig. 7

Military anti-UAV/UAS techniques

These solutions are summarized in Table 5 .

Table 5

Analytical review of drone/UAV detection-prevention security solutions.

7.4. Drones detection techniques

The rise of UAVs/drones, led to many detection techniques being developed and used as early warning signs. In fact, some of these techniques were presented and classified by Ganti et al. in [401] whilst also including their advantages, drawbacks and accuracy levels. Nonetheless, this paper presents the most known drone detection techniques as follows:

7.4.1. Audio detection 

is an acoustic detection method, which captures the ambient sound through the use of a multi-directional microphone array that detects any sound from a range of 25 to 30 ft [401]. Then, the sound waves are filtered to analyze the target’s frequency. This is possible since drones are noisy; their rotary includes at least 8 razors that buzz louder as it gets nearer. However, this method offers a high level of accuracy in quiet areas, and is not suitable in noisy environments.

7.4.2. Video detection 

has been classified as a limited detection method [402]; the detection mechanism includes the ability to capture images of flying drones even at high distances (350 ft) with an acceptable resolution. However, the main problem is its inability to distinguish between birds and drones [401], which results into a high level of detection failure, despite the use of computer algorithms such as flight patterns. It was shown in [401] that seagulls’ flight movement is similar to that of drones.

7.4.3. Motion detection 

if combined with Speed Up Robust Features (SURF) algorithm, it can successfully detect drones while having other flying objects in its vicinity [401] (50–150 ft away), and it also draws the path of the drones.

7.4.4. Thermal detection 

is more accurate at detecting fixed-wing drones up to 350 ft away. In [403], Stolkin et al. stated that turbo-fan or the turbo-jet engines are easier to detect due to the generation of hot gases from their exhausts. However, it seems like this method is not suitable nor reliable for plastic quad-copters with electric motors. Hence, in [401], Ganti et al. suggested that it is better to combine this method with other methods. Either way, its implementation cost is high with a low detection rate over a limited distance.

7.4.5. Radar detection 

is very useful at detecting large aircrafts [404] over long distances (150-1500+ ft), but not small ones. This is due to the fact that smaller drones emit less noise and have less signal transmission.

7.4.6. RF Detection 

RF detection is very effective for long-range drones since RF signals can be detected from a longer distance (between 200 ft [405] and up to 1400 ft). As such, in [406], Hansen et al. stated that it is highly difficult to detect a drone that escapes RF detection, especially when drones transmit an image to the Ground Control Station (GCS) using an RF signal. However, to ensure a successful detection rate, the transmitter’s power and receiver’s sensitivity must be first evaluated and maintained.

Table 6 lists the available drone/UAV detection methods.

In this section, we presented the possible drone/UAV and counter-drone/UAV security measures, in addition to prevention techniques, and solutions related to the security of drone/UAV communications and networks, which are essential for armed forces and search-and-rescue operations. Next, we discuss the limitations of the current solutions, in addition to recommendations for future research directions to secure UAS, UAVs and drone’s systems, networks, data and communications.

8. Limitations and recommendations

8.1. Limitations

Many limitations are currently facing the adoption and usage of drones, which include serious security threats [407]. The main existing limitations in drones’ security are:

8.2. Suggestions & recommendations

After discussing the main security and privacy threats, the attacks and corresponding solutions, next we propose recommendations to enhance drone/UAV security:

9. Conclusion

The tremendous increase in the use of drones and UAVs led to a new aviation era of autonomous aerial vehicles in both the civilian and military domains, offering numerous benefits including economical, commercial, industrial, mainly due to their autonomous, flexible and easy-to-use nature, with low cost and energy consumption. However, their use led to the rise of many security, safety and privacy issues, which were manifested through various cyber attacks, threats and challenges, listed and explained in this paper. Also, we presented a holistic view of the drones/UAVs domains and provided detailed explanation and classification of their use in various domains and for different purposes, in addition to the different lethal/non-lethal security solutions as part of drones/UAVs countermeasures. Moreover, successful experiments to detect, intercept and hijack a drone through either de-authentication or jamming were highlighted, based on realistic scenarios that follow the traditional hacking cycle and hence, confirming the ease with which drones could be intercepted, especially in terms of UAV communication channels. In this context, different security suggestions and recommendations were proposed to ensure a safer and more secure use of drones and UAVs. Finally, due to the alarmingly increase in the use of drones by terrorists, further studies and experiments on how to prevent and counter the UAV threats, imposed by terrorists, will be performed and conducted as part of future work.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Article information

Internet of Things. 2020 Sep; 11: 100218.

Published online 2020 May 8. doi: 10.1016/j.iot.2020.100218

PMCID: PMC7206421

Jean-Paul YaacoubHassan NouraOla Salman, and Ali Chehab

AUB, Bliss Street Beirut Lebanon

Ola Salman: ude.bua.liam@51smo

Corresponding author. ude.bua.liam@51smo

Received 2019 Jul 22; Revised 2020 Mar 31; Accepted 2020 May 2.

Copyright © 2020 Elsevier B.V. All rights reserved.

Since January 2020 Elsevier has created a COVID-19 resource centre with free information in English and Mandarin on the novel coronavirus COVID-19. The COVID-19 resource centre is hosted on Elsevier Connect, the company’s public news and information website. Elsevier hereby grants permission to make all its COVID-19-related research that is available on the COVID-19 resource centre – including this research content – immediately available in PubMed Central and other publicly funded repositories, such as the WHO COVID database with rights for unrestricted research re-use and analyses in any form or by any means with acknowledgement of the original source. These permissions are granted for free by Elsevier for as long as the COVID-19 resource centre remains active.

References

1. Chan K., Nirmal U., Cheaw W. AIP Conference Proceedings. Vol. 2030. AIP Publishing; 2018. Progress on drone technology and their applications: a comprehensive review; p. 020308. [Google Scholar]

2. Liu Z., Li Z., Liu B., Fu X., Raptis I., Ren K. Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing. ACM; 2015. Rise of mini-drones: applications and issues; pp. 7–12. [Google Scholar]

3. Altawy R., Youssef A.M. Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans. Cyber-Phys. Syst. 2017;1(2):7. [Google Scholar]

4. He D., Chan S., Guizani M. Drone-assisted public safety networks: the security aspect. IEEE Commun. Mag. 2017;55(8):218–223. [Google Scholar]

5. Yampolskiy M., Horvath P., Koutsoukos X.D., Xue Y., Sztipanovits J. Proceedings of the 2nd ACM international conference on High confidence networked systems. ACM; 2013. Taxonomy for description of cross-domain attacks on cps; pp. 135–142. [Google Scholar]

6. Sedjelmaci H., Senouci S.M. Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. J. Supercomput. 2018:1–17. [Google Scholar]

7. Humphreys T. Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil gps spoofing. Univer. Texas Austin (July 18, 2012) 2012 [Google Scholar]

8. Shepard D.P., Bhatti J.A., Humphreys T.E., Fansler A.A. Proceedings of the ION GNSS Meeting. Vol. 3. 2012. Evaluation of smart grid and civilian uav vulnerability to gps spoofing attacks; pp. 3591–3605. [Google Scholar]

9. Güvenç İ., Ozdemir O., Yapici Y., Mehrpouyan H., Matolak D. 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC) IEEE; 2017. Detection, localization, and tracking of unauthorized uas and jammers; pp. 1–10. [Google Scholar]

10. Sturdivant R.L., Chong E.K. Systems engineering baseline concept of a multispectral drone detection solution for airports. IEEE Access. 2017;5:7123–7138. [Google Scholar]

11. Shi X., Yang C., Xie W., Liang C., Shi Z., Chen J. Anti-drone system with multiple surveillance technologies: architecture, implementation, and challenges. IEEE Commun. Mag. 2018;56(4):68–74. [Google Scholar]

12. Nassi B., Shabtai A., Masuoka R., Elovici Y. Sok-security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps. arXiv Preprint arXiv:1903.05155. 2019 [Google Scholar]

13. Atherton K.D. The faa says there will be 7 million drones flying over america by 2020. Popular Sci. 2016 [Google Scholar]

14. Vattapparamban E., Güvenç İ., Yurekli A.İ., Akkaya K., Uluağaç S. Wireless Communications and Mobile computing Conference (IWCMC), 2016 International. IEEE; 2016. Drones for smart cities: issues in cybersecurity, privacy, and public safety; pp. 216–221. [Google Scholar]

15. Dalamagkidis K., Valavanis K.P., Piegl L.A. On integrating unmanned aircraft systems into the national airspace system. Springer; 2012. Aviation history and unmanned flight; pp. 11–42. [Google Scholar]

16. Juul M. Civil drones in the European union. Eur. Parliament. Res. Serv. (ed.). Eur. Union. 2015 [Google Scholar]

17. Stopforth R. Drone licenses-neccesities and requirements. II Ponte. 2017;73(1):149–156. [Google Scholar]

18. Campos V.S. Ethics and Civil Drones. Springer, Cham; 2018. European union policies and civil drones; pp. 35–41. [Google Scholar]

19. Miah A. Drones: The Brilliant, the Bad and the Beautiful. Emerald Publishing Limited; 2020. Regulating drones. [Google Scholar]

20. Wright S. Ethical and safety implications of the growing use of civilian drone. UK Parliament Website (Sci. Technol. Committee) 2020 [Google Scholar]

21. Are drones dangerous or harmless fun? – bbc news, (https://www.bbc.com/news/uk-england-34269585). (Accessed on 07/09/2018).

22. Cress J.J., Sloan J.L., Hutt M.E. Implementation of unmanned aircraft systems by the us geological survey. Geocarto Int. 2011;26(2):133–140. [Google Scholar]

23. Park J., Kim S., Suh K. A comparative analysis of the environmental benefits of drone-based delivery services in urban and rural areas. Sustainability. 2018;10(3):888. [Google Scholar]

24. Canis B. 2015. Unmanned aircraft systems (uas): commercial outlook for a new industry. [Google Scholar]

25. Stöcker C., Bennett R., Nex F., Gerke M., Zevenbergen J. Review of the current state of uav regulations. Remote Sens. (Basel) 2017;9(5):459. [Google Scholar]

26. Jones T. Technical Report. RAND; 2017. International commercial drone regulation and drone delivery services. [Google Scholar]

27. Marshall D.M., Barnhart R.K., Hottman S.B., Shappee E., Most M.T. Crc Press; 2016. Introduction to unmanned aircraft systems. [Google Scholar]

28. Chen M., Challita U., Saad W., Yin C., Debbah M. Machine learning for wireless networks with artificial intelligence: a tutorial on neural networks. arXiv Preprint arXiv:1710.02913. 2017 [Google Scholar]

29. Dinger J., Hartenstein H. Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on. IEEE; 2006. Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration; pp. 8–pp. [Google Scholar]

30. Rowaihy H., Enck W., McDaniel P., La Porta T. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. IEEE; 2007. Limiting sybil attacks in structured p2p networks; pp. 2596–2600. [Google Scholar]

31. Naoumov N., Ross K. Proceedings of the 1st international conference on Scalable information systems. ACM; 2006. Exploiting p2p systems for ddos attacks; p. 47. [Google Scholar]

32. Fotouhi A., Qiang H., Ding M., Hassan M., Giordano L.G., Garcia-Rodriguez A., Yuan J. Survey on uav cellular communications: practical aspects, standardization advancements, regulation, and security challenges. arXiv Preprint arXiv:1809.01752. 2018 [Google Scholar]

33. Uragun B. Machine Learning and Applications and Workshops (ICMLA), 2011 10th International Conference on. Vol. 2. IEEE; 2011. Energy efficiency for unmanned aerial vehicles; pp. 316–320. [Google Scholar]

34. Vincent P.J., Tummala M., McEachen J. System of Systems Engineering, 2006 IEEE/SMC International Conference on. IEEE; 2006. An energy-efficient approach for information transfer from distributed wireless sensor systems; p. 6. [Google Scholar]

35. Singh Y. 2016. Wifi Espionage Using a Uav. [Google Scholar]

36. Irizarry J., Gheisari M., Walker B.N. Usability assessment of drone technology as safety inspection tools. J. Inf. Technol. Construct. (ITcon) 2012;17(12):194–212. [Google Scholar]

37. Abid M.E., Austin T., Fox D., Hussain S.S. Drones, uavs, and rpas: an analysis of a modern technology. Worcester Polytech. Inst., Worcester, Massachusetts. 2014 [Google Scholar]

38. Kopardekar P.H. 2014. Unmanned aerial system (uas) traffic management (utm): Enabling low-altitude airspace and uas operations. [Google Scholar]

39. Zeitlin A., McLaughlin M. Modeling for uas collision avoidance. AUVSI Unmann. Syst. North America, Orlando. 2006 [Google Scholar]

40. Motlagh N.H., Taleb T., Arouk O. Low-altitude unmanned aerial vehicles-based internet of things services: comprehensive survey and future perspectives. IEEE Internet Things J. 2016;3(6):899–922. [Google Scholar]

41. Barfield F. National Aerospace and Electronics Conference, 2000. NAECON 2000. Proceedings of the IEEE 2000. IEEE; 2000. Autonomous collision avoidance: the technical requirements; pp. 808–813. [Google Scholar]

42. Sharma R., Ghose D. Collision avoidance between uav clusters using swarm intelligence techniques. Int. J. Syst. Sci. 2009;40(5):521–538. [Google Scholar]

43. Yang L., Qi J., Xiao J., Yong X. Intelligent Control and Automation (WCICA), 2014 11th World Congress on. IEEE; 2014. A literature review of uav 3d path planning; pp. 2376–2381. [Google Scholar]

44. Ueno S., Higuchi T. Numerical Analysis-Theory and Application. InTech; 2011. Collision avoidance law using information amount. [Google Scholar]

45. Brandt A.M., Colton M.B. Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on. IEEE; 2010. Haptic collision avoidance for a remotely operated quadrotor uav in indoor environments; pp. 2724–2731. [Google Scholar]

46. Israelsen J., Beall M., Bareiss D., Stuart D., Keeney E., van den Berg J. Robotics and Automation (ICRA), 2014 IEEE International Conference on. IEEE; 2014. Automatic collision avoidance for manually tele-operated unmanned aerial vehicles; pp. 6638–6643. [Google Scholar]

47. Tulum K., Durak U., Yder S.K. Aerospace conference, 2009 IEEE. IEEE; 2009. Situation aware uav mission route planning; pp. 1–12. [Google Scholar]

48. Yanmaz E., Kuschnig R., Quaritsch M., Bettstetter C., Rinner B. Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on. IEEE; 2011. On path planning strategies for networked unmanned aerial vehicles; pp. 212–216. [Google Scholar]

49. Hernandez-Hernandez L., Tsourdos A., Shin H.-S., Waldock A. Unmanned Aircraft Systems (ICUAS), 2014 International Conference on. IEEE; 2014. Multi-objective uav routing; pp. 534–542. [Google Scholar]

50. Baccelli F., Błaszczyszyn B. Stochastic geometry and wireless networks: volume ii applications. Found. Trends® in Network. 2010;4(1–2):1–312. [Google Scholar]

51. Shakhatreh H., Sawalmeh A., Al-Fuqaha A., Dou Z., Almaita E., Khalil I., Othman N.S., Khreishah A., Guizani M. Unmanned aerial vehicles: a survey on civil applications and key research challenges. arXiv Preprint arXiv:1805.00881. 2018 [Google Scholar]

52. Rango A., Laliberte A., Steele C., Herrick J.E., Bestelmeyer B., Schmugge T., Roanhorse A., Jenkins V. Using unmanned aerial vehicles for rangelands: current applications and future potentials. Environ. Pract. 2006;8(3):159–168. [Google Scholar]

53. Jumaat N., Ahmad B., Dutsenwai H.S. IOP Conference Series: Earth and Environmental Science. Vol. 169. IOP Publishing; 2018. Land cover change mapping using high resolution satellites and unmanned aerial vehicle; p. 012076. [Google Scholar]

54. Sakano T., Fadlullah Z.M., Ngo T., Nishiyama H., Nakazawa M., Adachi F., Kato N., Takahara A., Kumagai T., Kasahara H. Disaster-resilient networking: a new vision based on movable and deployable resource units. IEEE Netw. 2013;27(4):40–46. [Google Scholar]

55. Yaacoub J.-P.A., Noura M., Noura H.N., Salman O., Yaacoub E., Couturier R., Chehab A. Securing internet of medical things systems: limitations, issues and recommendations. Future Generat. Comput. Syst. 2019 [Google Scholar]

56. Thiels C.A., Aho J.M., Zietlow S.P., Jenkins D.H. Use of unmanned aerial vehicles for medical product transport. Air Med. J. 2015;34(2):104–108. [PubMed] [Google Scholar]

57. Lipsitch M., Swerdlow D.L., Finelli L. Defining the epidemiology of covid-19-studies needed. N. Engl. J. Med. 2020 [PubMed] [Google Scholar]

58. Jiang F., Deng L., Zhang L., Cai Y., Cheung C.W., Xia Z. Review of the clinical characteristics of coronavirus disease 2019 (covid-19) J. Gen. Intern. Med. 2020:1–5. [PMC free article] [PubMed] [Google Scholar]

59. Boulos M.N.K., Geraghty E.M. 2020. Geographical tracking and mapping of coronavirus disease covid-19/severe acute respiratory syndrome coronavirus 2 (sars-cov-2) epidemic and Associated Events around the World: How 21St Century Gis Technologies Are Supporting the Global Fight against Outbreaks and Epidemics. [PMC free article] [PubMed] [Google Scholar]

60. Alvear O., Zema N.R., Natalizio E., Calafate C.T. Using uav-based systems to monitor air pollution in areas with poor accessibility. J. Adv. Transp. 2017;2017 [Google Scholar]

61. Villa T.F., Gonzalez F., Miljievic B., Ristovski Z.D., Morawska L. An overview of small unmanned aerial vehicles for air quality measurements: present applications and future prospectives. Sensors. 2016;16(7):1072. [PMC free article] [PubMed] [Google Scholar]

62. Rohi G., Ofualagba G. Autonomous monitoring, analysis, and countering of air pollution using environmental drones. Heliyon. 2020;6(1):e03252. [PMC free article] [PubMed] [Google Scholar]

63. Freeman P.K., Freeland R.S. Agricultural uavs in the us: potential, policy, and hype. Remote Sens. Appl. 2015;2:35–43. [Google Scholar]

64. Malveaux C., Hall S.G., Price R. 2014 Montreal, Quebec Canada July 13–July 16, 2014. American Society of Agricultural and Biological Engineers; 2014. Using drones in agriculture: unmanned aerial systems for agricultural remote sensing applications; p. 1. [Google Scholar]

65. McKinnon T. Agricultural drones: what farmers need to know. Boulder, Colorado. 2016 [Google Scholar]

66. Krishna K.R. Taylor & Francis; 2018. Agricultural drones: a peaceful pursuit. [Google Scholar]

67. Lakshmi V., Corbett J. Proceedings of the 53rd Hawaii International Conference on System Sciences. 2020. How artificial intelligence improves agricultural productivity and sustainability: a global thematic analysis. [Google Scholar]

68. van Gemert J.C., Verschoor C.R., Mettes P., Epema K., Koh L.P., Wich S. European Conference on Computer Vision. Springer; 2014. Nature conservation drones for automatic localization and counting of animals; pp. 255–270. [Google Scholar]

69. Ivošević B., Han Y.-G., Cho Y., Kwon O. The use of conservation drones in ecology and wildlife research. J. Ecol. Environ. 2015;38(1):113–118. [Google Scholar]

70. Mukwazvure A., Magadza T. A survey on anti-poaching strategies. Int. J. Sci. Res. 2014;3(6):1064–1166. [Google Scholar]

71. Barnas A., Chabot D., Hodgson A., Johnston D.W., Bird D.M., Ellis-Felege S.N. A standardized protocol for reporting methods when using drones for wildlife research. J. Unmann. Vehicle Syst. 2020;(ja) [Google Scholar]

72. Matos A., Silva E., Cruz N., Alves J.C., Almeida D., Pinto M., Martins A., Almeida J., Machado D. 2013 OCEANS-San Diego. IEEE; 2013. Development of an unmanned capsule for large-scale maritime search and rescue; pp. 1–8. [Google Scholar]

73. Matos A., Silva E., Almeida J., Martins A., Ferreira H., Ferreira B., Alves J., Dias A., Fioravanti S., Bertin D. Unmanned maritime systems for search and rescue. Search Rescue Robotics; IntechOpen: London, UK. 2017:77–92. [Google Scholar]

74. De Sousa J.B., Gonçalves G.A. Unmanned vehicles for environmental data collection. Clean Technol. Environ. Policy. 2011;13(2):369–380. [Google Scholar]

75. Klemas V.V. Coastal and environmental remote sensing from unmanned aerial vehicles: an overview. J. Coastal Res. 2015;31(5):1260–1267. [Google Scholar]

76. Hodgson A., Kelly N., Peel D. Unmanned aerial vehicles (uavs) for surveying marine fauna: a dugong case study. PLoS ONE. 2013;8(11):e79556. [PMC free article] [PubMed] [Google Scholar]

77. Verfuss U.K., Aniceto A.S., Harris D.V., Gillespie D., Fielding S., Jiménez G., Johnston P., Sinclair R.R., Sivertsen A., Solbø S.A. A review of unmanned vehicles for the detection and monitoring of marine fauna. Mar. Pollut. Bull. 2019;140:17–29. [PubMed] [Google Scholar]

78. Johnson L.K., Dorn A.W., Webb S., Kreps S., Krieger W., Schwarz E., Shpiro S., Walsh P.F., Wirtz J.J. An ins special forum: intelligence and drones/eyes in the sky for peacekeeping: the emergence of uavs in un operations/the democratic deficit on drones/the german approach to drone warfare/pursuing peace: the strategic limits of drone warfare/seeing but unseen: intelligence drones in israel/drone paramilitary operations against suspected global terrorists: us and australian perspectives/the ‘terminator conundrum’ and the future of drone warfare. Intell. Natl. Secur. 2017;32(4):411–440. [Google Scholar]

79. Straub J. Unmanned aerial systems: consideration of the use of force for law enforcement applications. Technol. Soc. 2014;39:100–109. [Google Scholar]

80. Finn R.L., Wright D. Unmanned aircraft systems: surveillance, ethics and privacy in civil applications. Comput. Law Secur. Rev. 2012;28(2):184–194. [Google Scholar]

81. Rosenfeld A. Are drivers ready for traffic enforcement drones? Accid. Anal. Prevent. 2019;122:199–206. [PubMed] [Google Scholar]

82. Chamoso P., González-Briones A., De La Prieta F., Corchado J.M. RSFF. 2018. Computer vision system for fire detection and report using uavs. pp. 40–49. [Google Scholar]

83. Koebler J. North dakota man sentenced to jail in controversial drone-arrest case. US NEWS & WORLD REPORT, Jan. 2014;15 [Google Scholar]

84. Hibbett M. 2018. Audible killings: Capitalist motivation, character construction, and the effects of representation in true crime podcasts. [Google Scholar]

85. Traylor C.M. 2019. Serialized killing: usability and user experience in the true crime genre. [Google Scholar]

86. Michaeli S. B’tselem; 2013. Crowd Control: Israel’s Use of Crowd Control Weapons in the West Bank. [Google Scholar]

87. Crowley M. Tear gassing by remote control: the development and promotion of remotely operated means of delivering or dispersing riot control agents. Remote Control Project. 2015 [Google Scholar]

88. Porter A.A. Law enforcement’s use of weaponized drones: today and tomorrow. Louis ULJ. 2016;61:351. [Google Scholar]

89. Asaro P. Algorithms of violence: critical social perspectives on autonomous weapons. Soc. Res.: Int. Q. 2019;86(2):537–555. [Google Scholar]

90. Lee S. Simulating the contact zone: corporate mediations of (less-lethal) violence in israel, palestine, and beyond. Jerusalem Q. 2018;(75):24. [Google Scholar]

91. Cook K.L. 2007 IEEE Aerospace Conference. IEEE; 2007. The silent force multiplier: the history and role of uavs in warfare; pp. 1–7. [Google Scholar]

92. Chait R., Sciarretta A., Shorts D. Technical Report. NATIONAL DEFENSE UNIV WASHINGTON DC CENTER FOR TECHNOLOGY AND NATIONAL; 2006. Army science and technology analysis for stabilization and reconstruction operations. [Google Scholar]

93. Wilson J. Uav roundup. Aerosp. Am. 2013:26–36. [Google Scholar]

94. Galdi T. CRS Report for Congress. Vol. 11. 1995. Revolution in military affairs. [Google Scholar]

95. Long S., Haskins S. Uavs and win: a command, control, communications, computers, surveillance lance and reconnaissance winner. ARMY COMMUNICATOR. 1997;22:34–41. [Google Scholar]

96. Chait R., Sciarretta A., Lyons J., Barry C., Shorts D., Long D. Technical Report. NATIONAL DEFENSE UNIV WASHINGTON DC CENTER FOR TECHNOLOGY AND NATIONAL; 2007. A Further Look at Technologies and Capabilities for Stabilization and Reconstruction Operations. [Google Scholar]

97. Eggers J., Draper M.H. Proc. NATO RTO Human Factors and Medicine Symp. HFM-135. NATO TRO, Neuilly-sur-Siene, CEDEX, Biarritz, France. 2006. Multi-uav control for tactical reconnaissance and close air support missions: operator perspectives and design challenges; pp. 2006–2011. [Google Scholar]

98. Drew J. Raytheon system to quicken air response: Darpa’s persistent close air support program enters flight test phase. Inside the Air Force. 2014;25(6):1–13. [Google Scholar]

99. Pirnie B.R., Vick A., Grissom A., Mueller K.P., Orletsky D.T. Technical Report. RAND CORP SANTA MONICA CA; 2005. Beyond close air support. forging a new air-ground partnership. [Google Scholar]

100. Wing S.D. French intervention in mali: strategic alliances, long-term regional presence? Small wars Insurgencies. 2016;27(1):59–80. [Google Scholar]

101. Heisbourg F. A surprising little war: first lessons of mali. Survival (Lond) 2013;55(2):7–18. [Google Scholar]

102. Charbonneau B. Intervention in mali: building peace between peacekeeping and counterterrorism. J. Contemp. Afric. Stud. 2017;35(4):415–431. [Google Scholar]

103. Francis D.J. The regional impact of the armed conflict and french intervention in mali. Oslo: Norwegian Peacebuilding Resource Centre. 2013 [Google Scholar]

104. Rotte R. Western drones and african security. Afric. Secur. Rev. 2016;25(1):85–94. [Google Scholar]

105. Olsen G.R. Fighting terrorism in africa by proxy: the usa and the european union in somalia and mali. Eur. Secur. 2014;23(3):290–306. [Google Scholar]

106. Anderson D.M., McKnight J. Kenya at war: Al-shabaab and its enemies in eastern africa. Afr. Aff. (Lond) 2015;114(454):1–27. [Google Scholar]

107. Agbiboa D. The ongoing campaign of terror in nigeria: boko haram versus the state. Stability: International Journal of Security and Development. 2013;2(3) [Google Scholar]

108. Griffin C. Operation barkhane and boko haram: french counterterrorism and military cooperation in the sahel. Small Wars Insurgenci. 2016;27(5):896–913. [Google Scholar]

109. Solomon H. Springer; 2015. Terrorism and Counter-Terrorism in Africa: Fighting Insurgency from Al Shabaab, Ansar Dine and Boko Haram. [Google Scholar]

110. Jones S.G., Liepman A.M., Chandler N. Rand Corporation; 2016. Counterterrorism and Counterinsurgency in Somalia: Assessing the Campaign Against Al Shabaab. [Google Scholar]

111. Burgess S. Military intervention in africa: french and us approaches compared. Air Space Power J. 2018;9(2):5–25. [Google Scholar]

112. Hansen S.J. Oxford University Press; 2013. Al-Shabaab in Somalia: The history and ideology of a Militant Islamist group. [Google Scholar]

113. Churchill R.P. Unmanned Aerial Vehicles: Breakthroughs in Research and Practice. IGI Global; 2019. Drone warfare: Ethical and psychological issues; pp. 452–468. [Google Scholar]

114. Barrie D., Barry B., Boyd H., Chagnaud M.-L.C., Childs N., Giegerich B., Mölling C., Schütz T. International Institute for Strategic Studies; 2018. Protecting Europe: Meeting the EU’s Military Level of Ambition in the Context of brexit. [Google Scholar]

115. Marshall C., Garrett R. Simulation for c?isr: command, control, communications, computers, intelligence, surveillance, & reconnaissance. Phalanx. 1996;29(1):1–11. [Google Scholar]

116. Callam A. Drone wars: armed unmanned aerial vehicles. Int. Aff. Rev. 2010;18(3) [Google Scholar]

117. Felgenhauer P. The Guns of August 2008. Routledge; 2015. After august 7: the escalation of the russia-georgia war; pp. 186–204. [Google Scholar]

118. The basic requirements for modern complexes of guided artillery armament as an element of conducting distribution-fire actions of tactical level . Vol. 19. 2018. pp. 15–20. [Google Scholar]

119. Radin A., Davis L.E., Geist E., Han E., Massicot D., Povlock M., Reach C., Boston S., Charap S., Mackenzie W. 2019. What will russian military capabilities look like in the future? [Google Scholar]

120. Jenzen-Jones N., Ferguson J. Vol. 3. Armament Research Services Pty. Ltd.; 2014. Raising red flags: An examination of arms & munitions in the ongoing conflict in Ukraine. [Google Scholar]

121. M.A.C. Fox, Battle of debal’ tseve: the conventional line of effort in russia’ s hybrid war in ukraine.

122. Rossiter A. Drone usage by militant groups: exploring variation in adoption. Defense Secur. Anal. 2018;34(2):113–126. [Google Scholar]

123. Wendle J. The fighting drones of ukraine. Air Space Mag. 2018 [Google Scholar]

124. O. Analytica, Turkey may recruit more syrian rebel fighters, Emerald Expert Briefings, (oxan-es).

125. P. Escobar, Turkey at War with Syria.

126. Gusterson H. MIT Press; 2016. Drone: Remote Control Warfare. [Google Scholar]

127. Hovle C., Koch A. Yemen drone strike: just the start? Jane’s Defence Weekly. 2002;38(20):3. [Google Scholar]

128. Zenko M. Council on Foreign Relations; 2013. Reforming US drone strike policies. [Google Scholar]

129. Cole C. Drone wars briefing. Drone Wars UK: Oxford, UK. 2012 [Google Scholar]

130. Kreis J.F. Unmanned aircraft in israeli air operations. Air Power History. 1990;37(4):46–50. [Google Scholar]

131. Hartley K., Belin J. Routledge; 2019. The Economics of the Global Defence Industry. [Google Scholar]

132. Sanders R. Technical Report. INDUSTRIAL COLL OF THE ARMED FORCES WASHINGTON DC; 2003. An israeli military innovation: Uavs. [Google Scholar]

133. Dobbing M., Cole C. Israel and the drone wars: examining israel’ s production, use and proliferation of uavs. Drone Wars UK, Oxford. 2014 [Google Scholar]

134. Gettinger D. Drones operating in syria and iraq. Center for the Study of the Drone at Bard College. 2016 [Google Scholar]

135. Blank S. 2019. The russian military resurgence: Post-soviet decline and rebuilding, 1992 deliIns–2018. [Google Scholar]

136. O. Analytica, Damascus may press on in idlib, at high human cost, Emerald Expert Briefing.(oxan-db).

137. O. Analytica, A new accommodation over syria’s idlib is probable, Emerald Expert Briefing.(oxan-db).

138. O. Analytica, Syria’s new idlib offensive may be incremental, Emerald Expert Briefings(oxan-es).

139. O. Analytica, Idlib ceasefire shows syria’s relegation below libya, Emerald Expert Briefings(oxan-es).

140. O. Analytica, Moscow will limit ankara’s military gains in syria, Emerald Expert Briefings(oxan-es).

141. O. Analytica, Ceasefire may ultimately dislodge turkey from syria, Emerald Expert Briefings(oxan-db).

142. O. Analytica, Risk of russia-turkey clash in syria may prompt pause, Emerald Expert Briefings(oxan-es).

143. Hartmann K., Giles K. 2016 8th International Conference on Cyber Conflict (CyCon) IEEE; 2016. Uav exploitation: a new domain for cyber power; pp. 205–221. [Google Scholar]

144. Lafta R., Al-Nuaimi M.A., Burnham G. Injury and death during the isis occupation of mosul and its liberation: results from a 40-cluster household survey. PLoS Med. 2018;15(5):e1002567. [PMC free article] [PubMed] [Google Scholar]

145. Goebel G. 2008. History of unmanned aerial vehicles. [Google Scholar]

146. Kennett L. Simon and Schuster; 1999. The First Air War: 1914-1918. [Google Scholar]

147. Sullivan J.M. Evolution or revolution? the rise of uavs. IEEE Technol. Soc. Mag. 2006;25(3):43–49. [Google Scholar]

148. MacManus D., Dean K., Jones M., Rona R.J., Greenberg N., Hull L., Fahy T., Wessely S., Fear N.T. Violent offending by uk military personnel deployed to iraq and afghanistan: a data linkage cohort study. The Lancet. 2013;381(9870):907–917. [PubMed] [Google Scholar]

149. Benjamin M. Verso Books; 2013. Drone warfare: Killing by remote control. [Google Scholar]

150. Mini drone for special forces military black hornet, (http://dronesonvideo.com/personal-drone-for-special-forces-soldiers-black-hornet/). (Accessed on 07/09/2018).

151. Chaturvedi S.K., Sekhar R., Banerjee S., Kamal H. Comparative review study of military and civilian unmanned aerial vehicles (uavs) INCAS Bull. 2019;11(3):183–198. [Google Scholar]

152. A. EGOZI, The israeli new loitering weapon systems-answering a growing demand.

153. Ghulam A., Tomlinson C.P. The fire shadow project: a big step towards rapid acquisition. RUSI Defence Syst. 2008:77–80. [Google Scholar]

154. Von Winterfeldt D., O’Sullivan T.M. Should we protect commercial airplanes against surface-to-air missile attacks by terrorists? Decis. Anal. 2006;3(2):63–75. [Google Scholar]

155. Gibbons-Neff T. Israeli-made kamikaze drone spotted in nagorno-karabakh conflict. Washington Post. 2016;5 [Google Scholar]

156. Chornenky D. A multi-sided platform for remote operation of shared drones: deriving strategic opportunities from regulatory trends. Massachusetts Institute of Technology; 2018. Ph.D. thesis. [Google Scholar]

157. Hussain M.A., kyung Sup K. 2009 11th International Conference on Advanced Communication Technology. Vol. 1. IEEE; 2009. Wsn research activities for military application; pp. 271–274. [Google Scholar]

158. Hagen P.E., Storkersen N., Vestgard K., Kartvedt P. Oceans 2003. Celebrating the Past… Teaming Toward the Future (IEEE Cat. No. 03CH37492) Vol. 2. IEEE; 2003. The hugin 1000 autonomous underwater vehicle for military applications; pp. 1141–1145. [Google Scholar]

159. Inzartsev A. BoD–Books on Demand; 2009. Underwater vehicles. [Google Scholar]

160. Eaglen M., Rodeback J. Heritage Foundation; 2010. Submarine arms race in the Pacific: The Chinese challenge to US undersea supremacy. [Google Scholar]

161. Perlez J., Rosenberg M., Cook P. China agrees to return seized drone, ending standoff, pentagon says. N.Y. Times. 2016;17 [Google Scholar]

162. Cote O.R. MIT Center for International Studies; 2011. Assessing the Undersea Balance between the US and China. [Google Scholar]

163. Kawashima S. Japan–us–china relations during the trump administration and the outlook for east asia. Asia-Pacific Rev. 2017;24(1):23–36. [Google Scholar]

164. Hardy T., Barlow G. International Naval Engineering Conference and Exhibition 2008. 2008. Unmanned underwater vehicle (uuv) deployment and retrieval considerations for submarines. [Google Scholar]

165. Bane G., Ferguson J. Proceedings of the 1987 5th International Symposium on Unmanned Untethered Submersible Technology. Vol. 5. IEEE; 1987. The evolutionary development of the military autonomous underwater vehicle; pp. 60–88. [Google Scholar]

166. Braverman I., Johnson E.R. Duke University Press; 2020. Blue Legalities: The Life and Laws of the Sea. [Google Scholar]

167. Clegg D., Peterson M. Oceans 2003. Celebrating the Past… Teaming Toward the Future (IEEE Cat. No. 03CH37492) Vol. 3. IEEE; 2003. User operational evaluation system of unmanned underwater vehicles for very shallow water mine countermeasures; pp. 1417–1423. [Google Scholar]

168. P. Chu, Smart underwater robot (sur) for naval operations and undersea mining.

169. Truver S.C. Taking mines seriously: mine warfare in china’s near seas. Naval War College Rev. 2012;65(2):30–66. [Google Scholar]

170. Grimmett R.F. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE; 2006. Authorization for use of military force in response to the 9/11 attacks (pl 107-40): Legislative history. [Google Scholar]

171. Lee P. Submission of evidence to the all party parliamentary group drones: how are raf reaper (drone) operators affected by the conduct of recent and ongoing operations? Appgdrones. org. uk. 2017 [Google Scholar]

172. Davis L.E., McNerney M., Greenberg M.D. Technical Report. RAND CORP SANTA MONICA CA SANTA MONICA United States; 2016. Clarifying the Rules for Targeted Killing: An Analytical Framework for Policies Involving Long-Range Armed Drones. [Google Scholar]

173. Allen J. 2019. Testing the effects of us airstrikes on insurgent initiated violence in yemen. [Google Scholar]

174. Cutler L. President Obama’s Counterterrorism Strategy in the War on Terror. Springer; 2017. Drone security policy and targeted killing; pp. 37–63. [Google Scholar]

175. Boyle M.J. The costs and consequences of drone warfare. Int. Aff. 2013;89(1):1–29. [Google Scholar]

176. Boussios E. Changing the rules of war: the controversies surrounding the united states’ expanded use of drones. Contemp. Voices: St Andrews J. Int. Relat. 2015;6(1) [Google Scholar]

177. Dworkin A. European Council on Foreign Relations (ECFR); 2013. Drones and targeted killing: Defining a European position. [Google Scholar]

178. Becker J., Shane S. Secret ’kill list’proves a test of obama’s principles and will. N.Y. Times. 2012;29:5. [Google Scholar]

179. Byman D. Do targeted killings work. Foreign Aff. 2006;85:95. [Google Scholar]

180. Lee P. The drone operator and identity: exploring the constitution of ethical subjectivity in drones discourses. Critical Approaches to Discourse Analysis across Disciplines: CADAAD. 2017;9(2):62–78. [Google Scholar]

181. Boussios E.G. The proliferation of drones: a new and deadly arms race. J. Appl. Security. Res. 2014;9(4):387–392. [Google Scholar]

182. Gettinger D., Michel A.H. Loitering munitions. Center Study Drone. 2017 [Google Scholar]

183. Davis L.E., McNerney M.J., Chow J., Hamilton T., Harting S., Byman D. Technical Report. RAND Corp Santa Monica Ca; 2014. Armed and dangerous? UAVs and US security. [Google Scholar]

184. Hughes M., Hess J. An assessment of lone wolves using explosive-laden consumer drones in the united states. Global Secur. Intell. Stud. 2016;2(1):6. [Google Scholar]

185. A mini uav becomes a suicide drone | paris air show 2015 content from aviation week, (http://aviationweek.com/paris-air-show-2015/mini-uav-becomes-suicide-drone-0).(Accessed on 07/09/2018).

186. Stolley M.R. Technical Report. Air Command And Staff College Maxwell Air Force Base United States; 2012. Unmanned Vanguard: Leveraging The Operational Effectiveness Of The Israeli Unmanned Aircraft System Program. [Google Scholar]

187. G. Dragon, Israel aerospace industries (iai) unveiled at the singapore airshow the newest members in its loitering munitions (lm) family. iai is the world’s pioneer in Developing and Fielding Various Types of Lms: the Most Prominent So Far Being Harpy (an Autonomous.

188. I. Nammer, Categorie: Isr.

189. Wright S., Lee P. Should we fear the rise of the drone assassins? The Conversation. 2017 [Google Scholar]

190. 2018. Venezuela ’drone attack’: Six arrests made – bbc news. [Google Scholar]( https://www.bbc.com/news/world-latin-america-45077057)

191. 2018. Venezuela: Military figures arrested after drone ’attack’ – bbc news. [Google Scholar]( https://www.bbc.com/news/world-latin-america-45190905

192. Terrorism by joystick | pittsburgh post-gazette, (https://www.post-gazette.com/opinion/2018/08/07/Terrorism-by-joystick/stories/201808070022).

193. Sauer F., Schörnig N. Killer drones: the ’silver bullet’of democratic warfare? Secur. Dialog. 2012;43(4):363–380. [Google Scholar]

194. Bergmann K. Mq-4c: northrop grumman gears up for’triton’full rate production. Asia-Pacif. Def. Reporter (2002) 2019;45(1):50. [Google Scholar]

195. Gettinger D. Center for the Study of the Drone at Bard College; 2016. Drone spending in the fiscal year 2017 defense budget. [Google Scholar]

196. Schulte P. Handbook of Terrorism and Counter Terrorism Post 9/11. Edward Elgar Publishing; 2019. Future war: Ai, drones, terrorism and counterterror. [Google Scholar]

197. McDonnell T.M. Sow what you reap: using predator and reaper drones to carry out assassinations or targeted killings of suspected islamic terrorists. Geo. Wash. Int’l L. Rev. 2012;44:243. [Google Scholar]

198. Cooper T. 2018. Combat drone makes trans-atlantic history. [Google Scholar]( https://www.forces.net/news/combat-drone-makes-trans-atlantic-history)

199. Bowden M. The ploy: the inside story of how the interrogators of task force 145 cracked abu musab al-zarqawi’s inner circle-without resorting to torture-and hunted down al-qaeda’s man in iraq. Atlantic Monthly. 2007;299(4) [Google Scholar]

200. Chambers P. Abu musab al zarqawi: the making and unmaking of an american monster (in baghdad) Alternatives. 2012;37(1):30–51. [Google Scholar]

201. Meo N. How israel killed ahmed jabari, its toughest enemy in gaza. The Telegraph. 2012;17 [Google Scholar]

202. Shah S., MANDHANA N., HASAN S.S. World news. Wall Street J. 2014;9 [Google Scholar]

203. Jakira A. Technical Report. AIR WAR COLL MAXWELL AFB AL MAXWELL AFB United States; 2017. Israeli Deterrence And the 2nd Lebanon War. [Google Scholar]

204. Analytica O. Fearful gulf states will seek to placate tehran. Emerald Expert Briefings. 2020 [Google Scholar]oxan-es

205. Analytica O. A new us-iran war will play out in iraq and beyond. Emerald Expert Briefings. 2020 [Google Scholar]oxan-db

206. Sluka J.A. Death from above: uavs and losing hearts and minds. Mil. Rev. 2011;91(3):70. [Google Scholar]

207. Veltman R. Rationalising Drone Warfare The Biopolitics and Necropolitics of US, Israeli and UK Drone Warfare. 2019. Master’s thesis. [Google Scholar]

208. Mir A., Moore D. Drones, surveillance, and violence: theory and evidence from a us drone program. Int. Stud. Q. 2019;63(4):846–862. [Google Scholar]

209. Bonetto M., Korshunov P., Ramponi G., Ebrahimi T. Automatic Face and Gesture Recognition (FG), 2015 11th IEEE International Conference and Workshops on. Vol. 4. IEEE; 2015. Privacy in mini-drone based video surveillance; pp. 1–6. [Google Scholar]

210. Horsman G. Unmanned aerial vehicles: a preliminary analysis of forensic challenges. Digital Invest. 2016;16:1–11. [Google Scholar]

211. Guérin F., Guinand F., Brethé J.-F., Pelvillain H. Industrial Technology (ICIT), 2015 IEEE International Conference on. IEEE; 2015. Uav-ugv cooperation for objects transportation in an industrial area; pp. 547–552. [Google Scholar]

212. Afzal U., Mahmood T. Information & Communication Technologies (ICICT), 2013 5th International Conference on. IEEE; 2013. Using predictive analytics to forecast drone attacks in pakistan; pp. 1–6. [Google Scholar]

213. Vemi S.G., Panchev C. Proceedings of the European Conference on e-Learning. Academic Conferences and Publishing International; 2015. Vulnerability testing of wireless access points using unmanned aerial vehicles (uav) p. 245. [Google Scholar]

214. S.S. Devekar, T.M. Pawar, Y.M. Lande, S. Deokule, Autonomous Drone Delivery System for Lightweight Packages.

215. Westerlund O., Asif R. 2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS) IEEE; 2019. Drone hacking with raspberry-pi 3 and wifi pineapple: Security and privacy threats for the internet-of-things; pp. 1–10. [Google Scholar]

216. Wesson K., Humphreys T. Hacking drones. Sci. Am. 2013;309(5):54–59. [PubMed] [Google Scholar]

217. Analysis: with drone attacks, the era of joystick terrorism appears to have arrived | south china morning post, 2018, (https://www.scmp.com/news/world/article/2158380/analysis-drone-attacks-prove-era-joystick-terrorism-has-arrived-and-world).

218. Ball R.J. Technical Report. Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States); 2017. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications. [Google Scholar]

219. Bunnell J.G. Technical Report. Air War College Air University Maxwell AFB United States; 2011. From the Underground to the High Ground: The Insurgent Use of Airpower. [Google Scholar]

220. Bunker R.J. Technical Report. ARMY WAR COLLEGE CARLISLE BARRACKS PA STRATEGIC STUDIES INSTITUTE; 2015. Terrorist and Insurgent Unmanned Aerial Vehicles: use, potentials, and military implications. [Google Scholar]

221. Yayla A.S., Speckhard A. 2017. The potential threats posed by isis’s use of weaponized air drones and how to fight back. [Google Scholar]

222. Solomon B. Witnessing an isis drone attack. New York Times. 2017 [Google Scholar]( https://www.nytimes.com/video/world/middleeast/100000005040770/isisdrone-attack-mosul.html)

223. Sims A. The rising drone threat from terrorists. Georgetown J. Int. Affair. 2018;19:97–107. [Google Scholar]

224. Almohammad A., Speckhard A. Isis drones: evolution, leadership, bases, operations and logistics. Int. Center Study Violent Extremism. 2017;5 [Google Scholar]

225. B. Serkan, Daesh’s drone strategy technology and the rise of innovative terrorism, 2017, SETA Found. Polit. Econ. Soc. Res..

226. Tønnessen T.H. Islamic state and technology–a literature review. Perspectives on terrorism. 2017;11(6):101–111. [Google Scholar]

227. Pomerleau M. How $650 drones are creating problems in iraq and syria. C4ISRNET-Media for the Intelligence Age Military. 2018 [Google Scholar]

228. El Damanhoury K., Winkler C., Kaczkowski W., Dicker A. Examining the military–media nexus in isis’s provincial photography campaign. Dyn. Asymmetr. Conf. 2018;11(2):89–108. [Google Scholar]

229. Harper A. 2018. Drones Level the Battlefield for Extremists. [Google Scholar]

230. Lee Ludvigsen J.A. The portrayal of drones in terrorist propaganda: a discourse analysis of al qaeda in the arabian peninsula’s inspire. Dyn. Asymmetric Confl. 2018;11(1):26–49. [Google Scholar]

231. McKown M. The new drone state: suggestions for legislatures seeking to limit drone surveillance by government and nongovernment controllers. U. Fla. JL & Pub. Pol’y. 2015;26:71. [Google Scholar]

232. Smith K.W. Drone technology: benefits, risks, and legal considerations. Seattle J. Envtl. L. 2015;5:i. [Google Scholar]

233. Hoenig M. Hezbollah and the use of drones as a weapon of terrorism. Public Interest Rep. 2014;67(2) [Google Scholar]

234. Knights M., Mello A. Defeat by annihilation: mobility and attrition in the islamic state’s defense of mosul. CTC Sentinel. 2017;10(43) [Google Scholar]

235. Dunn D.H. Drones: disembodied aerial warfare and the unarticulated threat. Int. Aff. 2013;89(5):1237–1246. [Google Scholar]

236. Rassler D. Combating Terrorism Center at West Point; 2018. The Islamic State and Drones: Supply, Scale, and Future Threats. [Google Scholar]

237. Warrick J. Use of weaponized drones by isis spurs terrorism fears. Washington Post. 2017;12 [Google Scholar]

238. Yokohama H., Sunde J., Ellis-Steinborner S.T., Ayubi Z. Vehicle borne improvised explosive device (vbied) characterisation and estimation of its effects in terms of human injury. Int. J. Protect. Struct. 2015;6(4):607–627. [Google Scholar]

239. Davis M. Verso Books; 2017. Buda’s Wagon: A brief history of the car bomb. [Google Scholar]

240. Waters N. Types of islamic state drone bombs and where to find them. Bellingcat. May. 2017;24 [Google Scholar]

241. Gibbons-Neff T. Houthi forces appear to be using iranian-made drones to ram saudi air defenses in yemen, report says. Washington Post. 2017;22 [Google Scholar]

242. Hubbard B., Karasz P., Reed S. Two major saudi oil installations hit by drone strike, and us blames iran. The New York Times (Sept. 14, 2019) 2019 [Google Scholar]available at https://www.nytimes.com/2019/09/14/world/middleeast/saudi-arabia-refineries-drone-attack.html (last updated Sept. 15, 2019)

243. Criekemans D. 2019. Simulation exercise: Iran versus saudi arabia. geopolitical struggle in the middle east. [Google Scholar]

244. Rezaei F. Iran’s Foreign Policy After the Nuclear Agreement. Springer; 2019. Iran and Israel: Taking on the “zionist enemy” pp. 215–242. [Google Scholar]

245. Knights M. The houthi war machine: from guerrilla war to state capture. Combatt. Terror. Center Sentinel. 2018;11(8):15–23. [Google Scholar]

246. Sharp J.M., Brudnick I.A. 2015. Yemen: civil war and regional intervention. [Google Scholar]

247. S. Center, Where coalitions come to die.

248. Nevola L., Shiban B. Global, Regional, and Local Dynamics in the Yemen Crisis. Springer; 2020. The role of “coup forces,” saleh, and the houthis; pp. 233–251. [Google Scholar]

249. Rassler D. Technical Report. Combating Terrorism Center at West Point West Point United States; 2016. Remotely piloted innovation: Terrorism, drones and supportive technology. [Google Scholar]

250. Katz Y. Idf encrypting drones after hezbollah accessed footage. Jerusalem Post. 2010 [Google Scholar]

251. Gorman S., Dreazen Y.J., Cole A. Insurgents hack us drones. Wall Street J. 2009;17 [Google Scholar]

252. Wan W., Finn P. Global race on to match us drone capabilities. Washington Post. 2011;4 [Google Scholar]

253. McBride S.P. Pirating the ultimate killer app: hacking military unmanned aerial vehicles. Inf. Secur. Manag. Handbook. 2012;6:301. [Google Scholar]

254. Gibbons-Neff T. Isis drones are attacking us troops and disrupting airstrikes in raqqa, officials say. Washington Post. 2017;14 [Google Scholar]

255. Scher C., Saah D. AGU Fall Meeting Abstracts. 2018. Extent and characteristics of damage from wildfires caused by incendiary kites during protests of the gaza-israel barrier fence (march 2018 to present) [Google Scholar]

256. Gleeson L. Palestinians still defying apartheid. Green Left Weekly. 2018;(1189):13. [Google Scholar]

257. Zych J. The use of weaponized kites and balloons in the israeli–palestinian conflict. Secur. Defence Q. 2019 [Google Scholar]

258. Khen H.M.-E. From knives to kites: developments and dilemmas around the use of force in the israeli–palestinian conflict since protective edge. J. Int. Humanitar. Legal Stud. 2019;10(2):303–336. [Google Scholar]

259. Cavoukian A. Information and Privacy Commissioner of Ontario, Canada Ontario; 2012. Privacy and drones: Unmanned aerial vehicles. [Google Scholar]

260. Kafi M.A., Challal Y., Djenouri D., Doudou M., Bouabdallah A., Badache N. A study of wireless sensor networks for urban traffic monitoring: applications and architectures. Procedia Comput. Sci. 2013;19:617–626. [Google Scholar]

261. Mansfield K., Eveleigh T., Holzer T.H., Sarkani S. Technologies for Homeland Security (HST), 2013 IEEE International Conference on. IEEE; 2013. Unmanned aerial vehicle smart device ground control station cyber security threat model; pp. 722–728. [Google Scholar]

262. Jones A., Kovacich G.L. Auerbach Publications; 2015. Global Information Warfare: The New Digital Battlefield. [Google Scholar]

263. Hudson B. 2018. Drone attacks are essentially terrorism by joystick – the washington post. [Google Scholar]( https://www.washingtonpost.com/opinions/drone-attacks-are-essentially-terrorism-by-joystick/2018/08/05/f93ec18a-98d5-11e8-843b-36e177f3081c_story.html?noredirect=on&utm_term=.792978a5071d)

264. Boucher P. Domesticating the drone: the demilitarisation of unmanned aircraft for civil markets. Sci. Eng. Ethic. 2015;21(6):1393–1412. [PMC free article] [PubMed] [Google Scholar]

265. Letterman C., Schanzer D., Pitts W., Ladd K., Holloway J., Mitchell S., Kaydos-Daniels S.C. Technical Report. Institution for Homeland Security Solutions; 2013. Unmanned aircraft and the human element: Public perceptions and first responder concerns. [Google Scholar]

266. Du H., Heldeweg M.A. 2017. Responsible design of drones and drone services: Legal perspective synthetic report. [Google Scholar]

267. Wackwitz K., Boedecker H. Safety risk assessment for uav operation. Drone Industry Insights, Safe Airspace Integration Project, Part One, Hamburg, Germany. 2015 [Google Scholar]

268. Carr E.B. Unmanned aerial vehicles: examining the safety, security, privacy and regulatory issues of integration into us airspace. Natl. Centre Policy Anal. (NCPA). Retriev. September. 2013;23:2014. [Google Scholar]

269. Syed N., Berry M. Journo-drones: a flight over the legal landscape. Comm. LAw. 2014;30:1–27. [Google Scholar]

270. Finn R.L., Wright D., Friedewald M. European data protection: coming of age. Springer; 2013. Seven types of privacy; pp. 3–32. [Google Scholar]

271. Clarke R. The regulation of civilian drones’ impacts on behavioural privacy. Comput. Law Secur. Rev. 2014;30(3):286–305. [Google Scholar]

272. Salman O., Elhajj I., Chehab A., Kayssi A. Iot survey: an sdn and fog computing perspective. Comput. Netw. 2018;143:221–246. [Google Scholar]

273. Salman O., Elhajj I., Chehab A., Kayssi A. 2017 Fourth International Conference on Software Defined Systems (SDS) IEEE; 2017. Software defined iot security framework; pp. 75–80. [Google Scholar]

274. Rahman M.F.B.A. 2017. Smart cctvs for secure cities: Potentials and challenges. [Google Scholar]

275. Zeng Y., Zhang R., Lim T.J. Wireless communications with unmanned aerial vehicles: opportunities and challenges. arXiv preprint arXiv:1602.03602. 2016 [Google Scholar]

276. Rudinskas D., Goraj Z., Stankūnas J. Security analysis of uav radio communication system. Aviation. 2009;13(4):116–121. [Google Scholar]

277. Kerns A.J., Shepard D.P., Bhatti J.A., Humphreys T.E. Unmanned aircraft capture and control via gps spoofing. J. Field Rob. 2014;31(4):617–636. [Google Scholar]

278. Seo S.-H., Lee B.-H., Im S.-H., Jee G.-I. Effect of spoofing on unmanned aerial vehicle using counterfeited gps signal. J. Positioni. Navigat. Timing. 2015;4(2):57–65. [Google Scholar]

279. Kim A., Wampler B., Goppert J., Hwang I., Aldridge H. Infotech@ Aerospace 2012. 2012. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles; p. 2438. [Google Scholar]

280. Shashok N. 2017. Analysis of vulnerabilities in modern unmanned aircraft systems. [Google Scholar]

281. Lin X., Wiren R., Euler S., Sadam A., Maattanen H.-L., Muruganathan S.D., Gao S., Wang Y.-P.E., Kauppi J., Zou Z. Mobile networks connected drones: field trials, simulations, and design insights. arXiv Preprint arXiv:1801.10508. 2018 [Google Scholar]

282. Abdallah A., Ali M.Z., Mišić J., Mišić V.B. Efficient security scheme for disaster surveillance uav communication networks. Information. 2019;10(2):43. [Google Scholar]

283. Kovar D. 2016. Uavs, Iot, and Cybersecurity. [Google Scholar]

284. Ramon Soria P., Bevec R., Arrue B., Ude A., Ollero A. Extracting objects for aerial manipulation on uavs using low cost stereo sensors. Sensors. 2016;16(5):700. [PMC free article] [PubMed] [Google Scholar]

285. Tomislav R., Andrija V., Jurica I., Bo W. International Scientific Conference “Science and Traffic Development”(ZIRP 2018) 2018. Challenges and solutions for urban uav operations. [Google Scholar]

286. Alwateer M., Loke S.W., Zuchowicz A. Drone services: issues in drones for location-based services from human-drone interaction to information processing. J. Locat. Based Serv. 2019;13(2):94–127. [Google Scholar]

287. Kim S.J., Lim G.J., Cho J. Drone flight scheduling under uncertainty on battery duration and air temperature. Comput. Ind. Eng. 2018;117:291–302. [Google Scholar]

288. Tseng C.-M., Chau C.-K., Elbassioni K., Khonji M. Autonomous recharging and flight mission planning for battery-operated autonomous drones. arXiv preprint arXiv:1703.10049. 2017 [Google Scholar]

289. Commission B.P. The security impact of drones: challenges and opportunities for the uk. Univer. Birmingham, October. 2014 [Google Scholar]

290. Clothier R.A., Walker R.A., Fulton N., Campbell D.A. 2007. A casualty risk analysis for unmanned aerial system (uas) operations over inhabited areas. [Google Scholar]

291. M. Dinucci, Missili usa in romania e polonia: l’europa sul fronte nucleare.

292. Erdelj M., Natalizio E. DroNet@ MobiSys. 2018. Drones, smartphones and sensors to face natural disasters. pp. 75–86. [Google Scholar]

293. Velagapudi P., Owens S., Scerri P., Lewis M., Sycara K. AIAA Infotech@ Aerospace Conference and AIAA Unmanned… Unlimited Conference. 2009. Environmental factors affecting situation awareness in unmanned aerial vehicles; p. 2057. [Google Scholar]

294. Strohmeier M., Lenders V., Martinovic I. International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer; 2015. Intrusion detection for airborne communication using phy-layer information; pp. 67–77. [Google Scholar]

295. Mitchell R., Chen R. Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans. Syst. Man Cybernet. 2014;44(5):593–604. [Google Scholar]

296. Mitchell R., Chen R. Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans. Syst. Man Cybernet. 2013;44(5):593–604. [Google Scholar]

297. Kacem T., Wijesekera D., Costa P., Barreto A. Trustcom/BigDataSE/ISPA, 2016 IEEE. IEEE; 2016. An ads-b intrusion detection system; pp. 544–551. [Google Scholar]

298. Casals S.G., Owezarski P., Descargues G. Digital Avionics Systems Conference (DASC), 2013 IEEE/AIAA 32nd. IEEE; 2013. Generic and autonomous system for airborne networks cyber-threat detection; pp. 4A4–1. [Google Scholar]

299. Rani C., Modares H., Sriram R., Mikulski D., Lewis F.L. Security of unmanned aerial vehicle systems against cyber-physical attacks. J. Defense Model. Simul. 2016;13(3):331–342. [Google Scholar]

300. Lu H., Li Y., Mu S., Wang D., Kim H., Serikawa S. Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet Things J. 2017;5(4):2315–2322. [Google Scholar]

301. Condomines J.-P., Zhang R., Larrieu N. Network intrusion detection system for uav ad-hoc communication: from methodology design to real test validation. Ad Hoc Netw. 2019;90:101759. [Google Scholar]

302. Sedjelmaci H., Senouci S.M., Ansari N. A hierarchical detection and response system to enhance security against lethal cyber-attacks in uav networks. IEEE Trans. Syst. Man Cybernet. 2017;48(9):1594–1606. [Google Scholar]

303. Sedjelmaci H., Senouci S.M., Ansari N. Intrusion detection and ejection framework against lethal attacks in uav-aided networks: a bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 2017;18(5):1143–1153. [Google Scholar]

304. Lauf A.P., Peters R.A., Robinson W.H. A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Netw. 2010;8(3):253–266. [Google Scholar]

305. Mitchell R., Chen I.-R. Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications. ACM; 2012. Specification based intrusion detection for unmanned aircraft systems; pp. 31–36. [Google Scholar]

306. Zhang G., Wu Q., Cui M., Zhang R. GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE; 2017. Securing uav communications via trajectory optimization; pp. 1–6. [Google Scholar]

307. Zhang G., Wu Q., Cui M., Zhang R. Securing uav communications via joint trajectory and power control. IEEE Trans. Wireless Commun. 2019;18(2):1376–1389. [Google Scholar]

308. Cui M., Zhang G., Wu Q., Ng D.W.K. Robust trajectory and transmit power design for secure uav communications. IEEE Trans. Veh. Technol. 2018;67(9):9042–9046. [Google Scholar]

309. Zhao N., Cheng F., Yu F.R., Tang J., Chen Y., Gui G., Sari H. Caching uav assisted secure transmission in hyper-dense networks based on interference alignment. IEEE Trans. Commun. 2018;66(5):2281–2294. [Google Scholar]

310. Lee H., Eom S., Park J., Lee I. Uav-aided secure communications with cooperative jamming. IEEE Trans. Veh. Technol. 2018;67(10):9385–9392. [Google Scholar]

311. Liu C., Quek T.Q., Lee J. 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP) IEEE; 2017. Secure uav communication in the presence of active eavesdropper; pp. 1–6. [Google Scholar]

312. Cai Y., Cui F., Shi Q., Zhao M., Li G.Y. Dual-uav-enabled secure communications: joint trajectory design and user scheduling. IEEE J. Sel. Areas Commun. 2018;36(9):1972–1985. [Google Scholar]

313. Li C., Xu Y., Xia J., Zhao J. Protecting secure communication under uav smart attack with imperfect channel estimation. IEEE Access. 2018;6:76395–76401. [Google Scholar]

314. Lee Y., Kim E., Kim Y., Seol D. Effective message authentication method for performing a swarm flight of drones. Emergency. 2015;3(4):95–97. [Google Scholar]

315. Kim Y.J., Kyung K.-U. Consumer Electronics (ICCE), 2015 IEEE International Conference on. IEEE; 2015. Secured radio communication based on fusion of cryptography algorithms; pp. 388–389. [Google Scholar]

316. Won J., Seo S.-H., Bertino E. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ACM; 2015. A secure communication protocol for drones and smart objects; pp. 249–260. [Google Scholar]

317. Seo S., Bertino E. Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing. CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR. 2013;10:2013. [Google Scholar]

318. Sun H., Wen Q., Zhang H., Jin Z. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front. Comput. Sci. 2013;7(4):544–557. [Google Scholar]

319. Yang G., Tan C.-H. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM; 2011. Strongly secure certificateless key exchange without pairing; pp. 71–79. [Google Scholar]

320. Sharma D., Rashid A., Gupta S., Gupta S.K. A functional encryption technique in uav integrated hetnet: a proposed model. Int. J. Simul.–Syst. Sci. Technol. 2019;20 [Google Scholar]

321. Chen C.-L., Deng Y.-Y., Weng W., Chen C.-H., Chiu Y.-J., Wu C.-M. A traceable and privacy-preserving authentication for uav communication control system. Electronics (Basel) 2020;9(1):62. [Google Scholar]

322. Noura H., Chehab A., Sleem L., Noura M., Couturier R., Mansour M.M. One round cipher algorithm for multimedia iot devices. Multimed. Tools Appl. 2018;77(14):18383–18413. [Google Scholar]

323. Shim K.A., Park C.M. A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015;26(8):2128–2139. doi: 10.1109/TPDS.2014.2346764. [CrossRef] [Google Scholar]

324. Pilli E.S., Joshi R., Niyogi R. A generic framework for network forensics. Int. J. Comput. Appl. 2010;1(11) [Google Scholar]

325. Beebe N.L., Clark J.G. A hierarchical, objectives-based framework for the digital investigations process. Digital Invest. 2005;2(2):147–167. [Google Scholar]

326. Jain U., Rogers M., Matson E.T. Sensors Applications Symposium (SAS), 2017 IEEE. IEEE; 2017. Drone forensic framework: Sensor and data identification and verification; pp. 1–6. [Google Scholar]

327. Bouafif H., Kamoun F., Iqbal F., Marrington A. 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) IEEE; 2018. Drone forensics: Challenges and new insights; pp. 1–6. [Google Scholar]

328. Barton T.E.A., Azhar M.H.B. International Conference on Digital Forensics and Cyber Crime. Springer; 2017. Open source forensics for a multi-platform drone system; pp. 83–96. [Google Scholar]

329. Barton T.E.A., Azhar M.H.B. Emerging Security Technologies (EST), 2017 Seventh International Conference on. IEEE; 2017. Forensic analysis of popular uav systems; pp. 91–96. [Google Scholar]

330. Clark D.R., Meffert C., Baggili I., Breitinger F. Drop (drone open source parser) your drone: forensic analysis of the dji phantom iii. Digital Invest. 2017;22:S3–S14. [Google Scholar]

331. Mantas E., Patsakis C. International Workshop on Security. Springer; 2019. Gryphon: Drone forensics in dataflash and telemetry logs; pp. 377–390. [Google Scholar]

332. Carrier B., Spafford E.H. Digital forensic research workshop. 2004. An event-based digital forensic investigation framework; pp. 11–13. [Google Scholar]

333. Roder A., Choo K.-K.R., Le-Khac N.-A. Unmanned aerial vehicle forensic investigation process: Dji phantom 3 drone as a case study. arXiv preprint arXiv:1804.08649. 2018 [Google Scholar]

334. Brunty J. Validation of forensic tools and software: a quick guide for the digital forensic examiner. Forensic Mag. 2011 [Google Scholar]

335. Krishnan A. Routledge; 2016. Killer robots: legality and ethicality of autonomous weapons. [Google Scholar]

336. Strawn C. Expanding the potential for gps evidence acquisition. Small Scale Digital Device Forensics J. 2009;3(1):1–12. [Google Scholar]

337. Zulu A., John S. A review of control algorithms for autonomous quadrotors. arXiv preprint arXiv:1602.02622. 2016 [Google Scholar]

338. K.M. Smalling, K.W. Eure, A short tutorial on inertial navigation system and global positioning system integration (2015).

339. Achi H., Hellany A., Nagrial M. High-Capacity Optical Networks and Enabling Technologies (HONET), 2009 6th International Symposium on. IEEE; 2009. Digital forensics of wireless systems and devices technical and legal challenges; pp. 43–46. [Google Scholar]

340. Wild G., Murray J., Baxter G. Exploring civil drone accidents and incidents to help prevent potential air disasters. Aerospace. 2016;3(3):22. [Google Scholar]

341. McElrath K., O’Neill C. Experiences with mephedrone pre-and post-legislative controls: perceptions of safety and sources of supply. Int. J. Drug Policy. 2011;22(2):120–127. [PubMed] [Google Scholar]

342. Uk Set to Ban Drones from Flying within 1Km of Airports | Financial Times, (https://www.ft.com/content/64d8ef9e-63fa-11e8-90c2-9563a0613e56). (Accessed on 07/09/2018).

343. Zweiri M. Iran and political dynamism in the arab world: the case of yemen. Digest Middle East Stud. 2016;25(1):4–18. [Google Scholar]

344. Brookes P. The growing iranian unmanned combat aerial vehicle threat needs us action. Heritage Found. Backgrounder. 2019;(3437) [Google Scholar]

345. Sanchez A., McKibben C. Worst case scenario: the criminal use of drones. Counc. Hemispheric Affairs. Feb. 2015;2 [Google Scholar]

346. Williams B.G. University of Pennsylvania Press; 2016. Counter Jihad: America’s Military Experience in Afghanistan, Iraq, and Syria. [Google Scholar]

347. Goodrich M. Drone catcher:” robotic falcon” can capture, retrieve renegade drones. Michigan Tech News. 2016;7 [Google Scholar]

348. Capello E., Dentis M., Mascarello L.N., Primatesta S. 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS) IEEE; 2017. Regulation analysis and new concept for a cloud-based uav supervision system in urban environment; pp. 90–95. [Google Scholar]

349. Hooper M., Tian Y., Zhou R., Cao B., Lauf A.P., Watkins L., Robinson W.H., Alexis W. MILCOM 2016-2016 IEEE Military Communications Conference. IEEE; 2016. Securing commercial wifi-based uavs from common security attacks; pp. 1213–1218. [Google Scholar]

350. Birnbaum Z., Dolgikh A., Skormin V., O’Brien E., Muller D., Stracquodaine C. Unmanned aerial vehicle security using recursive parameter estimation. J. Intell. Robot. Syst. 2016;84(1–4):107–120. [Google Scholar]

351. Abbaspour A., Yen K.K., Forouzannezhad P., Sargolzaei A. A neural adaptive approach for active fault-tolerant control design in uav. IEEE Trans. Syst. Man Cybernetics. 2018 [Google Scholar]

352. Bonilla C.A.T., Parra O.J.S., Forero J.H.D. Common security attacks on drones. Int. J. Appl. Eng. Res. 2018;13(7):4982–4988. [Google Scholar]

353. Daubert J., Boopalan D., Mühlhäuser M., Vasilomanolakis E. NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium. IEEE; 2018. Honeydrone: A medium-interaction unmanned aerial vehicle honeypot; pp. 1–6. [Google Scholar]

354. Lindley J., Coulton P. Proceedings of the 2015 annual symposium on computer-human interaction in play. 2015. Game of drones; pp. 613–618. [Google Scholar]

355. Trujano F., Chan B., Beams G., Rivera R. Security analysis of dji phantom 3 standard. Massachusett. Inst. Technol. 2016 [Google Scholar]

356. Watkins L., Ramos J., Snow G., Vallejo J., Robinson W.H., Rubin A.D., Ciocco J., Jedrzejewski F., Liu J., Li C. Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy. 2018. Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems; pp. 1–6. [Google Scholar]

357. Fournier G., de Kerdrel P.A., Cotret P., Tong V.V.T. 2017. Dronejack: Kiss your drones goodbye! [Google Scholar]

358. Sharma K., Bhatt S. 2018. Jamming Attack–a Survey. [Google Scholar]

359. Najera-Gutierrez G., Ansari J.A. Packt Publishing Ltd; 2018. Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux. [Google Scholar]

360. R. French, P. Ranganathan, Cyber attacks and defense framework for unmanned aerial systems (uas) environment.

361. Booker M. Effects of Hacking an Unmanned Aerial Vehicle Connected to the Cloud. The Ohio State University; 2018. Ph.D. thesis. [Google Scholar]

362. Hartmann K., Steup C. 2013 5th international conference on cyber conflict (CYCON 2013) IEEE; 2013. The vulnerability of uavs to cyber attacks-an approach to the risk assessment; pp. 1–23. [Google Scholar]

363. Tippenhauer N.O., Pöpper C., Rasmussen K.B., Capkun S. Proceedings of the 18th ACM conference on Computer and communications security. ACM; 2011. On the requirements for successful gps spoofing attacks; pp. 75–86. [Google Scholar]

364. Mohan M. Cybersecurity in drones. Utica College; 2016. Ph.D. thesis. [Google Scholar]

365. Kopp C. Technical Report. Air Power Australia; 2008. Russian/Soviet point defence weapons. [Google Scholar]

366. Zaloga S.J. 1992. Zsu-23-4 shilka and soviet air defense gun vehicles. [Google Scholar]

367. Priego A. Security and Defence in Europe. Springer; 2020. Russia’s a2/ad policy as a balancing strategy vs nato enlargement; pp. 203–216. [Google Scholar]

368. Guardia M. Bloomsbury Publishing; 2015. Self-Propelled Anti-Aircraft Guns of the Soviet Union. [Google Scholar]

369. O. Analytica, Erdogan-putin relations will outweigh syria frictions, Emerald Expert Briefings(oxan-db).

370. Köstem S. Russian-turkish cooperation in syria: geopolitical alignment with limits. Cambridge Rev. Int. Affair. 2020:1–23. [Google Scholar]

371. LASCONJARIAS G., MAGED H. 2019. Fear the drones: Remotely piloted systems and non-state actors in Syria and Iraq. [Google Scholar]

372. Praisler D.J. Technical Report. AIR WAR COLLEGE, AIR UNIVERSITY MAXWELL United States; 2017. Counter-UAV Solutions for the Joint Force. [Google Scholar]

373. A. Harutyunyan, Rapid development of uavs: Transforming the Warfare and Defence.

374. Ding G., Wu Q., Zhang L., Lin Y., Tsiftsis T.A., Yao Y.-D. An amateur drone surveillance system based on the cognitive internet of things. IEEE Commun. Mag. 2018;56(1):29–35. [Google Scholar]

375. Kratky M., Farlik J. Countering uavs–the mover of research in military technology. Def. Sci. J. 2018;68(5):460–466. [Google Scholar]

376. Michel A.H. Center for the Study of the Drone at Bard College; 2018. Counter-drone systems. [Google Scholar]

377. Peck M. High-energy laser weapons target uavs. C4ISRNET-webpage [Online]. Accessed. 2016;21:2016. [Google Scholar]

378. Extance A. Military technology: laser weapons get real. Nature News. 2015;521(7553):408. [PubMed] [Google Scholar]

379. Carter C. Understanding c-uas purpose and process. Counter Unmanned Aircraft Syst. Technol. Oper. 2020 [Google Scholar]

380. M.G. Tham, C.E. Wong, M.K.K.K. Ming, Technologies in hybrid warfare: challenges, Editor. Board, 12.

381. Slocombe G. Uas: developments with small unmanned aerial systems. Asia-Pacif. Defence Rep. (2002) 2019;45(1):36. [Google Scholar]

382. Egozi A. Rafael unveils /guillemotleftdrone dome/guillemotright anti-uav system. FlightGlobal. 2016;12 [Google Scholar]

383. Atherton K. Israeli contractor rafael shows off anti-drone laser in korea. Aust. Popular Sci. 2015;21 [Google Scholar]

384. O. Analytica, Tighter restrictions on drones promise limited gain, Emerald Expert Briefings(oxan-db).

385. A. IAI’s, Successes of israel’s defence industry.

386. Geis II J.P. Defeating small civilian unmanned aerial systems to maintain air superiority. Air Space Power J. 2017;31(2):102. [Google Scholar]

387. Hauck III L.F., Geis II J.P. Air mines: countering the drone threat to aircraft. Air Space Power J. 2017;31(1):26. [Google Scholar]

388. Marrone A., Maulny J.-P., Fattibene D., Stabile A.A. Boosting defense cooperation in europe: an analysis of key military capabilities. Istituto Affari Internazionali, Institut de Relations Internationales et Strategiques, Hellenic Foundation for European and Foreign Policy, Swedish Defence Research Agency, Polish Institute of International Affairs, Royal United Services Institute. 2018 [Google Scholar]

389. Shelley A. A framework for counter-unmanned aircraft system regulation in new zealand. Policy Q. 2018;14(3):74–80. [Google Scholar]

390. Król M., Koperski W., Błaszczyk J., Woźniak R., Błaszczyk P.M. San: an integrated unmanned air vehicles interdictor system concept. Problemy Mechatroniki: uzbrojenie, lotnictwo, inżynieria bezpieczeństwa. 2017;8 [Google Scholar]

391. Kiel C.D.H., Ziv U.C.M., Ret U. A vision for directed energy and electric weapons in the current and future navy. Paper and presentation from ASNE, Arlington, VA. 2007 [Google Scholar]

392. Smith B., Nourse R., Baumann J., Sanders G. 2006 IEEE Aerospace Conference. IEEE; 2006. Extended area protection system (eaps) program overview; pp. 8–pp. [Google Scholar]

393. Luciano M. Armaments Systems Forum [dok. elektr.] 2018. Extended area protection and survivability (eaps) ato 2016. [Google Scholarhttps://ndiastorage.blob.core.usgovcloudapi.net/ndia/2016/armament/18295_Luciano.pdf [dost ep: 20.07.]

394. Staton R., Pawlak R. Technical Report. NAVAL SURFACE WARFARE CENTER DAHLGREN DIV VA; 2012. Laser weapon system (LAWS) adjunct to the close-in weapon system (CIWS) [Google Scholar]

395. Moretti J.D., Sabatini J.J., Chen G. 2017. Armor piercing incendiary projectile. [Google Scholar]US Patent 9,702,678

396. Siperco I. Shield of david: the promise of israeli national missile defense. Middle East Policy. 2010;17(2):127. [Google Scholar]

397. Seligman L. Alternative to bae’s 57 mm: Oto melara pitching 76 mm gun as option for navy’s future frigate. Inside the Navy. 2015;28(8):1–12. [Google Scholar]

398. Chen M.M. Technical Report. ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD WEAPONS AND MATERIALS RESEARCH DIRECTORATE; 2006. Structural Design and Analysis of Initial Extended Area Protection and Survivability (EAPS) Projectile Configurations. [Google Scholar]

399. Green P. McFarland; 2017. Encyclopedia of Weird War Stories: Supernatural and Science Fiction Elements in Novels, Pulps, Comics, Film, Television, Games and Other Media. [Google Scholar]

400. Nikolić S.S. An innovative response to commercial uav menace: anti-uav falconry. Vojno Delo. 2017;69(4):146–167. [Google Scholar]

401. Ganti S.R., Kim Y. Unmanned Aircraft Systems (ICUAS), 2016 International Conference on. IEEE; 2016. Implementation of detection and tracking mechanism for small uas; pp. 1254–1260. [Google Scholar]

402. Páll E., Mathe K., Tamas L., Busoniu L. Automation, Quality and Testing, Robotics, 2014 IEEE International Conference on. IEEE; 2014. Railway track following with the ar. drone using vanishing point detection; pp. 1–6. [Google Scholar]

403. Stolkin R., Rees D., Talha M., Florescu I. Multisensor Fusion and Integration for Intelligent Systems (MFI), 2012 IEEE Conference on. IEEE; 2012. Bayesian fusion of thermal and visible spectra camera data for region based tracking with rapid background adaptation; pp. 192–199. [Google Scholar]

404. Li C.J., Ling H. Antennas and Propagation & USNC/URSI National Radio Science Meeting, 2015 IEEE International Symposium on. IEEE; 2015. Synthetic aperture radar imaging using a small consumer drone; pp. 685–686. [Google Scholar]

405. Nguyen P., Ravindranatha M., Nguyen A., Han R., Vu T. Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use. ACM; 2016. Investigating cost-effective rf-based detection of drones; pp. 17–22. [Google Scholar]

406. Hansen S.T., Ergun A.S., Khuri-Yakub B.T. Ultrasonics Symposium, 2001 IEEE. Vol. 2. IEEE; 2001. Improved modeling and design of microphones using radio frequency detection with capacitive micromachined ultrasonic transducers; pp. 961–964. [Google Scholar]

407. Choudhary G., Sharma V., Gupta T., You I. Internet of drones (iod): threats, vulnerability, and security perspectives. arXiv Preprint arXiv:1808.00203. 2018 [Google Scholar]

408. Noura H., Salman O., Chehab A., Couturier R. Preserving data security in distributed fog computing. Ad Hoc Netw. 2019;94:101937. [Google Scholar]

409. Noura H.N., Salman O., Chehab A., Couturier R. Distlog: a distributed logging scheme for iot forensics. Ad Hoc Netw. 2020;98:102061. [Google Scholar]

410. Noura H., Melki R., Chehab A., Mansour M.M., Martin S. 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) IEEE; 2018. Efficient and secure physical encryption scheme for low-power wireless m2m devices; pp. 1267–1272. [Google Scholar]

411. Melki R., Noura H.N., Mansour M.M., Chehab A. An efficient ofdm-based encryption scheme using a dynamic key approach. IEEE Internet Things J. 2018 [Google Scholar]