Hybrid cyber security of unmanned aerial vehicles





Cyber security, Unmanned aerial vehicle, Semi autonomous system, Military weapon systems, Hybrid System, Hybrid security


Unmanned aerial vehicle technological improvement has had a direct influence on today's warfare. As today's battles take place in cities, the distinction between civilians and soldiers has grown increasingly hazy. There is a wealth of literature on autonomy and ethical concerns concerning autonomous weapon systems. Unmanned aerial vehicles must contend with a slew of security risks, ranging from electronic jammers to missile strikes. The societal acceptance of these techniques, ethical value judgments, and long-term consequences are all important topics to discuss. Unmanned aerial vehicles have a wide range of applications in the military, from gathering intelligence to destroying targets, and in the civilian arena, from agriculture to photography. Furthermore, unmanned aerial vehicles have the potential to be used not just for military or commercial goals, but also for international crimes. Nowadays unmanned aerial vehicles are used in electronic warfare to monitor enemy positions, prevent their communications by jamming systems, instantly monitor the country's border security, render the electronic systems of the determined targets inoperable, and listen for information via communication systems. Under the conditions specified above, the study seeks to provide a hybrid approach to unmanned aerial vehicles. The cybersecurity of unmanned aerial vehicles, software security, physical security, and social and cultural security will all be handled from a single point of view.


Download data is not yet available.


Albeaino, G., Gheisari, M., & Franz, B. A. (2019). A systematic review of unmanned aerial vehicle application areas and technologies in the AEC domain. Journal of Information Technology in Construction, 24(20), 381–405. https://www.itcon.org/papers/2019_20-ITcon-


Afghah, F., Razi, A., Chakareski, J., & Ashdown, J. (2019). Wildfire Monitoring in Remote Areas using Autonomous Unmanned Aerial Vehicles. Conference on Computer Communications Workshops. https://doi.org/10.1109/infcomw.2019.8845309

Laghari, A. A., Jumani, A. K., Laghari, R. A., & Nawaz, H. (2022). Unmanned aerial vehicles: A review. Cognitive Robotics, 3, 8–22. https://doi.org/10.1016/j.cogr.2022.12.004

Hartmann, K., & Giles, K. (2016b). UAV exploitation: A new domain for cyber power. International Conference on Cyber Conflict. https://doi.org/10.1109/cycon.2016.7529436

Shepard, D. P., Bhatti, J. A., Humphreys, T. E., & Fansler, A. A. (2012b). Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks. Proceedings of the 25th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2012), 3591–3605. https://doi.org/10.15781/t2xw48c62

Krishna, C. G. L., & Murphy, R. R. (2017). A review on cybersecurity vulnerabilities for unmanned aerial vehicles. International Symposium on Safety, Security, and

Rescue Robotics. https://doi.org/10.1109/ssrr.2017.8088163

Fourati, L. C., Chahbani, S., & Rezgui, J. (2020). Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems. International Symposium on Networks, Computers and Communications. https://doi.org/10.1109/isncc49221.2020.9297293

Shane, S., & Sanger, D. E. (2011). Drone crash in Iran reveals secret US surveillance effort. The New York Times, 7.

Kim, A. W., Wampler, B. L., Goppert, J., Hwang, I., & Aldridge, H. (2012). Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles. Infotech@Aerospace 2012. https://doi.org/10.2514/6.2012- 2438

Dahiya, S., & Garg, M. (2019). Unmanned Aerial Vehicles: Vulnerability to Cyber Attacks. Springer EBooks, 201–211. https://doi.org/10.1007/978-3-030-37393-1_18

Sharma, P., Sarma, K. K., & Mastorakis, N. E. (2020). Artificial intelligence aided electronic warfare systems-recent trends and evolving applications. IEEE Access, 8, 224761-224780.

Tkachenko, O. Y. (2015, October). System of electronic warfare with uavs. In 2015 IEEE International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD) (pp. 324-327). IEEE.

Lei, L., Gao, Y., Wang, X., Zhang, P., & Guo, S. (2009). Design and Realization of Virtual Scene System in UAV Electronic Warfare. In 2009 International Conference on Information Engineering and Computer Science (pp. 1-4). IEEE.

Spezio, A. E. (2002). Electronic warfare systems. IEEE Transactions on Microwave Theory and Techniques, 50(3), 633-644.

Bommakanti, K. (2019). Soft Kill’or ‘Hard Kill’? The Requirements for India’s Space and Counter-Space Capabilities. ORF Occasional Paper, (224).

Mei, H., & Bo, X. (2022, November). A Real time Decision Making Method of Electronic Warfare Based on the Protection of Key Points. In 2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC) (pp. 195-199). IEEE.

Kuzdeba, S., Radlbeck, A., & Anderson, M. (2018, October). Performance metrics for cognitive electronic warfare-electronic support measures. In MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM) (pp. 1-9). IEEE.

Lazarov, L. (2019, March). Perspectives and trends for the development of electronic warfare systems. In 2019 International Conference on Creative Business for Smart and Sustainable Growth (CREBUS) (pp. 1- 3). IEEE.

Rani C, Modares H, Sriram R, Mikulski D, Lewis FL. Security of unmanned aerial vehicle systems against cyber-physical attacks. The Journal of Defense Modeling and Simulation. 13(3):331-342, 2016. doi:10.1177/1548512915617252.

Tiurin V, Mirnenko V, Openko P. General approach to counter unmanned aerial vehicles. Safety & Defense, 5, 6-12, 2016.

Yusuf, G. E. N. Ç., & Erciyes, E. İnsansız hava araçları (İHA) tehditleri ve güvenlik yönetimi. Türkiye insansız hava araçları dergisi, 2(2), 36- 42, 2020.

Sathyamoorthy, D. A Review Of Security Threats Of Unmanned Aerial Vehicles And Mitigation Steps The Journal of Defence and Security; Kuala Lumpur Vol. 6, Iss. 1, 2015.

Humpreys, T., Statement on the Security Threat Posed by Unmanned Aerial Systems and Possible Countermeasures. Statement to the Subcommittee on Oversight and Management Efficiency of the House Committee on Homeland Security, Washington D.C., 2015.

Naboulsi, Z., Drone Detection: What Works and What Doesn't. Available online at: http://www.net-security.org/article.php?id=2297 (Last access date: 09 April 2023).

Chuter, A., Mini drones spark heightened interest in countering threat. Defense News, 22 June 2015.

Gayle, D., The Drone Catcher: Flying Net Is Designed to Stop Terrorists from Flying Bomb-Laden Gadgets Into Nuclear Power Stations. Available online at: http://www.dailymail.co.uk/news/article- 2948062/The-drone-catcher-France-reveals-flying-netstop-terrorists- flying-bomb-laden-gadgets-nuclear-power-stations-following-spate- sightings.html (Last access date: 09 April 2023).

Gettinger, D., Domestic Drone Threats. Available online at: http://dronecenter.bard.edu/whatyou-need-to-know-about-domestic- drone-threats (Last access date: 09 April 2023).

Wilson, R. L. (2014, May). Ethical issues with use of drone aircraft. In 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering (pp. 1-4). IEEE.




How to Cite

O. . DÖŞ, Y. E. KARAKOCA, E. CAMADAN, and F. BAYKALI, “Hybrid cyber security of unmanned aerial vehicles”, J. Appl. Methods Electron. Comput., vol. 11, no. 4, pp. 179–185, Dec. 2023.



Research Articles