Abstract:
Unmanned Aerial Vehicles are remotely handled for fulfilling tasks like photojournalism, security, rescue efforts, and even package deliveries. These gadgets have a varie...Show MoreMetadata
Abstract:
Unmanned Aerial Vehicles are remotely handled for fulfilling tasks like photojournalism, security, rescue efforts, and even package deliveries. These gadgets have a variety of sensors and cameras that enable them to gather data and provide real-time images to their administrators. These devices are vulnerable to cyber-attacks that can lead to hacking of devices, resulting in data theft, identity theft and spoofing. Important information carried by unmanned aerial vehicle devices can be intercepted by unauthorized users to destroy the network transmission. This research paper performs an experimental study on generating traffic patterns of unmanned aerial vehicle communication for cyber-attacks. The unmanned aerial vehicle traffic pattern is compared in global positioning system jamming and spoofing attacks for analyzing battery state, system power, logger status and computational load. The achieved results indicate the critical parameters of the network that are to be considered while framing security policies for unmanned aerial vehicle communication.
Date of Conference: 14-16 September 2023
Date Added to IEEE Xplore: 26 January 2024
ISBN Information: