Cybersecurity of Unmanned Aerial Vehicles from a Control Systems Perspective: A Review
Abstract
1. Introduction
2. Generalized Attack Model
2.1. Time-Delay Switch Attack
2.2. Denial of Service Attack
2.3. False Data Injection Attack
2.4. Replay Attack
3. Effects of Attacks
3.1. Existing Literature
3.2. Attack Simulations
4. Prevention Algorithms
4.1. Encryption
4.2. Blockchain
4.3. Authentication
4.4. Channel Hopping
4.5. Adaptive Channel Allocation
4.6. Redundancy
5. Detection Algorithms
5.1. Model-Based Detection
5.1.1. TDS Attacks
5.1.2. FDI Attacks
5.1.3. DoS Attacks
5.1.4. Replay Attacks
5.2. Learning-Based Detection
5.3. Hybrid-Based Detection
6. Mitigation Algorithms
6.1. Model-Based Mitigation
6.1.1. TDS Attacks
6.1.2. FDI Attacks
6.1.3. DoS Attacks
6.1.4. Replay Attacks
6.2. Learning-Based Mitigation
6.2.1. TDS Attacks
6.2.2. FDI Attacks
6.2.3. DoS Attacks
6.2.4. Replay Attacks
6.3. Hybrid Hybrid-Based Mitigation
6.3.1. TDS Attacks
6.3.2. FDI Attacks
6.3.3. DoS Attacks
6.3.4. Replay Attacks
7. Summary of Findings
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Sargolzaei, A.; Abbaspour, A.; Crane, C.D. Control of cooperative unmanned aerial vehicles: Review of applications, challenges, and algorithms. In Optimization, Learning, and Control for Interdependent Complex Networks; Springer: Berlin/Heidelberg, Germany, 2020; pp. 229–255. [Google Scholar]
- Qin, H.; Cui, J.Q.; Li, J.; Bi, Y.; Lan, M.; Shan, M.; Liu, W.; Wang, K.; Lin, F.; Zhang, Y.; et al. Design and implementation of an unmanned aerial vehicle for autonomous firefighting missions. In Proceedings of the 2016 12th IEEE International Conference on Control and Automation (ICCA), Kathmandu, Nepal, 1–3 June 2016; IEEE: New York, NY, USA, 2016; pp. 62–67. [Google Scholar]
- Wang, Z.; Gao, Q.; Xu, J.; Li, D. A review of UAV power line inspection. In Proceedings of the Advances in Guidance, Navigation and Control: Proceedings of 2020 International Conference on Guidance, Navigation and Control, ICGNC 2020, Tianjin, China, 23–25 October 2020; Springer: Berlin/Heidelberg, Germany, 2022; pp. 3147–3159. [Google Scholar]
- Yang, L.; Fan, J.; Liu, Y.; Li, E.; Peng, J.; Liang, Z. A review on state-of-the-art power line inspection techniques. IEEE Trans. Instrum. Meas. 2020, 69, 9350–9365. [Google Scholar] [CrossRef]
- Cook, K.L. The silent force multiplier: The history and role of UAVs in warfare. In Proceedings of the 2007 IEEE Aerospace Conference, Big Sky, MT, USA, 3–10 March 2007; IEEE: New York, NY, USA, 2007; pp. 1–7. [Google Scholar]
- Shafique, A.; Mehmood, A.; Elhadef, M. Survey of security protocols and vulnerabilities in unmanned aerial vehicles. IEEE Access 2021, 9, 46927–46948. [Google Scholar] [CrossRef]
- Jung, S.; Kim, H. Analysis of amazon prime air uav delivery service. J. Knowl. Inf. Technol. Syst. 2017, 12, 253–266. [Google Scholar] [CrossRef]
- Liu, Y.; Xie, J.; Xing, C.; Xie, S.; Ni, B. Construction of FANETs for user coverage and information transmission in disaster rescue scenarios. Comput. Commun. 2023, 207, 164–174. [Google Scholar] [CrossRef]
- Elmokadem, T.; Savkin, A.V. Towards fully autonomous UAVs: A survey. Sensors 2021, 21, 6223. [Google Scholar] [CrossRef]
- Chung, S.J.; Paranjape, A.A.; Dames, P.; Shen, S.; Kumar, V. A survey on aerial swarm robotics. IEEE Trans. Robot. 2018, 34, 837–855. [Google Scholar] [CrossRef]
- Gu, X.; Zhang, G. A survey on UAV-assisted wireless communications: Recent advances and future trends. Comput. Commun. 2023, 208, 44–78. [Google Scholar] [CrossRef]
- Sharma, A.; Vanjani, P.; Paliwal, N.; Basnayaka, C.M.W.; Jayakody, D.N.K.; Wang, H.C.; Muthuchidambaranathan, P. Communication and networking technologies for UAVs: A survey. J. Netw. Comput. Appl. 2020, 168, 102739. [Google Scholar] [CrossRef]
- Balestrieri, E.; Daponte, P.; De Vito, L.; Picariello, F.; Tudosa, I. Sensors and measurements for UAV safety: An overview. Sensors 2021, 21, 8253. [Google Scholar] [CrossRef] [PubMed]
- Sargolzaei, A.; Yen, K.; Abdelghani, M.; Abbaspour, A.; Sargolzaei, S. Generalized attack model for networked control systems, evaluation of control methods. Intell. Control Autom. 2017, 8, 164–174. [Google Scholar] [CrossRef]
- Sargolzaei, A.; Zegers, F.M.; Abbaspour, A.; Crane, C.D.; Dixon, W.E. Secure control design for networked control systems with nonlinear dynamics under time-delay-switch attacks. IEEE Trans. Autom. Control 2022, 68, 798–811. [Google Scholar] [CrossRef]
- Abbasspour, A.; Sargolzaei, A.; Victorio, M.; Khoshavi, N. A neural network-based approach for detection of time delay switch attack on networked control systems. Procedia Comput. Sci. 2020, 168, 279–288. [Google Scholar] [CrossRef]
- Abbaspour, A.; Sargolzaei, A.; Yen, K. Detection of false data injection attack on load frequency control in distributed power systems. In Proceedings of the 2017 North American Power Symposium (NAPS), Morgantown, WV, USA, 17–19 September 2017; IEEE: New York, NY, USA, 2017; pp. 1–6. [Google Scholar]
- Sargolzaei, A. A secure control design for networked control system with nonlinear dynamics under false-data-injection attacks. In Proceedings of the 2021 American Control Conference (ACC), New Orleans, LA, USA, 26–28 May 2021; IEEE: New York, NY, USA, 2021; pp. 2693–2699. [Google Scholar]
- Rabah, M.A.O.; Drid, H.; Medjadba, Y.; Rahouti, M. Detection and Mitigation of Distributed Denial of Service Attacks Using Ensemble Learning and Honeypots in a Novel SDN-UAV Network Architecture. IEEE Access 2024, 12, 128929–128940. [Google Scholar] [CrossRef]
- Sánchez, H.S.; Rotondo, D.; Vidal, M.L.; Quevedo, J. Frequency-based detection of replay attacks: Application to a quadrotor UAV. In Proceedings of the 2019 8th International Conference on Systems and Control (ICSC), Marrakesh, Morocco, 23–25 October 2019; IEEE: New York, NY, USA, 2019; pp. 289–294. [Google Scholar]
- Khan, N.A.; Jhanjhi, N.; Brohi, S.N.; Almazroi, A.A.; Almazroi, A.A. A secure communication protocol for unmanned aerial vehicles. Cmc-Comput. Mater. Contin. 2022, 70, 601–618. [Google Scholar]
- Wei, X.; Ma, J.; Sun, C. A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures. IEEE Internet Things J. 2024, 11, 34826–34847. [Google Scholar] [CrossRef]
- Syed, F.; Gupta, S.K.; Hamood Alsamhi, S.; Rashid, M.; Liu, X. A survey on recent optimal techniques for securing unmanned aerial vehicles applications. Trans. Emerg. Telecommun. Technol. 2021, 32, e4133. [Google Scholar] [CrossRef]
- Wang, Z.; Li, Y.; Wu, S.; Zhou, Y.; Yang, L.; Xu, Y.; Zhang, T.; Pan, Q. A survey on cybersecurity attacks and defenses for unmanned aerial systems. J. Syst. Archit. 2023, 138, 102870. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V.; Sahu, N.; Guizani, M. Applications of blockchain in unmanned aerial vehicles: A review. Veh. Commun. 2020, 23, 100249. [Google Scholar] [CrossRef]
- Shrestha, R.; Omidkar, A.; Roudi, S.A.; Abbas, R.; Kim, S. Machine-learning-enabled intrusion detection system for cellular connected UAV networks. Electronics 2021, 10, 1549. [Google Scholar] [CrossRef]
- Whelan, J.; Almehmadi, A.; El-Khatib, K. Artificial intelligence for intrusion detection systems in unmanned aerial vehicles. Comput. Electr. Eng. 2022, 99, 107784. [Google Scholar] [CrossRef]
- Choudhary, G.; Sharma, V.; You, I.; Yim, K.; Chen, R.; Cho, J.H. Intrusion detection systems for networked unmanned aerial vehicles: A survey. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; IEEE: New York, NY, USA, 2018; pp. 560–565. [Google Scholar]
- Gudla, C.; Rana, M.S.; Sung, A.H. Defense techniques against cyber attacks on unmanned aerial vehicles. In Proceedings of the International Conference on Embedded Systems, Cyber-Physical Systems, and Applications (ESCS); The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2018; pp. 110–116. Available online: https://www.proquest.com/openview/b9f06d22a92d31ddb9a4d4cb4e434b34/1?pq-origsite=gscholar&cbl=1976354 (accessed on 23 December 2025).
- Owoputi, R.; Ray, S. Security of multi-agent cyber-physical systems: A survey. IEEE Access 2022, 10, 121465–121479. [Google Scholar] [CrossRef]
- Sargolzaei, A.; Yazdani, K.; Abbaspour, A.; Crane, C.D., III; Dixon, W.E. Detection and mitigation of false data injection attacks in networked control systems. IEEE Trans. Ind. Inform. 2019, 16, 4281–4292. [Google Scholar] [CrossRef]
- Gupta, B.B.; Gaurav, A.; Arya, V.; Chui, K.T. Machine Learning-Based DDoS Mitigation Framework for Unmanned Aerial Vehicles (UAV) Environment Using Software-Defined Networks (SDN). In Proceedings of the GLOBECOM 2023-2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 8–12 December 2023; IEEE: New York, NY, USA, 2023; pp. 2178–2183. [Google Scholar]
- Mokhtari, S.; Abbaspour, A.; Yen, K.K.; Sargolzaei, A. Neural network-based active fault-tolerant control design for unmanned helicopter with additive faults. Remote Sens. 2021, 13, 2396. [Google Scholar] [CrossRef]
- Yu, Z.; Wang, Z.; Yu, J.; Liu, D.; Song, H.H.; Li, Z. Cybersecurity of unmanned aerial vehicles: A survey. IEEE Aerosp. Electron. Syst. Mag. 2023, 39, 182–215. [Google Scholar] [CrossRef]
- Pandey, G.K.; Gurjar, D.S.; Nguyen, H.H.; Yadav, S. Security threats and mitigation techniques in UAV communications: A comprehensive survey. IEEE Access 2022, 10, 112858–112897. [Google Scholar] [CrossRef]
- Sargolzaei, A. Control of Multi-Agent Systems Under Cyberattack. Ph.D. Thesis, University of Florida, Gainesville, GA, USA, 2020. [Google Scholar]
- Victorio, M.; Sargolzaei, A.; Khalghani, M.R. A secure control design for networked control systems with linear dynamics under a time-delay switch attack. Electronics 2021, 10, 322. [Google Scholar] [CrossRef]
- Sargolzaei, A.; Yen, K.K.; Abdelghani, M.N.; Sargolzaei, S.; Carbunar, B. Resilient design of networked control systems under time delay switch attacks, application in smart grid. IEEE Access 2017, 5, 15901–15912. [Google Scholar] [CrossRef]
- Sargolzaei, A. Time-Delay Switch Attack on Networked Control Systems, Effects and Countermeasures. Ph.D. Thesis, Florida International University, Miami, FL, USA, 2015. [Google Scholar] [CrossRef]
- Sargolzaei, A.; Yen, K.K.; Abdelghani, M.N. Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Trans. Smart Grid 2015, 7, 1176–1185. [Google Scholar] [CrossRef]
- Dey, V.; Pudi, V.; Chattopadhyay, A.; Elovici, Y. Security vulnerabilities of unmanned aerial vehicles and countermeasures: An experimental study. In Proceedings of the 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), Pune, India, 8–10 January 2018; IEEE: New York, NY, USA, 2018; pp. 398–403. [Google Scholar]
- Wang, Z.; Liu, Y. Detection and defense of time-varying formation for unmanned aerial vehicles against false data injection attacks and external disturbance. Int. J. Robust Nonlinear Control 2024, 34, 1714–1731. [Google Scholar] [CrossRef]
- Pan, S.; Xi, Z. Health Assessment of Unmanned Aerial Vehicle Formation Systems under False Data Injection Attack. In Proceedings of the 2022 IEEE International Conference on Unmanned Systems (ICUS), Guangzhou, China, 28–30 October 2022; IEEE: New York, NY, USA, 2022; pp. 701–707. [Google Scholar]
- Mo, Y.; Sinopoli, B. Secure control against replay attacks. In Proceedings of the 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 30 September–2 October 2009; IEEE: New York, NY, USA, 2009; pp. 911–918. [Google Scholar]
- Elkhider, S.M.; El-Ferik, S.; Saif, A.W.A. Denial of service attack of QoS-based control of multi-agent systems. Appl. Sci. 2022, 12, 4315. [Google Scholar] [CrossRef]
- Yuan, S.; Li, H.; Zhang, R.; Cao, H.; Jiang, W.; Ni, T.; Fan, W.; Zhao, Q.; Xu, G. Omni-Angle Assault: An Invisible and Powerful Physical Adversarial Attack on Face Recognition. In Proceedings of the Forty-Second International Conference on Machine Learning, Vancouver, BC, Canada, 13–19 July 2025. [Google Scholar]
- Yuan, S.; Xu, G.; Li, H.; Zhang, R.; Qian, X.; Jiang, W.; Cao, H.; Zhao, Q. FIGhost: Fluorescent Ink-based Stealthy and Flexible Backdoor Attacks on Physical Traffic Sign Recognition. arXiv 2025, arXiv:2505.12045. [Google Scholar] [CrossRef]
- Yuan, S.; Li, H.; Han, X.; Xu, G.; Jiang, W.; Ni, T.; Zhao, Q.; Fang, Y. Itpatch: An invisible and triggered physical adversarial patch against traffic sign recognition. arXiv 2024, arXiv:2409.12394. [Google Scholar]
- Alenezi, M.N.; Alabdulrazzaq, H.; Mohammad, N.Q. Symmetric encryption algorithms: Review and evaluation study. Int. J. Commun. Netw. Inf. Secur. 2020, 12, 256–272. [Google Scholar]
- Aissaoui, R.; Deneuville, J.C.; Guerber, C.; Pirovano, A. A survey on cryptographic methods to secure communications for UAV traffic management. Veh. Commun. 2023, 44, 100661. [Google Scholar] [CrossRef]
- Nyangaresi, V.O.; Jasim, H.M.; Mutlaq, K.A.A.; Abduljabbar, Z.A.; Ma, J.; Abduljaleel, I.Q.; Honi, D.G. A symmetric key and elliptic curve cryptography-based protocol for message encryption in unmanned aerial vehicles. Electronics 2023, 12, 3688. [Google Scholar] [CrossRef]
- Li, T.; Zhang, J.; Obaidat, M.S.; Lin, C.; Lin, Y.; Shen, Y.; Ma, J. Energy-efficient and secure communication toward UAV networks. IEEE Internet Things J. 2021, 9, 10061–10076. [Google Scholar] [CrossRef]
- Li, T.; Ma, J.; Ma, X.; Gao, C.; Wang, H.; Ma, C.; Yu, J.; Lu, D.; Zhang, J. Lightweight secure communication mechanism towards UAV networks. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Big Island, HI, USA, 9–13 December 2019; IEEE: New York, NY, USA, 2019; pp. 1–6. [Google Scholar]
- Kadakia, Y.A.; Suryavanshi, A.; Alnajdi, A.; Abdullah, F.; Christofides, P.D. Encrypted model predictive control of a nonlinear chemical process network. Processes 2023, 11, 2501. [Google Scholar] [CrossRef]
- Yan, Y.; Chen, Z.; Varadharajan, V. Control of Large-Scale Networked Cyberphysical Systems Using Cryptographic Techniques. arXiv 2020, arXiv:2002.03470. [Google Scholar] [CrossRef]
- Ding, H.J.; Wu, R.B.; Zhao, Q.C. Networked Control Systems Secured by Quantum Key Distribution. arXiv 2018, arXiv:1805.09015. [Google Scholar] [CrossRef]
- Aggarwal, V.; Kaushik, A.R.; Jutla, C.; Ratha, N. Enhancing privacy and security of autonomous uav navigation. In Proceedings of the 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 25–27 June 2024; IEEE: New York, NY, USA, 2024; pp. 518–523. [Google Scholar]
- Alzahrani, M.Y.; Khan, N.A.; Georgieva, L.; Bamahdi, A.M.; Abdulkader, O.A.; Alahmadi, A.H. Protecting attacks on unmanned aerial vehicles using homomorphic encryption. Indones. J. Electr. Eng. Inform. 2023, 11, 88–96. [Google Scholar] [CrossRef]
- Kaushik, A.R.; Jutla, C.; Ratha, N. Towards Building Secure UAV Navigation with FHE-Aware Knowledge Distillation. In Proceedings of the International Conference on Pattern Recognition, Porto, Portugal, 23–25 February 2025; Springer: Berlin/Heidelberg, Germany, 2025; pp. 373–388. [Google Scholar]
- Suryateja, P.S.; Rao, K.V. A Survey on Lightweight Cryptographic Algorithms in IoT. Cybern. Inf. Technol. 2024, 24, 21–34. [Google Scholar] [CrossRef]
- Khoshavi, N.; Tristani, G.; Sargolzaei, A. Blockchain applications to improve operation and security of transportation systems: A survey. Electronics 2021, 10, 629. [Google Scholar] [CrossRef]
- Castelló Ferrer, E. The blockchain: A new framework for robotic swarm systems. In Proceedings of the Future Technologies Conference (FTC), Vancouver, BC, Canada, 13–14 November 2018; Springer: Berlin/Heidelberg, Germany, 2019; Volume 2, pp. 1037–1058. [Google Scholar]
- Xiao, W.; Li, M.; Alzahrani, B.; Alotaibi, R.; Barnawi, A.; Ai, Q. A blockchain-based secure crowd monitoring system using UAV swarm. IEEE Netw. 2021, 35, 108–115. [Google Scholar] [CrossRef]
- Koulianos, A.; Litke, A. Blockchain technology for secure communication and formation control in smart drone swarms. Future Internet 2023, 15, 344. [Google Scholar] [CrossRef]
- Haque, E.U.; Shah, A.; Iqbal, J.; Ullah, S.S.; Alroobaea, R.; Hussain, S. A scalable blockchain based framework for efficient IoT data management using lightweight consensus. Sci. Rep. 2024, 14, 7841. [Google Scholar] [CrossRef]
- Rodrigues, M.; Amaro, J.; Osório, F.S.; RLJC, B.K. Authentication methods for UAV communication. In Proceedings of the 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June–3 July 2019; IEEE: New York, NY, USA, 2019; pp. 1210–1215. [Google Scholar]
- Gan, R.; Xiao, Y.; Shao, J.; Qin, J. An analysis on optimal attack schedule based on channel hopping scheme in cyber-physical systems. IEEE Trans. Cybern. 2019, 51, 994–1003. [Google Scholar] [CrossRef]
- Atheeq, C.; Gulzar, Z.; Al Reshan, M.S.; Alshahrani, H.; Sulaiman, A.; Shaikh, A. Securing uav networks: A lightweight chaotic-frequency hopping approach to counter jamming attacks. IEEE Access 2024, 12, 38685–38699. [Google Scholar] [CrossRef]
- Yoon, K.; Park, D.; Yim, Y.; Kim, K.; Yang, S.K.; Robinson, M. Security authentication system using encrypted channel on UAV network. In Proceedings of the 2017 First IEEE International Conference on Robotic Computing (IRC), Taichung, Taiwan, 10–12 April 2017; IEEE: New York, NY, USA, 2017; pp. 393–398. [Google Scholar]
- Sargolzaei, A.; Abbaspour, A.; Al Faruque, M.A.; Salah Eddin, A.; Yen, K. Security challenges of networked control systems. In Sustainable Interdependent Networks: From Theory to Application; Springer International Publishing: Cham, Switzerland, 2018; pp. 77–95. [Google Scholar]
- Wang, K.; Liu, W.; Lim, T.J. Wireless Resource Allocation with Collaborative Distributed and Centralized DRL under Control Channel Attacks. arXiv 2024, arXiv:2411.10702. [Google Scholar] [CrossRef]
- Hartmann, K.; Steup, C. The vulnerability of UAVs to cyber attacks-An approach to the risk assessment. In Proceedings of the 2013 5th International Conference on Cyber Conflict (CYCON 2013), Tallinn, Estonia, 4–7 June 2013; IEEE: New York, NY, USA, 2013; pp. 1–23. [Google Scholar]
- Puchaty, E.M.; DeLaurentis, D.A. A performance study of UAV-based sensor networks under cyber attack. In Proceedings of the 2011 6th International Conference on System of Systems Engineering, Albuquerque, NM, USA, 27–30 June 2011; IEEE: New York, NY, USA, 2011; pp. 214–219. [Google Scholar]
- Chattopadhyay, A.; Mitra, U. Security against false data-injection attack in cyber-physical systems. IEEE Trans. Control Netw. Syst. 2019, 7, 1015–1027. [Google Scholar] [CrossRef]
- Ștefan, O.; Codrean, A. Networked Control of a Small Drone Resilient to Cyber Attacks. Drones 2024, 8, 552. [Google Scholar] [CrossRef]
- Niu, H.; Sahoo, A.; Bhowmick, C.; Jagannathan, S. An optimal hybrid learning approach for attack detection in linear networked control systems. IEEE/CAA J. Autom. Sin. 2019, 6, 1404–1416. [Google Scholar] [CrossRef]
- Pan, K.; Yang, F.; Lyu, Y.; Tan, Z.; Pan, Q. Observer based attack detection and security control for UAVs against attacks on desired trajectory. J. Frankl. Inst. 2024, 361, 106920. [Google Scholar] [CrossRef]
- Luo, Y.; Liao, Y.; Ni, S.; Zhang, A.; Cheng, L. Research on UAV sensor attack detection based on Kalman filter. In Proceedings of the 2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP), Nanjing, China, 22–24 October 2021; IEEE: New York, NY, USA, 2021; pp. 1228–1232. [Google Scholar]
- Adeli, M.; Hajatipour, M.; Yazdanpanah, M.J.; Hashemi-Dezaki, H.; Shafieirad, M. Optimized cyber-attack detection method of power systems using sliding mode observer. Electr. Power Syst. Res. 2022, 205, 107745. [Google Scholar] [CrossRef]
- Zhang, X.; Du, H.; Jia, Z.; Cui, C.; Cheng, Y.; Yan, Y. An adaptive observer design for denial-of-service attack detection in platoon. Optim. Control Appl. Methods 2023, 44, 2148–2165. [Google Scholar] [CrossRef]
- Weng, Y.O. Detection and Characterization of Actuator Attacks Using Kalman Filter Estimation. Master’s Thesis, Marquette University, Milwaukee, WI, USA, 2018. [Google Scholar]
- Adeli, M.; Hajatipour, M.; Yazdanpanah, M.J.; Shafieirad, M.; Hashemi-Dezaki, H. Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks. IET Control Theory Appl. 2021, 15, 1987–1998. [Google Scholar] [CrossRef]
- Ganesh, P.; Lou, X.; Chen, Y.; Tan, R.; Yau, D.K.; Chen, D.; Winslett, M. Learning-based simultaneous detection and characterization of time delay attack in cyber-physical systems. IEEE Trans. Smart Grid 2021, 12, 3581–3593. [Google Scholar] [CrossRef]
- Aldaej, A.; Ahanger, T.A.; Atiquzzaman, M.; Ullah, I.; Yousufudin, M. Smart cybersecurity framework for IoT-empowered drones: Machine learning perspective. Sensors 2022, 22, 2630. [Google Scholar] [CrossRef]
- Khan, I.U.; Abdollahi, A.; Khan, M.A.; Uddin, M.I.; Ullah, I. Securing Against DoS/DDoS Attacks in Internet of Flying Things using Experience-based Deep Learning Algorithm. Res. Sq. 2021. [Google Scholar] [CrossRef]
- Qu, Z.; Bo, X.; Yu, T.; Liu, Y.; Dong, Y.; Kan, Z.; Wang, L.; Li, Y. Active and passive hybrid detection method for power CPS false data injection attacks with improved AKF and GRU-CNN. IET Renew. Power Gener. 2022, 16, 1490–1508. [Google Scholar] [CrossRef]
- Koley, I.; Adhikary, S.; Dey, S. An RL-based adaptive detection strategy to secure cyber-physical systems. arXiv 2021, arXiv:2103.02872. [Google Scholar]
- Liu, X.; Hu, Y.; Konstantinou, C.; Jin, Y. Chimera: A hybrid estimation approach to limit the effects of false data injection attacks. In Proceedings of the 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aachen, Germany, 25–28 October 2021; IEEE: New York, NY, USA, 2021; pp. 95–101. [Google Scholar]
- Welch, G.; Bishop, G. An Introduction to the Kalman Filter. 1995. Available online: http://www.ceri.memphis.edu/people/rsmalley/ESCI7355/welch%20and%20bishop%20-%20kalman.pdf (accessed on 14 May 2025).
- Baig, Z.; Syed, N.; Mohammad, N. Securing the smart city airspace: Drone cyber attack detection through machine learning. Future Internet 2022, 14, 205. [Google Scholar] [CrossRef]
- Mitchell, R.; Chen, R. Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Trans. Syst. Man Cybern. Syst. 2013, 44, 593–604. [Google Scholar] [CrossRef]
- Sajja, G.S.; Meesala, M.K.; Addula, S.R.; Ravipati, P. Optimizing Retail Supply Chain Sales Forecasting with a Mayfly Algorithm-Enhanced Bidirectional Gated Recurrent Unit. SN Comput. Sci. 2025, 6, 737. [Google Scholar] [CrossRef]
- Abbaspour, A.; Sargolzaei, A.; Forouzannezhad, P.; Yen, K.K.; Sarwat, A.I. Resilient control design for load frequency control system under false data injection attacks. IEEE Trans. Ind. Electron. 2019, 67, 7951–7962. [Google Scholar] [CrossRef]
- Gu, Y.; Yu, X.; Guo, K.; Qiao, J.; Guo, L. Detection, estimation, and compensation of false data injection attack for UAVs. Inf. Sci. 2021, 546, 723–741. [Google Scholar] [CrossRef]
- Li, R.; Zhang, L.; Lu, Y.; Yi, C.; Chen, L.; Su, Y. Event-triggered adaptive output feedback control of unmanned aerial vehicles under hybrid attacks. IET Control Theory Appl. 2024, 18, 2864–2871. [Google Scholar] [CrossRef]
- Mairaj, A.; Javaid, A.Y. Game theoretic solution for an Unmanned Aerial Vehicle network host under DDoS attack. Comput. Netw. 2022, 211, 108962. [Google Scholar] [CrossRef]
- Yang, H.; Yu, Z.; Zhang, Y. Event-triggered resilient consensus control of multiple unmanned systems against periodic DoS attacks based on state predictor. Secur. Saf. 2023, 2, 2023017. [Google Scholar] [CrossRef]
- Moreira, J.F.; Lacerda, M.J. State-Feedback Control for Cyber-Physical Discrete-Time Systems under Replay Attacks: An LMI Approach. Math. Probl. Eng. 2022, 2022, 7946710. [Google Scholar] [CrossRef]
- Franzè, G.; Tedesco, F.; Famularo, D. Resilience against replay attacks: A distributed model predictive control scheme for networked multi-agent systems. IEEE/CAA J. Autom. Sin. 2020, 8, 628–640. [Google Scholar] [CrossRef]
- Wu, C.; Yao, W.; Sun, G.; Wu, L.; Wu, C.; Yao, W.; Sun, G.; Wu, L. Deep Reinforcement Learning Control Approach to Mitigating Attacks. In Security of Cyber-Physical Systems: State Estimation and Control; Springer International Publishing: Cham, Switzerland, 2022; pp. 239–264. [Google Scholar]
- He, S.; Jia, Z.; Dong, C.; Wang, W.; Cao, Y.; Yang, Y.; Wu, Q. Routing recovery for UAV networks with deliberate attacks: A reinforcement learning based approach. In Proceedings of the GLOBECOM 2023-2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 4–8 December 2023; IEEE: New York, NY, USA, 2023; pp. 952–957. [Google Scholar]
- Yu, Y.; Yang, W.; Ding, W.; Zhou, J. Reinforcement learning solution for cyber-physical systems security against replay attacks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2583–2595. [Google Scholar] [CrossRef]
- Jin, D.; Chen, B.; Yu, L.; Liu, S. Adaptive output regulation for cyber-physical systems under time-delay attacks. Control Theory Technol. 2022, 20, 20–31. [Google Scholar] [CrossRef]
- Chakraborty, S.; Gao, W.; Vamvoudakis, K.G.; Jiang, Z.P. Resilient Learning-Based Control Under Denial-of-Service Attacks. arXiv 2024, arXiv:2409.07766. [Google Scholar]
- Chen, A.; Mitsopoulos, K.; Romagnoli, R. Reinforcement learning-based optimal control and software rejuvenation for safe and efficient uav navigation. In Proceedings of the 2023 62nd IEEE Conference on Decision and Control (CDC), Singapore, 13–15 December 2023; IEEE: New York, NY, USA, 2023; pp. 7527–7532. [Google Scholar]
- Yu, J.; Zhang, Y.; Sun, C. End-to-end multi-task reinforcement learning-based UAV swarm communication attack detection and area coverage. Knowl.-Based Syst. 2025, 316, 113390. [Google Scholar] [CrossRef]
- Liu, Y. Reference Governors for MIMO Systems and Preview Control: Theory, Algorithms, and Practical Applications; The University of Vermont and State Agricultural College: Burlington, VT, USA, 2022. [Google Scholar]
- Institute, S.R. SwRI Develops System to Legally Test GPS Spoofing Vulnerabilities in Automated Vehicles. 2019. Available online: https://www.autonomousvehicleinternational.com/news/safety/swri-develops-system-to-legally-test-gps-spoofing-vulnerabilities-in-avs.html (accessed on 14 May 2025).



| Response | Unattacked | FDI | TDS | DoS | Replay |
|---|---|---|---|---|---|
| RMSE | 2.5341 | 3.0315 | 5.2976 | 4.1480 | 4.2752 |
| Algorithm Type | TDS | FDI | Dos | Replay | |
|---|---|---|---|---|---|
| Detection | Model-based | [15,39,75,76] | [77,78,79] | [80,81] | [82] |
| Learning-based | [83] | [84] | [84,85] | ||
| Hybrid-based | [86,87,88] |
| Algorithm Type | TDS | FDI | Dos | Replay | |
|---|---|---|---|---|---|
| Mitigation | Model-based | [15,75] | [33,93,94] | [95,96,97] | [98,99] |
| Learning-based | [83] | [100] | [101] | [102] | |
| Hybrid-based | [15,103] | [18,33,88] | [104] | [105,106] |
| Algorithm Type | References | Findings | |
|---|---|---|---|
| Simulation | HiL | ||
| Encryption | [52,53,54,56,57,58,59] | well-established field of study and considered robust but increases latencies, computational load, and energy requirements | |
| Blockchain | [63,64] | has great potential for FANETs, considered extremely robust, increases latencies, computational load, and energy requirements | |
| Authentication | [66] | prevents replay attacks and some forms of FDI, may not prevent DoS and TDS attacks | |
| Channel Hopping | [68,69] | makes DoS and TDS attack more difficult, may not prevent FDI or replay attacks | |
| ACA | [70,71] | makes DoS and TDS attack more difficult, may not prevent FDI or replay attacks | |
| Redundancy | [73,74] | strong prevention if backup channels are secure. Redundant sensors may increase weight and cost of a UAV | |
| Algorithm Type | References | Findings | |
|---|---|---|---|
| Simulation | HiL | ||
| Model-based | [15] | observer-based TDS attack detection in NCSs | |
| [75] | reference governor detects TDS attacks in UAVs | ||
| [39] | estimated states of a power grid are used to detect TDS attacks | ||
| [76] | adaptive observer used to detect TDS attacks in NCSs | ||
| [77] | UIO detects FDI attacks in UAVs | ||
| [78] | Kalman filter detects FDI attacks in UAVs | ||
| [79] | sliding-mode observer detects FDI attacks in power grids | ||
| [80] | adaptive observer detects DoS attacks in autonomous vehicles | ||
| [81] | Kalman filter detects DoS attacks in NCSs | ||
| [82] | Kalman filter detects replay attacks in UAVs | ||
| Learning-based | [83] | LSTM NN detects TDS attacks in power plants | |
| [84] | random forest ML detects GPS spoofing and DoS in UAVs | ||
| [85] | deep learning detects DoS attacks in UAVs | ||
| Hybrid-based | [86] | Kalman filter and CNN detect FDI attacks in power grids | |
| [88] | state estimation and LSTM detect FDI attacks in power grids | ||
| [87] | state estimation and RL detect FDI attacks in NCSs | ||
| Algorithm Type | References | Findings | |
|---|---|---|---|
| Simulation | HiL | ||
| Model-based | [75] | reference governor updates reference signal of UAV under TDS attack | |
| [93] | sliding-mode controller mitigates FDI attacks in power grids | ||
| [94] | disturbance observer mitigates FDI attacks in UAVs | ||
| [95] | event-triggered controller mitigates DoS attacks in UAVs | ||
| [96] | game-theoretic protocol mitigates DoS attacks in UAVs | ||
| [97] | disturbance observer mitigates DoS attacks in UAVs | ||
| [98] | Lyapunov-based controller mitigates replay attacks in NCSs | ||
| [99] | distributed MPC mitigates replay attacks in MAS | ||
| Learning-based | [83] | LSTM NN mitigates TDS attacks in power plants | |
| [100] | RL agent mitigates FDI attacks in satellite and robot arm | ||
| [101] | RL agent mitigates DoS attacks in UAVs | ||
| [102] | RL agent mitigates replay attacks in UAVs | ||
| Hybrid-based | [15] | Lyapunov-based controller and NN-based observer mitigate TDS attacks in UAV formations | |
| [18] | [18] | Lyapunov-based controller and NN mitigate FDI attacks in NCSs | |
| [33] | Kalman filter and NN mitigate FDI attacks in UAVs | ||
| [88] | weighted least squares and LSTM estimate states under FDI attack | ||
| [103] | adaptive control law and RL mitigate TDS attacks | ||
| [104] | RL agent updates control law under DoS attack | ||
| [105] | Lyapunov controller, observer, and RL mitigate replay attacks in UAVs | ||
| [106] | model-based swarm control and RL mitigate replay attacks | ||
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Graziano, B.; Sargolzaei, A. Cybersecurity of Unmanned Aerial Vehicles from a Control Systems Perspective: A Review. Electronics 2026, 15, 163. https://doi.org/10.3390/electronics15010163
Graziano B, Sargolzaei A. Cybersecurity of Unmanned Aerial Vehicles from a Control Systems Perspective: A Review. Electronics. 2026; 15(1):163. https://doi.org/10.3390/electronics15010163
Chicago/Turabian StyleGraziano, Ben, and Arman Sargolzaei. 2026. "Cybersecurity of Unmanned Aerial Vehicles from a Control Systems Perspective: A Review" Electronics 15, no. 1: 163. https://doi.org/10.3390/electronics15010163
APA StyleGraziano, B., & Sargolzaei, A. (2026). Cybersecurity of Unmanned Aerial Vehicles from a Control Systems Perspective: A Review. Electronics, 15(1), 163. https://doi.org/10.3390/electronics15010163
