Approaches to Cybersecurity in UAS in the SORA Process: A Systematic Literature Review of Standards, Probabilistic Models, and AI Integration †
Abstract
1. Introduction
2. Research Methodology
2.1. Research Question
2.2. Review Objective
2.3. Scope and Time Frame
2.4. Data Sources
2.5. Inclusion Criteria
- Explicit references to the Cyber Safety Extension to SORA, including its application or critique;
- Relevance to the application of international cybersecurity frameworks (ISO/IEC 27001, NIST SP 800-53, CIS Controls, MITRE ATT&CK) within UAS;
- Use of BN for modeling cyber risks or resilience in aviation or Cyber–Physical Systems (CPS) environments;
- Proposals of architectures or AI-based solutions for supporting cybersecurity processes in drone systems;
- Accessibility (full-text or sufficient abstract) to allow methodological and conceptual extraction.
2.6. Exclusion Criteria
- Works unrelated to drone operations or risk assessment;
- Hardware-only studies lacking a cybersecurity focus;
- Publications without author, date, or institutional context;
- Purely promotional or descriptive texts without analytical content;
- Duplicate entries, unless offering distinct contributions in terms of data, scope, or findings.
2.7. Search Methodology Objectives
- Deduplication—removal of repeated entries across databases.
- Title/abstract screening—exclusion of works unrelated to UAS or lacking a cybersecurity perspective.
- Full-text eligibility check—application of inclusion/exclusion criteria (e.g., focus on standards, probabilistic methods, or AI integration).
3. Analysis and Systematization of the Literature
- (1)
- Cyber Safety Extension in SORA-based UAS risk assessments;
- (2)
- The application of internationally recognized information security standards and frameworks to UAS;
- (3)
- The utilization of BN for risk modeling and assessment;
- (4)
- Approaches for cybersecurity management processes and integration of AI-based assistants;
- (5)
- Multi-domain contributions to cyber resilience research.
3.1. Cyber Safety Extension in SORA-Based UAS Risk Assessments
3.1.1. Analytical Overview of Key Publications
3.1.2. Key Findings and Identified Limitations
3.2. The Application of Internationally Recognized Information Security Standards and Frameworks to UAS
3.2.1. Analytical Overview of Key Publications
3.2.2. Key Findings and Identified Limitations
3.3. The Utilization of Bayesian Networks for Risk Modeling and Assessment
3.3.1. Analytical Overview of Key Publications
3.3.2. Key Findings and Identified Limitations
3.4. Approaches for Cybersecurity Management Processes and Integration of AI-Based Assistants
3.4.1. Analytical Overview of Key Publications
3.4.2. Key Findings and Identified Limitations
3.5. Multi-Domain Contributions to Cyber Resilience Research
3.5.1. Analytical Overview of Key Publications
3.5.2. Key Findings and Identified Limitations
4. Findings and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| AI | Artificial Intelligence |
| AI RMF | AI Risk Management Framework |
| ASSURE | Alliance for System Safety of UAS through Research Excellence |
| BBN | Bayesian Belief Network |
| BN | Bayesian Network |
| BVLOS | Beyond Visual Line of Sight |
| CIE | Cyber-Informed Engineering |
| CIS Controls | Center for Internet Security Controls |
| CPS | Cyber–Physical Systems |
| CSF | Cybersecurity Framework |
| DETECT | Decision Triggering Event Composer and Tracker |
| DoS | Denial of Service |
| FAA | Federal Aviation Administration |
| GNSS | Global Navigation Satellite System |
| ICS | Industrial Control Systems |
| IoD | Internet of Drones |
| IoT | Internet of Things |
| ISO/IEC 27001 | International Organization for Standardization / International Electrotechnical Commission Standard 27001 |
| MITRE ATT&CK | MITRE Adversarial Tactics, Techniques, and Common Knowledge |
| ML | Machine Learning |
| NIST SP 800-53 | National Institute of Standards and Technology Special Publication 800-53 |
| PRA | Probabilistic Risk Assessment |
| PREM | Probabilistic Risk Exposure Map |
| RMF | Risk Management Framework |
| SAIL | Specific Assurance and Integrity Levels |
| SCADA | Supervisory Control and Data Acquisition |
| SORA | Specific Operations Risk Assessment |
| TTPs | Tactics, Techniques, and Procedures |
| UAS | Unmanned Aerial Systems |
| UAV | Unmanned Aerial Vehicle |
| XAI | Explainable Artificial Intelligence |
| ZTA | Zero Trust Architecture |
References
- ISO/IEC 27001:2013; Information Technology—Security Techniques—Information Security Management Systems—Requirements. ISO: Geneva, Switzerland, 2013.
- National Institute of Standards and Technology. Security and Privacy Controls for Information Systems and Organizations; (NIST Special Publication 800-53 Revision 5); U.S. Department of Commerce: Washington, DC, USA, 2020.
- JARUS. JARUS Guidelines on Specific Operations Risk Assessment (SORA) Main Body; JAR-DEL-SRM-SORA-MB-2.5; Joint Authorities for Rulemaking on Unmanned Systems: The Hague, Netherlands, 2024. [Google Scholar]
- JARUS. JARUS Guidelines on SORA Cyber Safety Extension; JAR-DEL-SRM-SORA-Cyb-2.5; Joint Authorities for Rulemaking on Unmanned Systems: The Hague, Netherlands, 2024. [Google Scholar]
- JARUS. SORA v2.0 to v2.5 Summary of Changes for External Consultation; JAR-DEL-WOS-0.04; Joint Authorities for Rulemaking on Unmanned Systems: The Hague, Netherlands, 2023. [Google Scholar]
- Tran, T.D.; Thiriet, J.-M.; Marchand, N.; El Mrabti, A. A Cybersecurity Risk Framework for Unmanned Aircraft Systems Under Specific Category. J. Intell. Robot. Syst. 2022, 104, 4. [Google Scholar] [CrossRef]
- Svensson, E. Process and Product Implications while Transiting from SORA 2.0 to SORA 2.5: A Case Study. Thesis for the Degree of Master of Science in Engineering, Mälardalen University, Västerås, Sweden, 2024. [Google Scholar]
- Habibi, H.; Venkateswara Rao, D.M.K.K.; Sanchez-Lopez, J.L.; Voos, H. On SORA for High-Risk UAV Operations Under New EU Regulations: Perspectives for Automated Approach. In International Conference on Unmanned Aircraft Systems (ICUAS); IEEE: Warsaw, Poland, 2023; pp. 213–220. [Google Scholar]
- Martinez, C.; Sanchez-Cuevas, P.J.; Gerasimou, S.; Bera, A.; Olivares-Mendez, M.A. SORA Methodology for Multi-UAS Airframe Inspections in an Airport. Drones 2021, 5, 141. [Google Scholar] [CrossRef]
- Greer, J., IV. MITRE Attack Framework Adaptation in UAV Usage During Surveillance and Reconnaissance Missions. Master’s Thesis, Mississippi State University, Starkville, MS, USA, 2024. [Google Scholar]
- Groš, S. A Critical View on CIS Controls. In Proceedings of the 16th International Conference on Telecommunications (ConTEL), Zagreb, Croatia, 30 June–2 July 2021; pp. 122–128. [Google Scholar] [CrossRef]
- Center for Internet Security. Internet of Things Security Companion to the CIS Critical Security Controls (Version 6); CIS Critical Security Controls: New York, NY, USA, 2015. [Google Scholar]
- Kitsios, F.; Chatzidimitriou, E.; Kamariotou, M. The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector. Sustainability 2023, 15, 5828. [Google Scholar] [CrossRef]
- Disterer, G. ISO/IEC 27000, 27001 and 27002 for Information Security Management. J. Inf. Secur. 2013, 4, 92–100. [Google Scholar] [CrossRef]
- Culot, G.; Nassimbeni, G.; Podrecca, M.; Sartor, M. The ISO/IEC 27001 Information Security Management Standard: Literature Review and Theory-Based Research Agenda. TQM J. 2021, 33, 76–90. [Google Scholar] [CrossRef]
- Taherdoost, H. Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview. Electronics 2022, 11, 2181. [Google Scholar] [CrossRef]
- Asiedu, S. Risk Driven Models & Security Framework for Drone Operation in GNSS-Denied Environment. Master’s Thesis, University of Turku, Turku, Finland, 2023. [Google Scholar]
- Puliyski, A.; Serbezov, V. Risk Assessment and Resilience: Bayesian Networks in Drone Cybersecurity. J. Phys. Technol. 2024, 5, 16–21. [Google Scholar]
- Miao, S.; Pan, Q. Risk Assessment of UAV Cyber Range Based on Bayesian-Nash Equilibrium. Drones 2024, 8, 556. [Google Scholar] [CrossRef]
- Heckerman, D. A Tutorial on Learning with Bayesian Networks. In Learning in Graphical Models; NATO ASI Series; Jordan, M.I., Ed.; Springer: Dordrecht, The Netherlands, 1998; Volume 89. [Google Scholar] [CrossRef]
- Wang, J.; Neil, M. A Bayesian-network-based cybersecurity adversarial risk analysis framework with numerical examples. arXiv 2021, arXiv:2106.00471v1. [Google Scholar]
- Cerotti, D.; Codetta-Raiteri, D.; Dondossola, G.; Egidi, L.; Franceschinis, G.; Portinale, L.; Terruggia, R. A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems. In Proceedings of the 3rd Italian Conference on Cyber Security (ITASEC 2019), Pisa, Italy, 13–15 February 2019; pp. 1–10. [Google Scholar]
- Chockalingam, S.; Pieters, W.; Teixeira, A.; van Gelder, P. Bayesian Network Models in Cyber Security: A Systematic Review. In Proceedings of the Secure IT Systems, 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, Tartu, Estonia, 8–10 November 2017; Lecture Notes in Computer Science. Lipmaa, H., Mitrokotsa, A., Matulevičius, R., Eds.; Springer: Cham, Switzerland, 2017; Volume 10674, pp. 105–122. [Google Scholar] [CrossRef]
- Kaya, U.C.; Dogan, A.; Huber, M. A Probabilistic Risk Assessment Framework for the Path Planning of Safe Task-Aware UAS Operations. In Proceedings of the AIAA Scitech 2020 Forum, San Diego, CA, USA, 7–11 January 2019. [Google Scholar] [CrossRef]
- Agbo, C.; Mehrpouyan, H. Achieving Cyber-Informed Engineering Through Bayesian Belief Network and Sensitivity Analysis. In Proceedings of the 10th International Conference on Dependable Systems and Their Applications (DSA), Tokyo, Japan, 10–11 August 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 260–271. [Google Scholar] [CrossRef]
- Sheh, R.; Harriss, D.; Geappen, K. Autonomous Aerial Drones Connecting Public Safety: Opportunities and Challenges for the Future. In Proceedings of the Exponential 2024, San Diego, CA, USA, 22–25 April 2024. [Google Scholar] [CrossRef]
- Ashraf, S.N.; Manickam, S.; Zia, S.S.; Abro, A.A.; Obaidat, M.; Uddin, M.; Abdelhaq, M.; Alsaqour, R. IoT Empowered Smart Cybersecurity Framework for Intrusion Detection in Internet of Drones. Sci. Rep. 2023, 13, 18422. [Google Scholar] [CrossRef]
- Gaba, S.; Budhiraja, I.; Kumar, V.; Martha, S.; Khurmi, J.; Singh, A.; Singh, K.K.; Askar, S.S.; Abouhawwash, M. A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems. IEEE Access 2024, 12, 6017–6035. [Google Scholar] [CrossRef]
- Suhail, S.; Jurdak, R. Towards Trusted and Intelligent Cyber-Physical Systems: A Security-by-Design Approach. arXiv 2022, arXiv:2105.08886v3. [Google Scholar]
- McCarthy, A.; Ghadafi, E.; Andriotis, P.; Legg, P. Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey. J. Cybersecur. Priv. 2022, 2, 154–190. [Google Scholar] [CrossRef]
- Tambon, F.; Laberge, G.; An, L.; Nikanjam, A.; Mindom, P.S.N.; Pequignot, Y.; Khomh, F.; Antoniol, G.; Merlo, E.; Laviolette, F. How to Certify Machine Learning Based Safety-critical Systems? A Systematic Literature Review. Autom. Softw. Eng. 2022, 29, 38. [Google Scholar] [CrossRef]
- Bellini, E.; D’Aniello, G.; Flammini, F.; Gaeta, R. Situation Awareness for Cyber Resilience: A review. Int. J. Crit. Infrastruct. Prot. 2025, 49, 100755. [Google Scholar] [CrossRef]
- Pimentel, L.; Bernardo, M.R.; Rocha, T. The Implementation of Public Chatbots to Raise Awareness of Computer Crime. Int. J. Hum.-Comput. Interact. 2025, 41, 319–341. [Google Scholar] [CrossRef]
- Alliance for System Safety of UAS through Research Excellence (ASSURE). UAS Cyber Security and Safety Literature Review; FAA’s Center of Excellence for UAS Research: Starkville, MS, USA, 2022. [Google Scholar]
- Haque, E.; Hasan, K.; Ahmed, I.; Alam, M.S.; Islam, T. Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis. arXiv 2024, arXiv:2403.17093. [Google Scholar] [CrossRef]
- Jeong, G.; Kim, K.; Yoon, S.; Shin, D.; Kang, J. Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study. Information 2023, 14, 561. [Google Scholar] [CrossRef]
- Aldaej, A.; Ahanger, T.A.; Atiquzzaman, M.; Ullah, I.; Yousufudin, M. Smart Cybersecurity Framework for IoT-Empowered Drones: Machine Learning Perspective. Sensors 2022, 22, 2630. [Google Scholar] [CrossRef]
- Yaacoub, J.-P.; Noura, H.; Salman, O.; Chehab, A. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 2020, 11, 100218. [Google Scholar] [CrossRef]
- Oruc, A. Potential cyber threats, vulnerabilities, and protections of unmanned vehicles. Drone Syst. Appl. 2022, 10, 51–58. [Google Scholar] [CrossRef]
- Kim, I.; Park, M.; Lee, H.-J.; Jang, J.; Lee, S.; Shin, D. A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework. Information 2024, 15, 18. [Google Scholar] [CrossRef]
- Renu, Y.; Sarveshwaran, V. A Review of Cyber Security Challenges and Solutions in Unmanned Aerial Vehicles (UAVs). Intel. Artif. 2025, 28, 199–219. [Google Scholar] [CrossRef]
- Sheh, R.; Geappen, K.; Harriss, D. Autonomous Cybersecurity and AI Risk Management for Uncrewed Systems: Challenges and Opportunities Using the NIST Frameworks. In Proceedings of the Exponential 2024, San Diego, CA, USA, 22–25 April 2024. [Google Scholar] [CrossRef]
- Jiang, Y.; Meng, Q.; Shang, F.; Oo, N.; Minh, L.T.H.; Lim, H.W.; Sikdar, B. MITRE ATT&CK Applications in Cybersecurity and The Way Forward. arXiv 2025, arXiv:2502.10825v1. [Google Scholar] [CrossRef]
- Pappaterra, M.J. Implementing Bayesian Networks for online threat detection. Master’s Thesis, Uppsala University, Uppsala, Sweden, 2018; 101pp. [Google Scholar] [CrossRef]
- Lattimore, G.L. Unmanned Aerial System Cybersecurity Risk Management Decision Matrix for Tactical Operators. Master’s Thesis, Naval Postgraduate School, Monterey, CA, USA, 2019. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Puliyski, A.; Serbezov, V. Approaches to Cybersecurity in UAS in the SORA Process: A Systematic Literature Review of Standards, Probabilistic Models, and AI Integration. Eng. Proc. 2026, 121, 17. https://doi.org/10.3390/engproc2025121017
Puliyski A, Serbezov V. Approaches to Cybersecurity in UAS in the SORA Process: A Systematic Literature Review of Standards, Probabilistic Models, and AI Integration. Engineering Proceedings. 2026; 121(1):17. https://doi.org/10.3390/engproc2025121017
Chicago/Turabian StylePuliyski, Anton, and Vladimir Serbezov. 2026. "Approaches to Cybersecurity in UAS in the SORA Process: A Systematic Literature Review of Standards, Probabilistic Models, and AI Integration" Engineering Proceedings 121, no. 1: 17. https://doi.org/10.3390/engproc2025121017
APA StylePuliyski, A., & Serbezov, V. (2026). Approaches to Cybersecurity in UAS in the SORA Process: A Systematic Literature Review of Standards, Probabilistic Models, and AI Integration. Engineering Proceedings, 121(1), 17. https://doi.org/10.3390/engproc2025121017

