Cybersecure and Trustworthy Deployment of Drones and Autonomous Vehicles

A special issue of Drones (ISSN 2504-446X). This special issue belongs to the section "Drone Communications".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 3102

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electrical Engineering, Purdue University Northwest, Hammond, IN 46323, USA
Interests: telecommunication and radio frequency electronics; microwave engineering and wireless communications

E-Mail Website
Guest Editor
Department of Electrical Engineering, University of North Dakota, Grand Forks, ND 58202-7165, USA
Interests: wireless communication and networking; cybersecurity; sensing; signal/image processing; smart systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Autonomous systems have recently witnessed an exponential growth in utilization for their contribution to promoting life quality. One such example of autonomous systems is unmanned aerial vehicles (UAVs), which find uses in civil and military fields including but not limited to, scientific expeditions, agriculture, and search and rescue missions. Autonomous vehicles have also received their fair share of research with applications to transportation services, advancing safety, optimizing traffic management, and improving convenience and accessibility, especially for users with disabilities. This growth of autonomous systems factors in the continued demand for automation and the rapid advancement in enabling software and hardware technologies. To this end, significant efforts were dedicated to developing schemes for improving navigation, control, and telecommunication protocols to facilitate autonomous operation. Nevertheless, few have explored the cybersecurity challenges that potentially compromise autonomous systems, which in some cases, may result in catastrophic consequences. In other words, cybersecurity research with applications to autonomous systems is still in its infancy and requires further efforts for tackling the associated cyberattacks such as denial of service location spoofing, and malicious message injection, to name a few.

The aim of this Special Issue is to promote cybersecurity awareness in autonomous systems by inviting original research articles that investigate the recent cybersecurity challenges, detection and mitigation methodologies, and research findings with applications to UAVs and autonomous vehicles. This Issue also aims to establish a broader impact by creating the foundation of cybersecurity research that benefits other research areas such as robotics.

Suggested themes of articles are those that address the aforementioned cybersecurity challenges and highlight novel state-of-the-art detection and countermeasure approaches. Such approaches may include artificial intelligence, image or video processing, signal processing, new or improved hardware modules (e.g., sensors, front-end circuitry), cooperative networking, vehicle-to-vehicle communications, and coding protocols.

Dr. Khair Ayman Al-Shamaileh
Prof. Dr. Naima Kaabouch
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Drones is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • artificial intelligence 
  • autonomous systems 
  • cybersecurity 
  • hardware integration 
  • signal processing 
  • unmanned aerial vehicles 
  • vehicle-to-vehicle communications

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

102 pages, 3277 KiB  
Article
A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud Architecture
by Gregorius Airlangga and Alan Liu
Drones 2023, 7(5), 289; https://doi.org/10.3390/drones7050289 - 25 Apr 2023
Cited by 3 | Viewed by 2464
Abstract
An unmanned aerial vehicle (UAV) is an autonomous flying robot that has attracted the interest of several communities because of its capacity to increase the safety and productivity of labor. In terms of software engineering, UAV system development is extremely difficult because the [...] Read more.
An unmanned aerial vehicle (UAV) is an autonomous flying robot that has attracted the interest of several communities because of its capacity to increase the safety and productivity of labor. In terms of software engineering, UAV system development is extremely difficult because the focus is not only on functional requirement fulfillment, but also on nonfunctional requirements such as security and safety, which play a crucial role in mission success. Consequently, architecture robustness is very important, and one of the most common architectures developed is based on a centralized pattern in which all UAVs are controlled from a central location. Even though this is a very important problem, many developers must expend a great deal of effort to adapt and improve security. This is because there are few practical perspectives of security development in the context of UAV system development; therefore, the study of attack and defense patterns in centralized architecture is required to fill this knowledge gap. This paper concentrates on enhancing the security aspect of UAV system development by examining attack and defense patterns in centralized architectures. We contribute to the field by identifying 26 attack variations, presenting corresponding countermeasures from a software analyst’s standpoint, and supplying a node.js code template for developers to strengthen their systems’ security. Our comprehensive analysis evaluates the proposed defense strategies in terms of time and space complexity, ensuring their effectiveness. By providing a focused and in-depth perspective on security patterns, our research offers crucial guidance for communities and developers working on UAV-based systems, facilitating the development of more secure and robust solutions. Full article
Show Figures

Figure 1

Back to TopTop