{"id":"https://openalex.org/W2766764374","doi":"https://doi.org/10.1109/ssrr.2017.8088163","title":"A review on cybersecurity vulnerabilities for unmanned aerial vehicles","display_name":"A review on cybersecurity vulnerabilities for unmanned aerial vehicles","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2766764374","doi":"https://doi.org/10.1109/ssrr.2017.8088163","mag":"2766764374"},"language":"en","primary_location":{"id":"doi:10.1109/ssrr.2017.8088163","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssrr.2017.8088163","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028629786","display_name":"C. G. Leela Krishna","orcid":null},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"C. G. Leela Krishna","raw_affiliation_strings":["Department of Computer Science and Engineering, Texas A&M University, College Station, Texas"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Texas A&M University, College Station, Texas","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048150326","display_name":"Robin R. Murphy","orcid":"https://orcid.org/0000-0003-0774-4312"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robin R. Murphy","raw_affiliation_strings":["Department of Computer Science and Engineering, Texas A&M University, College Station, Texas"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Texas A&M University, College Station, Texas","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028629786"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":220.7461,"has_fulltext":false,"cited_by_count":253,"citation_normalized_percentile":{"value":0.9997324,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"194","last_page":"199"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12158","display_name":"Guidance and Control Systems","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9211491346359253},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7468653917312622},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.722498893737793},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.5338301658630371},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5066908001899719},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.4758950471878052},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.41142213344573975},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2417571246623993},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.10492140054702759}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9211491346359253},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7468653917312622},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.722498893737793},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.5338301658630371},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5066908001899719},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.4758950471878052},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.41142213344573975},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2417571246623993},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.10492140054702759},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ssrr.2017.8088163","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssrr.2017.8088163","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5600000023841858,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W579279579","https://openalex.org/W1488193565","https://openalex.org/W1620598987","https://openalex.org/W1877570691","https://openalex.org/W1905925205","https://openalex.org/W1974589906","https://openalex.org/W1982610171","https://openalex.org/W2049985835","https://openalex.org/W2076796034","https://openalex.org/W2081218243","https://openalex.org/W2083707006","https://openalex.org/W2108752147","https://openalex.org/W2148786132","https://openalex.org/W2156565444","https://openalex.org/W2160452173","https://openalex.org/W2289975515","https://openalex.org/W2413257655","https://openalex.org/W2477379160","https://openalex.org/W2529882973","https://openalex.org/W2545823459","https://openalex.org/W2559990582","https://openalex.org/W2566763967","https://openalex.org/W2566869048","https://openalex.org/W2568472206","https://openalex.org/W2581103495","https://openalex.org/W2582348787","https://openalex.org/W2611814963","https://openalex.org/W4246079090","https://openalex.org/W4285719527","https://openalex.org/W6731251631","https://openalex.org/W6731342607","https://openalex.org/W6733260405"],"related_works":["https://openalex.org/W89971267","https://openalex.org/W2945504560","https://openalex.org/W2794664665","https://openalex.org/W3007059209","https://openalex.org/W4220832730","https://openalex.org/W1688416049","https://openalex.org/W4312120756","https://openalex.org/W2972017669","https://openalex.org/W2783658022","https://openalex.org/W4288120931"],"abstract_inverted_index":{"This":[0],"paper":[1,59,141],"surveys":[2],"the":[3,22,32,44,110,131,146,183,196],"scientific":[4],"and":[5,18,21,48,70,76,90,117,122,144,177,185],"trade":[6],"literature":[7],"on":[8,16,68,101,109,125,160,174,182,193,195],"cybersecurity":[9,171],"for":[10,24,38,56],"unmanned":[11],"aerial":[12],"vehicles":[13],"(UAV),":[14],"concentrating":[15],"actual":[17],"simulated":[19],"attacks,":[20],"implications":[23],"small":[25,36,151,161],"UAVs.":[26,162],"The":[27,58,140,163,189],"review":[28],"is":[29,200],"motivated":[30],"by":[31,73,81,148],"increasing":[33],"use":[34],"of":[35,222,229],"UAVs":[37,69],"inspecting":[39],"critical":[40],"infrastructures":[41],"such":[42],"as":[43,202],"electric":[45],"utility":[46],"transmission":[47],"distribution":[49],"grid,":[50],"which":[51],"could":[52],"be":[53],"a":[54,61,118,136,207,214,224,230],"target":[55],"terrorism.":[57],"presents":[60],"modified":[62],"taxonomy":[63],"to":[64,169,213],"organize":[65],"cyber":[66],"attacks":[67,100,108,124,181,194],"exploiting":[71],"threats":[72,172],"Attack":[74,82],"Vector":[75],"Target.":[77],"It":[78],"shows":[79],"that,":[80],"Vector,":[83],"there":[84,96],"has":[85,219],"been":[86,98],"one":[87],"physical":[88],"attack":[89,116,217,227],"ten":[91],"remote":[92],"attacks.":[93],"By":[94],"Target,":[95],"have":[97],"six":[99],"GPS":[102,175],"(two":[103,129],"jamming,":[104],"four":[105],"spoofing),":[106],"two":[107,123],"control":[111,215],"communications":[112,127,187,198],"stream":[113,128,199,216],"(a":[114],"deauthentication":[115],"zero-day":[119],"vulnerabilities":[120],"attack),":[121],"data":[126,132,186,197],"intercepting":[130],"feed,":[133],"zero":[134],"executing":[135],"video":[137,225,231],"replay":[138,226],"attack).":[139],"also":[142],"divides":[143],"discusses":[145],"findings":[147],"large":[149],"or":[150,154],"UAVs,":[152],"over":[153],"under":[155],"25":[156],"kg,":[157],"but":[158,179,218],"concentrates":[159],"survey":[164],"concludes":[165],"that":[166],"UAV-related":[167],"research":[168,192],"counter":[170],"focuses":[173],"Jamming":[176],"Spoofing,":[178],"ignores":[180],"controls":[184],"stream.":[188],"gap":[190],"in":[191],"concerning,":[201],"an":[203],"operator":[204],"can":[205],"see":[206],"UAV":[208],"flying":[209],"off":[210],"course":[211],"due":[212],"no":[220],"way":[221],"detecting":[223],"(substitution":[228],"feed).":[232]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":44},{"year":2024,"cited_by_count":31},{"year":2023,"cited_by_count":29},{"year":2022,"cited_by_count":38},{"year":2021,"cited_by_count":37},{"year":2020,"cited_by_count":36},{"year":2019,"cited_by_count":23},{"year":2018,"cited_by_count":11}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
