{"id":"https://openalex.org/W4206504716","doi":"https://doi.org/10.1145/3485272","title":"A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis","display_name":"A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis","publication_year":2022,"publication_date":"2022-01-17","ids":{"openalex":"https://openalex.org/W4206504716","doi":"https://doi.org/10.1145/3485272"},"language":"en","primary_location":{"id":"doi:10.1145/3485272","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3485272","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012821734","display_name":"Alessio Rugo","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Alessio Rugo","raw_affiliation_strings":["Guardia di Finanza, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Guardia di Finanza, Rome, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058453558","display_name":"Claudio A. Ardagna","orcid":"https://orcid.org/0000-0001-7426-4795"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Claudio A. Ardagna","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 degli Studi di Milano, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 degli Studi di Milano, Milan, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024294410","display_name":"Nabil El Ioini","orcid":"https://orcid.org/0000-0002-1288-1082"},"institutions":[{"id":"https://openalex.org/I171543936","display_name":"Free University of Bozen-Bolzano","ror":"https://ror.org/012ajp527","country_code":"IT","type":"education","lineage":["https://openalex.org/I171543936"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Nabil El Ioini","raw_affiliation_strings":["Free University of Bolzano/Bozen, Bolzano, Italy"],"affiliations":[{"raw_affiliation_string":"Free University of Bolzano/Bozen, Bolzano, Italy","institution_ids":["https://openalex.org/I171543936"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012821734"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":50.1497,"has_fulltext":false,"cited_by_count":92,"citation_normalized_percentile":{"value":0.99856636,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"55","issue":"1","first_page":"1","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9632999897003174,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9409000277519226,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8220760822296143},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.7541887164115906},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.734209418296814},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6682891845703125},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5342319011688232},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.4959929883480072},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4918334484100342},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4638832211494446},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44019076228141785}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8220760822296143},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.7541887164115906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.734209418296814},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6682891845703125},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5342319011688232},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.4959929883480072},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4918334484100342},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4638832211494446},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44019076228141785},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3485272","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3485272","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Zero hunger","id":"https://metadata.un.org/sdg/2"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":85,"referenced_works":["https://openalex.org/W790201181","https://openalex.org/W1511583130","https://openalex.org/W1982466846","https://openalex.org/W1982610171","https://openalex.org/W2021862793","https://openalex.org/W2046624934","https://openalex.org/W2074040836","https://openalex.org/W2076796034","https://openalex.org/W2099101940","https://openalex.org/W2114495437","https://openalex.org/W2118521282","https://openalex.org/W2323336488","https://openalex.org/W2373474033","https://openalex.org/W2460079651","https://openalex.org/W2495751938","https://openalex.org/W2527386436","https://openalex.org/W2529882973","https://openalex.org/W2545823459","https://openalex.org/W2566527471","https://openalex.org/W2566763967","https://openalex.org/W2566869048","https://openalex.org/W2591949910","https://openalex.org/W2601260651","https://openalex.org/W2602197485","https://openalex.org/W2604974201","https://openalex.org/W2765404915","https://openalex.org/W2766048395","https://openalex.org/W2766139170","https://openalex.org/W2766764374","https://openalex.org/W2773228868","https://openalex.org/W2782556342","https://openalex.org/W2793706993","https://openalex.org/W2794772989","https://openalex.org/W2800467193","https://openalex.org/W2803109435","https://openalex.org/W2823447463","https://openalex.org/W2842452803","https://openalex.org/W2847378279","https://openalex.org/W2888968277","https://openalex.org/W2889144763","https://openalex.org/W2889987778","https://openalex.org/W2900676289","https://openalex.org/W2901203335","https://openalex.org/W2904779896","https://openalex.org/W2906948942","https://openalex.org/W2907807152","https://openalex.org/W2910371451","https://openalex.org/W2912402142","https://openalex.org/W2918472297","https://openalex.org/W2941217974","https://openalex.org/W2942437319","https://openalex.org/W2944772476","https://openalex.org/W2946134548","https://openalex.org/W2963270044","https://openalex.org/W2965160006","https://openalex.org/W2965660127","https://openalex.org/W2971746348","https://openalex.org/W2973189390","https://openalex.org/W2974331033","https://openalex.org/W2979779535","https://openalex.org/W2980909345","https://openalex.org/W2991322664","https://openalex.org/W2994954803","https://openalex.org/W2995324964","https://openalex.org/W2997542111","https://openalex.org/W3001898499","https://openalex.org/W3027211756","https://openalex.org/W3030057993","https://openalex.org/W3036612116","https://openalex.org/W3038229327","https://openalex.org/W3041803705","https://openalex.org/W3047899736","https://openalex.org/W3048942131","https://openalex.org/W3049401039","https://openalex.org/W3066307143","https://openalex.org/W3085606966","https://openalex.org/W3088375349","https://openalex.org/W3093756417","https://openalex.org/W3113666351","https://openalex.org/W3116177770","https://openalex.org/W3127826998","https://openalex.org/W3168482278","https://openalex.org/W4233957689","https://openalex.org/W4246173749","https://openalex.org/W6750222642"],"related_works":["https://openalex.org/W3193520027","https://openalex.org/W2076796034","https://openalex.org/W3184656183","https://openalex.org/W3175764924","https://openalex.org/W2921822472","https://openalex.org/W4250525350","https://openalex.org/W4378192017","https://openalex.org/W2912259948","https://openalex.org/W2896962396","https://openalex.org/W2477379160"],"abstract_inverted_index":{"Unmanned":[0,208],"Aerial":[1],"Vehicles":[2],"(UAVs)":[3],"are":[4,164,177,251],"becoming":[5],"one":[6],"of":[7,51,95,109,123,126,190,223],"the":[8,23,49,57,78,93,110,124,132,157,166,179,191,206,221,242],"main":[9],"technological":[10],"supports":[11],"for":[12,205],"commercial":[13,33,99],"applications,":[14],"embracing":[15],"many":[16],"domains":[17],"ranging":[18],"from":[19,45,256],"human":[20],"safety":[21],"to":[22,197,240],"medical":[24],"field,":[25],"agriculture":[26],"and":[27,31,74,83,90,105,117,129,143,161,174,193,227,234,237,275],"environment,":[28],"multimedia":[29],"production,":[30],"even":[32],"delivery.":[34],"This":[35],"rise":[36],"in":[37,92,98,131,136,149,156,259],"popularity,":[38],"however,":[39],"is":[40],"causing":[41],"an":[42],"increasing":[43],"interest":[44,130],"criminals,":[46],"making":[47],"UAVs":[48,97],"target":[50],"new":[52],"attacks.":[53],"To":[54],"fully":[55],"characterize":[56],"current":[58],"UAV":[59,141,217,273],"cybersecurity":[60,88],"landscape,":[61],"we":[62],"perform":[63],"a":[64,102,120,150,187],"complete":[65,188],"literature":[66],"review,":[67],"digging":[68],"into":[69],"drone":[70,133],"security":[71,127],"historic":[72],"facts":[73],"scientific":[75,84],"studies":[76],"on":[77,87],"matter,":[79],"reviewing":[80],"specialized":[81],"articles":[82,111],"papers":[85],"focusing":[86],"threats":[89],"gaps":[91],"context":[94],"small":[96],"applications.":[100],"Being":[101],"recent":[103,207],"research":[104],"development":[106],"area,":[107],"most":[108,167,180,243],"have":[112],"been":[113],"published":[114],"between":[115],"2016":[116],"2020":[118],"as":[119,268],"direct":[121],"consequence":[122],"increase":[125],"concerns":[128],"field.":[134,158],"Papers":[135],"this":[137],"review":[138],"deal":[139],"with":[140,199],"cyberthreats":[142],"related":[144,200],"vulnerabilities,":[145],"identifying":[146],"flaws":[147],"experimented":[148],"lab":[151],"or":[152,215,254],"describing":[153],"incidents":[154],"detected":[155],"Communication,":[159],"sensors,":[160],"system":[162],"misconfigurations":[163],"among":[165,178],"important":[168],"threat":[169],"vectors,":[170],"while":[171,262],"sensor":[172],"spoofing/jamming":[173,231],"malware":[175],"DoS/control":[176],"cited":[181],"threats.":[182],"Threat":[183],"vectors":[184],"permit":[185],"depicting":[186],"overview":[189],"topic":[192],"potential":[194],"countermeasures":[195],"known":[196],"date,":[198],"gap":[201],"analysis,":[202],"also":[203,246],"accounting":[204],"Aircraft":[209],"System":[210],"evolution":[211],"toward":[212],"ad":[213],"hoc":[214],"cloud-based":[216],"networks.":[218],"Countermeasures":[219],"include":[220],"adoption":[222],"traditional":[224],"communication":[225],"encryption":[226,233],"standard":[228],"protocols,":[229],"GPS":[230,276],"mitigation,":[232],"privacy-aware":[235],"implementations,":[236],"counter-malware":[238],"techniques,":[239],"name":[241],"adopted.":[244],"It":[245],"emerges":[247],"that":[248],"often":[249],"attacks":[250,258,264],"simply":[252],"ported":[253],"adapted":[255],"other":[257],"similar":[260],"domains,":[261],"peculiar":[263],"still":[265],"remain":[266],"such":[267],"targeted":[269],"physical":[270],"attacks,":[271],"specific":[272],"malware,":[274],"spoofing/jamming.":[277]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":29},{"year":2024,"cited_by_count":34},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":7}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
