Reference Hub7
Drone Industry Security Issues and Challenges in the Context of IoD

Drone Industry Security Issues and Challenges in the Context of IoD

Copyright: © 2024 |Pages: 14
ISBN13: 9798369307748|ISBN13 Softcover: 9798369345627|EISBN13: 9798369307755
DOI: 10.4018/979-8-3693-0774-8.ch012
Cite Chapter Cite Chapter

MLA

Shah, Imdad Ali. "Drone Industry Security Issues and Challenges in the Context of IoD." Cybersecurity Issues and Challenges in the Drone Industry, edited by Imdad Ali Shah and Noor Zaman Jhanjhi, IGI Global, 2024, pp. 310-323. https://doi.org/10.4018/979-8-3693-0774-8.ch012

APA

Shah, I. A. (2024). Drone Industry Security Issues and Challenges in the Context of IoD. In I. Shah & N. Jhanjhi (Eds.), Cybersecurity Issues and Challenges in the Drone Industry (pp. 310-323). IGI Global. https://doi.org/10.4018/979-8-3693-0774-8.ch012

Chicago

Shah, Imdad Ali. "Drone Industry Security Issues and Challenges in the Context of IoD." In Cybersecurity Issues and Challenges in the Drone Industry, edited by Imdad Ali Shah and Noor Zaman Jhanjhi, 310-323. Hershey, PA: IGI Global, 2024. https://doi.org/10.4018/979-8-3693-0774-8.ch012

Export Reference

Mendeley
Favorite

Abstract

The major commercial sector has been drawn to the internet of drones (IoD) because of its technological breakthroughs, utility functions, and capacities. It is a tiered network primarily intended for unidentified aerial vehicles operating in restricted airspace. The IoD offers generic services for various drone applications, including package delivery, traffic surveillance, search and rescue, and others. Drones have the potential to be used in a variety of ways to enhance cybersecurity. A mix of software and hardware components must work together for a drone to successfully take off, fly, and land. Ground control stations often control drones and have rotors, sensors, and navigation systems. These devices are typically used in environments where flying would be hazardous for humans. Technology and operational procedures are the intended targets of cyber security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.