Reference Hub1
Addresses the Security Issues and Safety in Cyber-Physical Systems of Drones

Addresses the Security Issues and Safety in Cyber-Physical Systems of Drones

Areeba Laraib, Areesha Sial, Raja Majid Ali Ujjan
Copyright: © 2024 |Pages: 24
ISBN13: 9798369307748|ISBN13 Softcover: 9798369345627|EISBN13: 9798369307755
DOI: 10.4018/979-8-3693-0774-8.ch016
Cite Chapter Cite Chapter

MLA

Laraib, Areeba, et al. "Addresses the Security Issues and Safety in Cyber-Physical Systems of Drones." Cybersecurity Issues and Challenges in the Drone Industry, edited by Imdad Ali Shah and Noor Zaman Jhanjhi, IGI Global, 2024, pp. 381-404. https://doi.org/10.4018/979-8-3693-0774-8.ch016

APA

Laraib, A., Sial, A., & Ujjan, R. M. (2024). Addresses the Security Issues and Safety in Cyber-Physical Systems of Drones. In I. Shah & N. Jhanjhi (Eds.), Cybersecurity Issues and Challenges in the Drone Industry (pp. 381-404). IGI Global. https://doi.org/10.4018/979-8-3693-0774-8.ch016

Chicago

Laraib, Areeba, Areesha Sial, and Raja Majid Ali Ujjan. "Addresses the Security Issues and Safety in Cyber-Physical Systems of Drones." In Cybersecurity Issues and Challenges in the Drone Industry, edited by Imdad Ali Shah and Noor Zaman Jhanjhi, 381-404. Hershey, PA: IGI Global, 2024. https://doi.org/10.4018/979-8-3693-0774-8.ch016

Export Reference

Mendeley
Favorite

Abstract

Drones' cyber-physical systems (CPS), which integrate computer, networking, and physical systems, can also be vulnerable to various security threats. As CPS often consists of a network of interdependent devices and systems, any one part may be the target of a cyberattack. By inserting malware into the software, exploiting vulnerabilities, or initiating cyber attacks, including denial-of-service attacks, cyber attackers can access the drone's control system unauthorised. Drones' onboard computers produce an immense amount of data, some of which may be very confidential. Data breaches and privacy violations can occur if this information is not encrypted or maintained securely.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.