Skip to main content
. 2020 May 8;11:100218. doi: 10.1016/j.iot.2020.100218

Table 4.

Drones/counter-drones cyber-attacks.

Attack
Targets
Security Measures
Type Nature Privacy Data Confidentiality Integrity Availability Authentication Non-Cryptographic Cryptographic
Malware Infection Hybrid lightweight IDS Control access, system integrity solutions and multi-factor authentication
BackDoor Access Infection Hybrid lightweight IDS, vulnerability assessment Multi-factor robust authentication scheme
Social Engineering Exploitation X X Raising awareness, training operators N/A
Baiting Exploitation X Raising awareness, training operators N/A
Injection/Modification Exploitation X X X Machine-Learning hybrid IDS, time stamps Message authentication or digital signature
Fabrication Exploitation X X , Assigning privilege Multi-factor authentication, message authentication or digital signature
Reconnaissance Information gathering X X X Hybrid lightweight IDS Encrypted traffic/stream
Scanning Information gathering X X Hybrid lightweight IDS or Honeypot Encrypted traffic/stream
Three-Way Handshake Interception X X X Traffic filtering, close unused TCP/FTP ports X
Eavesdropping Interception X X X N/A Securing communication/traffic, secure connection
Traffic Analysis Interception X X X X N/A Securing communication/traffic, secure connection
Man-in-the-Middle Authentication X X Lightweight hybrid IDS Multi-factor authentication & lightweight strong cryptographic authentication protocol
Password Breaking Cracking X X X X Lightweight IDS Strong periodic passwords, strong encryption
Wi-Fi Aircrack Cracking X X X X Lightweight IDS at the physical layer Strong & periodic passwords, strong encryption algorithm
Wi-Fi Jamming Jamming X X X X Frequency hopping, frequency range variation N/A
De-Authentication Jamming X X X X Frequency hopping, frequency range variation N/A
Replay Jamming X X X X Frequency hopping, time stamps N/A
Buffer Overflow Jamming X X X X Frequency hopping, frequency range variation N/A
Denial of Service Jamming X X X X Frequency hopping, frequency range variation N/A
ARP Cache Poison Jamming X X X X Frequency hopping, frequency range variation N/A
Ping-of-Death Jamming X X X X Frequency range variation N/A
GPS Spoofing Jamming X X X X Return-to-base, frequency range variation N/A