UAV Cybersecurity Materials :book: πŸŽ“ξ…—

A curated list of papers and technical posts related to UAV cybersecurity research.

Table of Contentsξ…—

  1. General
  2. Compromised Component
  3. Protocol-Based Attacks
  4. Sensor-Based Attacks
  5. Jammers
  6. Drone Purpose Detection
  7. Drone Authentication and Identification
  8. Drone Detection
  9. Secure Communication
  10. Others
  11. Copyright

Generalξ…—

Compromised Componentξ…—

Protocol-Based Attacksξ…—

Sensor-Based Attacksξ…—

Jammersξ…—

Many companies have developed UAV Jammers, such as: Battelle, Bilghter, CTS - Computer Technology Solutions, DroneShield, SESP Group, etc.

Drone Purpose Detectionξ…—

How can we tell whether the drone is being used for a legitimate purpose (e.g., delivering pizza) or an illegitimate purpose (e.g., taking a peek at a person showering in his/her own house)?

Drone Authentication and Identificationξ…—

Drone Detectionξ…—

Radarξ…—

RF Scanner & Spectrum Analyzerξ…—

Optical and Computer Visionξ…—

Acousticξ…—

Secure Communicationξ…—

Othersξ…—

CC0

This list is released into the public domain.