Your browser does not support JavaScript!

Security aspects of UAV and robot operating system

Security aspects of UAV and robot operating system

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Imaging and Sensing for Unmanned Aircraft Systems. Volume 1: Control and Performance — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Unmanned aerial vehicles (UAVs) are an enabling technology being used to improve typical tasks such as delivery, agriculture, inspection, rescue, catastrophe response, among others. Initially used on military applications, nowadays they are increasing its presence as the commercial platform and consumer electronics. Despite its benefits and being an evolving technology, it embraces aspects such as complex architecture and mission-critical applications that require a rigorous development process to guarantee operational success during its whole life cycle. News about security-related events is becoming commonplace, compromising systems aspects such as confidentiality, integrity, and availability (i.e., security pillars), resulting in operational disruption, financial losses and safety incidents. This chapter preliminary presents typical, published and ongoing researches on security flaws on UAV domain and possible scenarios that can arise from them. The following security strategies to the resilient operation is presented to support new UAV designs based on typical security approaches (e.g., authentication, cryptography), current researches, and insights derived from aircraft design guidelines, which relates to intentional unauthorized interaction (cyber-threat) and its effects to safety. Finally, deployment of the robot operating system on consumer UAV (parrot AR.Drone 2) is performed, and a cybersecurity assessment is presented containing its findings, mitigations, and proposals to strengthen its operation (resiliency).

Chapter Contents:

  • 10.1 Introduction
  • 10.2 Unmanned aerial vehicles
  • 10.3 ROS basic concepts
  • 10.4 Security UAV review
  • 10.5 Security ROS review
  • 10.6 UAV security scenarios
  • 10.7 Security assessment on consumer UAV operation with ROS
  • 10.8 Future trends
  • 10.9 Conclusion
  • References

Inspec keywords: computer network security; remotely operated vehicles; safety; security of data; autonomous aerial vehicles

Other keywords: resilient operation; security strategies; typical tasks; security pillars; rigorous development process; UAV domain; complex architecture; robot operating system; catastrophe response; military applications; security-related events; life cycle; consumer UAV; chapter preliminary presents; ongoing researches; UAV designs; operational disruption; systems aspects; unmanned aerial vehicles; mission-critical applications; consumer electronics; operational success; security aspects; evolving technology; commercial platform; typical security approaches; security flaws

Subjects: Mobile robots; Computer communications; Aerospace control; Data security

Preview this chapter:
Zoom in

Security aspects of UAV and robot operating system, Page 1 of 2

| /docserver/preview/fulltext/books/ce/pbce120f/PBCE120F_ch10-1.gif /docserver/preview/fulltext/books/ce/pbce120f/PBCE120F_ch10-2.gif

Related content

This is a required field
Please enter a valid email address