IMPLEMENTATION OF COMPLEX SOLUTIONS FOR PROTECTION AGAINST CYBER THREATS OF ELECTRONIC SYSTEMS OF UNMANNED AERIAL VEHICLES

In the article, the possibilities of applying complex solutions to protect the electronic systems of unmanned aerial vehicles (UAVs) and other important processes from cyber threats were considered. The current application of UAVs in various fields makes the security of their electronic systems rele...

Full description

Saved in:
Bibliographic Details
Published inZeszyty naukowe Politechniki Śla̦skiej. Vol. 127; pp. 155 - 164
Main Authors MAMMADOV, Aftandil, SADİGOV, Gurban
Format Journal Article
LanguageEnglish
Published Silesian University of Technology 01.06.2025
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In the article, the possibilities of applying complex solutions to protect the electronic systems of unmanned aerial vehicles (UAVs) and other important processes from cyber threats were considered. The current application of UAVs in various fields makes the security of their electronic systems relevant. Aerial vehicles can be subject to attacks by attackers who exploit physical, network, and software vulnerabilities in the data exchange process. The article analyzes such methods as data encryption, encoding methods, publishing fake data, and protection against Global Positioning System spoofing attacks. The proposed complex approaches are integrated into the existing systems of UAVs, allowing to increase the level of their security. Complex solutions involve the integration of a special encryption and coding block, as well as the implementation of a module for comparing coordinates and broadcasting false signals.
AbstractList In the article, the possibilities of applying complex solutions to protect the electronic systems of unmanned aerial vehicles (UAVs) and other important processes from cyber threats were considered. The current application of UAVs in various fields makes the security of their electronic systems relevant. Aerial vehicles can be subject to attacks by attackers who exploit physical, network, and software vulnerabilities in the data exchange process. The article analyzes such methods as data encryption, encoding methods, publishing fake data, and protection against Global Positioning System spoofing attacks. The proposed complex approaches are integrated into the existing systems of UAVs, allowing to increase the level of their security. Complex solutions involve the integration of a special encryption and coding block, as well as the implementation of a module for comparing coordinates and broadcasting false signals.
Author SADİGOV, Gurban
MAMMADOV, Aftandil
Author_xml – sequence: 1
  givenname: Aftandil
  orcidid: 0000-0003-0842-4230
  surname: MAMMADOV
  fullname: MAMMADOV, Aftandil
– sequence: 2
  givenname: Gurban
  orcidid: 0009-0006-8730-7452
  surname: SADİGOV
  fullname: SADİGOV, Gurban
BookMark eNo9UctOwzAQtBBIlMcXcPEPpPgRO_ExBLeNlCYoMQhOlnEc1Ko0KAkH-HqcgNjLamdnR9qZC3B67I4OgBuMlgTFLL4d9sPnOIx-ImyJSbQUJ2BBQoYCzEJxChaIIBFQSsJzcD0Me-SLx37FF-A72z7kcisLlaisLGC5gmk5Qc-wLvPHCavhqqzgQ1Uqmc6cZJ1kRa1g-nInK6g2lUxUPV3K3DOqsshSWL_USm5n9LHYJkUh72EiqyzJ4ZPcZGku6ytw1prD4K7_-iVQK6nSTZCX6yxN8sBSTMaAc8LixvCImZbaOCL2lfu_hXURb7ETzjLcCM8KG4obEwvH-avFIaMhQobQS5D9yjad2euPfvdu-i_dmZ2ega5_06Yfd_bgdISj0IhYNJzj0FEnmPep5a2lzHrDWq9Ff7Vs3w1D79p_PYz0HIb-C0NPYWgfhhb0B0cYdpY
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.20858/sjsutst.2025.127.9
DatabaseName CrossRef
DOAJ - Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Open Access Full Text
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Economics
EISSN 2450-1549
EndPage 164
ExternalDocumentID oai_doaj_org_article_7174a989d6614e3e95068f6fc35c685f
10_20858_sjsutst_2025_127_9
GroupedDBID AAYXX
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
OK1
Y2W
ID FETCH-LOGICAL-c312t-66258da675af3c872cb62089ce76f1e9ec51d96624d31da89e66bc1453400a23
IEDL.DBID DOA
ISSN 0209-3324
IngestDate Wed Aug 27 01:32:45 EDT 2025
Thu Jul 03 08:16:44 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c312t-66258da675af3c872cb62089ce76f1e9ec51d96624d31da89e66bc1453400a23
ORCID 0009-0006-8730-7452
0000-0003-0842-4230
OpenAccessLink https://doaj.org/article/7174a989d6614e3e95068f6fc35c685f
PageCount 10
ParticipantIDs doaj_primary_oai_doaj_org_article_7174a989d6614e3e95068f6fc35c685f
crossref_primary_10_20858_sjsutst_2025_127_9
PublicationCentury 2000
PublicationDate 2025-06-01
PublicationDateYYYYMMDD 2025-06-01
PublicationDate_xml – month: 06
  year: 2025
  text: 2025-06-01
  day: 01
PublicationDecade 2020
PublicationTitle Zeszyty naukowe Politechniki Śla̦skiej.
PublicationYear 2025
Publisher Silesian University of Technology
Publisher_xml – name: Silesian University of Technology
SSID ssj0000685496
ssib026971971
Score 2.2930741
Snippet In the article, the possibilities of applying complex solutions to protect the electronic systems of unmanned aerial vehicles (UAVs) and other important...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 155
SubjectTerms cyber-attacks
electronic systems
encoding and encryption
gps spoofing
inertial navigation system
sensor
unmanned aerial vehicles
Title IMPLEMENTATION OF COMPLEX SOLUTIONS FOR PROTECTION AGAINST CYBER THREATS OF ELECTRONIC SYSTEMS OF UNMANNED AERIAL VEHICLES
URI https://doaj.org/article/7174a989d6614e3e95068f6fc35c685f
Volume 127
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1BT9swFLYQF3ZBMIbGgMkHjgs0duLYxxDctVOaoCadyilyYvvAoSDaXvj1PDsBdadduFovlvXp2e998fP3ELoaWcY1BP7AQC4aRECYA0VGNEiMIIoooyPfrWFWsMki-rOMlzutvlxNWC8P3AN3A3QjUoIL7QKJoUbEI8Ytsx2NO8Zj605fiHk7ZAo8iTCRhGJIdPozmQMR8heXxF32QxrRSxC5FpX8Zv243m7WrrSSxNchSa7FP2FqR83fh53xEToc8kWc9us8Rntm9RUdvD8nXp-g1-nsPveS_P5vEy7HOCvd0BJXZb7wr4QxUD18Py9r6UtGcPo7BdJe4-zhVs5xPZnLtK7clzIHi3lZTDNcPVS1nPnRRTFLi0Le4RRYX5rjv3IyzXJZfUP1WNbZJBgaKgQdDckmYEB2uFbAEZSlHU9I1zIAQHQmYTY0wnRxqIH_kEjTUCsuDGNtF0YxhZ2uCD1F-6unlfmOMExkQ9oyEbU64taqmHMFXIgn2momxBn69Q5f89zLZjRANzzazYB249BuAO0GzG8dxB-mTvPaD4AnNIMnNP_zhB-fMck5-uKW1ReDXaD9zcvWXELasWl_eg97Azsaxk4
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=IMPLEMENTATION+OF+COMPLEX+SOLUTIONS+FOR+PROTECTION+AGAINST+CYBER+THREATS+OF+ELECTRONIC+SYSTEMS+OF+UNMANNED+AERIAL+VEHICLES&rft.jtitle=Zeszyty+naukowe+Politechniki+%C5%9Ala%CC%A6skiej.&rft.au=MAMMADOV%2C+Aftandil&rft.au=SAD%C4%B0GOV%2C+Gurban&rft.date=2025-06-01&rft.issn=0209-3324&rft.eissn=2450-1549&rft.volume=127&rft.spage=155&rft.epage=164&rft_id=info:doi/10.20858%2Fsjsutst.2025.127.9&rft.externalDBID=n%2Fa&rft.externalDocID=10_20858_sjsutst_2025_127_9
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0209-3324&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0209-3324&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0209-3324&client=summon