IMPLEMENTATION OF COMPLEX SOLUTIONS FOR PROTECTION AGAINST CYBER THREATS OF ELECTRONIC SYSTEMS OF UNMANNED AERIAL VEHICLES
In the article, the possibilities of applying complex solutions to protect the electronic systems of unmanned aerial vehicles (UAVs) and other important processes from cyber threats were considered. The current application of UAVs in various fields makes the security of their electronic systems rele...
Saved in:
Published in | Zeszyty naukowe Politechniki Śla̦skiej. Vol. 127; pp. 155 - 164 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Silesian University of Technology
01.06.2025
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In the article, the possibilities of applying complex solutions to protect the electronic systems of unmanned aerial vehicles (UAVs) and other important processes from cyber threats were considered. The current application of UAVs in various fields makes the security of their electronic systems relevant. Aerial vehicles can be subject to attacks by attackers who exploit physical, network, and software vulnerabilities in the data exchange process. The article analyzes such methods as data encryption, encoding methods, publishing fake data, and protection against Global Positioning System spoofing attacks. The proposed complex approaches are integrated into the existing systems of UAVs, allowing to increase the level of their security. Complex solutions involve the integration of a special encryption and coding block, as well as the implementation of a module for comparing coordinates and broadcasting false signals. |
---|---|
AbstractList | In the article, the possibilities of applying complex solutions to protect the electronic systems of unmanned aerial vehicles (UAVs) and other important processes from cyber threats were considered. The current application of UAVs in various fields makes the security of their electronic systems relevant. Aerial vehicles can be subject to attacks by attackers who exploit physical, network, and software vulnerabilities in the data exchange process. The article analyzes such methods as data encryption, encoding methods, publishing fake data, and protection against Global Positioning System spoofing attacks. The proposed complex approaches are integrated into the existing systems of UAVs, allowing to increase the level of their security. Complex solutions involve the integration of a special encryption and coding block, as well as the implementation of a module for comparing coordinates and broadcasting false signals. |
Author | SADİGOV, Gurban MAMMADOV, Aftandil |
Author_xml | – sequence: 1 givenname: Aftandil orcidid: 0000-0003-0842-4230 surname: MAMMADOV fullname: MAMMADOV, Aftandil – sequence: 2 givenname: Gurban orcidid: 0009-0006-8730-7452 surname: SADİGOV fullname: SADİGOV, Gurban |
BookMark | eNo9UctOwzAQtBBIlMcXcPEPpPgRO_ExBLeNlCYoMQhOlnEc1Ko0KAkH-HqcgNjLamdnR9qZC3B67I4OgBuMlgTFLL4d9sPnOIx-ImyJSbQUJ2BBQoYCzEJxChaIIBFQSsJzcD0Me-SLx37FF-A72z7kcisLlaisLGC5gmk5Qc-wLvPHCavhqqzgQ1Uqmc6cZJ1kRa1g-nInK6g2lUxUPV3K3DOqsshSWL_USm5n9LHYJkUh72EiqyzJ4ZPcZGku6ytw1prD4K7_-iVQK6nSTZCX6yxN8sBSTMaAc8LixvCImZbaOCL2lfu_hXURb7ETzjLcCM8KG4obEwvH-avFIaMhQobQS5D9yjad2euPfvdu-i_dmZ2ega5_06Yfd_bgdISj0IhYNJzj0FEnmPep5a2lzHrDWq9Ff7Vs3w1D79p_PYz0HIb-C0NPYWgfhhb0B0cYdpY |
ContentType | Journal Article |
DBID | AAYXX CITATION DOA |
DOI | 10.20858/sjsutst.2025.127.9 |
DatabaseName | CrossRef DOAJ - Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Open Access Full Text url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics |
EISSN | 2450-1549 |
EndPage | 164 |
ExternalDocumentID | oai_doaj_org_article_7174a989d6614e3e95068f6fc35c685f 10_20858_sjsutst_2025_127_9 |
GroupedDBID | AAYXX ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ OK1 Y2W |
ID | FETCH-LOGICAL-c312t-66258da675af3c872cb62089ce76f1e9ec51d96624d31da89e66bc1453400a23 |
IEDL.DBID | DOA |
ISSN | 0209-3324 |
IngestDate | Wed Aug 27 01:32:45 EDT 2025 Thu Jul 03 08:16:44 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c312t-66258da675af3c872cb62089ce76f1e9ec51d96624d31da89e66bc1453400a23 |
ORCID | 0009-0006-8730-7452 0000-0003-0842-4230 |
OpenAccessLink | https://doaj.org/article/7174a989d6614e3e95068f6fc35c685f |
PageCount | 10 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_7174a989d6614e3e95068f6fc35c685f crossref_primary_10_20858_sjsutst_2025_127_9 |
PublicationCentury | 2000 |
PublicationDate | 2025-06-01 |
PublicationDateYYYYMMDD | 2025-06-01 |
PublicationDate_xml | – month: 06 year: 2025 text: 2025-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Zeszyty naukowe Politechniki Śla̦skiej. |
PublicationYear | 2025 |
Publisher | Silesian University of Technology |
Publisher_xml | – name: Silesian University of Technology |
SSID | ssj0000685496 ssib026971971 |
Score | 2.2930741 |
Snippet | In the article, the possibilities of applying complex solutions to protect the electronic systems of unmanned aerial vehicles (UAVs) and other important... |
SourceID | doaj crossref |
SourceType | Open Website Index Database |
StartPage | 155 |
SubjectTerms | cyber-attacks electronic systems encoding and encryption gps spoofing inertial navigation system sensor unmanned aerial vehicles |
Title | IMPLEMENTATION OF COMPLEX SOLUTIONS FOR PROTECTION AGAINST CYBER THREATS OF ELECTRONIC SYSTEMS OF UNMANNED AERIAL VEHICLES |
URI | https://doaj.org/article/7174a989d6614e3e95068f6fc35c685f |
Volume | 127 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1BT9swFLYQF3ZBMIbGgMkHjgs0duLYxxDctVOaoCadyilyYvvAoSDaXvj1PDsBdadduFovlvXp2e998fP3ELoaWcY1BP7AQC4aRECYA0VGNEiMIIoooyPfrWFWsMki-rOMlzutvlxNWC8P3AN3A3QjUoIL7QKJoUbEI8Ytsx2NO8Zj605fiHk7ZAo8iTCRhGJIdPozmQMR8heXxF32QxrRSxC5FpX8Zv243m7WrrSSxNchSa7FP2FqR83fh53xEToc8kWc9us8Rntm9RUdvD8nXp-g1-nsPveS_P5vEy7HOCvd0BJXZb7wr4QxUD18Py9r6UtGcPo7BdJe4-zhVs5xPZnLtK7clzIHi3lZTDNcPVS1nPnRRTFLi0Le4RRYX5rjv3IyzXJZfUP1WNbZJBgaKgQdDckmYEB2uFbAEZSlHU9I1zIAQHQmYTY0wnRxqIH_kEjTUCsuDGNtF0YxhZ2uCD1F-6unlfmOMExkQ9oyEbU64taqmHMFXIgn2momxBn69Q5f89zLZjRANzzazYB249BuAO0GzG8dxB-mTvPaD4AnNIMnNP_zhB-fMck5-uKW1ReDXaD9zcvWXELasWl_eg97Azsaxk4 |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=IMPLEMENTATION+OF+COMPLEX+SOLUTIONS+FOR+PROTECTION+AGAINST+CYBER+THREATS+OF+ELECTRONIC+SYSTEMS+OF+UNMANNED+AERIAL+VEHICLES&rft.jtitle=Zeszyty+naukowe+Politechniki+%C5%9Ala%CC%A6skiej.&rft.au=MAMMADOV%2C+Aftandil&rft.au=SAD%C4%B0GOV%2C+Gurban&rft.date=2025-06-01&rft.issn=0209-3324&rft.eissn=2450-1549&rft.volume=127&rft.spage=155&rft.epage=164&rft_id=info:doi/10.20858%2Fsjsutst.2025.127.9&rft.externalDBID=n%2Fa&rft.externalDocID=10_20858_sjsutst_2025_127_9 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0209-3324&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0209-3324&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0209-3324&client=summon |