5Privacy and Security Challenges in Unmanned Aerial Vehicles (UAVs)

Imdad Ali Shah

School of Computing Science, Taylor’s University, Kuala Lumpur, Selangor, Malaysia

Abstract

An unauthorized person’s use of sensitive information is referred to as a human privacy breach, also known as a privacy violation or breach. It takes place when a person’s privacy rights are breached, exposing or compromising their private information. Technology’s most crucial goal is removing obstacles and supporting human life. An example of a technology created in this area is the unmanned aerial vehicle (UAV). It becomes more apparent when performing duties that endanger people’s health and safety. UAVs can also be used to accomplish tasks that would be impossible for humans to complete correctly and that are not easy to reach. Every new technology has both benefits and drawbacks. Some of its drawbacks include the requirement for energy, range restrictions, problems with command and control, hardware and software limitations, and weak environmental resilience. In recent years, UAVs have been used for logistics and military operations and also for illegal and unauthorized information collection, intelligence studies, attacks, and destruction. Cyberattacks on the UAV’s parts, systems, and missions also have ulterior motives in addition to these. Attacks against coordination information and communication systems are of particular concern. In this chapter, we discuss UAV system components, features, ...

Get Cybersecurity in the Transportation Industry now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.