IDEAS home Printed from https://ideas.repec.org/a/aac/ijirss/v6y2023i1p164-173id1173.html
   My bibliography  Save this article

Managing the cyber-physical security for unmanned aerial vehicles used in perimeter surveillance

Author

Listed:
  • Mahmod Al-Bkree

Abstract

This paper discusses the vulnerabilities of perimeter surveillance unmanned aerial vehicles to cyber-physical security threats and discusses some approaches to manage them, as most cyber threats to the UAVs coming through their onboard wireless transceiver, we are suggesting an Antennas propagation type that limit the vector of the threat, also the importance of vulnerabilities scanner to evaluate the system risks. And addressing the limited energy and computation power resources onboard, a computation efficient onboard encryption method is proposed, and a sign cutting machine vision algorithm to provide warning of suspicious activity detected on interrupted surveillance imagery. The focus of this analysis is to manage the vulnerabilities of the system during both its operation time and its standby time, this is done by performing a checklist of computerized tests periodically and comparing two or more results to discover any unexpected changes. We showed that the onboard resources can be utilized more efficiently securing itself and the system from possible intrusion, however, some heavy calculation tasks still need to be performed on the ground control station which is causing some latency problem to such time sensitive operation. We have demonstrated that image registration techniques have produced useful results when applied to analyze the differences between two scene images.

Suggested Citation

  • Mahmod Al-Bkree, 2023. "Managing the cyber-physical security for unmanned aerial vehicles used in perimeter surveillance," International Journal of Innovative Research and Scientific Studies, Innovative Research Publishing, vol. 6(1), pages 164-173.
  • Handle: RePEc:aac:ijirss:v:6:y:2023:i:1:p:164-173:id:1173
    as

    Download full text from publisher

    File URL: https://ijirss.com/index.php/ijirss/article/view/1173/327
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aac:ijirss:v:6:y:2023:i:1:p:164-173:id:1173. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Natalie Jean (email available below). General contact details of provider: https://ijirss.com/index.php/ijirss/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.