key: cord-1019793-8kuv4ls0 authors: Yaacoub, Jean-Paul; Salman, Ola title: Security Analysis of Drones Systems: Attacks, Limitations, and Recommendations date: 2020-05-08 journal: nan DOI: 10.1016/j.iot.2020.100218 sha: 0cdcb926902d1878a7c8a48bfdb2d9c77ec5be02 doc_id: 1019793 cord_uid: 8kuv4ls0 Abstract Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere and at any time. However, recently, the malicious use of drones began to emerge among criminals and cyber-criminals alike. The probability and frequency of these attacks are both high and their impact can be very dangerous with devastating effects. Therefore, the need for detective, protective and preventive counter-measures is highly required. The aim of this survey is to investigate the emerging threats of using drones in cyber-attacks, along the countermeasures to thwart these attacks. The different uses of drones for malicious purposes are also reviewed, along the possible detection methods. As such, this paper analyzes the exploitation of drones vulnerabilities within communication links, as well as smart devices and hardware, including smart-phones and tablets. Moreover, this paper presents a detailed review on the drone/Unmanned Aerial Vehicle (UAV) usage in multiple domains (i.e civilian, military, terrorism, etc.) and for different purposes. A realistic attack scenario is also presented, which details how the authors performed a simulated attack on a given drone following the hacking cycle. This review would greatly help ethical hackers to understand the existing vulnerabilities of UAVs in both military and civilian domains. Moreover, it allows them to adopt and come up with new techniques and technologies for enhanced UAV attack detection and protection. As a result, various civilian and military anti-drones/UAVs (detective and preventive) countermeasures will be reviewed. The reliance and use of drones is constantly rising in numerous domains. This is due to the drones' ability to offer a livestream, real-time video and image capture, along with the ability to fly and transport goods [1] . As a result, more than 10,000 drones will be operational for commercial use within the next five years. This is mainly due to their advantages over commercial helicopters when it comes to costs and budget [2] . Moreover, the technological advancement enables easy manipulations via smart-phones to fly mini-drones instead of using remote controllers. In fact, the use of drones is not limited to commercial and personal aims. Drones are being used by law enforcement and border control surveillance teams. In case of natural disasters, search and rescue teams employ them to gather information or to drop essential supplies. However, drones are not being used exclusively by "good guys"; "bad guys" are leveraging drones to achieve their malicious objectives. Being easy to control, drones can be used to perform different attacks. On the other hand, drones expose security vulnerabilities that make them prone to hijacking. In this paper, we review the attacks from/to drones, along with their existing countermeasures. The reliance on wireless communications makes drones vulnerable to various attacks. These attacks can have drastic effects, including commercial and non-commercial losses. In this context, there is a lack of proper understanding on how hackers perform their attacks and hijack a drone, in order to intercept it or even crash it. In fact, drones can also be compromised for malicious purposes. Hence, there is a need to detect them and prevent them from causing any damage. The security of civilian drones was reviewed in [3] . Also, different security attacks on drones were analyzed in [4] , [5] , [6] , [7] , [8] . Drones detection methods were reviewed in [9] , [10] , [11] , [12] . However, a main limitation of the previous work is the lack of a comprehensive analysis of the drones security vulnerabilities and the attack life cycle. Moreover, only one aspect of drones' security threats was addressed, attacks on drones. The existing countermeasures need to be analyzed, and new techniques need to be proposed to overcome the limitations of the existing security solutions. In this work, we conduct a comprehensive review of the different aspects of drones' cyber-security including two main aspects: drones' security vulnerabilities, and the security concerns associated with compromised drones. Then, we review the countermeasures to secure drone systems, and to detect malicious ones. These contributions are summarized below: • As for drones fitted with cameras, they should not be flown: -Within 50 meters of people, vehicles, buildings or structures. -Over large gatherings like concerts or/and sports events. Many of these rules already came into effect by the end of July 2018, restricting all drones from flying above 400 ft. In fact, violators could be punished with unlimited fines or/and up to five years in jail. For this reason, this paper presents and classifies the main regulations applied in different countries per continent as illustrated in TABLE II, while relying on a series of conducted surveys, reviews and comparative studies in [22] , [23] , [24] , [25] , [26] . Typically, any UAV or drone architecture consists of three main elements: Unmanned Aircraft (UmA), Ground Control Station (GCS), and Communication Data-Link (CDL) [3] , [27] . These components are briefly described in the following: • Flight Controller: it is classified as the drone's central processing unit [3] . • Ground Control Station: it is based on an On-Land Facility (OLF), which provides human operators with the necessary capabilities to control and/or monitor UAVs during their operations from a distance. GCSs differ depending on the size, type, and drones' missions. • Data Links: are wireless links used to control the information flow between the drone and the GCS. This depends on the operational range of UAVs. Based on the research in [3] , drones' control can be categorized based on their distance from the GCS: -Visual Line-of-sight (VLOS) Distance: allows control signals to be sent and received via the use of direct radio waves. -Beyond Visual Line-of-Sight (BVLOS) Distance: allows drones to be controlled via satellite communications [27] . Drone communications can be classified into four main types, Drone-to-Drone (D2D), Drone-to-Ground Station (D2GS), Drone-to-Network (D2N), and Drone-to-Satellite (D2S). The communication framework is illustrated in Fig. 1 . In fact, Machine Learning can be leveraged in order to design and optimize a smart UAV-based wireless communication system [28] . In most cases, D2D communications can be modeled as Peer-to-Peer (P2P) communication. This would make it vulnerable to various types of P2P attacks including jamming (i.e Distributed Denial of Service (D-DoS) and sybil attacks) [29] , [30] , [31] . This communication type is based on the already known and standardized industrial protocols, which are based on wireless communications such as Bluetooth and Wi-Fi 802.11 including 2.4 GHz and 5 GHz. However, most drone-to-ground communications are public and not secure, using a single factor authentication, which can be easily broken, making them vulnerable to passive (eavesdropping) and active (man-in-the-middle) attacks. 3) Drone-To-Network: This communication type allows the choice of the network based on the required security level. It may also include cellular communications, which means relying on 3 GHz, 4 GHz, 4G+ (LTE) and 5 GHz. It is essential to secure such wireless communications networks when being used. 4) Drone-To-Satellite: This is the type of communication needed for sending real-time coordinates via the Global Positioning System (GPS). This allows any drone to be called back to its initial station in case it went beyond the line of control or outside the line of sight. Satellite communications are deemed secure and safe. However, they exhibit a high cost and maintenance requirements. This is why they are heavily used by armed forces. All UAVs are drones, however, not all drones are UAVs. This paper details the difference between drones, UAVs, and Unmanned Aircraft Systems (UAS); Fig. 2 presents a classification of UAVs. This term is commonly used to refer to remotely (autonomously) guided aircraft. This term also describes various vehicles including submarines or land-based autonomous vehicles. In fact, drones can be classified into three main types, according to their flying mechanisms [32] , as described next. • Multi-Rotor Drones: they are also known as rotary-wing drones. They are based on the Vertical Take-Off and Landing (VTOL) principle. Moreover, due to their manoeuvrability, they can hover over a fixed location, which allows them to provide a constant cellular coverage over certain areas. Therefore, multi-rotor drones can act as base stations at their intended locations with high accuracy and precision. However, their mobility is very limited and they consume large amounts of energy. • Fixed-Wing Drones: these are more energy efficient [33] , [34] than multi-rotor drones. This is due to their ability to glide and travel at a high speed, while carrying heavy payloads. The main drawback of fixed-wing drones is the need for a runway to take off and land [35] , due to their Horizontal Take-Off and Landing (HTOL) nature. Another drawback is their inability to hover over fixed locations, in addition to their expensive software/hardware nature. • Hybrid-Wing Drones: these are fixed/rotary wing drones that recently made it the market. This type of drones is able to reach the destination quickly by gliding over the air and hovering through the use of four rotors. 2) UAVs: A UAV can fly remotely/autonomously using a controller, mobile phone, computer or even a tablet [36] . They are characterised by their autonomous flight capabilities and ability to operate over long distances with a secure live feed transmission. Moreover, UAVs control can be classified and divided into three main categories [3] : • Remote Pilot Control: known as operator static automation, where all decisions are made by a human remote operator. • Remote Supervised Control: known as adaptive automation. It offers the drones the ability to launch and carry out a given mission process independently, while allowing for human intervention, if needed. • Full Autonomous Control: known as system static automation, where drones can make all required decisions for a successful mission completion, without the need for any human intervention. These include UAVs and drones, and the operators controlling them [37] . A UAV is a type of UAS since it refers to a controlled vehicle or aircraft [38] . 4) RPA: RPA stands for Remotely Piloted Aircraft, which requires intensive skills and training over a long period of time (a couple of years) to operate and control these complex flights [37] . Various drone types are now equipped with crash avoidance systems, to navigate around objects and to return back to base on a programmed route. This is possible using Radio-Frequency Identification (RFIDs) and low power Radio-Frequency (RF) transmitters continually broadcasting their identities. This ensures that the asset is protected, and located at legitimate entry points at all times. Due to the continuous and close encounters between aircraft and UAVs, it is critical to avoid any collision between them. As a result, in [39] , several methods were discussed along the modeling and evaluation of drones safety, and by applying these methods on Unmanned Aircraft Systems (UASs). The aim was to develop a UA-Sense-and-Avoid (SAA) system, based on the ability to sense and avoid obstacles, in coordination with the Federal Aviation Administration (FAA) standard (RTCA SC-203) [40] . Another method for SAA was also presented by Barfield in [41] . The method is based on an autonomous CA system that offers protection to prevent any collision. This was successfully done without causing any failure in the flight operation. In fact, CA algorithms were developed in [42] to perform certain tasks including Individual Collision Avoidance (ICA) in 2D and Group Collision Avoidance (GCA) in the 3D plane. Another method was presented by Yang et al. in [43] and it is based on the UAV 3D path planning, which consists of locating a collision-free path in a 3D cluttered environment based on three main constraints, geometric, physical and temporal. Different obstacle-collision avoidance methods were also presented to overcome any obstacle facing the UAVs. In [44] , Ueno et al. presented a law that enables an aircraft to accurately localize objects in its vicinity. In [45] , Brandt et al. stated that quad-rotors are more suitable to operate indoors due to their flexible operations in small and confined areas. Furthermore, an algorithm was presented by Israelsen et al. in [46] to manually tele-operate UAVs using automatic Obstacle Collision Avoidance (OCA). It is important to ensure a safe routing path for drones to avoid accidents, damage or/and injuries. To do that, one must take into consideration the threat, risk, target, and terrain, along with the UAV restrictions. As a result, in [47] , Tulum et al. introduced an agent-based approach for the UAV mission route planning problem, by using situation awareness algorithms. Moreover, deterministic and probabilistic path planning strategies for autonomous UAV networks were followed through the exploration of obstacles in an area [48] . In [49] , Hernández et al. applied a graph-based method for a multi-objective route planning of a simulated UAV to adhere to the required safety considerations. This section described briefly the drone architecture, communications types, and UAV types. Also, the difference between drones, UAV, and UAS. Note that firmer regulations are still needed to ensure a safer use of UAV and UAS, especially with the recent encounters between drones/UAVs and other aircrafts. In the next section, the security of main UAV applications will be presented. Drones will play a major role in the near future, by delivering goods and merchandise, or even serving as flying mobile hotspots for broadband wireless access. In fact, when drones are deployed as hot-spots, the most suitable solution for bandwidth allocation is the Binomial and Poisson cluster processes, as presented in [50] . The main goal is to serve a massive number of users in a specific area. Moreover, drones can be used to maintain all the needed security and surveillance techniques, which are implemented to ensure the usage of these drones safely, securely and properly according to [14] . Therefore, the focus is on the multi-purpose usage of these drones, both in the civilian and military domains. The multi-purpose uses of drones are illustrated in Fig. 3 and discussed next. Lately, drones have been used in various civilian domains [3] . Many of these domains are mentioned and discussed in [51] , including search and rescue, and disaster management. The main civilian applications of drones include: • Cinematography: Drones are currently being used by various filmmakers to ensure aerial filming like never before, enabling a new level of creativity with a bird's eye view [52] . • Natural Disaster Response and Control: UAVs are being deployed for disaster control and assessments ever since the Katrina hurricane in 2005, where roads were blocked by fallen trees, cars, road signs, etc. This helped in assessing the disaster consequences and in checking for missing, injured and trapped survivors. • Search and Rescue: UAVs can be used for the purpose of searching for lost, scattered or stranded people, especially when human presence is deemed dangerous or limited. • Tourism: UAVs can also be used to capture stunning views including the bird's eye view. This can be used to attract tourists and to promote touristic places and areas of interest [53] , which enhances the overall tourism industry. • Commercial Ads: Drones are also being used in commercial ads since they can be used to capture (film) a scene with High Definition (HD) quality and for a specific amount of time. This reduces the need for expensive equipment and human interaction. • Crisis Management: In case of a terrorist attack or a natural disaster (earthquake floods), UAVs can act as hot spots or base stations, which allows for the collection of short messages sent by affected people [54] , or used to alert response teams [55] . In other cases, it helps in locating people based on their GPS location or MAC addresses. However, in case of a terrorist attack, they might act as an Access Point (AP) for a suicide bomber's detonator, which facilitates the activation and detonation of a bomb. • Emergency Response: Drones are currently being used as mobile medical kits that can be sent to first aid response teams on scene [56] . This offers the necessary help without delays, in contrast to ambulance cars. In fact, drones were deployed across the streets of Spain and China (mainly Wuhan), using cameras and speakers to raise awareness and warm people, using aerial spray and disinfection to fight the corona-virus (COVID-19) spread [57] , [58] . In addition, drones were used as a flying delivery mean to supply isolated/infected patients with goods (i.e food and medicine), and also as a flying mean to transport testing samples at a faster pace, reducing human interaction [59] . • Environmental Management: Drones can be used to perform pollution measuring tasks [60] (i.e environmental drones for air quality measurement and analysis [61] , [60] , [62] ), agricultural tasks [63] (i.e soil analysis, crop/seed/livestock management and pest control [64] , [65] , [66] , [67] ), or nature/wildlife research/conservation tasks (i.e anti-poaching, endangered species protection [68] , [69] , [70] , [71] ). • Underwater/Maritime Purposes: Underwater drones or Unmanned Ocean Vehicles (UOV) saw an increase use of underwater search-and-rescue operations [72] , [73] , environmental and coastal data collection [74] , [75] and detecting and monitoring maritime fauma (animals) [76] , [77] . Drones are used to track down suspects using the aerial bird watch view. This proved to be cheaper and more maneuverable than a helicopter. In fact, drones will soon have the ability to contain thermal, motion, and night vision detection, which can be used to track down suspects at any time of the day. Furthermore, drones can be used to enhance traffic efficiency by offering quick response and identification of road conditions. This helps in avoiding traffic congestion, and in responding to a traffic accident or emergency. Moreover, these drones can be used for surveillance purposes, with the ability to detect suspicious targets hidden within public domains, which proved to be more flexible than fixed cameras. The reason is due to their capability in identifying and recognizing suspects from their height, size, and facial recognition, and thus, making it very difficult for suspects to hide in public. In fact, according to BBC News, the UK prison service and the police are investing their resources to stop drone pilots from flying drugs, mobile phones, blades, knives, Subscriber Identity Module (SIM) cards, Universal Serial Bus (USBs) etc. into prisons [78] . These drones were being flown over walls and physical barriers. As a result, reports revealed that almost £3m may possibly be spent on the newly assigned task force to overcome this problem. As a result, due to the autonomous and operational nature of drones, they became more and more adaptable and operational. This reduces and replaces the use of choppers, decreasing the response time and needed resources. Drones are capable of capturing a live bird-view of different types of incidents ranging from crimes, theft, to even riots. This leads to a firmer response with a more enhanced plan due to the ability to identify suspects while locating and tracking them down before arresting them. Also, UAVs can be used by the police and other agencies to gather crucial information in dangerous situations with less manpower and money [79] , [80] ; drones were used by the police 372 times across Northern Ireland since 2013. The paper explains the reasons for using drones in the case of aerial surveillance based on real-case incidents as shown below: • Traffic Monitoring: UAVs are being used to monitor traffic and accident scenes, such as the case of their use in the state of Illinois since 2015, and in India including Kanpur city [81] , as well as their use in Spain to monitor traffic black-spots [82] . • Tracking Escapees: UAVs were used to monitor escapees from crime scenes and prisons. A prime example of that is when in 2016 the Ohio police department managed to track down an escaped inmate using a drone, which led to his arrest. In 2010, the UK police managed to capture a car thief in the city of Merseyside. In 2011, a Predator drone was used to assist in the arrest of a suspect in North Dakota [83] . • Forensics Search & Rescue: UAVs were used in solving crimes incidents such as the case of Ms. Tara Grinstead 2005 murder, where a fixed wing drone, called Spectra, was used by the Irwin County Sheriff's Office in Georgia, while another drone was used by the specialist Gene Robinson to cover large areas in search of her whereabouts. The case was not solved until February 2017, when one of her students confessed to her murder to the Georgia Bureau of Investigations (GBI) [84] , [85] . • Anti-Rioting: UAVs saw recent use in counter-protest efforts, as part of crowd control tactic used by Israel towards Palestinians [86] . As early as 2015, experiments were conducted by using drones armed with tear gas [87] , and the Indian police considered using drones armed with pepper-spray [88] . Around March, 2018, the Israeli Defense Force (IDF) and police started using drones armed with tear-gas to disperse Gaza protesters from the Israeli-Palestinian borders [89] , [90] . UAVs became the perfect choice for military usage [91] , especially for intelligence and reconnaissance purposes [92] performing Surveillance, Target Acquisition and Reconnaissance (STAR), Joint Surveillance Target Attack Radar (JSTAR), Reconnaissance, Surveillance and Target Acquisition (RSTA) [93] , [94] , [95] tasks. Their deployment is a key part to counter insurgency and terrorism, offering the ability to Track and Identify Dismounted Personnel (TIDP) in urban environments, especially in Areas of Operation (AO) [96] . Fig. III presents a summary about several Drone/UAV types being used in overt/covert military operations, which are described next. • P-CAS: more efforts are directed to enable UAVs to offer a Persistent-Close Air Support (P-CAS)/Precision Strikes for real-time protection of ground troops [97] , [98] and for a quick target elimination through the use of laser-guided missiles and without waiting for an airstrike-call [99] . This method was applied by the American, (British) and French armed forces in Mali [100] , [101] , [102] , [103] , Somalia and Djibouti [104] , [105] , Kenya [106] and Nigeria [107] (mainly against Boko-Haram [108] , [109] , and Al-Shabaab [110] , [111] , [112] ); hence, the Unmanned Combat Aerial Vehicle (UCAV) term was introduced [113] . These drones can also be used to help (elite) troops in their covert, overt or clandestine operations by offering guidance, close air-support or currently active/passive enemy movement as part of Surveillance, Target Acquisition, and Reconnaissance (STAR), Reconnaissance Surveillance Target Acquisition [114] , to enhance the Command, Control, Communications, Computers, Intelligence, Surveillance, & Reconnaissance (C4ISR) role [115] and overcoming the limited Intelligence, Surveillance, and Reconnaissance (ISR) role of Unmanned Ground Vehicles (UGVs). • Precision Shelling: UAVs were also used to conduct precision shelling against terrorist targets [116] . In fact, Russia has been relying on this Guided Artillery Rounds technique as early as July 2015 [117] , [118] , [119] . This technique was also adopted by Pro-Russian separatists against Ukrainian forces in 2014 [120] , [121] , and by Ukrainian forces against Pro-Russian separatists in 2019. • Aerial Surveillance/Reconnaissance: unlike the reliance on Human Intelligence (HUMINT), UAVs were also deployed as part of aerial intelligence and information gathering, allowing the identification and tracking of insurgents (i.e training, movement and camps), vehicles (i.e movement, types), weapons, weapon caches, and Improvised Explosive Devices (IED) (i.e factories, equipment, market, and planting), especially in Afghanistan [92] , [96] . In fact, they were also used by both Ukrainian forces and pro-Russians [122] for reconnaissance and counter-reconnaissance purposes during the Ukraine war [120] , [123] . Recently, a new Russian drones' footage emerged on February 2020, exposing how Turkish artillery batteries are targeting the Syrian army in support of anti-government rebels [124] in Idlib [125] . • Unmanned Airstrikes: were the prime choice of the US as early as 2002, especially in the elimination of Al-Qaeda operatives in Yemen [126] with their use of predator drones [127] , [116] , before evolving into their authorised use in their Global War Against Terror (GWAT) [128] along their British counterparts [129] . Moreover, Israel also relied on the extensive use of drones and UAVs [130] to perform unmanned airstrikes against key targets/figures in the West Bank, and military installations in Iraq and Syria [131] , [132] , [133] . The same goes for Russia and Iran (Shahed-129 drone [134] ) using UAVs to counter uprising insurgencies and terrorism in Syria [135] . Recently, after the loss/injury of more than 59 Turkish soldiers by Syrian airstrikes as part of "Dawn of Idlib 2" [136] , the Turkish army extensively used drones in retaliation attacks to target the Syrian Regime's troops and allies' military targets and installations in series of wellcoordinated drone strikes [137] , [138] , before a cease-fire was established [139] , [140] , [141] , and before risking further escalation with Russia [142] . • UAV Hijacking: This is done mainly through GPS spoofing/jamming, and it was very effective in the Ukrainian conflict [143] and in countering ISIL's threat, especially over the city of Mosul, until its liberation in 2017 [144] . • Covert Aerial Surveillance/Reconnaissance: UAVs were being developed and produced as early as world war one [145] , using Archibald Montgomery Low's radio control techniques to counter the Zeppelins threat [146] , before their covert use in the cold war era for spying purposes, and during the Vietnam war as part of reconnaissance [147] . This included their use by the US-led coalition forces, mainly the British in operation Herrick [148] , [148] , [149] , [150] , Afghanistan. • Evading Radar-Detection: another military purpose of drones is to avoid radar detection. The Harop IAI [151] , or HARPY IAI 2 [152] along the British "Fire Shadow" [153] , are classified as anti-radiation drones. They are capable of autonomously reaching their targets without the need to carry a warhead by self-destruction into the main target. However, IAI Harop showed a higher success and accuracy rate compared to the Fire Shadow, yet the British Ministry of Defense (MoD) stated that the project will be extended in the future [152] . This is due to their ability and capability to evade SAMs [154] and radar detection systems, which are either designed to target a much larger aircraft or to intercept fixed-trajectory missiles [155] . • Interception of Footage: military analysts are capable of analyzing the footage taken and filmed by a terrorist's drone in an attempt to thwart a domestic terror attack [156] . This allows them to identify their tactics, operational geographical location, along with their skills, weapons, and training. • Underwater Surveillance: underwater drones were used for covert underwater surveillance and reconnaissance operations, especially by the US Navy [157] , [158] near and across the China sea [159] , [160] ; many sensors were caught by Chinese authorities, mainly between 2016 and 2018 [161] , [162] , [163] . Such operations includes various underwater drones types such as the Unmanned Underwater Vehicles (UUV), Amphibious Underwater Vehicles (AUV) and Underwater Maritime Vehicles (UMV) [164] , [165] , [166] , which are also used as part of naval counter-mine warfare [167] , [168] , [169] . • Targeted Assassination & Killing: the adoption of this term came as part of the US approval of use of lethal force [170] , [171] as part of new rules of engagements [172] for counter-terrorism and counter-insurgency tasks/purposes [173] , [174] , [128] (i.e Afghanistan [175] , [176] , [177] , Yemen [178] , Iraq [179] , Syria [180] and Libya [181] ). Its adoption can be based on the use of drone strikes or explosive-laden drones. Kamikaze drones/UAVs or loitering munitions [182] , [183] might also be used for "Target Assassination" purposes, as part of the so called explosive-laden drones [184] . This specific concept was demonstrated by the Israeli K1-UAV [185] , which can be adapted and used by intelligence and spying agencies, where Israel Aerospace Industries (IAI) [186] also unveiled their newest Loitering Munitions (LM) called IAI Harpi at the Singapore Airshow in 2016 [187] and the IAI Mini-Harpi in 2019 [188] , [189] . However, not far from now, on August 4th, 2018, a drone-led assassination attempt was foiled when two drones wrapped with explosives were used to assassinate the Venezuelan president; they were shot down by snipers injuring 8 soldiers and 1 civilian [190] , [191] , [192] . Targeted killing is executed via drone strikes by what is referred to as "Killer Drones" [193] such as the case of the Global Hawk [194] , [195] , Predator and Reaper Drones [196] , [197] , as well as the British "Protector RG Mk.1" UAV [198] for the elimination of key terrorist figures/targets [199] , [200] , [201] , [202] , [203] , [204] , [205] . However, the adoption of this method resulted into further civilian casualties [206] , and the rise of new insurgencies [207] , [208] . After presenting the different purposes for the use of UAVs, we list the malicious usages of drones by terrorists and/or criminals to launch malicious attacks such as having drones perform some types of physical or even logical attacks. In general, UAV malicious use can be divided between criminal usage and terrorist usage as described below: Such attacks include physical as well as logical attacks: • Physical Attacks: the main threat is related to the issue of private property surveillance, where drones can be easily used to breach the physical privacy of people. This is a very serious issue whereby drones are able to break through the geo-boundaries [209] . According to BBC News [210] , smuggling drugs, phones, and even blades to prisoners within highly secure prisons, were being carried out while avoiding ground detection. This is typically achieved via an octo-copter that is capable of lifting 20lbs [211] . Moreover, such attacks include crashing drones into certain people (accidentally or intentionally) or crashing them into people's properties, which may cause low to serious damages. Another threat is related to small quad-copters such as the DJI Phantom 3, which can reach an altitude of 1600ft (488 m) and a distance of 16,000ft (4800 m) [212] . This imposes a serious problem, especially with bird-related incidents, which can cause serious problems to airplanes engines. • Logical Attacks: Logical attacks include, among others, the setup of a fake mobile Wi-Fi network or a rogue Access Point (AP) [213] , which leads to the interception of smart-phones traffic by luring users to connect to a nearby "Open AP", typically titled as "Free Wi-Fi". Thus, an attacker can capture users sensitive information like passwords and credit cards credentials. This also includes hijacking other drones by connecting a raspberry-pi device into a drone and programming it to intercept and hijack other nearby drones [214] , [215] . This turns the malicious drone into a rogue AP for nearby devices and drones, and injecting malware into connected smartphones through the interception and redirection of users data traffic, or through phishing (malicious links, fake advertisement, or false update). In fact, various drone attacks including jamming and spoofing were mentioned and discussed in [216] . Finally, UAV sensor inputs may also be targeted and exploited by an attacker who would manipulate such parameters and trick the sensors. After the proliferation of drones, serious threats and challenges emerged since these drones could be used by terrorists for malicious purposes [217] . Having drones in the wrong hands can lead to serious consequences [218] . Actually, drones are being used by insurgents and terrorists alike [219] , [220] ; drones and UAVs were used by ISIS to drop bombs (i.e weaponized drones [221] ) and to film propaganda videos (i.e training, battle tactics, simulated attacks, location/geography, reconnaissance etc.) [222] , [223] in conflict zones such as the targeting of Iraqi and Syrian military personnel [224] , [225] , [226] , [227] . Also, against the backdrop of its increasing use of attack drones in Iraq and Syria, ISIS has released an informative graphic detailing its attacks in February 2017 using a pro-ISIS channel known by "Ninawa Province", to show the footage taken prior to a terrorist attack [228] . This alarmed the whole world about the drones' serious safety and security threats, and their devastating effects on the moral of both military and civilian personnel. Typically, the use of drones by terrorists is associated with the following purposes: • Online Propaganda: recently, terrorists have been using drones [227] , [229] to film their attacks, training and operations using in some cases drones with High Definition (HD) cameras in an effort to boost the moral of their jihadists and urge sympathisers and world-wide supporters to join them [230] , [218] . • UAV-Surveillance: is a new method used by terrorists to capture live footage (i.e images/videos) while planning an attack [231] , [232] , [229] , or potential future attacks [203] , [233] . • UAV-Aided Shelling: is also a new terrorist choice to guide and adjust their (artillery/mortar) shelling against a given military/civilian target [234] (i.e ISIS/ISIL [235] , [116] ). • UAV-Guided & UAV-led Attacks: is a technique that was used between 2016 and late 2017 [234] to target military personnel, convoys and checkpoints or installations [221] , [236] , [237] using the Vehicle-Borne Improvised Explosive Devices (VBIED) [238] ; in addition to the old car bomb style [239] , or the dropping of homemade bombs (i.e bomblets, grenades, 20-40 mm, or modified shells) or leaflets [240] . Moreover, they can be used as loitering munition to target airports, military installations and oil refineries (i.e in Saudi Arabia and United Arab Emirates (UAE)) [241] , [242] , [243] , [244] , [245] . • Loitering Munition: the Samad UAV is a family of long-range UAVs built and used by the Iranian armed forces and handed over to Hezbullah in the Middle East, and extensively used by the Houthis in Yemen for reconnaissance purposes [246] , [247] , and also as loitering munition to target Saudi Arabia and United Arab Emirates facilities (oil refineries, airports and military installations, i.e Abqaiq-Khurais attack [242] ). It was named after the assassination of Saleh Al-Sammad in a drone strike by the United Arab Emirates in 2018 [248] , and includes three models, Samad-1 (wingspan of 3.5 m, 500 Km range, surveillance), Samad-2 (UAV-X, wingspan of 4.5 m, 500 Km+ range, surveillance or explosive payload) and Samad-3 (wingspan of 4.5 m, 1500 Km range, explosive payload). • Drone Footage Interception: military drones/UAVs were prone to stream/footage interception attempts, many of which were successful. One example is the case of Israeli drone footage being intercepted in 1997 [249] before applying further encryption [250] . Another case occurred during the Iraqi war with insurgents intercepting US predator drones using first, a $26-value software [251] , [252] and then, the SkyGrabber software [253] . • Airstrike Disruption: this technique was adopted by ISIS to disrupt airstrikes against them in Raqqa; they wait on their opponents to fly a drone, then ISIS operators would fly and target the airstrike calling team, tricking their opponents into thinking its a friendly drone hovering overhead. Such drones were often armed with 40-mm grenade-sized munitions and can hit their target with high accuracy [254] . • Burning/Incendiary Kites: these were used in March 2018 during the Palestinian protests on the Palestinian-Israeli borders, and included the use of helium balloons, or strapping a kite, or an aerial unmanned device with a bomb, incendiary device, or Molotov cocktail and crashing it on the Israeli side causing a huge wildfire to nearby farmlands [255] , [256] , [257] , [258] . In summary, the use of drones/UAVs can be be applied into different domains. As described above, the threat of Drones/UAVs is highly alarming and taking place at an increasing rate especially as the year 2020 is unfolding, with the increasing terrorist and criminal use of drones/UAVs to conduct malicious activities. As stated in this section, drones have been employed in different domains for good purposes, but also for malicious ones. Accordingly, there are new challenges related to several security, safety and privacy concerns when drones/UAVs are employed for malicious goals, which we discuss in the next section. The use of drones offered advantages on so many levels, from commercial to personal. However, drone systems suffer from different security, safety, and privacy issues [259] .The breaches of security and privacy led by drones should be addressed by the highest national level. Moreover, there should exist a very strict approach to limit the drones' ability to gather images and record videos of people and properties without authorized permission. From the perspective of security and threat analysis, drone-assisted public safety network is different from traditional wireless networks such as Wireless Sensor Networks (WSNs) and Mobile Ad-hoc Networks (MANETs) [260] . This is attributed to carrying less information and requiring less power compared to a drone-assisted public safety network. Moreover, the drone's coverage area is broader and wider than WSNs and MANETs. Therefore, security challenges are primary related to the resources constraints along with the delay constraints of UAVs. Moreover, it is essential to ensure that confidentiality, integrity, availability, authentication, and non-repudiation properties over communication channels are fulfilled. This is done in accordance to the AAA process and guidelines: • Authorisation: by assigning privileges to the personnel controlling the UAV. • Authentication: by ensuring a multi-factor authentication using something you know (strong constantly changing password), something you have (username), something you are (biometric) properties. • Auditing/Accounting: by tracking down and/or arresting drone/UAV legitimate owners in case of criminal/malicious activities. The use of drones, by malicious entities to conduct physical and cyber-attacks, threatens the society by breaching the privacy of its residents along with threatening the public's safety. In fact, various technical and operational drone properties are being exploited and misused for potential attacks. This includes performing critical operations based on offensive reconnaissance, as well as surveillance aimed at tracking specific people and certain properties, causing safety and privacy issues [261] . On the other hand, it is essential to prevent the use of drones above residential areas, which leads to privacy breaches through reckless behaviours, since the captured footage may be used for either scamming and/or blackmailing purposes. Safety breaches may also occur in case a drone malfunctions and crashes into a nearby house, park, parked car or civilians. This would result into material loss/damage and humans casualties/fatalities. Moreover, drones are predominantly used to target guest Wi-Fi connections and/or short-range Wi-Fi, Bluetooth and other wireless devices, such as Bluetooth-connected keyboards. Such connections are not protected due to current security measures, which assume that no one could get close enough to compromise them or to access internal networks via wireless signals. These assumptions lead to weak single factor authentication and the use of typical passwords that can be easily cracked, especially with the absence of encrypted connection. This makes it as easy to intercept information in a private building and in a public café [262] . An attacker would leverage such vulnerabilities to breach security, safety and/or privacy. Fig. 4 , lists the main drones security threats as well as the corresponding techniques to overcome them. Next, we summarize the current and future security challenges. The drones characteristics (small size, low cost, and ease of manoeuvrability and maintenance) made them a preferred choice for criminals. Also, terrorists started to divert their attention towards using these drones to carry out terrorist attacks [263] , Fig. 4 : Drone threats taxonomy mainly due to the nature of drones that makes them less prone to detection. In fact, drones can be armed and modified to carry deadly chemicals, or be fit with explosives to attack critical infrastructures. Moreover, drones carrying explosives may be detonated around people gathering in a hard to reach places. This makes the task easier for a terrorist to achieve, especially since drones provide the stealth of a suicide bomber with the range of an aircraft [232] . Military analysts are concerned about drones being used against the US for espionage purposes. This is due to ISIS being able to re-arm commercially available drones, and make them fit for combat roles over Iraq and Syria. Security does not always mean safety, and vice versa. Outside the military domain, civilian drones/UAVs [264] can also malfunction and crash into a nearby house or a group of people, causing property/material damage [80] , and human injuries/fatalities [265] , ranging from trauma/blunt force trauma, deep cut injuries (caused by drone blades) and laceration. On August 9th, 2016, a young woman lost her life in a car crash in the first non-military related drone incident after reports of a drone being flown near Wandsworth Prison in London. On November 2016, an 18-month old toddler from Stourport-on-Severn, Worcester UK, sliced his eyeball in half by the propeller of an out-of-control drone. In April 2016, a British Airways passenger jet, flight BA727 was hit by a drone before landing at Heathrow Airport. However, no injuries were reported and all 132 passengers and five crew members were safe. As a result of these incidents, we list below the main safety concerns: • Lack of Safety Feature By Design: which could result into drones going out of control and flying aimlessly and autonomously without having the ability to shut it down or to re-gain control [266] . • Lack of Technological & Operational Standards: especially as related to the crash avoidance mechanisms, which would result into the UAV's inability to recognise and identify aircraft and airborne objects and avoid them [267] . • Signal Distortion-Jamming: this makes a UAV prone to hacking, hijacking and GPS/Sginal-jamming as part of cyberterrorism or cyber-criminal activity, mainly due to the UAV's command-and-control operation center being prone to exploitation. • Lack of Governments Regulation & Awareness: especially in terms of safety practices and features to ensure safe UAs integration into the national airspace domain [268] . People's privacy is also at high risk of being exposed by unwanted flying guests that can record their movement and capture images at anytime, without their knowledge or permission. This is an indication of how much our privacy is vulnerable to such an emerging threat. According to the Canadian Public Safety, UAV technologies raised a broad range of issues that relate to the collection of images and videos [269] . This was associated with blackmailing and scamming by threatening the disclosure of personal images or videos captured without the victims knowledge from an aerial position. In general, the privacy threats can be divided into three main categories. • Physical Privacy: is based on flying drones over someone's property or at their window level. This allows attackers to covertly gather images and record videos of certain people in possibly inappropriate ways, threatening their personal freedom. • Location Privacy: is based on tracking and detecting people with a drone flying and buzzing above them without them knowing that they are under surveillance [270] . • Behaviour Privacy: is where the presence of a flying drone can affect the way people act and react [271] , especially when knowing that they are under surveillance. As a consequence, this would also limit their liberty, breach their privacy, and restrict their freedom. Security, safety and privacy are key requirements for the adoption of any new IoT technology, especially drones and UAVs [272] , [273] . In this section, we review the main privacy, safety and security concerns that can be imposed by security breaches. These key concerns must be addressed to as soon as possible, otherwise their illegal use will remain on a constant rise, especially with the absence of firm laws, legal restrictions and sanctions. In the next section, we present the main security vulnerabilities and threats that can be exploited in order to compromise the drones security. UAVs and drones are being perceived as viable and vital threats to information security. Many UAVs have serious design flaws, and most of them are designed without wireless security protection and footage encryption [274] . • Prone to Spoofing: analysis of the configuration and flight controllers of UAV models, with multiple rotors, revealed many weaknesses. These are associated with both the telemetry links streaming data to/from a drone via serial port connections, especially due to its weak communication nature, which is in most cases not encrypted [275] , [276] . The experiments done in [277] , [278] showed that, through GPS spoofing, the information can be easily captured, modified, or injected. This vulnerability in the data link enables the interception and spoofing, giving hackers complete control of the drone. • Prone to Malware Infection: the communication protocols are enabled within the UAVs to allow users to pilot drones via wireless remote control such as tablets, laptops and mobile phones. However, this technique was found to be insecure [279] , [280] ; it allows hackers to create a reverse-shell TCP payload, injects it into the drone's memory, which will covertly install malware on the systems running the ground stations. • Prone to Data Interference & Interception: telemetry feeds are used to monitor the vehicles and facilitate information transfer through open non-secure wireless transmission [281] , making them vulnerable to various threats. These include data interception, malicious data injection, and alteration of pre-set flight paths. This allows the installation and insertion of many infected digital files (videos, images) from the drone to the ground station [282] . Another vulnerability was revealed in [4] , and related to the UAV's communication module, which uses wireless communication to exchange both data and commands with the ground station [283] . • Prone to Manipulation: since drones fly pre-programmed and pre-defined routes, manipulation can occur and could potentially have serious consequences [284] . This ranges from stealing high-value cargo, to redirecting UAVs to deliver explosives, biological weapons, or other terrorist payloads, through RF or GPS spoofing, which allows the attacker to gain control over the drone by sending counterfeit signals, or jamming it with the purpose of crashing it. • Prone to Technical Issues: many drones suffer from various technical failures [285] . This includes application errors such as connection failure between a user's device and the drone, causing it to either crash or fly away. Other issues are related to the lack of stable connection, especially under challenging natural causes [286] ; the battery life, which results in a very limited flight time before being fit to fly again. Note that in cold weathers, the batteries' life span is reduced, leading to a shorter flying time, as well as possible malfunctioning [287] , [288] . • Prone to Operational Issues: another major issue is the lack of flying skills by drone owners and the type of drones in use [289] . This can cause serious damage and/or injuries against properties and/or personnel [290] . In fact, drones are sensitively made, so a small accident could bring the drone down. In many cases, if one of the rotaries dysfunctions or stops working, it would cause a serious turbulence with a hard to maintain control of the drone [266] . This, in most cases, would lead to the crashing of the drone. For example, [291] mentioned an incident of an Israeli drone, which broke into the Lebanese airspace and crashed in the south of Lebanon due to technical and operational failure. • Prone To Natural Issues: in many cases, drones cannot withstand wind due to their lightweight nature. Moreover, extreme heat conditions can lead to engine failure, bringing the drone down. Also, the battery could explode and cause serious damage and harm. Another issue is the inability of drones to fly through rain since they are not equipped with waterproof protection [292] , [293] . Usually, when drones crash into lakes, rivers, beaches or even pools, they immediately stop working. Furthermore, during fog, owners are not advised to fly drones due to the limited visibility, which shrinks from few meters to less than a meter leading to the disruption of communications between the drone and the GPS, sending the drone outside its control area till it crashes. • Prone to Wi-Fi Jamming: drones can also be hijacked by sending a de-authentication process between the access point and the device controlling the drone, which can be done temporarily or permanently, such as jamming the intended drone frequency, and luring it to connect to the hacker's Wi-Fi; this can be done by installing and configuring a raspberry-pi for such a job [215] . The main countermeasures that can be adopted to safeguard drones against security attacks can be classified into the following types based on an attacker's main motives, objectives and goals. In the following, the existing solutions to secure drones' networks, communications, and data are discussed. Moreover, the existing forensics solutions, used during the investigations of drone attacks, and aiming to identify the root causes of such attacks, are listed and described. Drone networks suffer from several security threats and issues. Recently, Intrusion Detection Systems (IDSes) have been deployed to detect UAVs/drones' malicious activities and to detect suspicious attacks that may target them. Typically, an IDS monitors incoming and outgoing network traffic, and analyzes them to detect anomalies. Their aim is to detect and identify cyber-attacks by examining data audits (trails) that were collected at different network parts. In the following, we present the various IDS approaches to protect drone networks against intruders. They proved that attackers can be detected within 40 seconds. In [295] , Mitchell and Chen presented a specification-based detection technique to guard a UAV system against various types of cyber-attacks. The authors relied on a behaviour rule-based UAV-IDS. The behaviour rules were constructed based on defined attack models, including reckless, random, and opportunistic attacks. This allowed the minimization of detection errors including false positive and false negative rates, with a critical trade-off between UAVs' security and performance. In [296] , Mitchell et al. presented BRUIDS, an adaptive behaviour-rule specification-based IDS, which detects malicious UAVs in airborne systems. The authors also investigated the effectiveness of BRUIDS on reckless, random, and opportunistic attacker behaviours to quickly assess the UAV's survivability against malicious attacks. The simulation results showed that BRUIDS achieves a higher detection rate compared to the multi-trust anomaly-based IDS approach, and with a lower false positive rate. However, rule-based IDSes suffer from their complexity management, which requires human intervention for rules configuration. In addition, this type of IDS is incapable of detecting unknown attacks. • Given that drone networks' gateways might be operating with some constraints (fog nodes), there is a need for a lightweight host-based anomaly detection technique that requires micivinimal computational resources. This can be achieved by using a simple machine learning technique or a statistical approach with minimum possible number of features. The structure of a resilient IDS should be based on a hybrid approach, where rule-based or signature-based approaches are used for known attacks and the anomaly-based approach for the detection of abnormal behavior. Such a system would depend on machine learning and human security experts. In [312] , Cai et al. investigated the joint optimization of UAV trajectories and user scheduling for a dual-UAV enabled secure communication system and presented a novel P-CCCP based algorithm for this purpose. The algorithm was further extended to cover the case of multiple jamming UAVs to further improve the secrecy rate. Simulation results revealed a better performance than other conventional UAV-aided algorithms. In [313] , Li et al. studied secure communication with imperfect channel estimation, in the case of a smart UAV attacker under different modes (i.e keeping silent, eavesdropping, jamming, and spoofing). As a result, a non-cooperative game theory technique was used to present a Q-learning based power control algorithm, using a Nash Equilibrium (NE) strategy, to obtain an adaptive policy for the transmitter. Simulation results showed an effective decrease in the UAV attack rate and an increase in the system secrecy capacity. In addition to modulation techniques, it is essential to encrypt the communications of drones and UAVs. In this context, different cryptographic solutions were recently presented, including message encryption and authentication. Since most drone standards have to ensure secure communication, the focus became on how to design a lightweight message authenticationencryption algorithm. Also, this can be done in a way to preserve the source authentication in addition to integrity and confidentiality of the transmitted data. The existing cryptographic algorithms to secure drone communications were discussed in [314] , [315] . These algorithms can possibly be applied to secure the communications of drones used for civilian applications. Moreover, a secure communication protocol (eCLSC-TKEM) between drones and smart objects was presented by Won et al. in [316] . The authors claimed that their system is 1.3, 1.5 and 2.8 times better than other protocols including the protocols in Seo's CLSC-TKEM [317] , Sun's CL-AKA [318] , and Yang's CL-AKA [319] . Additionally, in [320] , Sharma et al. presented a highly secured Functional Encryption (FE) technique to secure a UAV assisted Heterogeneous Network (HetNet) in dense urban areas against malicious activities, and also to secure by encryption users' critical data; however, this solution requires further enhancements. On the other hand, in [321] , Chen et al. presented a Traceable and Privacy-Preserving Authentication (TPPA) scheme for UAV communication control systems. TPPA integrates Elliptic Curve Cryptography (ECC), digital signature, hashing, and other cryptography mechanisms for UAV applications. This ensures privacy, confidentiality, integrity, availability, anonymity, and non-repudiation, especially against DoS and spoofing attacks, with low computational and communication costs. Operating over long distances on battery enabled devices, the security of drone communications requires lightweight cryptographic algorithms and protocols. Recently, new cryptographic algorithms with one round functions or few number of iterations were presented in [322] . Moreover, existing privacy-preserving authentication protocols can leverage such lightweight cryptographic algorithms for a minimal delay. Also, physical layer parameters can be used for multi-factor authentication. All the data captured by drones must be aggregated to minimize the traffic being continuously sent to the base station. However, aggregation of encrypted data imposes new challenges. Accordingly, in [4] , He et al. presented a Homomorphic Encryption (HE) method, and a practical data aggregation scheme based on the additive HE presented in [323] . Unfortunately, existing HE solutions suffer from security and/or performance issues. Symmetric ciphers suffer from security issues, especially in terms of chosen plaintext/ciphertext attacks, while asymmetric ciphers suffer from high computational and resources overhead, in addition to the associated storage overhead. Digital forensics techniques are being extensively used in the UAV/drone domain. In [324] , Pilli et al. presented a generic framework for Network Forensics (NF) which involves the analysis of network data traveling through firewalls or intrusion detection systems. This allows a network-based investigation to detect and identify anomalies in the traffic. The goal of such a model is to trace back the source of the attack using a six-phased chain-of-custody. Another framework was presented in [325] , and it uses a Digital Investigation Process (DIP) to promote a comprehensive multi-tier hierarchical digital investigation model. This framework includes two tiers: 1) First-Tier: involves assessment and incident response phase,data collection and analysis phase, and presenting findings and incident closure phase. 2) Second-Tier: includes an object-based sub-phase [326] . In Professional and AR Drone 2 in a polymathic workstyle, by aiming to reconstruct the actions that were taken by these drones, identifying the drones' operators, and extracting data from their associated mobile devices. This can be done by analyzing flight logs and identifying artefacts and capturing the drones' digital media. In [330] , Clark et al. presented an open source forensics tool, DRone Open source Parser (DROP), which parses proprietary data files extracted from the DJI Phantom III nonvolatile internal storage, and text files located on the mobile device controlling the drone. Results revealed that it is possible to identify GPS locations, battery, and flight time, along the ability to link a given drone to its controlling mobile device based on its serial number. Further results revealed that data can be forensically acquired by manually extracting the drone's Secure Digital (SD) card. In [331] , Mantas et al. investigated the mostly used forensics platforms such as Ardupilot, the dataflash and telemetry logs, before presenting their own open source forensics tool, Gryphon, which focuses on the drone's flight data logs from the perspective of the ground control station, collects, examines and analyzes the forensic artefacts to construct the corresponding timeline of events so perpetrators can be brought to justice. In [326] , Jain et al. presented an event-based digital forensic investigation framework, as a result of an investigation process based on a physical crime scene [332] . this framework aids the hypothesis's testing and development through an event reconstruction based on the collected evidences following the readiness and deployment phase, physical crime scene investigation phase, digital crime scene investigation phase, and presentation phase. Moreover, a UAV forensic investigation process was presented in [333] , followed a step-by-step process based on three main initial phases. • Preparation Phase: this is to identify the chain of command since the UAV will be the first equipment to be seized once crashed [333] . It allows a conventional forensic practice to be carried out to identify any DNA or fingerprints on the drone/UAV. Thus, a piece of digital evidence could be combined with traditional evidence such as witness statements. Then, an "offence analysis" [333] is carried out to identify the device in use, to determine the current date and time, and to identify the current UAV operator by tracking their address and seizing their device. • Examination Phase: it is based on the identification of the drone's video/audio recording and image capturing capabilities [333] . This is done by identifying the data storage locations such as removable, fixed and flash memory cards, as well as identifying open communication ports for further traffic interception. This requires non-destructive methods, to protect the original data, using commercial or non-commercial forensic tools [334] , or using a destructive extraction method. • Reporting and Analysis Phase: it is based on an initial review of the extracted data since the first stored images are the suspect's own images including initial take off/landing spot, available personnel, surrounding location, area coordinates, etc.. Thus, it is important to know how the recording function works to intercept the data and translate it into a human readable form. Furthermore, a well-fit forensic model called "waterfall model" was presented in [326] , in response to the significant differences among commercial models. This model includes multiple phases to allow a digital investigator to recheck all previous phases during an investigation process, including the preparation and identification phase,weight measurement and customization check phase [335] , fingerprints phase, memory card phase [336] , geo-location phase [337] , [338] , [336] , and Wi-Fi & Bluetooth phase [339] . However, recently several anti-forensics techniques have been developed to prevent investigators from finding and/or collecting evidence, which necessitates the development of efficient countermeasures to recover valid evidence. Such anti-anti-forensics solutions should be designed in a way to preserve the main functionalities of drone systems while resisting anti-forensics methods. In summary, this section reviewed the existing security solutions for securing drone systems, including cryptographic and non cryptographic solutions. The cryptographic solutions aim essentially at securing the drones communication and the communicated data, while the non-cryptographic solutions (IDS) aim at detecting and recovering from possible security attacks. Since the number of incidents between drones and airplanes increased from 6 to 93 in 3 years (2014 to 2017) [340] , it has become essential to address the security and privacy breaches at the highest national level. This includes adopting very strict approaches that limit the drone's ability to gather images and record videos of people and properties without a clearly authorized permission. In fact, since many people do not read the manual properly, they are incapable of reacting properly in case of a malfunction. In the UK, for example, if a drone weights more than 250 g, its users are supposed to take safety awareness tests and the police is given the authority to stop any drone when suspected of a criminal activity [341] . Also, the British government announced new rules to ban drones from flying within one kilometer of British airports to prevent any possible collisions with airplanes [342] . In Fig. 5 , we present a framework to secure the various components of a UAV system. There are different techniques to hack and/or hijack a drone, either using traditional techniques (discussed below) or using a new form called "hack and crack". On the other hand, due to the recent extensive use of armed drones in deadly conflicts such as in Yemen [246] , [343] , [344] , Iraq and Syria by the different fighting factions [134] , [345] , [346] , the adoption of non-lethal solutions to counter these threats is highly ineffective and unreliable. As such, the countermeasures are divided into civilian, government, and military countermeasures (see Fig. 6 ). Civilian countermeasures are divided between physical and logical countermeasures. 1) Physical Countermeasures: When drones became widely popular, many organizations spent time and resources searching for ways to prevent their use in restricted airspace and above their buildings. This issue emerged after a drone crashed last year in front of the White House. • Drone Catchers: the Tokyo police and Michigan Tech University developed drone catchers, large drones equipped with nets, such as the "robotic falcon" [347] . • Drone Defenders: the US Company, Battelle, developed the drone-defender (Dedrone), which is used to drop drones from the sky using radio waves. • Low Tech Methods: low-tech methods were used by the police in Netherlands; these include training an eagle or a hawk to catch the drones with their talons [262] . However, such methods can cause serious harm to animals, especially in the case of large drones with very sharp rotaries. • Electrical Fence: in October 2017, China was the only country to establish an electric fence connected to a UAS cloud to detect and prevent a UAS from entering prohibited areas, especially those beyond VLOS [348] . These measures include the use of logical equipment rather than expensive physical equipment. For example, in [349] , Hooper et al. conducted pen testing on a Parrot Bebop UAV and revealed how Wi-Fi-based Parrot UAVs are prone to zero-day vulnerabilities and different attacks such as Address Resolution Protocol (ARP) and Cache Poisoning attacks. Hence, the authors presented a Multi-layer security framework as a defence-in-depth mechanism to guard UAVs against zero-day vulnerabilities. In [350] , Birnbaum et al. presented a prototype UAV monitoring system that captures flight data and performs real-time estimation and tracking of the airframe and controller parameters by comparing them to previously known parameters. This was done using the Recursive Least Squares Method (RLSM) that detects cyber-attacks and incipient hardware degradation and failures. Experimental results revealed that it is possible to automatically establish UAV . This scheme ensures real-time detection and isolation of faults in the actuators without the need to reconfigure the controller or affecting its performance. However, other security solutions were presented to counter-UAVs, as presented next. • Wi-Fi Jamming: This is the first method to apply when drones are using the frequency of 2.4 GHz. This jams all wireless communications within a specified coverage area [6] . However, the jamming ability is very limited and cannot be hidden for it can be easily detected and it jams other nearby frequencies. • Three-Way Handshake: This process is based on a handshake between the router's AP and the newly integrated rogue device. It allows the attacker to de-authenticate or even jam the communication between the drone and the device controlling it. Moreover, such a handshake can be used in order to launch a password cracking attack, especially if the drone is secure. • Wi-Fi Aircrack: In [4] , a Wi-Fi attack (SkyJet) was presented; it enables an attacker to search for drones in its vicinity and hijack them, turning them into "zombie drones". SkyJet uses aircrack-ng to detect nearby wireless networks and clients before deactivating the drone's controller. This task is done while connecting the attacker to the drone, allowing full control over the victim's drone. This type of attacks is based on three main phases, as presented in [4] . -First Module: a wireless sniffing tool, such as the "airodump", which aims at discovering WEP-enabled and WPA-2 enabled networks, as well as open networks. -Second Module: an injection tool, such as "airplay", used to increase the traffic. -Third Module: the "aircrack-ng", which allows the attacker to lead a de-authentication attack. Such an attack can disrupt a Wi-Fi connection protected by WPA2 encryption according to [4] . • Replay: this is a DoS-like attack, which intercepts the transmitted data and then, either delays it, or re-transmits it at a later time [4] , [352] . In fact, replaying the Address Resolution Protocol (ARP) request can also be used in an attempt to crack the encryption keys, especially if the connection between the drone and device is secure. • Buffer Overflow: this is a DoS-like attack, which intercepts the network traffic and floods it with constant requests to disrupt the drone/device connection. This attack occurs when a JSON script makes a request to become the controller, from an attacking computer, to capture network traffic via Wireshark [8] , in addition to embedded statistics from the /proc/stats directory. This is further explained in [353] , [354] , [352] , with an example on how a DJI phantom 3 drone was exploited in [355] . • Denial of Service (DoS): this is performed either through de-authentication or Wi-Fi jamming using "Kali-Linux" as a platform to cause the UAV to crash [8] . The de-authentication process can be sent periodically or permanently using 1) the "airodump-ng" command to assess the drone's network security, 2) the "Aireplay-ng" command to disconnect any connected device, or 3) the "aircrack-ng" command to break any secure drone/device connection [356] , [357] . As for Wi-Fi jamming, Websploit Wi-Fi jammer can be used once the Extended Service Set Identifier (ESSID) of the device (MAC address of the drone's AP), and the Basic Service Set Identifier (BSSID) (channel number of drone/device communication) are known [216] , [358] , [359] . • ARP Cache Poison: this is a man-in-the-middle attack type and is launched to interrupt, halt or change the network traffic. To perform this attack, a computer is used to continuously execute a malicious script called "Scapy" via Python library until the drone disconnects from the connected device [360] , [361] . • Injection and Modification: also known as integrity attacks [302] . Such attacks are based on altering sensitive information of a legitimate aerial vehicle by injecting wrong data [5] . This allows the modification of content and possibly uploading infected data to ensure a backdoor to the ground-control system. • Fabrication: this attack targets the drone's authenticity. It allows gaining access privilege into the aerial vehicle components to provide false information [6] . • Civilian GPS Spoofing: it is highly important to ensure that the GPS data is legitimate, otherwise, this leads to false estimation of the device's position. This could lead to mission failure and possibly loss of assets such as the recently claimed theft of a US RQ-170 Sentinel by Iranian forces [362] . Using Universal Software Radio Peripheral (USRP) [363] , a GPS signal simulator was implemented to launch GPS spoofing attacks, which were deemed to be very effective in the Ukrainian conflict [143] . This was done by attaching a power amplifier and an antenna to a GPS signal simulator, while radiating the RF signal towards the target receiver. Then, simultaneously repeated periodic signals were sent, which led to the possibility of receivers being in tracking mode and prone to spoofing attacks [362] . As a result, the biggest challenge remains as how to encrypt civilian GPS since it is very costly and it requires complex hardware and software. In [7] , the University of Texas managed to hijack a Hornet Mini-rotorcraft UAV by launching a GPS Spoofing attack, and exploiting the vulnerability of the drone that depends on civil GPS for navigation. The spoofer transmitted first weak counterfeit GPS signals towards the hovering UAV, and then, rapidly increased the counterfeit signal power, bringing the UAV under their control. This was done by simply inducing a false upward drift in the UAV's perceived location, fooling the UAV's flight controller into commanding a dive. Moreover, Humphreys [8] stated that a spoofer strategy requires predicted data navigation from the coupled receiver or an external source to produce fake GPS signals that are almost indistinguishable from the initial GPS signals. This can be achieved in two ways: Proximity Spoofing Attack: the spoofer is few meters away from the target receiver. Distant Spoofing Attack: the spoofer is at a non-negligible distance with a precise alignment of the counterfeit and authentic signals, which is only possible with a meter-level accurate suggested position. TABLE VI presents a classification of UAV attacks based of their class, and whether the target is just one or multiple security goals. The national approach adopted by the British Government to enhance its cyber-security protection against cyber-attacks includes cyber-security boot camps and the national budget: • Cyber-security Boot Camp: According to a BBC article, cyber-spies will learn how to hack drones and crack codes at a new government-backed cyber-security boot-camp. The students will gain all the required skills to fight cyber-attacks and to keep the UK safe. The boot-camp is a 10-week long course, and certified by UK spy agency GCHQ [364] . • National Budget: Another BBC article announced that the Cyber Retraining Academy is operated by the cyber-security training firm, Sans Institute, and funded as part of the government's £1.9bn National Cyber Security Strategy (NCSS). The performance of students throughout the course was being tracked, and talented individuals were recruited. The fifty successful candidates, who attended the academy in London in 2017, received a two year training condensed into 10 weeks [364] . Examples of military techniques to counter drone attacks include the use of old Soviet anti-aircraft weaponry (i.e ZSU-23-4 Shilka [365] , [366] , and surface-to-air missiles (SAM S-300/S-400 missiles) [367] , [368] ), to shoot down Turkish drones over Idlib and Syria [369] , [370] . Recent studies [371] , [372] revealed how terrorists are shifting towards a new asymmetric warfare called "drone warfare" [373] . For this reason, four main different military countermeasures were suggested and implemented to overcome the UAV security threats [374] , [375] . According to the Cable News Network (CNN), the Pentagon issued new guidelines allowing the military to bring down any drone flying near or over a US military base [376] . Next, we list a set of the most recent real-time highly accurate anti-drone countermeasures, and in Fig. 7 , we highlight the latest generation of high-energy laser weapons targeting UAVs [377] . • ATHENA: or Advanced Test High Energy Asset, is an upgrade to the Area Defense Anti-Munitions (ADAM) system, which is a 30-KW laser weapon system that uses the 30-KW Accelerated Laser Demonstration Initiative (ALADIN) laser, which combines the power of three 10-KW fiber lasers into a single beam. ATHENA can also operate on 10 and 20 KW levels [378] , [379] , [380]. This system is funded and tested by Lockheed Martin and it can operate over thousands of meters. • Rafael Drone Dome: is a counter-UAS operational mobile system [381] used to detect, track and eliminate hostile drones (even when maneuvering) as small as 0.002 m2, at a distance of 3.5 km, using a high power laser beam, enabling a soft and hard-kill. Testing results show its ability to successfully eliminate three drones in a timely manner [382] , [383] , [384] , [385] . • Boeing Compact Laser Weapons System (CLWS): is used to track and disable UAVs through the use of a laser weapon system to acquire, track, and identify potential targets, or even destroy them [386] , [387] . Its main advantages are based on the fact that it is portable and it can be assembled in almost 15 minutes. Moreover, it can destroy a target from 22 miles within 10-seconds, using an energy beam of 2, 5 or 10 KW. is an anti-UAV system developed by UK defense companies to address the increasing UAV threats [388] . It is classified as a smart-sensor and "effector" package with the ability to remotely detect small UAVs, track and classify them before providing the option to disrupt their activities [389] , [390] . It was used around UK airports and it is now being deployed in New Zealand [11] . Among its characteristics, it contains an electronic-scanning radar aimed at detecting targets, an electro-optical video for target tracking and classification, along with a software known as "intelligent directional RF inhibitor". Its detection range is up to 10 km, with a minimum target size of 0.01 m2. Moreover, it is able to operate in various weather conditions, and 24 hours a day. • Counter-Rocket and Mortar (CRAM): is a missile-based counter rocket, artillery, and mortar defense system [391] developed as part of the US Army Enhanced Area Protection and Surviving (EAPS) technology, with an expansion including threats from unmanned aircraft systems or drones [392] , [393] . In fact, CRAM is the land version of Phalanx CIWS [394] . Among its characteristics is the use of a 20mm HEIT-SD (highly explosive incendiary tracer, self-destruct) [395] , [396] , 30, 50 or 76mm Driven Ammunition Reduced Time (DART) of flight [397] , cannon to launch command guided interceptors using a precise tracking radar interfero-meter as a sensor, a fire Control Computer (CC), along with an RF transceiver to launch the projectile into an engagement 'basket' [398] . Computations are then made on the ground, and the RF sends the information back to the CC. • Non-kinetic Methods: other countermeasures include non-kinetic methods such as the use of radio waves to disrupt drone flights [372] . However, due to the rules of engagement being classified, it is hard to tell under what options and weapons the army might use them [399] . • Anti-UAV Zappers: were sent and used by the British forces on the frontline in Iraq and Syria to protect Western and American forces against drone attacks emanating from the Islamic State of Iraq and Syria (ISIS). By 2017, Zapper was responsible for downing more than 500 drones through radar jamming [400] . The rise of UAVs/drones, led to many detection techniques being developed and used as early warning signs. In fact, some of these techniques were presented and classified by Ganti et al. in [401] whilst also including their advantages, drawbacks and accuracy levels. Nonetheless, this paper presents the most known drone detection techniques as follows: 1) Audio Detection: is an acoustic detection method, which captures the ambient sound through the use of a multi-directional microphone array that detects any sound from a range of 25 to 30 ft [401] . Then, the sound waves are filtered to analyze the target's frequency. This is possible since drones are noisy; their rotary includes at least 8 razors that buzz louder as it gets nearer. However, this method offers a high level of accuracy in quiet areas, and is not suitable in noisy environments. 2) Video Detection: has been classified as a limited detection method [402] ; the detection mechanism includes the ability to capture images of flying drones even at high distances (350 ft) with an acceptable resolution. However, the main problem is its inability to distinguish between birds and drones [401] , which results into a high level of detection failure, despite the use of computer algorithms such as flight patterns. It was shown in [401] that seagulls' flight movement is similar to that of drones. 3) Motion Detection: if combined with Speed Up Robust Features (SURF) algorithm, it can successfully detect drones while having other flying objects in its vicinity [401] (50-150 ft away), and it also draws the path of the drones. 4) Thermal Detection: is more accurate at detecting fixed-wing drones up to 350 ft away. In [403] , Stolkin et al. stated that turbo-fan or the turbo-jet engines are easier to detect due to the generation of hot gases from their exhausts. However, it seems like this method is not suitable nor reliable for plastic quad-copters with electric motors. Hence, in [401] , Ganti et al. suggested that it is better to combine this method with other methods. Either way, its implementation cost is high with a low detection rate over a limited distance. Detection: is very useful at detecting large aircrafts [404] over long distances (150-1500+ ft), but not small ones. This is due to the fact that smaller drones emit less noise and have less signal transmission. 6) RF Detection: RF detection is very effective for long-range drones since RF signals can be detected from a longer distance (between 200 ft [405] and up to 1400 ft). As such, in [406] , Hansen et al. stated that it is highly difficult to detect a drone that escapes RF detection, especially when drones transmit an image to the Ground Control Station (GCS) using an RF signal. However, to ensure a successful detection rate, the transmitter's power and receiver's sensitivity must be first evaluated and maintained. In this section, we presented the possible drone/UAV and counter-drone/UAV security measures, in addition to prevention techniques, and solutions related to the security of drone/UAV communications and networks, which are essential for armed forces and search-and-rescue operations. Next, we discuss the limitations of the current solutions, in addition to recommendations for future research directions to secure UAS, UAVs and drone's systems, networks, data and communications. Many limitations are currently facing the adoption and usage of drones, which include serious security threats [407] . The main existing limitations in drones' security are: • Market Availability: the availability of drones in all markets made them a suitable choice for terrorists and criminals to launch malicious activities. Further security screening and inspection requirements are needed, especially for the owners of advanced drone types. • Weak Designs: manufacturers should take security as a key component in the development of any firmware, hardware and application. Therefore, security-by-design is the best practice to prevent most of the security attacks. • Weak Policies: the adoption of authorization and authentication policies should be strict, preventing unauthorized entities from accessing a drone system, to prevent possible insider threats. • Non-Real-Time Isolation: the need to implement mechanisms that instantly disconnect and/or turn off the drone, once a security threat is detected, is widely being adopted and used. This minimizes possible damages and avoids injuries and/or deaths. Equally important is the need to have a return-to-base command chip to be installed in each UAV/drone, in case of wandering outside the line-of-sight. • Limited Testing Phase: drones must undergo thorough testing to evaluate the corresponding threat level when they fall into the wrong hands. Therefore, the applications that control the drones must be tested to prevent any security flaw that could be exploited by attackers. One way is to design automated drone penetration tests. • Limited Forensics Capabilities: drones forensics are not currently a priority, even though they are essential to trace back and reconstruct any possible attack event. Therefore, efficient and lightweight forensics tools are required to help in detecting, locating, finding and preserving digital evidences, along with their corresponding sources [408] , [409] . • Weak level of Protection: drones protection systems should include three main phases for the detection, correction and protection, which is not currently the case. • Weak Authentication Scheme: the literature review revealed how drones can be easily hijacked and intercepted by compromising the authentication process. Thus, an enhanced lightweight multi-factor authentication scheme is recommended to address this issue. • Weak or Missed Cryptographic Suites: since the transmitted traffic is sometimes unencrypted, connection should be protected to ensure data confidentiality and authentication. Thus, using strong cryptographic suites is recommended to prevent data breaches. • Limited Frequency Range: drones/UAVs are mostly prone to frequency attacks, which brings them down easily. The lack of frequency hopping in drones makes them prone to jamming and de-authentication attacks. The best solution includes the ability to switch between frequencies to prevent such attacks. After discussing the main security and privacy threats, the attacks and corresponding solutions, next we propose recommendations to enhance drone/UAV security: • Drone Licensing: drone users must legally register them and obtain a permit to fly them. • Firmer Restrictions: must be taken into consideration, especially against the illegal use of drones and UAVs, and the irresponsible use of drones near vital areas such as airports and military installations. • Enhanced Surveillance: over the import of drones, especially counterfeit ones and keeping track of their purchase history, especially when drones have the ability to lift and carry weight at a high altitude with enhanced video feedback. • Further Education: is required, especially for drone users to understand their threats, along with training on how to use them. • Firmer Laws: must be adopted to prevent the unauthorised/unlicensed use of drones/UAVs, and illegal operators must be held accountable by law. • Restricted & Confined Areas: drones and UAVs must avoid flying over restricted areas and must only be flown above certain confined and designated areas to prevent any near-encounter that would result into property damage, injuries or loss of life. • National/International Counter-Terrorism Efforts: must be applied and maintained to limit the use of drones/UAVs in terrorist operations, and to track and shut down illegal drones/UAVs markets and trafficking. • Specialized Non-Lethal Security Measures: should also be considered as an ideal solution to counter the UAV threats over no-fly civilian areas to prevent damage and injuries. • Enhanced Drone/UAV Detection Methods: that offer a better alarming approach of any incoming drone/UAV, and to allow for enough time to neutralize its threat at a distance. • Define New Lightweight Host/Network IDS/IPS: without an efficient IDS, drones can be seriously compromised and be used to lead cyber or physical attacks against individuals and properties. Therefore, developing a lightweight IDS that employs hybrid detection techniques (i.e signature-based, specification-based and anomaly-based detection methods) is recommended to make prompt decisions in a drone resource-constrained environment or real-time applications. • Lightweight Multi-factor Authentication Scheme: using only one factor (cryptographic one) is not sufficient since any weakness in the identification/authentication schemes would compromise the drone to be used for malicious purposes, which can potentially lead to drastic effects. To address these challenges, lightweight cryptographic and non-cryptographicbased solutions should be combined to reduce the probability of illegal access. • Lightweight Dynamic cryptographic Algorithms: designing lightweight dynamic cryptographic algorithms can secure drone communications, ensuring a higher level of confidentiality with low latency and resources overhead. This is the case of the approach in [410] , [411] , which uses a single-round function by relying on common channel parameters as "you know" factor and the secret key as "you have" factor to produce a dynamic key since wireless channel parameters change in a random manner [322] . Therefore, the dynamic cryptographic approach strikes the right balance between security and performance levels. The tremendous increase in the use of drones and UAVs led to a new aviation era of autonomous aerial vehicles in both the civilian and military domains, offering numerous benefits including economical, commercial, industrial, mainly due to their autonomous, flexible and easy-to-use nature, with low cost and energy consumption. However, their use led to the rise of many security, safety and privacy issues, which were manifested through various cyber attacks, threats and challenges, listed and explained in this paper. Also, we presented a holistic view of the drones/UAVs domains and provided detailed explanation and classification of their use in various domains and for different purposes, in addition to the different lethal/non-lethal security solutions as part of drones/UAVs countermeasures. Moreover, successful experiments to detect, intercept and hijack a drone through either de-authentication or jamming were highlighted, based on realistic scenarios that follow the traditional hacking cycle and hence, confirming the ease with which drones could be intercepted, especially in terms of UAV communication channels. In this context, different security suggestions and recommendations were proposed to ensure a safer and more secure use of drones and UAVs. Finally, due to the alarmingly increase in the use of drones by terrorists, further studies and experiments on how to prevent and counter the UAV threats, imposed by terrorists, will be performed and conducted as part of future work. Progress on drone technology and their applications: A comprehensive review Rise of mini-drones: Applications and issues Security, privacy, and safety aspects of civilian drones: A survey Drone-assisted public safety networks: The security aspect Taxonomy for description of cross-domain attacks on cps Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil gps spoofing Evaluation of smart grid and civilian uav vulnerability to gps spoofing attacks Detection, localization, and tracking of unauthorized uas and jammers Systems engineering baseline concept of a multispectral drone detection solution for airports Anti-drone system with multiple surveillance technologies: Architecture, implementation, and challenges Sok-security and privacy in the age of drones: Threats, challenges, solution mechanisms, and scientific gaps The faa says there will be 7 million drones flying over america by 2020 Drones for smart cities: Issues in cybersecurity, privacy, and public safety Aviation history and unmanned flight Civil drones in the european union Drone licenses-neccesities and requirements European union policies and civil drones Regulating drones. In Drones: The Brilliant, the Bad and the Beautiful Ethical and safety implications of the growing use of civilian drone. UK Parliament Website (Science and Technology Committee Are drones dangerous or harmless fun? -bbc news Implementation of unmanned aircraft systems by the us geological survey A comparative analysis of the environmental benefits of drone-based delivery services in urban and rural areas Unmanned aircraft systems (uas): Commercial outlook for a new industry Review of the current state of uav regulations. Remote sensing International commercial drone regulation and drone delivery services Introduction to unmanned aircraft systems Machine learning for wireless networks with artificial intelligence: A tutorial on neural networks Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration Limiting sybil attacks in structured p2p networks Exploiting p2p systems for ddos attacks Survey on uav cellular communications: Practical aspects, standardization advancements, regulation, and security challenges Energy efficiency for unmanned aerial vehicles An energy-efficient approach for information transfer from distributed wireless sensor systems Wifi espionage using a uav Usability assessment of drone technology as safety inspection tools Drones, uavs, and rpas: An analysis of a modern technology Unmanned aerial system (uas) traffic management (utm): Enabling low-altitude airspace and uas operations Modeling for uas collision avoidance Low-altitude unmanned aerial vehicles-based internet of things services: Comprehensive survey and future perspectives Autonomous collision avoidance: the technical requirements Collision avoidance between uav clusters using swarm intelligence techniques A literature review of uav 3d path planning Collision avoidance law using information amount Haptic collision avoidance for a remotely operated quadrotor uav in indoor environments Automatic collision avoidance for manually tele-operated unmanned aerial vehicles Situation aware uav mission route planning On path planning strategies for networked unmanned aerial vehicles Multi-objective uav routing Stochastic geometry and wireless networks: Volume ii applications. Foundations and Trends® in Networking Unmanned aerial vehicles: A survey on civil applications and key research challenges Using unmanned aerial vehicles for rangelands: current applications and future potentials Land cover change mapping using high resolution satellites and unmanned aerial vehicle Disaster-resilient networking: a new vision based on movable and deployable resource units Securing internet of medical things systems: Limitations, issues and recommendations. Future Generation Computer Systems Use of unmanned aerial vehicles for medical product transport Defining the epidemiology of covid-19-studies needed Review of the clinical characteristics of coronavirus disease 2019 (covid-19) Geographical tracking and mapping of coronavirus disease covid-19/severe acute respiratory syndrome coronavirus 2 (sars-cov-2) epidemic and associated events around the world: how 21st century gis technologies are supporting the global fight against outbreaks and epidemics Using uav-based systems to monitor air pollution in areas with poor accessibility An overview of small unmanned aerial vehicles for air quality measurements: Present applications and future prospectives Autonomous monitoring, analysis, and countering of air pollution using environmental drones Agricultural uavs in the us: potential, policy, and hype. Remote Sensing Applications: Society and Environment Using drones in agriculture: unmanned aerial systems for agricultural remote sensing applications Agricultural drones: What farmers need to know Agricultural drones: a peaceful pursuit How artificial intelligence improves agricultural productivity and sustainability: A global thematic analysis Nature conservation drones for automatic localization and counting of animals The use of conservation drones in ecology and wildlife research A survey on anti-poaching strategies A standardized protocol for reporting methods when using drones for wildlife research Development of an unmanned capsule for large-scale maritime search and rescue Unmanned maritime systems for search and rescue. Search and Rescue Robotics Unmanned vehicles for environmental data collection Coastal and environmental remote sensing from unmanned aerial vehicles: An overview Unmanned aerial vehicles (uavs) for surveying marine fauna: a dugong case study A review of unmanned vehicles for the detection and monitoring of marine fauna An ins special forum: intelligence and drones/eyes in the sky for peacekeeping: the emergence of uavs in un operations/the democratic deficit on drones/the german approach to drone warfare/pursuing peace: the strategic limits of drone warfare/seeing but unseen: intelligence drones in israel/drone paramilitary operations against suspected global terrorists: Us and australian perspectives/the 'terminator conundrum'and the future of drone warfare Unmanned aerial systems: Consideration of the use of force for law enforcement applications Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications Are drivers ready for traffic enforcement drones? Accident Analysis & Prevention Computer vision system for fire detection and report using uavs North dakota man sentenced to jail in controversial drone-arrest case Audible killings: Capitalist motivation, character construction, and the effects of representation in true crime podcasts Serialized killing: usability and user experience in the true crime genre Crowd Control: Israel's Use of Crowd Control Weapons in the West Bank. B'tselem Tear gassing by remote control: The development and promotion of remotely operated means of delivering or dispersing riot control agents. Remote Control Project Law enforcement's use of weaponized drones: Today and tomorrow Algorithms of violence: Critical social perspectives on autonomous weapons Simulating the contact zone: Corporate mediations of (less-lethal) violence in israel, palestine, and beyond The silent force multiplier: the history and role of uavs in warfare Army science and technology analysis for stabilization and reconstruction operations Uav roundup Revolution in military affairs Uavs and win: a command, control, communications, computers, surveillance lance and reconnaissance winner A further look at technologies and capabilities for stabilization and reconstruction operations Multi-uav control for tactical reconnaissance and close air support missions: operator perspectives and design challenges Raytheon system to quicken air response: Darpa's persistent close air support program enters flight test phase. Inside the Air Force Beyond close air support. forging a new air-ground partnership French intervention in mali: strategic alliances, long-term regional presence? Small wars & insurgencies A surprising little war: first lessons of mali Intervention in mali: building peace between peacekeeping and counterterrorism The regional impact of the armed conflict and french intervention in mali. Oslo: Norwegian Peacebuilding Resource Centre Western drones and african security Fighting terrorism in africa by proxy: the usa and the european union in somalia and mali Kenya at war: Al-shabaab and its enemies in eastern africa The ongoing campaign of terror in nigeria: Boko haram versus the state Operation barkhane and boko haram: French counterterrorism and military cooperation in the sahel Terrorism and counter-terrorism in Africa: fighting insurgency from Al Shabaab, Ansar Dine and Boko Haram Counterterrorism and counterinsurgency in Somalia: assessing the campaign against Al Shabaab Military intervention in africa: French and us approaches compared Al-Shabaab in Somalia: The history and ideology of a Militant Islamist group Drone warfare: Ethical and psychological issues Protecting Europe: Meeting the EU's Military Level of Ambition in the Context of Brexit Simulation for cisr: Command, control, communications, computers, intelligence, surveillance, & reconnaissance. Phalanx Drone wars: Armed unmanned aerial vehicles After august 7: the escalation of the russia-georgia war The basic requirements for modern complexes of guided artillery armament as an element of conducting distribution-fire actions of tactical level What will russian military capabilities look like in the future? Raising red flags: an examination of arms & munitions in the ongoing conflict in Ukraine Battle of debal'tseve: the conventional line of effort in russia's hybrid war in ukraine Drone usage by militant groups: exploring variation in adoption The fighting drones of ukraine. Air and Space Magazine Turkey may recruit more syrian rebel fighters Turkey at war with syria Drone: Remote control warfare Yemen drone strike: just the start? Jane's Defence Weekly Reforming US drone strike policies. Number 65. Council on Foreign Relations Drone wars briefing Unmanned aircraft in israeli air operations The Economics of the Global Defence Industry. Routledge An israeli military innovation: Uavs Israel and the drone wars: Examining israel's production, use and proliferation of uavs Drones operating in syria and iraq. Center for the Study of the Drone at Bard College The russian military resurgence: Post-soviet decline and rebuilding Damascus may press on in idlib A new accommodation over syria's idlib is probable Syria's new idlib offensive may be incremental Idlib ceasefire shows syria's relegation below libya Moscow will limit ankara's military gains in syria Ceasefire may ultimately dislodge turkey from syria Risk of russia-turkey clash in syria may prompt pause Uav exploitation: A new domain for cyber power Injury and death during the isis occupation of mosul and its liberation: Results from a 40-cluster household survey History of unmanned aerial vehicles The First Air War: 1914-1918 Evolution or revolution? the rise of uavs Violent offending by uk military personnel deployed to iraq and afghanistan: a data linkage cohort study Drone warfare: Killing by remote control Mini drone for special forces military | black hornet Comparative review study of military and civilian unmanned aerial vehicles (uavs) The israeli new loitering weapon systems-answering a growing demand The fire shadow project: A big step towards rapid acquisition. RUSI Defence Systems Should we protect commercial airplanes against surface-to-air missile attacks by terrorists? Decision Israeli-made kamikaze drone spotted in nagorno-karabakh conflict A multi-sided platform for remote operation of shared drones: deriving strategic opportunities from regulatory trends Wsn research activities for military application The hugin 1000 autonomous underwater vehicle for military applications Underwater vehicles. BoD-Books on Demand Submarine arms race in the Pacific: The Chinese challenge to US undersea supremacy. Heritage Foundation China agrees to return seized drone, ending standoff, pentagon says Assessing the Undersea Balance between the US and China Japan-us-china relations during the trump administration and the outlook for east asia Unmanned underwater vehicle (uuv) deployment and retrieval considerations for submarines The evolutionary development of the military autonomous underwater vehicle Blue Legalities: The Life and Laws of the Sea User operational evaluation system of unmanned underwater vehicles for very shallow water mine countermeasures Smart underwater robot (sur) for naval operations and undersea mining Taking mines seriously: Mine warfare in china's near seas Authorization for use of military force in response to the 9/11 attacks (pl 107-40): Legislative history Submission of evidence to the all party parliamentary group drones: how are raf reaper (drone) operators affected by the conduct of recent and ongoing operations? Appgdrones. org. uk Clarifying the rules for targeted killing: An analytical framework for policies involving long-range armed drones Testing the effects of us airstrikes on insurgent initiated violence in yemen Drone security policy and targeted killing The costs and consequences of drone warfare Changing the rules of war: The controversies surrounding the united states' expanded use of drones. Contemporary Voices Drones and targeted killing: Defining a European position Secret 'kill list'proves a test of obama's principles and will Do targeted killings work The drone operator and identity: exploring the constitution of ethical subjectivity in drones discourses The proliferation of drones: A new and deadly arms race Armed and dangerous? uavs and us security An assessment of lone wolves using explosive-laden consumer drones in the united states A mini uav becomes a suicide drone | paris air show 2015 content from aviation week Unmanned vanguard: Leveraging the operational effectiveness of the israeli unmanned aircraft system program Israel aerospace industries (iai) unveiled at the singapore airshow the newest members in its loitering munitions (lm) family. iai is the world's pioneer in developing and fielding various types of lms: the most prominent so far being harpy Categorie: Isr Should we fear the rise of the drone assassins? The Conversation Venezuela 'drone attack': Six arrests made -bbc news Venezuela: Military figures arrested after drone 'attack' -bbc news Killer drones: The 'silver bullet'of democratic warfare? Security Dialogue Mq-4c: Northrop grumman gears up for'triton'full rate production Drone spending in the fiscal year 2017 defense budget. Center for the Study of the Drone at Bard College Future war: Ai, drones, terrorism and counterterror Sow what you reap: Using predator and reaper drones to carry out assassinations or targeted killings of suspected islamic terrorists Combat drone makes trans-atlantic history The ploy: The inside story of how the interrogators of task force 145 cracked abu musab al-zarqawi's inner circle-without resorting to torture-and hunted down al-qaeda's man in iraq Abu musab al zarqawi: The making and unmaking of an american monster (in baghdad) How israel killed ahmed jabari, its toughest enemy in gaza. The Telegraph Israeli deterrence and the 2nd lebanon war Fearful gulf states will seek to placate tehran A new us-iran war will play out in iraq and beyond Death from above: Uavs and losing hearts and minds Rationalising drone warfare the biopolitics and necropolitics of us, israeli and uk drone warfare Drones, surveillance, and violence: Theory and evidence from a us drone program Privacy in mini-drone based video surveillance Unmanned aerial vehicles: A preliminary analysis of forensic challenges Uav-ugv cooperation for objects transportation in an industrial area Using predictive analytics to forecast drone attacks in pakistan Vulnerability testing of wireless access points using unmanned aerial vehicles (uav) Autonomous drone delivery system for lightweight packages Drone hacking with raspberry-pi 3 and wifi pineapple: Security and privacy threats for the internet-of-things Hacking drones Analysis: with drone attacks, the era of joystick terrorism appears to have arrived | south china morning post The proliferation of unmanned aerial vehicles: Terrorist use, capability, and strategic implications From the underground to the high ground: The insurgent use of airpower Terrorist and insurgent unmanned aerial vehicles: use, potentials, and military implications The potential threats posed by isis's use of weaponized air drones and how to fight back Witnessing an isis drone attack The rising drone threat from terrorists Isis drones: Evolution, leadership, bases, operations and logistics. The International Center for the Study of Violent Extremism Daesh's drone strategy technology and the rise of innovative terrorism Islamic state and technology-a literature review How $650 drones are creating problems in iraq and syria. C4ISRNET-Media for the Intelligence Age Military Examining the military-media nexus in isis's provincial photography campaign Drones level the battlefield for extremists The portrayal of drones in terrorist propaganda: a discourse analysis of al qaeda in the arabian peninsula's inspire The new drone state: Suggestions for legislatures seeking to limit drone surveillance by government and nongovernment controllers Drone technology: Benefits, risks, and legal considerations Hezbollah and the use of drones as a weapon of terrorism Defeat by annihilation: Mobility and attrition in the islamic state's defense of mosul Drones: disembodied aerial warfare and the unarticulated threat The Islamic State and Drones: Supply, Scale, and Future Threats Use of weaponized drones by isis spurs terrorism fears Vehicle borne improvised explosive device (vbied) characterisation and estimation of its effects in terms of human injury Buda's Wagon: a brief history of the car bomb Types of islamic state drone bombs and where to find them Houthi forces appear to be using iranian-made drones to ram saudi air defenses in yemen, report says Two major saudi oil installations hit by drone strike, and us blames iran. The New York Times Simulation exercise: Iran versus saudi arabia. geopolitical struggle in the middle east Iran and israel: Taking on the "zionist enemy". In Iran's Foreign Policy After the Nuclear Agreement The houthi war machine: From guerrilla war to state capture Yemen: civil war and regional intervention Where coalitions come to die The role of "coup forces," saleh, and the houthis Remotely piloted innovation: Terrorism, drones and supportive technology Idf encrypting drones after hezbollah accessed footage. The Jerusalem Post Insurgents hack us drones Global race on to match us drone capabilities Pirating the ultimate killer app: Hacking military unmanned aerial vehicles. Information Security Management Handbook Isis drones are attacking us troops and disrupting airstrikes in raqqa, officials say Extent and characteristics of damage from wildfires caused by incendiary kites during protests of the gaza-israel barrier fence Palestinians still defying apartheid The use of weaponized kites and balloons in the israeli-palestinian conflict. Security and Defence Quarterly From knives to kites: Developments and dilemmas around the use of force in the israeli-palestinian conflict since 'protective edge' Privacy and drones: Unmanned aerial vehicles. Information and Privacy Commissioner of Abdelmadjid Bouabdallah, and Nadjib Badache. A study of wireless sensor networks for urban traffic monitoring: applications and architectures Unmanned aerial vehicle smart device ground control station cyber security threat model Global Information Warfare: The New Digital Battlefield Drone attacks are essentially terrorism by joystick -the washington post Domesticating the drone: the demilitarisation of unmanned aircraft for civil markets Unmanned aircraft and the human element: Public perceptions and first responder concerns Responsible design of drones and drone services: Legal perspective synthetic report Safety risk assessment for uav operation. Drone Industry Insights, Safe Airspace Integration Project, Part One Unmanned aerial vehicles: Examining the safety, security, privacy and regulatory issues of integration into us airspace. National Centre for Policy Analysis (NCPA) Journo-drones: a flight over the legal landscape Seven types of privacy The regulation of civilian drones' impacts on behavioural privacy Iot survey: An sdn and fog computing perspective Software defined iot security framework Smart cctvs for secure cities: Potentials and challenges Wireless communications with unmanned aerial vehicles: opportunities and challenges Security analysis of uav radio communication system Unmanned aircraft capture and control via gps spoofing Effect of spoofing on unmanned aerial vehicle using counterfeited gps signal Cyber attack vulnerabilities analysis for unmanned aerial vehicles Analysis of vulnerabilities in modern unmanned aircraft systems Field trials, simulations, and design insights Efficient security scheme for disaster surveillance uav communication networks Uavs, iot, and cybersecurity Extracting objects for aerial manipulation on uavs using low cost stereo sensors Challenges and solutions for urban uav operations Drone services: issues in drones for location-based services from human-drone interaction to information processing Drone flight scheduling under uncertainty on battery duration and air temperature Autonomous recharging and flight mission planning for battery-operated autonomous drones Birmingham Policy Commission et al. The security impact of drones: Challenges and opportunities for the uk A casualty risk analysis for unmanned aerial system (uas) operations over inhabited areas Missili usa in romania e polonia: l'europa sul fronte nucleare Drones, smartphones and sensors to face natural disasters Environmental factors affecting situation awareness in unmanned aerial vehicles Intrusion detection for airborne communication using phy-layer information Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications An ads-b intrusion detection system Generic and autonomous system for airborne networks cyber-threat detection Security of unmanned aerial vehicle systems against cyber-physical attacks Motor anomaly detection for unmanned aerial vehicles using reinforcement learning Network intrusion detection system for uav ad-hoc communication: From methodology design to real test validation A hierarchical detection and response system to enhance security against lethal cyber-attacks in uav networks Intrusion detection and ejection framework against lethal attacks in uav-aided networks: a bayesian game-theoretic methodology A distributed intrusion detection system for resource-constrained devices in ad-hoc networks Specification based intrusion detection for unmanned aircraft systems Securing uav communications via trajectory optimization Securing uav communications via joint trajectory and power control Robust trajectory and transmit power design for secure uav communications Caching uav assisted secure transmission in hyper-dense networks based on interference alignment Uav-aided secure communications with cooperative jamming Secure uav communication in the presence of active eavesdropper Dual-uav-enabled secure communications: Joint trajectory design and user scheduling Protecting secure communication under uav smart attack with imperfect channel estimation Effective message authentication method for performing a swarm flight of drones Secured radio communication based on fusion of cryptography algorithms A secure communication protocol for drones and smart objects Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing A novel pairing-free certificateless authenticated key agreement protocol with provable security Strongly secure certificateless key exchange without pairing A functional encryption technique in uav integrated hetnet: A proposed model A traceable and privacy-preserving authentication for uav communication control system One round cipher algorithm for multimedia iot devices. Multimedia tools and applications A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks A generic framework for network forensics A hierarchical, objectives-based framework for the digital investigations process Drone forensic framework: Sensor and data identification and verification Drone forensics: Challenges and new insights Open source forensics for a multi-platform drone system Forensic analysis of popular uav systems Drop (drone open source parser) your drone: Forensic analysis of the dji phantom iii Gryphon: Drone forensics in dataflash and telemetry logs An event-based digital forensic investigation framework Unmanned aerial vehicle forensic investigation process: Dji phantom 3 drone as a case study Validation of forensic tools and software: A quick guide for the digital forensic examiner. Forensic Magazine Killer robots: legality and ethicality of autonomous weapons Expanding the potential for gps evidence acquisition A review of control algorithms for autonomous quadrotors A short tutorial on inertial navigation system and global positioning system integration Digital forensics of wireless systems and devices technical and legal challenges Exploring civil drone accidents and incidents to help prevent potential air disasters Experiences with mephedrone pre-and post-legislative controls: perceptions of safety and sources of supply Uk set to ban drones from flying within 1km of airports | financial times Iran and political dynamism in the arab world: The case of yemen The growing iranian unmanned combat aerial vehicle threat needs us action. Heritage Foundation Backgrounder Worst case scenario: The criminal use of drones. Council on Hemispheric Affairs Counter Jihad: America's Military Experience in Afghanistan, Iraq, and Syria Drone catcher:" robotic falcon" can capture, retrieve renegade drones Regulation analysis and new concept for a cloud-based uav supervision system in urban environment Securing commercial wifi-based uavs from common security attacks Unmanned aerial vehicle security using recursive parameter estimation A neural adaptive approach for active fault-tolerant control design in uav Common security attacks on drones Honeydrone: A medium-interaction unmanned aerial vehicle honeypot Game of drones Security analysis of dji phantom 3 standard Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems Paul Audren de Kerdrel, Pascal Cotret, and Valérie Viet Triem Tong. Dronejack: Kiss your drones goodbye Jamming attack-a survey Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux Cyber attacks and defense framework for unmanned aerial systems (uas) environment Effects of Hacking an Unmanned Aerial Vehicle Connected to the Cloud The vulnerability of uavs to cyber attacks-an approach to the risk assessment On the requirements for successful gps spoofing attacks Cybersecurity in drones Russian/soviet point defence weapons Zsu-23-4 shilka and soviet air defense gun vehicles Russia's a2/ad policy as a balancing strategy vs nato enlargement Self-Propelled Anti-Aircraft Guns of the Soviet Union Erdogan-putin relations will outweigh syria frictions Russian-turkish cooperation in syria: geopolitical alignment with limits Fear the drones: Remotely piloted systems and non-state actors in syria and iraq Counter-uav solutions for the joint force Rapid development of uavs: Transforming the warfare and defence An amateur drone surveillance system based on the cognitive internet of things Countering uavs-the mover of research in military technology Counter-drone systems. Center for the Study of the Drone at Bard College High-energy laser weapons target uavs. C4ISRNET-webpage Military technology: Laser weapons get real Understanding c-uas purpose and process. Counter Unmanned Aircraft Systems Technologies and Operations Technologies in hybrid warfare: Challenges. Editorial Board Uas: Developments with small unmanned aerial systems Rafael unveils /guillemotleftdrone dome/guillemotright anti-uav system Israeli contractor rafael shows off anti-drone laser in korea Tighter restrictions on drones promise limited gain ASW IAI's. Successes of israel's defence industry Defeating small civilian unmanned aerial systems to maintain air superiority Air mines: Countering the drone threat to aircraft Boosting defense cooperation in europe: An analysis of key military capabilities. Istituto Affari Internazionali, Institut de Relations Internationales et Strategiques, Hellenic Foundation for European and Foreign Policy A framework for counter-unmanned aircraft system regulation in new zealand an integrated unmanned air vehicles interdictor system concept. Problemy Mechatroniki: uzbrojenie, lotnictwo, inżynieria bezpieczeństwa A vision for directed energy and electric weapons in the current and future navy. Paper and presentation from ASNE Extended area protection system (eaps) program overview Extended area protection and survivability (eaps) ato 2016. In Armaments Systems Forum [dok. elektr Laser weapon system (laws) adjunct to the close-in weapon system (ciws) Armor piercing incendiary projectile Shield of david: the promise of israeli national missile defense Alternative to bae's 57 mm: Oto melara pitching 76 mm gun as option for navy's future frigate Structural design and analysis of initial extended area protection and survivability (eaps) projectile configurations Encyclopedia of Weird War Stories: Supernatural and Science Fiction Elements in Novels, Pulps, Comics, Film, Television, Games and Other Media An innovative response to commercial uav menace: Anti-uav falconry. Vojno delo Implementation of detection and tracking mechanism for small uas Railway track following with the ar. drone using vanishing point detection Bayesian fusion of thermal and visible spectra camera data for region based tracking with rapid background adaptation Synthetic aperture radar imaging using a small consumer drone Investigating cost-effective rf-based detection of drones Improved modeling and design of microphones using radio frequency detection with capacitive micromachined ultrasonic transducers Takshi Gupta, and Ilsun You. Internet of drones (iod): Threats, vulnerability, and security perspectives Preserving data security in distributed fog computing Distlog: A distributed logging scheme for iot forensics Efficient and secure physical encryption scheme for low-power wireless m2m devices An efficient ofdm-based encryption scheme using a dynamic key approach ☒ The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.☐The authors declare the following financial interests/personal relationships which may be considered as potential competing interests: