ABSTRACT

In the past two decades, there has been a rapid development in the drone industry known as Unmanned Aerial Vehicles (UAVs). This technology has a lot of benefits in civilian applications. For example, parcel delivery and hostage rescue will unite the smart cities soon. Currently, the use of commercial drones has increased a lot due to their affordability. However, due to a lack of security implementations, this technology has many threats and vulnerabilities. In addition, software and hardware complexity in UAVs also triggers privacy and security issues. To minimize these threats, many strong security protocols have been proposed by researchers. Yet, these protocols also have many flaws which attackers can exploit. Hence, it became necessary to analyze and explore these security protocols used for discovery. This chapter aims to investigate the vulnerabilities present in security protocols and recommends guidelines for improving the security of UAVs. This will provide a clear direction for future research studies.