purchase and access at low prices to boot. Due to
high mobility and flexibility more and more UAVs
are being employed in civil applications, although it
suffers from potential risk. Various threats that are
associated with drones are the source of some risks;
it may get collide with buildings, aircrafts or other
objects, even it may get involved with potential
terrorist acts as well.
Researchers show their concerns and choose this
area as their research and presented their thoughts in
various forms. Yuliya Averyanova, Lyudmila
Blahaja in their works focuses on identifying UAV
risks and vulnerabilities in order to better implement
the risk-oriented approach of integrated UAVs into
the airspace safely and improving the security of
unmanned aerial systems. Nature, economic
engineering, and vulnerabilities and threats specific
to humans are quickly taken into account and certain
potential approaches to reduce vulnerabilities and
threats are also addressed in the paper.
Menaka Pushpa Arthur talks about various
possible cyber and physical risks that could emerge
from the use of UAVs, and then investigate multiple
methods of identifying, monitoring, and interdicting
hostile drones by utilizing techniques that focus on
UAV-emitted ambient radio frequency signals,
radars, acoustic sensors, and UAV-detection
computer vision techniques. Yuliya Averyanova,
Lyudmila Blahaja showed their concers about
durability of such vehicles. H. Shakhatreh, A.H.
Sawalmeh, A.I. Al-Fuqaha, Z. Dou, E.K. Almaita,
I.M. Khalil emphasis on key research challenges in
this area that need to be addressed properly. A.A.
Zhilenkov, I.R. Epifantsev talks about trajectories
planning in navigation system. H. Sedjelmaci, S. M.
Senouci and N. Ansari depicted that UAVs or drones
have been vulnerable to multiple malware attacks
such as the jamming attack since FANET.
The paper proposes a security framework for
FANET for Federated Learning-based on-device
jamming attack detection. It concludes that GPS
Jamming and Spoofing concentrate on UAV-related
research to address cybersecurity risks but avoids
assaults on the stream of controls and data
communications. L. Xiao, C. Xie, M. Min and W.
Zhuang [8] discussed the practicality of using
Identity Based Encryption in the UAV resource
restriction network. A major architecture challenge
when encryption is applied is the space limitation
existence of such WiFi-based UAV networks as
elaborated by Park, K. J., Kim, J., Lim, H., & Eun,
Y. It also discusses the practicality and performance
of IBE Identity Based Encryption in the UAV
network and thus provides an important wireless
UAV network resource limited security system.
From literature review it has been observed that
most of the failures are due to:
• Technical breakdown.
• Human factor.
• Adverse weather.
• Other factors.
However, in some intricate surroundings, UAV
cannot sense the environment parameters due to
limited communication and traditional sensor
perception capabilities. Despite many efforts to
overcome these weaknesses, it is essential to
develop more efficient and effective method in order
to perform more stability, predictability, and
security. Therefore, high performance independent
navigation is of great importance to develop the
application of UAV is of great importance. The
control of each drone falls on pilot to use visual
tracking to determine position and orientation. More
advanced drones use global positioning system
(GPS) receivers to play a significant role, that is,
navigation and control loop. Some smart features
include drone memorization to track the position
track. The trajectory of the drone can be
predetermined to establish GPS waypoints. When
this function is executed, the drone will use autopilot
to follow this path.
There exist various forms of UAV attacks; the
initial stages of UAV attack start with affecting the
physical configuration and the loss of mobility
which is also known as manoeuvrability. It is very
much difficult to detect, and to prevent or
countermeasure which includes the proper capturing
of vulnerabilities. On the basis of certain factors,
UAV attack can be categorized into four major parts
which are named as, UAV freezing, waypoint
alterations, enforced collision, and UAV hijacking.
These various attacks are as follows:
• UAV freezing: This attack starts with the
failure of node which is caused due to
modification in physical configuration of
unmanned armed vehicles which leads to loss
in mobility of UAV. These mobility losses
result in network failures. Intrusion, signal
jamming, and session hijacking are the main
cause to this attack.
• Waypoint alterations: Another major threat to
fully functional UAVs is waypoint
modifications. This attack leads to
overlapping of mobility patterns which in
turn results in enforced collision. This is a