Abstract
A drone is actually a flying computer, and as a result, it can be taken over by hackers using Wi-Fi networks or by disrupting GPS signals. Specialists analyzing various cases of loss of drones point to the possibility of an adversary taking control of their onboard systems. In addition, the most significant dangers arise when drones begin to operate in a network, cooperating and exchanging information (working, for example, as retlanslators). The purpose of this article is to provide an overview of the problem of cybersecurity in the skies. Drone manufacturers should secure their products against the possibility of launching an attack on installed systems. A significant challenge for them will be constantly working on eliminating vulnerabilities in cooperation with security experts. All drones should be equipped with authentication mechanisms to prevent the possibility of takeover by unauthorized persons. The paper analyzes the literature on the subject, considering current trends and available regulations.
Reference23 articles.
1. Projekt: Usługi cyfrowe dla bezzałogowych statków powietrznych https://ulc.gov.pl/pl/drony/5705-projekt-uslugi-cyfrowe-dla-bezzalogowych-statkow-powietrznych, dostęp. 10.09.2023.
2. Konwencja o zwalczaniu bezprawnych czynów skierowanych przeciwko bez-pieczeństwu lotnictwa cywilnego,sporządzona w Montrealu dnia 23 września 1971 r.
3. Vu, K., Hanafizadeh, P., & Bohlin, E. (2020). ICT as a driver of economic growth: A survey of the literature and directions for future research. Tele-communications Policy, 44 (2), Article 101922. https://doi.org/10.1016/j.telpol.2020.101922
4. Raport ENISA Threat Landscape 2022: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022 r.
5. Pietrek G., Zarządzanie w sytuacjach kryzysowych, Słupsk 2013, s. 20.