Security risk analysis and countermeasure technologies for unmanned aerial vehicles
Yishi Xue
Department of Computer Information and Network Security, Jiangsu Police Institute
DOI: https://doi.org/10.59429/esta.v13i1.13399
Keywords: unmanned aerial vehicle; security risk; management and countermeasure
Abstract
The expanding deployment of unmanned aerial vehicles (UAVs) across logistics, agriculture, infrastructure inspection, and emergency response has generated corresponding growth in security incidents. This paper presents a systematic survey of UAV security threats and their associated countermeasure technologies. A three-layer risk taxonomy is proposed that classifies threats into physical layer risks, communication layer risks, and data and privacy risks. The cross-layer cascade propagation mechanisms through which localized anomalies escalate into systemic failures are also analyzed. For each risk category, state-of-the-art countermeasures are reviewed, including multi-modal sensor fusion detection, graduated-response counter-UAV systems, network security hardening, digital-twin-enabled airspace governance, and AI-augmented intelligent management. The analysis reveals that effective UAV security governance requires a cross-layer defense-in-depth architecture coordinating detection, prevention, response, and regulatory enforcement.
References
[1] Drone Industry Insights. The drone market report 2025–2030[R/OL]. https://www.droneii.com/drone-marketreport.
[2] Pu F, Chen Z J, Liu Y, et al. Air traffic management technologies for digital low-altitude integrated operations
[J]. Acta Aeronautica et Astronautica Sinica, 2025, 46(11): 531331.
[3] Al-Sabbagh, A., El-Bokhary, A., El-Koussa, S., et al. Enhancing UAV security against GPS spoofing attacks
through a genetic algorithm-driven deep learning framework[J]. Information, 2025, 16(2): 115.
[4] Bai N, Hu X, Wang S. A survey on unmanned aerial systems cybersecurity[J]. Journal of Systems
Architecture, 2024, 156: 103282.
[5] Kumar N., Chaudhary A. Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV
security[J]. Computer Networks, 2024, 252: 110695.
[6] Cordill B, Fang D, Xu S, et al. A comprehensive survey of security and privacy in UAV systems[J]. IEEE
Access, 2025, 13: 12987-13015.
[7] Development review of counter-UAV technologies at home and abroad[EB/OL]. Secrss, 2025. https://www.
secrss.com/articles/76379.
[8] Yu P, Tan C, Li W J, et al. Digital twin driven autonomous management and control architecture and key
technologies for low-altitude intelligent networks[J]. Sci Sin Inform, 2025, 55: 2449–2470.
[9] Panjavarnam, K, Ismail, Z H, Tang C H H, et al. Model predictive control for autonomous UAV landings: A
comprehensive review of strategies, applications and challenges[J]. The Journal of Engineering, 2025.