Electronics Science Technology and Application

  • Home
  • About
    • About the Journal
    • Contact
  • Article
    • Current
    • Archives
  • Submissions
  • Editorial Team
  • Announcements
Register Login

ISSN

2424-8460(Online)

2251-2608(Print)

Article Processing Charges (APCs)

US$800

Publication Frequency

Quarterly

Download Full Text PDF

Published

2026-04-02

Issue

Vol 13 No 1 (2026): Published

Section

Articles

Security risk analysis and countermeasure technologies for unmanned aerial vehicles

Yishi Xue

Department of Computer Information and Network Security, Jiangsu Police Institute


DOI: https://doi.org/10.59429/esta.v13i1.13399


Keywords: unmanned aerial vehicle; security risk; management and countermeasure


Abstract

The expanding deployment of unmanned aerial vehicles (UAVs) across logistics, agriculture, infrastructure inspection, and emergency response has generated corresponding growth in security incidents. This paper presents a systematic survey of UAV security threats and their associated countermeasure technologies. A three-layer risk taxonomy is proposed that classifies threats into physical layer risks, communication layer risks, and data and privacy risks. The cross-layer cascade propagation mechanisms through which localized anomalies escalate into systemic failures are also analyzed. For each risk category, state-of-the-art countermeasures are reviewed, including multi-modal sensor fusion detection, graduated-response counter-UAV systems, network security hardening, digital-twin-enabled airspace governance, and AI-augmented intelligent management. The analysis reveals that effective UAV security governance requires a cross-layer defense-in-depth architecture coordinating detection, prevention, response, and regulatory enforcement.


References

[1] Drone Industry Insights. The drone market report 2025–2030[R/OL]. https://www.droneii.com/drone-marketreport.

[2] Pu F, Chen Z J, Liu Y, et al. Air traffic management technologies for digital low-altitude integrated operations

[J]. Acta Aeronautica et Astronautica Sinica, 2025, 46(11): 531331.

[3] Al-Sabbagh, A., El-Bokhary, A., El-Koussa, S., et al. Enhancing UAV security against GPS spoofing attacks

through a genetic algorithm-driven deep learning framework[J]. Information, 2025, 16(2): 115.

[4] Bai N, Hu X, Wang S. A survey on unmanned aerial systems cybersecurity[J]. Journal of Systems

Architecture, 2024, 156: 103282.

[5] Kumar N., Chaudhary A. Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV

security[J]. Computer Networks, 2024, 252: 110695.

[6] Cordill B, Fang D, Xu S, et al. A comprehensive survey of security and privacy in UAV systems[J]. IEEE

Access, 2025, 13: 12987-13015.

[7] Development review of counter-UAV technologies at home and abroad[EB/OL]. Secrss, 2025. https://www.

secrss.com/articles/76379.

[8] Yu P, Tan C, Li W J, et al. Digital twin driven autonomous management and control architecture and key

technologies for low-altitude intelligent networks[J]. Sci Sin Inform, 2025, 55: 2449–2470.

[9] Panjavarnam, K, Ismail, Z H, Tang C H H, et al. Model predictive control for autonomous UAV landings: A

comprehensive review of strategies, applications and challenges[J]. The Journal of Engineering, 2025.



ISSN: 2424-8460
21 Woodlands Close #02-10 Primz Bizhub Singapore 737854

Email:editorial_office@as-pub.com