{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T10:16:29Z","timestamp":1770545789779,"version":"3.49.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030587024","type":"print"},{"value":"9783030587031","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58703-1_8","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:02:47Z","timestamp":1599544967000},"page":"119-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Challenges of Securing and Defending Unmanned Aerial Vehicles"],"prefix":"10.1007","author":[{"given":"William","family":"Goble","sequence":"first","affiliation":[]},{"given":"Elizabeth","family":"Braddy","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Burmester","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Schwartz","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Sloan","sequence":"additional","affiliation":[]},{"given":"Demetra","family":"Drizis","sequence":"additional","affiliation":[]},{"given":"Nitish","family":"Ahir","sequence":"additional","affiliation":[]},{"given":"Melissa","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Bays","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Chastain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Arthur, M.P.: Detecting signal spoofing and jamming attacks in UAV networks using a lightweight ids. In: 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/CITS.2019.8862148"},{"key":"8_CR2","unstructured":"Autopilot, A.O.S. http:\/\/ardupilot.org\/"},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1952982.1952993","volume":"14","author":"M Burmester","year":"2011","unstructured":"Burmester, M., Munilla, J.: Lightweight RFID authentication with forward and backward security. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 1\u201326 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"8_CR4","unstructured":"CNSSP No.\u00a028, Cybersecurity of Unmanned National Security Systems. http:\/\/www.cnss.gov\/CNSS\/issuances\/Policies.cfm"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Davanian, A., Massacci, F., Allodi, L.: Diversity: A Poor Man\u2019s Solution to Drone Takeover. In: PECCS, pp. 25\u201334 (2017)","DOI":"10.5220\/0006408500250034"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Dill, E.T., Hayhurst, K.J., Young, S.D., Narkawicz, A.J.: UAS hazard mitigation through assured compliance with conformance criteria. In: 2018 AIAA Information Systems-AIAA Infotech@ Aerospace, p. 1218 (2018)","DOI":"10.2514\/6.2018-1218"},{"key":"8_CR7","unstructured":"Docker Docs: AC-1 Access Control Policy and Procedures. https:\/\/docs.docker.com\/compliance\/reference\/800-53\/ac\/"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"4850","DOI":"10.1109\/ACCESS.2017.2779146","volume":"6","author":"D Fang","year":"2017","unstructured":"Fang, D., Qian, Y., Hu, R.Q.: Security for 5g mobile wireless networks. IEEE Access 6, 4850\u20134874 (2017)","journal-title":"IEEE Access"},{"key":"8_CR10","unstructured":"Fuentes, G.: USNI News, June 19, 2018, Pentagon grounds marines\u2019 \u201cEyes in the Sky\u201d drones over cyber security concerns. http:\/\/news.usni.org\/2018\/06\/18\/pentagon-grounds-marines-eyes-sky-drones-cyber-security-concerns"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"G\u00fcven\u00e7, \u0130., Ozdemir, O., Yapici, Y., Mehrpouyan, H., Matolak, D.: Detection, localization, and tracking of unauthorized UAS and jammers. In: 2017 IEEE\/AIAA 36th Digital Avionics Systems Conference (DASC), pp. 1\u201310. IEEE (2017)","DOI":"10.1109\/DASC.2017.8102043"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Krishna, C.L., Murphy, R.R.: A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In: 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR), pp. 194\u2013199. IEEE (2017)","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Kumar, A., Saxena, N., Tsudik, G., Uzun, E.: Caveat EPTOR: a comparative study of secure device pairing methods. In: 2009 IEEE International Conference on Pervasive Computing and Communications, pp. 1\u201310. IEEE (2009)","DOI":"10.1109\/PERCOM.2009.4912753"},{"key":"8_CR14","unstructured":"MAVLink Common Message Set. https:\/\/mavlink.io\/en\/messages\/common.html"},{"key":"8_CR15","unstructured":"MAVLink Developer Guide. https:\/\/mavlink.io"},{"key":"8_CR16","unstructured":"MAVLink2. https:\/\/mavlink.io\/en\/guide\/mavlink_2.html"},{"key":"8_CR17","unstructured":"MAVROS, PX4 Development Guide: the MAVROS ROS package. https:\/\/dev.px4.io\/v1.9.0\/en\/ros\/mavros_installation.html"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"McGrew, D.A., Viega, J.: The security and performance of the Galois\/Counter Mode (GCM) of operation. In: International Conference on Cryptology in India, pp. 343\u2013355. Springer (2004)","DOI":"10.1007\/978-3-540-30556-9_27"},{"issue":"1","key":"8_CR19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.3390\/s17010053","volume":"17","author":"J Munilla","year":"2017","unstructured":"Munilla, J., Burmester, M., Peinado, A., Yang, G., Susilo, W.: RFID ownership transfer with positive secrecy capacity channels. Sensors 17(1), 53 (2017)","journal-title":"Sensors"},{"key":"8_CR20","unstructured":"NIST SP 800-38D: Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC, November 2007. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-38d\/final"},{"key":"8_CR21","unstructured":"NIST SP 8000-137: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-137.pdf"},{"key":"8_CR22","unstructured":"NIST Special Publication 800-121: Revision 2, guide to Bluetooth security. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-121r1.pdf"},{"key":"8_CR23","unstructured":"OWASP Cheat Sheet Series. https:\/\/www.owasp.org\/index.php\/OWASP Cheat_Sheet Series"},{"key":"8_CR24","unstructured":"OWASP Enterprise Security API. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Enterprise_Security_API"},{"issue":"2","key":"8_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2431211.2431216","volume":"45","author":"M Pearce","year":"2013","unstructured":"Pearce, M., Zeadally, S., Hunt, R.: Virtualization: issues, security threats, and solutions. ACM Comput. Surv. (CSUR) 45(2), 1\u201339 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"4","key":"8_CR26","doi-asserted-by":"publisher","first-page":"3340","DOI":"10.1109\/COMST.2019.2924143","volume":"21","author":"R Shakeri","year":"2019","unstructured":"Shakeri, R., Al-Garadi, M.A., Badawy, A., Mohamed, A., Khattab, T., Al-Ali, A.K., Harras, K.A., Guizani, M.: Design challenges of multi-UAV systems in cyber-physical applications: a comprehensive survey and future directions. IEEE Commun. Surv. Tutor. 21(4), 3340\u20133385 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"8_CR27","unstructured":"Shepardson, D.: Reuters, May 20, 2019, DHS warns of data threat from Chinese made drones. http:\/\/www.reuters.com\/article\/us-usa-drones-china\/dhs-warns-of- data-threat-from-chinese-made-drones-idUSKCN1SQ1ZY"},{"key":"8_CR28","unstructured":"sMAVLink, Secure MAVLink. https:\/\/docs.google.com\/document\/d\/1upZ_KnEgK3Hk1j0DfSHl9AdKFMoSqkAQVeK8LsngvEU\/edit"},{"issue":"7","key":"8_CR29","doi-asserted-by":"publisher","first-page":"6903","DOI":"10.1109\/TVT.2019.2911672","volume":"68","author":"J Srinivas","year":"2019","unstructured":"Srinivas, J., Das, A.K., Kumar, N., Rodrigues, J.J.: TCALAS: temporal credential-based anonymous lightweight authentication scheme for internet of drones environment. IEEE Trans. Veh. Technol. 68(7), 6903\u20136916 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"8_CR30","unstructured":"Puko, K.F.T.: The Wall Street Journal, October 30, 2019, Interior Department Grounds Aerial Drone Fleet, Citing Risk From Chinese Manufacturers. http:\/\/www.wsj.com\/articles\/interior-dept-grounds-aerial-drone-fleet-citing-risk-from-chinese-manufacturers-11572473703"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Torens, C., Adolf, F.: Automated Verification and Validation of an Onboard Mission Planning and Execution System for UAVs. In: AIAA Infotech@ Aerospace (I@ A) Conference, p. 4564 (2013)","DOI":"10.2514\/6.2013-4564"},{"key":"8_CR32","unstructured":"Tridgell, A., Meier, L.: Mavlink 2.0 packet signing proposal (2015). https:\/\/docs.google.com\/document\/d\/1ETle6qQRcaNWAmpG2wz0oOpFKSF_bcTmYMQvtTGI8ns\/edit#heading=h.r1r08t7lr2pc"},{"key":"8_CR33","unstructured":"Ubuntu Server 18.04.3 LTS. https:\/\/ubuntu.com\/download\/server"},{"key":"8_CR34","unstructured":"Ward, A.E.: The legal, technical, and practical challenges of countering the commercial drone threat to national security. Technical report, Naval Postgraduate School Monterey United States (2019)"},{"key":"8_CR35","unstructured":"What is a Container: Docker, Inc. http:\/\/docker.com . Accessed 30 Oct 2019"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Won, J., Bertino, E.: Securing mobile data collectors by integrating software attestation and encrypted data repositories. In: 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), pp. 26\u201335. IEEE (2018)","DOI":"10.1109\/CIC.2018.00-43"},{"issue":"8","key":"8_CR37","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975)","journal-title":"Bell Syst. Tech. J."},{"key":"8_CR38","unstructured":"Yasrab, R.: Mitigating docker security issues. arXiv preprint arXiv:1804.05039 (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58703-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T11:25:29Z","timestamp":1723548329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58703-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9783030587024","9783030587031"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58703-1_8","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}