{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T02:08:33Z","timestamp":1774058913864,"version":"3.50.1"},"reference-count":228,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Taighde \u00c9ireann - Research Ireland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Internet of Things"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.iot.2026.101902","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:49:44Z","timestamp":1771519784000},"page":"101902","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Toward secure complex UAV cyber-physical systems: A unified threat taxonomy and cross-layer survey of cybersecurity challenges"],"prefix":"10.1016","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3042-6072","authenticated-orcid":false,"given":"Muhammad Iftikhar","family":"Umrani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0610-0128","authenticated-orcid":false,"given":"Bernard","family":"Butler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8197-0911","authenticated-orcid":false,"given":"Aisling","family":"O\u2019 Driscoll","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3300-1152","authenticated-orcid":false,"given":"Steven","family":"Davy","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.iot.2026.101902_bib0001","unstructured":"SatNews, The connected commercial drone market by 2029, 2025, https:\/\/news.satnews.com\/2025\/04\/09\/the-connected-commercial-drone-market-to-reach-us-37-3-billion-worldwide-by-2029\/."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s12544-019-0368-2","article-title":"Last mile delivery by drones: an estimation of viable market potential and access to citizens across european cities","volume":"11","author":"Aurambout","year":"2019","journal-title":"Eur. Transp. Res. Rev."},{"key":"10.1016\/j.iot.2026.101902_bib0003","series-title":"2019 International Conference on Unmanned Aircraft Systems (Icuas)","first-page":"1005","article-title":"The urban last mile problem: autonomous drone delivery to your balcony","author":"Brunner","year":"2019"},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0004","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/19475705.2016.1238852","article-title":"Multipurpose UAV for search and rescue operations in mountain avalanche events","volume":"8","author":"Silvagni","year":"2017","journal-title":"Geom. Nat. Hazards Risk"},{"issue":"55","key":"10.1016\/j.iot.2026.101902_bib0005","article-title":"An autonomous drone for search and rescue in forests using airborne optical sectioning","volume":"6","author":"Schedl","year":"2021","journal-title":"Sci. Rob."},{"issue":"22","key":"10.1016\/j.iot.2026.101902_bib0006","doi-asserted-by":"crossref","first-page":"8797","DOI":"10.3390\/s22228797","article-title":"Monitoring and identification of road construction safety factors via UAV","volume":"22","author":"Zhu","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.iot.2026.101902_bib0007","series-title":"2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN)","first-page":"682","article-title":"Drone-assisted inspection for automated accident damage estimation: a deep learning approach","author":"Serhani","year":"2019"},{"issue":"22","key":"10.1016\/j.iot.2026.101902_bib0008","doi-asserted-by":"crossref","DOI":"10.3390\/su132212560","article-title":"Toward an integrated disaster management approach: how artificial intelligence can boost disaster management","volume":"13","author":"Abid","year":"2021","journal-title":"Sustainability"},{"issue":"4","key":"10.1016\/j.iot.2026.101902_bib0009","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s41650-018-0034-1","article-title":"UAV-Aided networks for emergency communications in areas with unevenly distributed users","volume":"3","author":"Peng","year":"2018","journal-title":"J. Commun. Inf. Netw."},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0010","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1109\/COMST.2019.2962207","article-title":"Survey on unmanned aerial vehicle networks: a cyber physical system perspective","volume":"22","author":"Wang","year":"2019","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"10.1016\/j.iot.2026.101902_bib0011","doi-asserted-by":"crossref","first-page":"2124","DOI":"10.1109\/TVT.2018.2890773","article-title":"Autonomous navigation of UAVs in large-scale complex environments: a deep reinforcement learning approach","volume":"68","author":"Wang","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.iot.2026.101902_bib0012","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1109\/OJVT.2023.3316181","article-title":"A comprehensive survey on artificial intelligence for unmanned aerial vehicles","volume":"4","author":"Sai","year":"2023","journal-title":"IEEE Open J. Veh. Technol."},{"key":"10.1016\/j.iot.2026.101902_bib0013","series-title":"2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR)","first-page":"194","article-title":"A review on cybersecurity vulnerabilities for unmanned aerial vehicles","author":"Krishna","year":"2017"},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0014","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3001836","article-title":"Security, privacy, and safety aspects of civilian drones: a survey","volume":"1","author":"Altawy","year":"2016","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"10.1016\/j.iot.2026.101902_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109626","article-title":"A survey on security and privacy issues of UAVs","volume":"224","author":"Mekdad","year":"2023","journal-title":"Comput. Networks"},{"key":"10.1016\/j.iot.2026.101902_bib0016","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.cose.2019.05.003","article-title":"Cyber-attacks on unmanned aerial system networks: detection, countermeasure, and future research directions","volume":"85","author":"Manesh","year":"2019","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3485272","article-title":"A security review in the UAVNet era: threats, countermeasures, and gap analysis","volume":"55","author":"Rugo","year":"2022","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.iot.2026.101902_bib0018","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1631\/FITEE.1601650","article-title":"Current trends in the development of intelligent unmanned autonomous systems","volume":"18","author":"Zhang","year":"2017","journal-title":"Front. Inf. Technol. Electron. Eng."},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0019","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1109\/TASE.2017.2651109","article-title":"State-of-the-art intelligent flight control systems in unmanned aerial vehicles","volume":"15","author":"Santoso","year":"2017","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"10.1016\/j.iot.2026.101902_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103607","article-title":"A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs","volume":"213","author":"Hadi","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.iot.2026.101902_bib0021","article-title":"Internet of drones security: taxonomies, open issues, and future directions","volume":"39","author":"Derhab","year":"2023","journal-title":"Veh. Commun."},{"key":"10.1016\/j.iot.2026.101902_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2022.102894","article-title":"A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks","volume":"133","author":"Tsao","year":"2022","journal-title":"Ad Hoc Netw."},{"issue":"5","key":"10.1016\/j.iot.2026.101902_bib0023","doi-asserted-by":"crossref","first-page":"3227","DOI":"10.1109\/COMST.2024.3515051","article-title":"A survey of security in uavs and fanets: issues, threats, analysis of attacks, and solutions","volume":"27","author":"Ceviz","year":"2025","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.iot.2026.101902_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2024.103282","article-title":"A survey on unmanned aerial systems cybersecurity","author":"Bai","year":"2024","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.iot.2026.101902_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101281","article-title":"Advancing UAV security with artificial intelligence: a comprehensive survey of techniques and future directions","volume":"27","author":"Tlili","year":"2024","journal-title":"Internet of Things"},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0026","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1002\/rob.70040","article-title":"Cybersecurity challenges and solutions in unmanned aerial vehicles (UAVs)","volume":"43","author":"Morshedi","year":"2026","journal-title":"J. Field Rob."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0027","doi-asserted-by":"crossref","DOI":"10.1049\/ise2\/2046868","article-title":"Cybersecurity and artificial intelligence in unmanned aerial vehicles: emerging challenges and advanced countermeasures","volume":"2025","author":"Alsadie","year":"2025","journal-title":"IET Inf. Secur."},{"key":"10.1016\/j.iot.2026.101902_bib0028","doi-asserted-by":"crossref","unstructured":"A. Khazraei, H. Meng, M. Pajic, Stealthy perception-based attacks on unmanned aerial vehicles, arXiv: 2303.02112(2023).","DOI":"10.1109\/ICRA48891.2023.10160900"},{"key":"10.1016\/j.iot.2026.101902_bib0029","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2020.100218","article-title":"Security analysis of drones systems: attacks, limitations, and recommendations","volume":"11","author":"Yaacoub","year":"2020","journal-title":"Internet of Things"},{"key":"10.1016\/j.iot.2026.101902_bib0030","doi-asserted-by":"crossref","first-page":"148244","DOI":"10.1109\/ACCESS.2021.3124996","article-title":"A survey of cyberattack countermeasures for unmanned aerial vehicles","volume":"9","author":"Kong","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.iot.2026.101902_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110695","article-title":"Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security","volume":"252","author":"Kumar","year":"2024","journal-title":"Comput. Networks"},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0032","article-title":"Cybersecurity in unmanned aerial vehicles: a review","volume":"16","author":"Shafik","year":"2023","journal-title":"Int. J. Smart Sens. Int. Syst."},{"issue":"6","key":"10.1016\/j.iot.2026.101902_bib0033","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1080\/01691864.2019.1586760","article-title":"Unmanned aerial vehicles using machine learning for autonomous flight; state-of-the-art","volume":"33","author":"Choi","year":"2019","journal-title":"Adv. Rob."},{"key":"10.1016\/j.iot.2026.101902_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.102870","article-title":"A survey on cybersecurity attacks and defenses for unmanned aerial systems","volume":"138","author":"Wang","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.iot.2026.101902_bib0035","first-page":"313","article-title":"Metrics, schmetrics! how the heck do you determine a UAV\u2019s autonomy anyway?","volume":"990","author":"Clough","year":"2002","journal-title":"NIST Special Publication"},{"key":"10.1016\/j.iot.2026.101902_bib0036","first-page":"849","article-title":"A framework for autonomy levels for unmanned systems (ALFUS)","author":"Huang","year":"2005","journal-title":"Proc. AUVSI\u2019s Unmanned Syst. North Am."},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0037","doi-asserted-by":"crossref","first-page":"2771","DOI":"10.32604\/cmc.2021.017236","article-title":"A technical framework for selection of autonomous UAV navigation technologies and sensors","volume":"68","author":"Al-Darraji","year":"2021","journal-title":"Comput. Mater. Continua"},{"key":"10.1016\/j.iot.2026.101902_bib0038","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.eng.2021.10.007","article-title":"From unmanned systems to autonomous intelligent systems","volume":"12","author":"Chen","year":"2022","journal-title":"Engineering"},{"key":"10.1016\/j.iot.2026.101902_bib0039","doi-asserted-by":"crossref","first-page":"6134","DOI":"10.1109\/TASE.2024.3439544","article-title":"A covert spoofing algorithm for SINS\/GNSS tightly integrated navigation system","volume":"22","author":"Geng","year":"2024","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2478\/jagi-2014-0001","article-title":"Artificial general intelligence: concept, state of the art, and future prospects","volume":"5","author":"Goertzel","year":"2014","journal-title":"J. Artif. General Intell."},{"key":"10.1016\/j.iot.2026.101902_bib0041","doi-asserted-by":"crossref","unstructured":"Y. Zhang, D. Luo, Editorial of special issue on UAV autonomous, intelligent and safe control, (2021).","DOI":"10.1142\/S2737480721020015"},{"key":"10.1016\/j.iot.2026.101902_bib0042","doi-asserted-by":"crossref","DOI":"10.1016\/j.ast.2023.108803","article-title":"Optimized intelligent tracking control for a quadrotor unmanned aerial vehicle with actuator failures","volume":"144","author":"Li","year":"2024","journal-title":"Aerosp. Sci. Technol."},{"key":"10.1016\/j.iot.2026.101902_bib0043","series-title":"Advances in Neural Computation, Machine Learning, and Cognitive Research IV: Selected Papers from the XXII International Conference on Neuroinformatics, October 12\u201316, 2020, Moscow, Russia","first-page":"125","article-title":"Providing situational awareness in the control of unmanned vehicles","author":"Igonin","year":"2021"},{"key":"10.1016\/j.iot.2026.101902_bib0044","series-title":"Situation Awareness Analysis and Measurement","author":"Endsley","year":"2000"},{"key":"10.1016\/j.iot.2026.101902_bib0045","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.inffus.2020.06.003","article-title":"Real evaluation for designing sensor fusion in UAV platforms","volume":"63","author":"Garc\u00eda","year":"2020","journal-title":"Inf. Fusion"},{"issue":"5","key":"10.1016\/j.iot.2026.101902_bib0046","article-title":"State-of-the-art in cyber situational awareness: a comprehensive review and analysis","volume":"18","author":"Kim","year":"2024","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"10.1016\/j.iot.2026.101902_bib0047","series-title":"2020 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)","first-page":"2488","article-title":"LAVAPilot: lightweight UAV trajectory planner with situational awareness for embedded autonomy to track and locate radio-tags","author":"Van Nguyen","year":"2020"},{"issue":"3","key":"10.1016\/j.iot.2026.101902_bib0048","doi-asserted-by":"crossref","first-page":"1807","DOI":"10.1109\/JSEN.2021.3139124","article-title":"Embedded sensors, communication technologies, computing platforms and machine learning for UAVs: a review","volume":"22","author":"Wilson","year":"2021","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.iot.2026.101902_bib0049","unstructured":"P.D. Team, PX4 - open source UAV flight control software, 2024, (URL: https:\/\/px4.io\/)."},{"key":"10.1016\/j.iot.2026.101902_bib0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.micpro.2021.104340","article-title":"A review on communication protocols for autonomous unmanned aerial vehicles for inspection application","volume":"86","author":"Shi","year":"2021","journal-title":"Microprocess Microsyst."},{"key":"10.1016\/j.iot.2026.101902_bib0051","series-title":"2023 International Conference on Unmanned Aircraft Systems (ICUAS)","first-page":"1155","article-title":"PACED-5G: predictive autonomous control using edge for drones over 5g","author":"Sankaranarayanan","year":"2023"},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0052","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3390\/drones7020089","article-title":"Vision-based navigation techniques for unmanned aerial vehicles: review and challenges","volume":"7","author":"Arafat","year":"2023","journal-title":"Drones"},{"issue":"15","key":"10.1016\/j.iot.2026.101902_bib0053","doi-asserted-by":"crossref","first-page":"4220","DOI":"10.3390\/s20154220","article-title":"Deep learning sensor fusion for autonomous vehicle perception and localization: a review","volume":"20","author":"Fayyad","year":"2020","journal-title":"Sensors"},{"issue":"7","key":"10.1016\/j.iot.2026.101902_bib0054","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MAES.2020.3043072","article-title":"Artificial intelligence and data fusion at the edge","volume":"36","author":"Munir","year":"2021","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"issue":"9\u201310","key":"10.1016\/j.iot.2026.101902_bib0055","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1177\/0020294019866860","article-title":"Optimal control and state estimation for unmanned aerial vehicle under random vibration and uncertainty","volume":"52","author":"Al-Mashhadani","year":"2019","journal-title":"Measur. Control"},{"key":"10.1016\/j.iot.2026.101902_bib0056","doi-asserted-by":"crossref","DOI":"10.1109\/JSEN.2023.3292427","article-title":"A review of small UAV navigation system based on multi-source sensor fusion","author":"Ye","year":"2023","journal-title":"IEEE Sens. J."},{"issue":"3","key":"10.1016\/j.iot.2026.101902_bib0057","doi-asserted-by":"crossref","first-page":"2128","DOI":"10.1109\/TAES.2012.6237583","article-title":"Flight-test evaluation of sensor fusion algorithms for attitude estimation","volume":"48","author":"Gross","year":"2012","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"10.1016\/j.iot.2026.101902_bib0058","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s10846-017-0483-z","article-title":"Survey on computer vision for UAVs: current developments and trends","volume":"87","author":"Kanellakis","year":"2017","journal-title":"J. Intell. Rob. Syst."},{"issue":"8","key":"10.1016\/j.iot.2026.101902_bib0059","doi-asserted-by":"crossref","first-page":"4941","DOI":"10.1109\/TITS.2020.2983491","article-title":"Reliable path planning for drone delivery using a stochastic time-dependent public transportation network","volume":"22","author":"Huang","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.iot.2026.101902_bib0060","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s10846-019-01073-3","article-title":"Towards real-time path planning through deep reinforcement learning for a UAV in dynamic environments","volume":"98","author":"Yan","year":"2020","journal-title":"J. Intell. Rob. Syst."},{"issue":"6","key":"10.1016\/j.iot.2026.101902_bib0061","doi-asserted-by":"crossref","first-page":"4233","DOI":"10.1007\/s11831-022-09742-7","article-title":"UAV Path planning using optimization approaches: a survey","volume":"29","author":"Ait Saadi","year":"2022","journal-title":"Arch. Comput. Methods Eng."},{"key":"10.1016\/j.iot.2026.101902_bib0062","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.micpro.2018.05.002","article-title":"A survey of open-source UAV flight controllers and flight simulators","volume":"61","author":"Ebeid","year":"2018","journal-title":"Microprocess Microsyst."},{"key":"10.1016\/j.iot.2026.101902_bib0063","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1016\/j.comcom.2019.12.026","article-title":"An effective approach to unmanned aerial vehicle navigation using visual topological map in outdoor and indoor environments","volume":"150","author":"Han","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.iot.2026.101902_bib0064","series-title":"Drones in Smart-cities","first-page":"37","article-title":"Emerging use of UAV\u2019s: secure communication protocol issues and challenges","author":"Khan","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0065","series-title":"ICC 2024-IEEE International Conference on Communications","first-page":"1939","article-title":"Exploring jamming and hijacking attacks for micro aerial drones","author":"Mekdad","year":"2024"},{"key":"10.1016\/j.iot.2026.101902_bib0066","series-title":"2012 Ieee Conference on Technologies for Homeland Security (Hst)","first-page":"585","article-title":"Cyber security threat analysis and modeling of an unmanned aerial vehicle system","author":"Javaid","year":"2012"},{"key":"10.1016\/j.iot.2026.101902_bib0067","series-title":"2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS\/SBR)","first-page":"127","article-title":"The impact of DoS attacks on the AR. drone 2.0","author":"Vasconcelos","year":"2016"},{"key":"10.1016\/j.iot.2026.101902_bib0068","doi-asserted-by":"crossref","first-page":"2705","DOI":"10.1007\/s11277-020-07212-6","article-title":"Effective GPS jamming techniques for UAVs using low-cost SDR platforms","volume":"115","author":"Ferreira","year":"2020","journal-title":"Wireless Personal Commun."},{"key":"10.1016\/j.iot.2026.101902_bib0069","series-title":"31st USENIX Security Symposium (USENIX Security 22)","first-page":"3503","article-title":"An experimental study of GPS spoofing and takeover attacks on UAVs","author":"Sathaye","year":"2022"},{"key":"10.1016\/j.iot.2026.101902_bib0070","doi-asserted-by":"crossref","first-page":"46668","DOI":"10.1109\/ACCESS.2024.3382543","article-title":"An analysis of GPS spoofing attack and efficient approach to spoofing detection in PX4","volume":"12","author":"Jung","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.iot.2026.101902_bib0071","unstructured":"Z. Wang, Y. Li, J. Zhang, X. Han, K. Liu, L. Yang, T. Zhang, Q. Pan, et al., SSD: a state-based stealthy backdoor attack for navigation system in UAV route planning, arXiv: 2502.20178(2025)."},{"issue":"5","key":"10.1016\/j.iot.2026.101902_bib0072","doi-asserted-by":"crossref","first-page":"3125","DOI":"10.1109\/TDSC.2021.3085412","article-title":"Remote attacks on drones vision sensors: an empirical study","volume":"19","author":"Fu","year":"2021","journal-title":"IEEE Trans. Dependable Secure. Comput."},{"issue":"8","key":"10.1016\/j.iot.2026.101902_bib0073","doi-asserted-by":"crossref","first-page":"8976","DOI":"10.1109\/TII.2022.3224980","article-title":"Fast reactive mechanism for desired trajectory attacks on unmanned aerial vehicles","volume":"19","author":"Gu","year":"2022","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.iot.2026.101902_bib0074","series-title":"2024 21st European Radar Conference (EuRAD)","first-page":"252","article-title":"Implementation and validation of a real-time spoofing system","author":"Choi","year":"2024"},{"issue":"23","key":"10.1016\/j.iot.2026.101902_bib0075","doi-asserted-by":"crossref","first-page":"23341","DOI":"10.1109\/JSEN.2022.3212977","article-title":"Analytic models of a loosely coupled GNSS\/INS\/LiDAR Kalman filter considering update frequency under a spoofing attack","volume":"22","author":"Chang","year":"2022","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.iot.2026.101902_bib0076","series-title":"2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)","first-page":"1082","article-title":"SoK: Rethinking sensor spoofing attacks against robotic vehicles from a systematic view","author":"Xu","year":"2023"},{"key":"10.1016\/j.iot.2026.101902_bib0077","article-title":"Adversarial examples: a survey of attacks and defenses in deep learning-enabled cybersecurity systems","author":"Macas","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.iot.2026.101902_bib0078","series-title":"2023 3rd International Conference on Artificial Intelligence (ICAI)","first-page":"95","article-title":"Adversarial attacks on aerial imagery: the state-of-the-art and perspective","author":"Kazmi","year":"2023"},{"key":"10.1016\/j.iot.2026.101902_bib0079","unstructured":"I.J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing adversarial examples, arXiv: 1412.6572(2014)."},{"issue":"22","key":"10.1016\/j.iot.2026.101902_bib0080","doi-asserted-by":"crossref","first-page":"22399","DOI":"10.1109\/JIOT.2021.3111024","article-title":"Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles","volume":"9","author":"Tian","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.iot.2026.101902_bib0081","series-title":"2024 IEEE International Conference on Robotics and Biomimetics (ROBIO)","first-page":"420","article-title":"Real-Time detection of white and black box adversarial attacks on deep reinforcement learning UAV guidance","author":"Hickling","year":"2024"},{"key":"10.1016\/j.iot.2026.101902_bib0082","series-title":"2024 Silicon Valley Cybersecurity Conference (SVCC)","first-page":"1","article-title":"The impact of model variations on the robustness of deep learning models in adversarial settings","author":"Juraev","year":"2024"},{"issue":"10","key":"10.1016\/j.iot.2026.101902_bib0083","doi-asserted-by":"crossref","first-page":"591","DOI":"10.3390\/drones8100591","article-title":"Efficient ensemble adversarial attack for a deep neural network (DNN)-Based unmanned aerial vehicle (UAV) vision system","volume":"8","author":"Zhang","year":"2024","journal-title":"Drones"},{"key":"10.1016\/j.iot.2026.101902_bib0084","series-title":"2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P)","first-page":"78","article-title":"Deghost: unmasking phantom intrusions in autonomous recognition systems","author":"Oyama","year":"2024"},{"key":"10.1016\/j.iot.2026.101902_bib0085","article-title":"Adversarial machine learning in IoT from an insider point of view","volume":"70","author":"Aloraini","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.iot.2026.101902_bib0086","series-title":"2019 International Conference on Unmanned Aircraft Systems (ICUAS)","first-page":"1316","article-title":"Compromising flight paths of autopiloted drones","author":"Chen","year":"2019"},{"key":"10.1016\/j.iot.2026.101902_bib0087","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11416-011-0158-4","article-title":"ARDrone Corruption","volume":"8","author":"Deligne","year":"2012","journal-title":"J. Comput. Virol."},{"key":"10.1016\/j.iot.2026.101902_bib0088","series-title":"Proceedings of the 8th International Conference on Cyber-physical Systems","first-page":"143","article-title":"Virtualdrone: virtual sensing, actuation, and communication for attack-resilient unmanned aerial systems","author":"Yoon","year":"2017"},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0089","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1109\/TDSC.2022.3144319","article-title":"DPM: Towards accurate drone position manipulation","volume":"20","author":"Chen","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.iot.2026.101902_bib0090","unstructured":"S. Kamkar, SkyJack: autonomous drone hacking, 2013, (URL: https:\/\/samy.pl\/skyjack\/)."},{"key":"10.1016\/j.iot.2026.101902_bib0091","unstructured":"T.H. News, MalDrone: new backdoor malware targeting drones, 2015, (URL: https:\/\/thehackernews.com\/2015\/01\/MalDrone-backdoor-drone-malware.html)."},{"key":"10.1016\/j.iot.2026.101902_bib0092","doi-asserted-by":"crossref","first-page":"112858","DOI":"10.1109\/ACCESS.2022.3215975","article-title":"Security threats and mitigation techniques in UAV communications: a comprehensive survey","volume":"10","author":"Pandey","year":"2022","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.iot.2026.101902_bib0093","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/MWC.2016.1600073WC","article-title":"Communication security of unmanned aerial vehicles","volume":"24","author":"He","year":"2016","journal-title":"IEEE Wireless Commun."},{"key":"10.1016\/j.iot.2026.101902_bib0094","series-title":"MILCOM 2016-2016 IEEE Military Communications Conference","first-page":"1213","article-title":"Securing commercial WiFi-based UAVs from common security attacks","author":"Hooper","year":"2016"},{"key":"10.1016\/j.iot.2026.101902_bib0095","series-title":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","first-page":"1222","article-title":"A container-based DoS attack-resilient control framework for real-time UAV systems","author":"Chen","year":"2019"},{"key":"10.1016\/j.iot.2026.101902_bib0096","doi-asserted-by":"crossref","first-page":"43203","DOI":"10.1109\/ACCESS.2018.2863237","article-title":"Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles","volume":"6","author":"Kwon","year":"2018","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.iot.2026.101902_bib0097","doi-asserted-by":"crossref","first-page":"2802","DOI":"10.1109\/COMST.2021.3097916","article-title":"Fast, reliable, and secure drone communication: a comprehensive survey","volume":"23","author":"Hassija","year":"2021","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.iot.2026.101902_bib0098","series-title":"Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014","first-page":"168","article-title":"Hacking and securing the AR. drone 2.0 quadcopter: investigations for improving the security of a toy","volume":"9030","author":"Pleban","year":"2014"},{"issue":"3","key":"10.1016\/j.iot.2026.101902_bib0099","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1177\/1548512915617252","article-title":"Security of unmanned aerial vehicle systems against cyber-physical attacks","volume":"13","author":"Rani","year":"2016","journal-title":"J. Defense Model. Simul."},{"key":"10.1016\/j.iot.2026.101902_bib0100","series-title":"2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS)","first-page":"1","article-title":"Drone hacking with raspberry-pi 3 and wifi pineapple: security and privacy threats for the internet-of-things","author":"Westerlund","year":"2019"},{"key":"10.1016\/j.iot.2026.101902_bib0101","series-title":"2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS)","first-page":"319","article-title":"Towards secure wireless mesh networks for UAV swarm connectivity: current threats, research, and opportunities","author":"Lopez","year":"2021"},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0102","doi-asserted-by":"crossref","first-page":"2010","DOI":"10.1109\/JSYST.2018.2882769","article-title":"Keeping UAVs under control during GPS jamming","volume":"13","author":"Van den Bergh","year":"2018","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.iot.2026.101902_bib0103","series-title":"Proceedings of the 10th USENIX Conference on Offensive Technologies","first-page":"221","article-title":"Controlling UAVs with sensor input spoofing attacks","author":"Davidson","year":"2016"},{"key":"10.1016\/j.iot.2026.101902_bib0104","series-title":"3rd USENIX Symposium on Vehicle Security and Privacy (VehicleSec 25)","first-page":"45","article-title":"Confusense: sensor reconfiguration attacks for stealthy UAV manipulation","author":"Erba","year":"2025"},{"issue":"21","key":"10.1016\/j.iot.2026.101902_bib0105","doi-asserted-by":"crossref","first-page":"5298","DOI":"10.3390\/rs14215298","article-title":"Adversarial patch attack on multi-scale object detection for uav remote sensing images","volume":"14","author":"Zhang","year":"2022","journal-title":"Remote Sens."},{"key":"10.1016\/j.iot.2026.101902_bib0106","unstructured":"A. Chakraborty, M. Alam, V. Dey, A. Chattopadhyay, D. Mukhopadhyay, Adversarial attacks and defences: a survey, arXiv: 1810.00069(2018)."},{"key":"10.1016\/j.iot.2026.101902_bib0107","series-title":"Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23\u201327, 2013, Proceedings, Part III 13","first-page":"387","article-title":"Evasion attacks against machine learning at test time","author":"Biggio","year":"2013"},{"key":"10.1016\/j.iot.2026.101902_bib0108","series-title":"2022 IEEE 27th Pacific Rim International Symposium on Dependable Computing (PRDC)","first-page":"194","article-title":"Are UAVs\u2019 flight controller software reliable?","author":"Khan","year":"2022"},{"key":"10.1016\/j.iot.2026.101902_bib0109","series-title":"Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy","first-page":"1","article-title":"Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems","author":"Watkins","year":"2018"},{"key":"10.1016\/j.iot.2026.101902_bib0110","doi-asserted-by":"crossref","first-page":"87658","DOI":"10.1109\/ACCESS.2019.2924410","article-title":"Micro air vehicle link (mavlink) in a nutshell: a survey","volume":"7","author":"Koub\u00e2a","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.iot.2026.101902_bib0111","series-title":"2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)","first-page":"661","article-title":"Blur the eyes of uav: effective attacks on uav-based infrastructure inspection","author":"Raja","year":"2021"},{"key":"10.1016\/j.iot.2026.101902_bib0112","series-title":"3rd USENIX Symposium on Vehicle Security and Privacy (VehicleSec 25)","first-page":"63","article-title":"{WIP}: Hijacking attacks on {UAV}{Follow-Me} systems in realistic scenarios","author":"Li","year":"2025"},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0113","doi-asserted-by":"crossref","first-page":"2144","DOI":"10.1109\/TITS.2021.3136304","article-title":"Lightweight trustworthy message exchange in unmanned aerial vehicle networks","volume":"24","author":"Liu","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.iot.2026.101902_bib0114","doi-asserted-by":"crossref","first-page":"40913","DOI":"10.1109\/ACCESS.2019.2907962","article-title":"UAV Relay flight path planning in the presence of jamming signal","volume":"7","author":"Mah","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.iot.2026.101902_bib0115","series-title":"2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)","first-page":"89","article-title":"Spatial retreat of net-drones under communication failure","author":"Kang","year":"2016"},{"key":"10.1016\/j.iot.2026.101902_bib0116","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.comnet.2018.03.011","article-title":"Distributed adaptive beam nulling to survive against jamming in 3d uav mesh networks","volume":"137","author":"Bhunia","year":"2018","journal-title":"Comput. Networks"},{"key":"10.1016\/j.iot.2026.101902_bib0117","doi-asserted-by":"crossref","first-page":"5337","DOI":"10.1109\/OJCOMS.2024.3451288","article-title":"Leveraging transformer models for anti-jamming in heavily attacked UAV environments","volume":"5","author":"Elleuch","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"10","key":"10.1016\/j.iot.2026.101902_bib0118","doi-asserted-by":"crossref","first-page":"2355","DOI":"10.1109\/LCOMM.2022.3193309","article-title":"Reinforcement learning-based dynamic anti-jamming power control in UAV networks: an effective jamming signal strength based approach","volume":"26","author":"Ma","year":"2022","journal-title":"IEEE Commun. Lett."},{"issue":"3","key":"10.1016\/j.iot.2026.101902_bib0119","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3763788","article-title":"Escorting the confidentiality and integrity of UAVs: what exactly can trusted execution environment offer?","volume":"58","author":"Dong","year":"2025","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"10.1016\/j.iot.2026.101902_bib0120","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","article-title":"Adversarial attacks and defenses in deep learning","volume":"6","author":"Ren","year":"2020","journal-title":"Engineering"},{"key":"10.1016\/j.iot.2026.101902_bib0121","unstructured":"F. Tram\u00e8r, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, P. McDaniel, Ensemble adversarial training: attacks and defenses, arXiv: 1705.07204(2017)."},{"key":"10.1016\/j.iot.2026.101902_bib0122","unstructured":"Y. Burda, H. Edwards, A. Storkey, O. Klimov, Exploration by random network distillation, arXiv: 1810.12894(2018)."},{"key":"10.1016\/j.iot.2026.101902_bib0123","series-title":"2016 IEEE European Symposium on Security and Privacy (EuroS&P)","first-page":"372","article-title":"The limitations of deep learning in adversarial settings","author":"Papernot","year":"2016"},{"issue":"4","key":"10.1016\/j.iot.2026.101902_bib0124","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1007\/s11431-022-2213-8","article-title":"A survey of unmanned aerial vehicle flight data anomaly detection: technologies, applications, and future directions","volume":"66","author":"Yang","year":"2023","journal-title":"Sci. China Technol. Sci."},{"key":"10.1016\/j.iot.2026.101902_bib0125","series-title":"2019 International Conference on Computer, Information and Telecommunication Systems (CITS)","first-page":"1","article-title":"Detecting signal spoofing and jamming attacks in UAV networks using a lightweight IDS","author":"Arthur","year":"2019"},{"key":"10.1016\/j.iot.2026.101902_bib0126","series-title":"2023 International Conference on Unmanned Aircraft Systems (ICUAS)","first-page":"812","article-title":"Anomaly-based intrusion detection system for in-Flight and network security in UAV swarm","author":"Da Silva","year":"2023"},{"key":"10.1016\/j.iot.2026.101902_bib0127","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10846-015-0284-1","article-title":"Unmanned aerial vehicle security using recursive parameter estimation","volume":"84","author":"Birnbaum","year":"2016","journal-title":"J. Intell. Rob. Syst."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0128","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/LRA.2018.2883408","article-title":"There\u2019s no place like home: visual teach and repeat for emergency return of multirotor UAVs during GPS failure","volume":"4","author":"Warren","year":"2018","journal-title":"IEEE Rob. Autom. Lett."},{"key":"10.1016\/j.iot.2026.101902_bib0129","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.109729","article-title":"A return-to-home unmanned aerial vehicle navigation solution in global positioning system denied environments via bidirectional long short-term memory reverse flightpath prediction","volume":"140","author":"Alkhatib","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.iot.2026.101902_bib0130","series-title":"2018 IEEE International Congress on Internet of Things (ICIOT)","first-page":"57","article-title":"Detecting poisoning attacks on machine learning in IoT environments","author":"Baracaldo","year":"2018"},{"key":"10.1016\/j.iot.2026.101902_bib0131","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.107784","article-title":"Artificial intelligence for intrusion detection systems in unmanned aerial vehicles","volume":"99","author":"Whelan","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.iot.2026.101902_bib0132","doi-asserted-by":"crossref","first-page":"4925","DOI":"10.1109\/ACCESS.2024.3349469","article-title":"A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication","volume":"12","author":"Cengiz","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.iot.2026.101902_bib0133","series-title":"Information Security Applications: 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26\u201328, 2020, Revised Selected Papers 21","first-page":"45","article-title":"Unsupervised intrusion detection system for unmanned aerial vehicle with less labeling effort","author":"Park","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0134","series-title":"2017 First IEEE International Conference on Robotic Computing (IRC)","first-page":"393","article-title":"Security authentication system using encrypted channel on UAV network","author":"Yoon","year":"2017"},{"issue":"17","key":"10.1016\/j.iot.2026.101902_bib0135","doi-asserted-by":"crossref","first-page":"3688","DOI":"10.3390\/electronics12173688","article-title":"A symmetric key and elliptic curve cryptography-based protocol for message encryption in unmanned aerial vehicles","volume":"12","author":"Nyangaresi","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.iot.2026.101902_bib0136","series-title":"2019 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED UAS)","first-page":"237","article-title":"Securing UAV communications using ROS with custom ECIES-based method","author":"Fernandez","year":"2019"},{"key":"10.1016\/j.iot.2026.101902_bib0137","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.comcom.2020.11.009","article-title":"A provably secure authentication scheme for RFID-enabled UAV applications","volume":"166","author":"Gope","year":"2021","journal-title":"Comput. Commun."},{"key":"10.1016\/j.iot.2026.101902_bib0138","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/OJVT.2023.3295208","article-title":"Blockchain-assisted UAV communication systems: a comprehensive survey","volume":"4","author":"Hafeez","year":"2023","journal-title":"IEEE Open J. Veh. Technol."},{"issue":"7","key":"10.1016\/j.iot.2026.101902_bib0139","doi-asserted-by":"crossref","first-page":"11324","DOI":"10.1109\/TVT.2025.3548281","article-title":"ACBFT: Adaptive chained byzantine fault-tolerant consensus protocol for UAV ad hoc networks","volume":"74","author":"Wang","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"10.1016\/j.iot.2026.101902_bib0140","doi-asserted-by":"crossref","first-page":"3639","DOI":"10.1109\/COMST.2019.2922584","article-title":"Intrusion detection systems: a cross-domain overview","volume":"21","author":"Tidjon","year":"2019","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"5","key":"10.1016\/j.iot.2026.101902_bib0141","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/TSMC.2013.2265083","article-title":"Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications","volume":"44","author":"Mitchell","year":"2013","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"10","key":"10.1016\/j.iot.2026.101902_bib0142","article-title":"Unknown network attack detection based on open-set recognition and active learning in drone network","volume":"33","author":"Zhang","year":"2022","journal-title":"Trans. Emerging Telecommun. Technol."},{"issue":"10","key":"10.1016\/j.iot.2026.101902_bib0143","doi-asserted-by":"crossref","first-page":"4381","DOI":"10.1109\/TIV.2023.3296227","article-title":"Robust adversarial attacks detection based on explainable deep reinforcement learning for UAV guidance and planning","volume":"8","author":"Hickling","year":"2023","journal-title":"IEEE Trans. Intell. Veh."},{"issue":"13s","key":"10.1016\/j.iot.2026.101902_bib0144","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3585385","article-title":"Wild patterns reloaded: a survey of machine learning security against training data poisoning","volume":"55","author":"Cin\u00e0","year":"2023","journal-title":"ACM Comput. Surv."},{"issue":"23","key":"10.1016\/j.iot.2026.101902_bib0145","doi-asserted-by":"crossref","first-page":"23379","DOI":"10.1109\/JIOT.2022.3206276","article-title":"Adversarial attacks and defenses toward ai-assisted uav infrastructure inspection","volume":"9","author":"Raja","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.iot.2026.101902_bib0146","unstructured":"D. Kong, S. Liang, W. Ren, Environmental matching attack against unmanned aerial vehicles object detection, arXiv: 2405.07595(2024)."},{"key":"10.1016\/j.iot.2026.101902_bib0147","series-title":"2018 IEEE International Conference on Robotics and Automation (ICRA)","first-page":"550","article-title":"Cross-layer retrofitting of UAVs against cyber-physical attacks","author":"Fei","year":"2018"},{"key":"10.1016\/j.iot.2026.101902_bib0148","doi-asserted-by":"crossref","DOI":"10.1016\/j.ast.2021.107212","article-title":"An enhanced UAV safety control scheme against attacks on desired trajectory","volume":"119","author":"Gu","year":"2021","journal-title":"Aerosp. Sci. Technol."},{"issue":"6","key":"10.1016\/j.iot.2026.101902_bib0149","doi-asserted-by":"crossref","first-page":"2057","DOI":"10.3390\/s21062057","article-title":"Drone secure communication protocol for future sensitive applications in military zone","volume":"21","author":"Ko","year":"2021","journal-title":"Sensors"},{"key":"10.1016\/j.iot.2026.101902_bib0150","series-title":"2024 International Wireless Communications and Mobile Computing (IWCMC)","first-page":"768","article-title":"MavSec: a safer version of MavLink","author":"Mai","year":"2024"},{"key":"10.1016\/j.iot.2026.101902_bib0151","series-title":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","first-page":"621","article-title":"MAVSec: Securing the MAVLink protocol for ardupilot\/PX4 unmanned aerial systems","author":"Allouch","year":"2019"},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0152","article-title":"A secure communication protocol for unmanned aerial vehicles","volume":"70","author":"Khan","year":"2021","journal-title":"Comput. Mater. Continua"},{"key":"10.1016\/j.iot.2026.101902_bib0153","series-title":"2020 IEEE 23rd International Conference on Computational Science and Engineering (CSE)","first-page":"92","article-title":"Lightweight digital signature solution to defend micro aerial vehicles against man-in-the-middle attack","author":"Li","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0154","article-title":"A survey on cryptographic methods to secure communications for UAV traffic management","volume":"44","author":"Aissaoui","year":"2023","journal-title":"Veh. Commun."},{"issue":"7","key":"10.1016\/j.iot.2026.101902_bib0155","doi-asserted-by":"crossref","first-page":"9609","DOI":"10.1007\/s11227-023-05811-1","article-title":"An approach to enhance the security of unmanned aerial vehicles (UAVs)","volume":"80","author":"Sabuwala","year":"2024","journal-title":"J. Supercomput."},{"key":"10.1016\/j.iot.2026.101902_bib0156","series-title":"Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use","first-page":"29","article-title":"A security framework for a drone delivery service","author":"Seo","year":"2016"},{"key":"10.1016\/j.iot.2026.101902_bib0157","series-title":"MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM)","first-page":"1","article-title":"Dronecrypt-an efficient cryptographic framework for small aerial drones","author":"Ozmen","year":"2018"},{"key":"10.1016\/j.iot.2026.101902_bib0158","doi-asserted-by":"crossref","first-page":"53769","DOI":"10.1109\/ACCESS.2021.3070683","article-title":"A lightweight authentication protocol for UAV networks based on security and computational resource optimization","volume":"9","author":"Lei","year":"2021","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.iot.2026.101902_bib0159","doi-asserted-by":"crossref","first-page":"6903","DOI":"10.1109\/TVT.2019.2911672","article-title":"TCALAS: Temporal credential-based anonymous lightweight authentication scheme for internet of drones environment","volume":"68","author":"Srinivas","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.iot.2026.101902_bib0160","series-title":"2020 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)","first-page":"1","article-title":"Lightweight authentication protocol for unmanned aerial vehicles using physical unclonable function and chaotic system","author":"Pu","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0161","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1109\/TIFS.2025.3527814","article-title":"DroneaudioID: a lightweight acoustic fingerprint-Based drone authentication system for secure drone delivery","volume":"20","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0162","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/TCOMM.2019.2947918","article-title":"Anti-intelligent UAV jamming strategy via deep Q-networks","volume":"68","author":"Gao","year":"2019","journal-title":"IEEE Trans. Commun."},{"issue":"7","key":"10.1016\/j.iot.2026.101902_bib0163","doi-asserted-by":"crossref","first-page":"205","DOI":"10.3390\/fi14070205","article-title":"Securing the smart city airspace: drone cyber attack detection through machine learning","volume":"14","author":"Baig","year":"2022","journal-title":"Future Internet"},{"issue":"13","key":"10.1016\/j.iot.2026.101902_bib0164","doi-asserted-by":"crossref","first-page":"10885","DOI":"10.1007\/s00521-022-07015-9","article-title":"High-performance intrusion detection system for networked UAVs via deep learning","volume":"34","author":"Abu Al-Haija","year":"2022","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0165","doi-asserted-by":"crossref","first-page":"46","DOI":"10.3390\/drones9010046","article-title":"Enhanced intrusion detection in drone networks: a cross-layer convolutional attention approach for drone-to-drone and drone-to-base station communications","volume":"9","author":"Aldossary","year":"2025","journal-title":"Drones"},{"issue":"26","key":"10.1016\/j.iot.2026.101902_bib0166","doi-asserted-by":"crossref","first-page":"30951","DOI":"10.1007\/s11042-024-20410-9","article-title":"READS: Resource efficient attack detection system for drones","volume":"84","author":"Vishnu","year":"2025","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.iot.2026.101902_bib0167","doi-asserted-by":"crossref","first-page":"2913","DOI":"10.1109\/TIFS.2023.3272862","article-title":"ETD: An efficient time delay attack detection framework for UAV networks","volume":"18","author":"Zhai","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"10.1016\/j.iot.2026.101902_bib0168","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1109\/TSMC.2017.2681698","article-title":"A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks","volume":"48","author":"Sedjelmaci","year":"2017","journal-title":"IEEE Trans. Syst. Man, and Cybern. Syst."},{"key":"10.1016\/j.iot.2026.101902_bib0169","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2018.09.004","article-title":"Network intrusion detection system for UAV ad-hoc communication: from methodology design to real test validation","volume":"90","author":"Condomines","year":"2019","journal-title":"Ad Hoc Netw."},{"issue":"29","key":"10.1016\/j.iot.2026.101902_bib0170","doi-asserted-by":"crossref","first-page":"18009","DOI":"10.1007\/s00521-024-10306-y","article-title":"Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs)","volume":"36","author":"AL-Syouf","year":"2024","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0171","first-page":"6","article-title":"Drone forensic analysis using open source tools","volume":"13","author":"Azhar","year":"2018","journal-title":"J. Digital Forensics, Secur. Law"},{"key":"10.1016\/j.iot.2026.101902_bib0172","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.diin.2019.07.002","article-title":"A comprehensive micro unmanned aerial vehicle (UAV\/drone) forensic framework","volume":"30","author":"Renduchintala","year":"2019","journal-title":"Digital Invest."},{"key":"10.1016\/j.iot.2026.101902_bib0173","series-title":"2020 Ieee International Conference on Robotics and Automation (Icra)","first-page":"5255","article-title":"On-board deep-learning-based unmanned aerial vehicle fault cause detection and identification","author":"Sadhu","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0174","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.diin.2015.11.002","article-title":"Unmanned aerial vehicles: a preliminary analysis of forensic challenges","volume":"16","author":"Horsman","year":"2016","journal-title":"Digital Invest."},{"key":"10.1016\/j.iot.2026.101902_bib0175","series-title":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","first-page":"1","article-title":"Unsupervised machine learning for drone forensics through flight path analysis","author":"Syed","year":"2022"},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0176","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TDSC.2018.2874243","article-title":"Detecting adversarial image examples in deep neural networks with adaptive noise reduction","volume":"18","author":"Liang","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"12","key":"10.1016\/j.iot.2026.101902_bib0177","doi-asserted-by":"crossref","first-page":"3157","DOI":"10.3390\/rs15123157","article-title":"Defending against poisoning attacks in aerial image semantic segmentation with robust invariant feature enhancement","volume":"15","author":"Wang","year":"2023","journal-title":"Remote Sens."},{"issue":"12","key":"10.1016\/j.iot.2026.101902_bib0178","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MC.2024.3461841","article-title":"AI Robustness against attacks in city-scale autonomous drone deployments","volume":"57","author":"Ottun","year":"2024","journal-title":"Computer"},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0179","doi-asserted-by":"crossref","first-page":"2163","DOI":"10.1109\/TCE.2024.3448541","article-title":"Adversarial label-Flipping attack and defense for anomaly detection in spatial crowdsourcing UAV services","volume":"71","author":"Akram","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.iot.2026.101902_bib0180","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102555","article-title":"Security of target recognition for UAV forestry remote sensing based on multi-source data fusion transformer framework","volume":"112","author":"Feng","year":"2024","journal-title":"Inf. Fusion"},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0181","article-title":"A comprehensive security and performance assessment of UAV authentication schemes","volume":"7","author":"Mekdad","year":"2024","journal-title":"Secur. Priv."},{"issue":"5","key":"10.1016\/j.iot.2026.101902_bib0182","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/TII.2021.3101651","article-title":"A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems","volume":"18","author":"Khan","year":"2021","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"12","key":"10.1016\/j.iot.2026.101902_bib0183","doi-asserted-by":"crossref","first-page":"10061","DOI":"10.1109\/JIOT.2021.3118079","article-title":"Energy-efficient and secure communication toward UAV networks","volume":"9","author":"Li","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.iot.2026.101902_bib0184","series-title":"2023 IEEE 28th Pacific Rim International Symposium on Dependable Computing (PRDC)","first-page":"217","article-title":"A machine learning driven fault tolerance mechanism for UAVs\u2019 flight controller","author":"Khan","year":"2023"},{"key":"10.1016\/j.iot.2026.101902_bib0185","series-title":"International Conference on Guidance, Navigation and Control","first-page":"4754","article-title":"Intrusion detection for unmanned aerial systems: a survey","author":"Di","year":"2022"},{"key":"10.1016\/j.iot.2026.101902_bib0186","series-title":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","first-page":"560","article-title":"Intrusion detection systems for networked unmanned aerial vehicles: a survey","author":"Choudhary","year":"2018"},{"key":"10.1016\/j.iot.2026.101902_bib0187","series-title":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","first-page":"1","article-title":"Detection of GPS spoofing attacks on unmanned aerial systems","author":"Manesh","year":"2019"},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0188","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/LWC.2019.2945022","article-title":"Detection of eavesdropping attack in UAV-aided wireless systems: unsupervised learning with one-class SVM and k-means clustering","volume":"9","author":"Hoang","year":"2019","journal-title":"IEEE Wireless Commun. Lett."},{"key":"10.1016\/j.iot.2026.101902_bib0189","article-title":"An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks","volume":"26","author":"Fotohi","year":"2020","journal-title":"Veh. Commun."},{"key":"10.1016\/j.iot.2026.101902_bib0190","doi-asserted-by":"crossref","first-page":"3412","DOI":"10.1109\/TIFS.2021.3080522","article-title":"De-Pois: an attack-agnostic defense against data poisoning attacks","volume":"16","author":"Chen","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.iot.2026.101902_bib0191","first-page":"116","article-title":"Applications of unmanned aerial vehicle (UAV) in road safety, traffic and highway infrastructure management: recent advances and challenges","volume":"141","author":"Outay","year":"2020","journal-title":"Transp. Res. Part A: Pol. Pract."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0192","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/TCST.2025.3598255","article-title":"QUADFormer: learning-based detection of cyber attacks in quadrotor UAVs","volume":"34","author":"Wang","year":"2026","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"4","key":"10.1016\/j.iot.2026.101902_bib0193","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/IOTM.001.2100045","article-title":"GaRuDa: a blockchain-based delivery scheme using drones for healthcare 5.0 applications","volume":"4","author":"Gupta","year":"2021","journal-title":"IEEE Internet of Things Mag."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0194","doi-asserted-by":"crossref","DOI":"10.1049\/ise2\/9637334","article-title":"Enhanced cybersecurity framework for unmanned aerial systems: a comprehensive STRIDE-model analysis and emerging defense strategies","volume":"2025","author":"Xi","year":"2025","journal-title":"IET Inf. Secur."},{"issue":"1","key":"10.1016\/j.iot.2026.101902_bib0195","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MPRV.2017.11","article-title":"Help from the sky: leveraging UAVs for disaster management","volume":"16","author":"Erdelj","year":"2017","journal-title":"IEEE Pervasive Comput."},{"key":"10.1016\/j.iot.2026.101902_bib0196","series-title":"IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","first-page":"835","article-title":"Wildfire monitoring in remote areas using autonomous unmanned aerial vehicles","author":"Afghah","year":"2019"},{"key":"10.1016\/j.iot.2026.101902_bib0197","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.ijdrr.2018.02.020","article-title":"A drone fleet model for last-mile distribution in disaster relief operations","volume":"28","author":"Rabta","year":"2018","journal-title":"Int. J. Disaster Risk Reduct."},{"key":"10.1016\/j.iot.2026.101902_bib0198","unstructured":"U. Vision, China\u2019s national day drone show ends in disaster, 2025, (URL: https:\/\/www.uasvision.com\/2025\/10\/06\/chinas-national-day-drone-show-in-quanzhou-ends-in-disaster\/)."},{"issue":"2","key":"10.1016\/j.iot.2026.101902_bib0199","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/MRA.2024.3433171","article-title":"Survey of simulators for aerial robots: an overview and in-Depth systematic comparisons [Survey]","volume":"32","author":"Dimmig","year":"2024","journal-title":"IEEE Rob. Autom. Mag."},{"key":"10.1016\/j.iot.2026.101902_bib0200","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.simpat.2019.01.004","article-title":"Application specific drone simulators: recent advances and challenges","volume":"94","author":"Mairaj","year":"2019","journal-title":"Simul. Modell. Pract. Theory"},{"key":"10.1016\/j.iot.2026.101902_bib0201","series-title":"2021 Ieee International Conference on Electro Information Technology (Eit)","first-page":"335","article-title":"Simulation testbeds and frameworks for UAV performance evaluation","author":"Gill","year":"2021"},{"key":"10.1016\/j.iot.2026.101902_bib0202","series-title":"2021 IEEE Symposium Series on Computational Intelligence (SSCI)","first-page":"01","article-title":"Efficient detection of gps spoofing attacks on unmanned aerial vehicles using deep learning","author":"Agyapong","year":"2021"},{"key":"10.1016\/j.iot.2026.101902_bib0203","series-title":"2022 IEEE 7th International Conference on Intelligent Transportation Engineering (ICITE)","first-page":"214","article-title":"UAVDome-safe UAV transportation","author":"Horovitz","year":"2022"},{"key":"10.1016\/j.iot.2026.101902_bib0204","series-title":"2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)","first-page":"382","article-title":"Intelligent detection algorithm against UAVs\u2019 GPS spoofing attack","author":"Wang","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0205","series-title":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","first-page":"1","article-title":"Vulnerabilities assessment for unmanned aerial vehicles communication systems","author":"Chaari","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0206","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/5517500","article-title":"An approach of linear regression-based UAV GPS spoofing detection","volume":"2021","author":"Meng","year":"2021","journal-title":"Wireless Commun. Mobile Comput."},{"key":"10.1016\/j.iot.2026.101902_bib0207","unstructured":"G.D. Team, Gazebo simulator, 2024, (URL: https:\/\/gazebosim.org\/features)."},{"key":"10.1016\/j.iot.2026.101902_bib0208","series-title":"2004 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)(IEEE Cat. No. 04CH37566)","first-page":"2149","article-title":"Design and use paradigms for gazebo, an open-source multi-robot simulator","volume":"3","author":"Koenig","year":"2004"},{"key":"10.1016\/j.iot.2026.101902_bib0209","series-title":"Proceedings of the 25Th International Conference on Distributed Computing and Networking","first-page":"394","article-title":"Integration of ROS and gazebo platform using MAVLINK protocol for real-time UAV applications","author":"Jha","year":"2024"},{"key":"10.1016\/j.iot.2026.101902_bib0210","series-title":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","first-page":"44","article-title":"Simulation of sensor spoofing attacks on unmanned aerial vehicles using the gazebo simulator","author":"Pekaric","year":"2022"},{"key":"10.1016\/j.iot.2026.101902_bib0211","unstructured":"P.A.D. Team, AirSim Integration with PX4, 2024, (URL: https:\/\/docs.px4.io\/main\/en\/simulation\/airsim.html)."},{"key":"10.1016\/j.iot.2026.101902_bib0212","series-title":"Field and Service Robotics: Results of the 11Th International Conference","first-page":"621","article-title":"Airsim: high-fidelity visual and physical simulation for autonomous vehicles","author":"Shah","year":"2018"},{"key":"10.1016\/j.iot.2026.101902_bib0213","series-title":"2024 7th Iberian Robotics Conference (ROBOT)","first-page":"1","article-title":"Realistic unmanned aerial vehicle simulation: a comprehensive approach","author":"Tejero-Ruiz","year":"2024"},{"key":"10.1016\/j.iot.2026.101902_bib0214","doi-asserted-by":"crossref","first-page":"23309","DOI":"10.1109\/ACCESS.2023.3253788","article-title":"AirLoop: a simulation framework for testing of UAV services","volume":"11","author":"Giovagnola","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.iot.2026.101902_bib0215","series-title":"2020 6th International Conference on Control, Automation and Robotics (ICCAR)","first-page":"486","article-title":"A new simulation environment based on airsim, ROS, and PX4 for quadcopter aircrafts","author":"Ma","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0216","unstructured":"M.D. Team, MathWorks UAV toolbox documentation, 2024, (URL: https:\/\/uk.mathworks.com\/products\/uav.html)."},{"issue":"17","key":"10.1016\/j.iot.2026.101902_bib0217","doi-asserted-by":"crossref","first-page":"7359","DOI":"10.3390\/s23177359","article-title":"Designing UAV swarm experiments: a simulator selection and experiment design process","volume":"23","author":"Phadke","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.iot.2026.101902_bib0218","series-title":"2020 5th International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)","first-page":"70","article-title":"Control simulation and anti-jamming verification of quadrotor UAV based on matlab","author":"Chen","year":"2020"},{"key":"10.1016\/j.iot.2026.101902_bib0219","unstructured":"F.D. Team, FlightGear - an open source flight simulator, 2024a, (URL: https:\/\/www.flightgear.org\/about\/features\/a)."},{"key":"10.1016\/j.iot.2026.101902_bib0220","unstructured":"P.D. Team, PX4 JMAVSim, 2024b, (URL: https:\/\/docs.px4.io\/main\/en\/sim_jmavsim\/b)."},{"key":"10.1016\/j.iot.2026.101902_bib0221","unstructured":"Q.D. Team, QGroundControl, 2024c, (URL: http:\/\/qgroundcontrol.com\/c)."},{"issue":"7","key":"10.1016\/j.iot.2026.101902_bib0222","doi-asserted-by":"crossref","first-page":"2339","DOI":"10.3390\/s18072339","article-title":"Extending QGroundcontrol for automated mission planning of UAVs","volume":"18","author":"Ramirez-Atencia","year":"2018","journal-title":"Sensors"},{"key":"10.1016\/j.iot.2026.101902_bib0223","unstructured":"A.D. Team, ArduPilot mission planner, 2024a, (URL: https:\/\/ardupilot.org\/planner\/a)."},{"key":"10.1016\/j.iot.2026.101902_bib0224","unstructured":"A.D. Team, MAVProxy, 2024b, (URL: https:\/\/ardupilot.org\/mavproxy\/b)."},{"key":"10.1016\/j.iot.2026.101902_bib0225","unstructured":"A.D. Team, ArduPilot - open-source UAV autopilot software, 2024c, (URL: https:\/\/ardupilot.org\/ardupilot\/index.htmlc)."},{"key":"10.1016\/j.iot.2026.101902_bib0226","doi-asserted-by":"crossref","DOI":"10.1016\/j.ast.2021.107052","article-title":"Explainable deep reinforcement learning for UAV autonomous path planning","volume":"118","author":"He","year":"2021","journal-title":"Aerosp. Sci. Technol."},{"key":"10.1016\/j.iot.2026.101902_bib0227","series-title":"Design and Implementation of a Model Predictive Control on a Pixhawk Flight Controller","author":"Amadi","year":"2018"},{"key":"10.1016\/j.iot.2026.101902_bib0228","series-title":"2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","first-page":"1","article-title":"Enhanced intrusion detection system for multiclass classification in UAV networks","author":"Menssouri","year":"2024"}],"container-title":["Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2542660526000326?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2542660526000326?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T01:25:13Z","timestamp":1774056313000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660526000326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":228,"alternative-id":["S2542660526000326"],"URL":"https:\/\/doi.org\/10.1016\/j.iot.2026.101902","relation":{},"ISSN":["2542-6605"],"issn-type":[{"value":"2542-6605","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Toward secure complex UAV cyber-physical systems: A unified threat taxonomy and cross-layer survey of cybersecurity challenges","name":"articletitle","label":"Article Title"},{"value":"Internet of Things","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.iot.2026.101902","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"101902"}}