{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:48:58Z","timestamp":1773013738382,"version":"3.50.1"},"reference-count":56,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T00:00:00Z","timestamp":1754870400000},"content-version":"vor","delay-in-days":222,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2024JC-YBQN-0620"],"award-info":[{"award-number":["2024JC-YBQN-0620"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns. Unmanned aerial systems (UAS) networks are characterized by high node mobility, unstable links, open communication environments, and limited platform resources, which in turn exhibit typical vulnerabilities in terms of cybersecurity. Most current studies on UAV cybersecurity issues tend to focus on individual UAVs, often neglecting the holistic cybersecurity of UAS. This paper outlines the composition of UAS network architecture. It summarizes the main cybersecurity challenges UAS faces within six categories\u2014spoofing, tampering, information disclosure, denial of service (DoS), service refusal, and privilege escalation\u2014based on the STRIDE threat model. Corresponding methods for risk mitigation and security protection strategies are proposed. Ultimately, the paper provides a perspective on the future development directions of UAS cybersecurity, aiming to offer a reference for addressing related issues in subsequent research and practice.<\/jats:p>","DOI":"10.1049\/ise2\/9637334","type":"journal-article","created":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T04:51:15Z","timestamp":1754974275000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE\u2010Model Analysis and Emerging Defense Strategies"],"prefix":"10.1049","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9118-2842","authenticated-orcid":false,"given":"Hailong","family":"Xi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4711-3991","authenticated-orcid":false,"given":"Le","family":"Ru","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1485-7465","authenticated-orcid":false,"given":"Jiwei","family":"Tian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9129-8553","authenticated-orcid":false,"given":"Bo","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1678-166X","authenticated-orcid":false,"given":"Shiguang","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4250-8405","authenticated-orcid":false,"given":"Wenfei","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6715-4392","authenticated-orcid":false,"given":"Hongqiao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9174-5335","authenticated-orcid":false,"given":"Xiaohui","family":"Luan","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2025,8,11]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7524168"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.09.018"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1360\/SSI-2022-0338"},{"key":"e_1_2_10_4_2","unstructured":"PatelT. SalotN. andParikhV. A Systematic Literature Review on Security of Unmanned Aerial Vehicle Systems 2022 (arXiv)."},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3124996"},{"key":"e_1_2_10_6_2","unstructured":"BestK. L. SchmidJ. andTierneyS. et al.How to Analyze the Cyber Threat From Drones 2020 Rand Arroyo Center Santa Monica CA."},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3313573"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107451"},{"key":"e_1_2_10_9_2","doi-asserted-by":"crossref","unstructured":"NaikN. JenkinsP. GraceP. NaikD. PrajapatS. andSongJ. A Comparative Analysis of Threat Modelling Methods: STRIDE DREAD VAST PASTA OCTAVE and LINDDUN The International Conference on Computing Communication Cybersecurity & AI 2024 Springer 271\u2013280.","DOI":"10.1007\/978-3-031-74443-3_16"},{"key":"e_1_2_10_10_2","doi-asserted-by":"crossref","unstructured":"Sa\u00dfnickO. RosenstatterT. Sch\u00e4ferC. andHuberS. STRIDE-Based Methodologies for Threat Modeling of Industrial Control Systems: A Review 2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS) 2024 IEEE 1\u20138.","DOI":"10.1109\/ICPS59941.2024.10639949"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.507"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88518-4_5"},{"key":"e_1_2_10_13_2","first-page":"37","article-title":"The Uav Ground Control Station: Types, Components, Safety, Redundancy, and Future Applications","volume":"4","author":"Arnold K. P.","year":"2016","journal-title":"International Journal of Unmanned Systems Engineering"},{"key":"e_1_2_10_14_2","first-page":"505","article-title":"Research Advance and Application Prospect of Unmanned Aerial Vehicle Remote Sensing System","volume":"39","author":"Deren L. I.","year":"2014","journal-title":"Geomatics and Information Science of Wuhan University"},{"key":"e_1_2_10_15_2","unstructured":"AnningC. Research on Navigation System Based Sensor Fusion for Unmanned Scale Helicopter 2006 Chinese Doctoral Dissertations & Master\u2019s Theses Full-text Database (Master)."},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854712"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863237"},{"key":"e_1_2_10_18_2","first-page":"99","article-title":"Application of STANAG-4586 Ed., 4 Based Standardization for up-to-Dated Interoperability of Military UAV System","volume":"24","author":"Kim H.-J.","year":"2019","journal-title":"Journal of the Korea Society of Computer and Information"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18113995"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864419"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2020.1846307"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8889122"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463315001010"},{"key":"e_1_2_10_24_2","first-page":"44","article-title":"Development Status of Deception Jamming Technology to UAV Satellite Navigation","volume":"46","author":"Yi M.","year":"2023","journal-title":"Shipboard Electronic Countermeasure"},{"key":"e_1_2_10_25_2","first-page":"35","article-title":"Feasibility Analysis on US Military Tests Massive GPS Jamming Weapon Over California","volume":"41","author":"Wan Y.","year":"2016","journal-title":"GNSS World of China"},{"key":"e_1_2_10_26_2","doi-asserted-by":"crossref","unstructured":"ShijithN. PoornachandranP. SujadeviV. andDharmanaM. M. Spoofing Technique to Counterfeit the GPS Receiver on a Drone 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy) 2017 IEEE 1\u20133.","DOI":"10.1109\/TAPENERGY.2017.8397268"},{"key":"e_1_2_10_27_2","first-page":"79","article-title":"Research on Power Control Strategy of GNSS Repeater Deception Jamming","volume":"12","author":"Shi P.","year":"2021","journal-title":"Modern Navigation"},{"key":"e_1_2_10_28_2","first-page":"147","article-title":"Time-Delay Control and Application Strategy Analysis of Repeater Deception Jamming to GPS Receiver","volume":"39","author":"Mao H.","year":"2019","journal-title":"Journal of Projectiles, Rockets, Missiles and Guidance"},{"key":"e_1_2_10_29_2","doi-asserted-by":"crossref","unstructured":"CoulonM. ChaboryA. Garcia-PenaA. andVezinetJ. Characterization of Meaconing and Its Impact on GNSS Receivers Proceedings of the 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation 2020 ION 3713\u20133737.","DOI":"10.33012\/2020.17713"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.001"},{"key":"e_1_2_10_31_2","unstructured":"HumphreysT. E. LedvinaB. M. andPsiakiM. L. et al.Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation 2008 2325 ION."},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3033060"},{"key":"e_1_2_10_33_2","doi-asserted-by":"crossref","unstructured":"SunS. MaZ. LiuL. GaoH. andPengJ. Detection of Malicious Nodes in Drone Ad-Hoc Network Based on Supervised Learning and Clustering Algorithms 2020 16th International Conference on Mobility Sensing and Networking (MSN) 2020 IEEE 145\u2013152.","DOI":"10.1109\/MSN50589.2020.00037"},{"key":"e_1_2_10_34_2","doi-asserted-by":"crossref","unstructured":"SunQ. RaoA. A. YaoX. YuB. andHuS. Counteracting Adversarial Attacks in Autonomous Driving Proceedings of the 39th International Conference on Computer-Aided Design 2020 IEEE 1\u20137.","DOI":"10.1145\/3400302.3415758"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3111024"},{"key":"e_1_2_10_36_2","first-page":"213","article-title":"Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network","volume":"57","author":"Wang Y.","year":"2024","journal-title":"Advanced Engineering Sciences"},{"key":"e_1_2_10_37_2","unstructured":"MengW. Research and Implementation on the Non-Repudiation of SM9 Digital Signature Based on Homomorphic Encryption 2021 Chinese Master\u2019s Theses Full-text Database."},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.023"},{"key":"e_1_2_10_39_2","doi-asserted-by":"crossref","unstructured":"KumarR. AljuhaniA. KumarP. KumarA. FranklinA. andJolfaeiA. Blockchain-Enabled Secure Communication for Unmanned Aerial Vehicle (UAV) Networks Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond 2022 ACM.","DOI":"10.1145\/3555661.3560861"},{"key":"e_1_2_10_40_2","first-page":"35","article-title":"Proactive Eavesdropping in UAV-Aided Suspicious Relay Systems","volume":"39","author":"Haiquan L. U.","year":"2019","journal-title":"Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition)"},{"key":"e_1_2_10_41_2","unstructured":"SanghaviP.andKaurH. A Comprehensive Study on Cyber Security in Unmanned Aerial Vehicles 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom) IEEE 804\u2013811."},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2984797"},{"key":"e_1_2_10_43_2","unstructured":"NetEase \u2018the United States Does Not even Spare Its Allies: It Sells F-35s for Military Data Theft 2019 https:\/\/www.163.com\/dy\/article\/EASO7UAS05357MRE.html."},{"key":"e_1_2_10_44_2","unstructured":"YuanH. Watch Out! Us\u2019 Sour Fox \u2019launches Cyberattack on China 2022 Global Timeshttps:\/\/doi.org\/10.28378\/n.cnki.nhqsb.2022.005508."},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.003"},{"key":"e_1_2_10_46_2","first-page":"498","article-title":"Location Privacy Protection Scheme for Unmanned Aerial Vehicle Group Based on Matrix Encryption","volume":"43","author":"Xing L.","year":"2022","journal-title":"Acta Aeronautica et Astronautica Sinica"},{"key":"e_1_2_10_47_2","unstructured":"DuT. Research on Lightweight Authentication Method of Unmanned Aerial Vehicle Against GPS Spoofing 2023 Chinese Master\u2019s Theses Full-Text Database."},{"key":"e_1_2_10_48_2","first-page":"83","article-title":"Current Status and Prospect of Quantum Communication on Space-Based Platforms","volume":"44","author":"Zheng D.","year":"2023","journal-title":"Chinese Journal of Scientific Instrument"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2100068"},{"key":"e_1_2_10_50_2","doi-asserted-by":"crossref","unstructured":"ManeshM. R. KenneyJ. HuW. C. DevabhaktuniV. K. andKaabouchN. Detection of GPS Spoofing Attacks on Unmanned Aerial Systems 2019 16th IEEE Annual Consumer Communications & Networking Conference 2019 1\u20136.","DOI":"10.1109\/CCNC.2019.8651804"},{"key":"e_1_2_10_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1800594"},{"key":"e_1_2_10_52_2","first-page":"665","article-title":"A Survey on Intrusion Detection and Trust System in FANETs","volume":"69","author":"Xueru D. U.","year":"2023","journal-title":"Journal of Wuhan University (Natural Science Edition)"},{"key":"e_1_2_10_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3015862"},{"key":"e_1_2_10_54_2","doi-asserted-by":"crossref","unstructured":"DeyS. Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory: A Proof of Work 2018 10th Computer Science and Electronic Engineering (CEEC) 2018 IEEE 7\u201310.","DOI":"10.1109\/CEEC.2018.8674185"},{"key":"e_1_2_10_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2688328"},{"key":"e_1_2_10_56_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.09.021"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/9637334","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/ise2\/9637334","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/9637334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:33:57Z","timestamp":1773009237000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ise2\/9637334"}},"subtitle":[],"editor":[{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/ise2\/9637334"],"URL":"https:\/\/doi.org\/10.1049\/ise2\/9637334","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-09-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9637334"}}