{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:58:16Z","timestamp":1776113896048,"version":"3.50.1"},"reference-count":81,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T00:00:00Z","timestamp":1478649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2017,4,30]]},"abstract":"<jats:p>The market for civilian unmanned aerial vehicles, also known as drones, is expanding rapidly as new applications are emerging to incorporate the use of civilian drones in our daily lives. On one hand, the convenience of offering certain services via drones is attractive. On the other hand, the mere operation of these airborne machines, which rely heavily on their cyber capabilities, poses great threats to people and property. Also, while the Federal Aviation Administration NextGen project aims to integrate civilian drones into the national airspace, the regulation is still a work-in-progress and does not cope with their threats. This article surveys the main security, privacy, and safety aspects associated with the use of civilian drones in the national airspace. In particular, we identify both the physical and cyber threats of such systems and discuss the security properties required by their critical operation environment. We also identify the research challenges and possible future directions in the fields of civilian drone security, safety, and privacy. Based on our investigation, we forecast that security will be a central enabling technology for the next generation of civilian unmanned aerial vehicles.<\/jats:p>","DOI":"10.1145\/3001836","type":"journal-article","created":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T15:19:26Z","timestamp":1486135166000},"page":"1-25","source":"Crossref","is-referenced-by-count":378,"title":["Security, Privacy, and Safety Aspects of Civilian Drones"],"prefix":"10.1145","volume":"1","author":[{"given":"Riham","family":"Altawy","sequence":"first","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, Qu\u00e9bec, Canada"}]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, Qu\u00e9bec, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,11,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Michal Addady. 2015. The number of drones expected to sell during the holiday seasons is caring the government. Retrieved from http:\/\/fortune.com\/2015\/09\/29\/drones-holiday-sales\/.  Michal Addady. 2015. The number of drones expected to sell during the holiday seasons is caring the government. Retrieved from http:\/\/fortune.com\/2015\/09\/29\/drones-holiday-sales\/."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521727"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"e_1_2_1_4_1","unstructured":"Amazon. 2015. Amazon revising the airspace model for the safe integration of small Unmanned Aircraft Systems. Retrieved from http:\/\/utm.arc.nasa.gov\/docs\/Amazon_RevisingtheAirspaceModelfortheSafeIntegrationofUAS{6}.pdf.  Amazon. 2015. Amazon revising the airspace model for the safe integration of small Unmanned Aircraft Systems. Retrieved from http:\/\/utm.arc.nasa.gov\/docs\/Amazon_RevisingtheAirspaceModelfortheSafeIntegrationofUAS{6}.pdf."},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","volume-title":"Sense and Avoid in UAS: Research and Applications","author":"Angelov Plamen","DOI":"10.1002\/9781119964049"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.12.004"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647096.716997"},{"key":"e_1_2_1_8_1","unstructured":"Bench.crypto. 2016. Computers used for benchmarking cryptographic systems. Retrieved from https:\/\/bench.cr.yp.to\/computers.html.  Bench.crypto. 2016. Computers used for benchmarking cryptographic systems. Retrieved from https:\/\/bench.cr.yp.to\/computers.html."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/M-RA.2007.914931"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2014.6842314"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2015.7152425"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43933-3_4"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.orbis.2014.11.007"},{"key":"e_1_2_1_14_1","unstructured":"David A. Brown Geoffrey Cooper Ian Gilvarry Anand Rajan Alan Tatourian Ramnath Venugopalan David Wheeler and Meiyuan Zhao. 2015. Automotive security best practices. Retrieved from www.mcafee.com\/ca\/resources\/white...\/wp-automotive-security.pdf.  David A. Brown Geoffrey Cooper Ian Gilvarry Anand Rajan Alan Tatourian Ramnath Venugopalan David Wheeler and Meiyuan Zhao. 2015. Automotive security best practices. Retrieved from www.mcafee.com\/ca\/resources\/white...\/wp-automotive-security.pdf."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1142\/S2301385014300017"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the IEEE\/AIAA 32nd Digital Avionics Systems Conference. 4A4--1--4A4--14","author":"Casals Silvia Gil","year":"2013"},{"key":"e_1_2_1_18_1","first-page":"1","article-title":"Development of a safe CPS component: The hybrid parachute, a remote termination add-on improving safety of UAS","volume":"2016","author":"Ciarletta Laurent","year":"2016","journal-title":"Embedded Real-Time Software and Systems."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2014.03.002"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2008.4702757"},{"key":"e_1_2_1_21_1","unstructured":"Carol Cratty. 2013. FBI uses drones for surveillance in U.S. Retrieved from http:\/\/www.cnn.com\/2013\/06\/19\/politics\/fbi-drones\/.  Carol Cratty. 2013. FBI uses drones for surveillance in U.S. Retrieved from http:\/\/www.cnn.com\/2013\/06\/19\/politics\/fbi-drones\/."},{"key":"e_1_2_1_22_1","unstructured":"Jordan Crook. 2013. Infamous hacker creates SkyJack to hunt hack and control otherdrones. Retrieved from http:\/\/techcrunch.com\/2013\/12\/04\/infamous-hacker-creates-skyjack-to-hunt-hack-and-control-other-drones\/.  Jordan Crook. 2013. Infamous hacker creates SkyJack to hunt hack and control otherdrones. Retrieved from http:\/\/techcrunch.com\/2013\/12\/04\/infamous-hacker-creates-skyjack-to-hunt-hack-and-control-other-drones\/."},{"key":"e_1_2_1_23_1","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"Daemen Joan"},{"key":"e_1_2_1_24_1","unstructured":"Sacco de Vries. 2005. UAV and Control Delays. Retrieved from http:\/\/oai.dtic.mil\/oai\/oai?verb&equals;getRecord8metadataPrefix&equals;html8identifier&equals;ADA454251.  Sacco de Vries. 2005. UAV and Control Delays. Retrieved from http:\/\/oai.dtic.mil\/oai\/oai?verb&equals;getRecord8metadataPrefix&equals;html8identifier&equals;ADA454251."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0158-4"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00587-9_3"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2015.2461196"},{"key":"e_1_2_1_29_1","unstructured":"Noam Eshel. 2015. A mini UAV becomes a suicide drone. Retrieved from http:\/\/aviationweek.com\/paris-air-show-2015\/mini-uav-becomes-suicide-drone-0.  Noam Eshel. 2015. A mini UAV becomes a suicide drone. Retrieved from http:\/\/aviationweek.com\/paris-air-show-2015\/mini-uav-becomes-suicide-drone-0."},{"key":"e_1_2_1_30_1","unstructured":"FAA.gov. 2015. Next Generation Air Transportation System (NextGen). Retrieved from https:\/\/www.faa.gov\/nextgen\/.  FAA.gov. 2015. Next Generation Air Transportation System (NextGen). Retrieved from https:\/\/www.faa.gov\/nextgen\/."},{"key":"e_1_2_1_31_1","unstructured":"FAA.gov. 2016. FAA special airworthiness certificate. Retrieved from https:\/\/www.faa.gov\/aircraft\/air_cert\/airworthiness_certification\/sp_awcert\/.  FAA.gov. 2016. FAA special airworthiness certificate. Retrieved from https:\/\/www.faa.gov\/aircraft\/air_cert\/airworthiness_certification\/sp_awcert\/."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2013.6549509"},{"key":"e_1_2_1_33_1","unstructured":"Stephen George. 2015. FAA Unmanned Aircraft Systems (UAS): cyber security initiatives. (2015). Retrieved from http:\/\/csrc.nist.gov\/groups\/SMA\/ispab\/documents\/minutes\/2015-02\/2015-feb_george-ispab.pdf.  Stephen George. 2015. FAA Unmanned Aircraft Systems (UAS): cyber security initiatives. (2015). Retrieved from http:\/\/csrc.nist.gov\/groups\/SMA\/ispab\/documents\/minutes\/2015-02\/2015-feb_george-ispab.pdf."},{"key":"e_1_2_1_34_1","unstructured":"Kim Gittleson. 2014. Data-stealing Snoopy drone unveiled at Black Hat - BBC News. Retrieved from http:\/\/www.bbc.com\/news\/technology-26762198.  Kim Gittleson. 2014. Data-stealing Snoopy drone unveiled at Black Hat - BBC News. Retrieved from http:\/\/www.bbc.com\/news\/technology-26762198."},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1109\/JSYST.2013.2257594","article-title":"Intrusion detection in cyber-physical systems: Techniques and challenges","volume":"8","author":"Han Song","year":"2014","journal-title":"IEEE Syst. J."},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 5th International Conference on Cyber Conflict. IEEE, 1--23","author":"Hartmann Klaus","year":"2013"},{"key":"e_1_2_1_37_1","unstructured":"Kelly Hodgkins. 2015. Anti-drone shoulder rifle lets police take control of UAVs with radio pulses. (2015). Retrieved from http:\/\/www.digitaltrends.com\/cool-tech\/battle-innovations-anti-drone-gun\/.  Kelly Hodgkins. 2015. Anti-drone shoulder rifle lets police take control of UAVs with radio pulses. (2015). Retrieved from http:\/\/www.digitaltrends.com\/cool-tech\/battle-innovations-anti-drone-gun\/."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.11.002"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322503"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0967-0661(02)00238-1"},{"key":"e_1_2_1_42_1","volume-title":"Digital Forensics and Incident Response Summit","author":"Kovar David","year":"2015","edition":"1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21975-7_16"},{"key":"e_1_2_1_44_1","unstructured":"Legal Information Institute. 2016. Fourth Amendment. Retrieved from https:\/\/www.law.cornell.edu\/wex\/fourth_amendment.  Legal Information Institute. 2016. Fourth Amendment. Retrieved from https:\/\/www.law.cornell.edu\/wex\/fourth_amendment."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.05.003"},{"key":"e_1_2_1_46_1","unstructured":"Sharon Lozano. 2016. First steps toward drone traffic management. Retrieved from http:\/\/www.nasa.gov\/feature\/ames\/first-steps-toward-drone-traffic-management.  Sharon Lozano. 2016. First steps toward drone traffic management. Retrieved from http:\/\/www.nasa.gov\/feature\/ames\/first-steps-toward-drone-traffic-management."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699093"},{"key":"e_1_2_1_48_1","volume-title":"Introduction to Unmanned Aircraft Systems","author":"Marshall Douglas M."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.001"},{"key":"e_1_2_1_50_1","unstructured":"Nils Melzer. 2013. Human Rights Implications of the Usage of Drones and Unmanned Robots in Warfare. European Parliament\u2019s Subcommittee on Human Rights.  Nils Melzer. 2013. Human Rights Implications of the Usage of Drones and Unmanned Robots in Warfare. European Parliament\u2019s Subcommittee on Human Rights."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the 1st Workshop on Secure Control Systems.","author":"Mo Yilin","year":"2010"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2014.6842265"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the ICAO RPAS Symposium.","author":"Moormann Dieter","year":"2015"},{"key":"e_1_2_1_56_1","unstructured":"NASA. 2013. NASA - Helios. Retrieved from http:\/\/www.nasa.gov\/centers\/dryden\/news\/ResearchUpdate\/Helios\/.  NASA. 2013. NASA - Helios. Retrieved from http:\/\/www.nasa.gov\/centers\/dryden\/news\/ResearchUpdate\/Helios\/."},{"key":"e_1_2_1_57_1","unstructured":"BBC News. 2014. Pentagon to use drones to create remote wi-fi hotspots. Retrieved from http:\/\/www.bbc.com\/news\/technology-27019389.  BBC News. 2014. Pentagon to use drones to create remote wi-fi hotspots. Retrieved from http:\/\/www.bbc.com\/news\/technology-27019389."},{"key":"e_1_2_1_58_1","unstructured":"NoFlyZone. 2016. NoFlyZone.org. Retrieved from https:\/\/www.noflyzone.org\/about.  NoFlyZone. 2016. NoFlyZone.org. Retrieved from https:\/\/www.noflyzone.org\/about."},{"key":"e_1_2_1_59_1","unstructured":"Pierluigi Paganini. 2015a. A hacker developed Maldrone the first malware for drones. Retrieved from http:\/\/securityaffairs.co\/wordpress\/32767\/hacking\/maldrone-malware-for-drones.html.  Pierluigi Paganini. 2015a. A hacker developed Maldrone the first malware for drones. Retrieved from http:\/\/securityaffairs.co\/wordpress\/32767\/hacking\/maldrone-malware-for-drones.html."},{"key":"e_1_2_1_60_1","unstructured":"Pierluigi Paganini. 2015b. ZigBee-sniffing drone used to map online Internet of Things. Retrieved from http:\/\/securityaffairs.co\/wordpress\/39143\/security\/drone-internet-of-things.html.  Pierluigi Paganini. 2015b. ZigBee-sniffing drone used to map online Internet of Things. Retrieved from http:\/\/securityaffairs.co\/wordpress\/39143\/security\/drone-internet-of-things.html."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1466046606060224"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies. 28--36","author":"Reed Theodore","year":"2011"},{"key":"e_1_2_1_63_1","unstructured":"J. E. Reich. 2015. Guards are battling contraband-smuggling drones at US prisons. Retrieved from http:\/\/www.techtimes.com\/articles\/104020\/20151106\/drones-prisons-guards.htm.  J. E. Reich. 2015. Guards are battling contraband-smuggling drones at US prisons. Retrieved from http:\/\/www.techtimes.com\/articles\/104020\/20151106\/drones-prisons-guards.htm."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.007"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2425676.2425678"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2162209"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the Institute of Navigation GNSS Meeting","volume":"3","author":"Shepard Daniel P."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831199"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_2_1_70_1","unstructured":"T. U. Delft. 2014. TU Delft\u2019s ambulance drone drastically increases chances of survival of cardiac arrest patients. Retrieved from http:\/\/www.tudelft.nl\/en\/current\/latest-news\/article\/detail\/ambulance-drone-tu-delft-vergroot-overlevingskans-bij-hartstilstand-drastisch\/.  T. U. Delft. 2014. TU Delft\u2019s ambulance drone drastically increases chances of survival of cardiac arrest patients. Retrieved from http:\/\/www.tudelft.nl\/en\/current\/latest-news\/article\/detail\/ambulance-drone-tu-delft-vergroot-overlevingskans-bij-hartstilstand-drastisch\/."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26096-9_9"},{"key":"e_1_2_1_72_1","unstructured":"Nick Valencia and Michael Martinez. 2015. Drone carrying drugs crashes south of U.S. border. (2015). Retrieved from http:\/\/www.cnn.com\/2015\/01\/22\/world\/drug-drone-crashes-us-mexico-border\/.  Nick Valencia and Michael Martinez. 2015. Drone carrying drugs crashes south of U.S. border. (2015). Retrieved from http:\/\/www.cnn.com\/2015\/01\/22\/world\/drug-drone-crashes-us-mexico-border\/."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2302875"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1108\/09574090810895988"},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the Institute of Navigation GNSS Meeting. 13--16","author":"Wen Hengqing","year":"2005"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1113-54"},{"key":"e_1_2_1_78_1","unstructured":"Martyn Williams. 2015. NEC\u2019s surveillance system will detect track drones. (2015). Retrieved from http:\/\/www.pcworld.com\/article\/2990525\/necs-surveillance-system-will-detect-track-drones.html.  Martyn Williams. 2015. NEC\u2019s surveillance system will detect track drones. (2015). Retrieved from http:\/\/www.pcworld.com\/article\/2990525\/necs-surveillance-system-will-detect-track-drones.html."},{"key":"e_1_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Marko Wolf. 2009. Security Engineering for Vehicular IT Systems. Vieweg+Teubner Research.   Marko Wolf. 2009. Security Engineering for Vehicular IT Systems. Vieweg+Teubner Research.","DOI":"10.1007\/978-3-8348-9581-3"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714616"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010023"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCIS.2010.189"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3001836","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3001836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:07Z","timestamp":1750218607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3001836"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2016,11,9]]},"references-count":81,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4,30]]}},"alternative-id":["10.1145\/3001836"],"URL":"https:\/\/doi.org\/10.1145\/3001836","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,9]]}}}