Ioannis Anagnostis’s research while affiliated with University of Piraeus and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Understanding and Securing the Risks of Unmanned Aerial Vehicle Services
  • Article
  • Full-text available

January 2025

·

67 Reads

·

1 Citation

IEEE Access

Ioannis Anagnostis

·

·

Unmanned Aerial Vehicles (UAV), are rapidly advancing across various sectors. However, this growth is accompanied by escalating security risks, as UAV become prime targets for sophisticated cyber and physical attacks. Although several surveys on UAV security exist in the literature, there is a lack of a practical guide to assist stakeholders in assessing and mitigating security risks in diverse UAV application sectors. Motivated by this gap, the main contribution of this tutorial is to describe a hands-on security assessment methodology for UAV services, by integrating fundamental background knowledge of UAV technology with actionable security strategies. The methodology is based on established standards, combining risk assessment with penetration testing. The goal is to assist practitioners and stakeholders of UAV services in understanding threat modeling, vulnerability analysis, and targeted risk mitigation. Initially, the underlying UAV technologies, architectures, and applications are presented. Then, a taxonomy of security attacks and countermeasures for UAV is provided. Based on the presented UAV characteristics and security needs, a practical step-by-step security assessment methodology for UAV services is presented. To demonstrate the practicality of the presented methodology, it is applied to a real-world-inspired scenario, showcasing its effectiveness in identifying attack vectors, assessing risks, and deploying countermeasures.

Download

Fig. 1. Illustration of paper organization and structure
Fig. 2. a) Multi-Rotor Drones, b) Fixed-Wing Drones, c) Single-Rotor Drones, d) Fixed-Wing Hybrid VTOL [17]
Fig. 3. Modules for UAV operations and control
Fig. 4. UAV communication modes: (a) UAV-GCS, (b) UAV-Satellite, (c) UAV-UAV, (d) UAV-Cellular communication
Fig. 6. A taxonomy of attacks against UAV

+8

Understanding and Securing Unmanned Aerial Vehicle (UAV) Services: A Comprehensive Tutorial

March 2024

·

785 Reads

·

4 Citations

Citations (2)


... In military research, attention has been directed toward covert reconnaissance, electronic warfare, and autonomous strike capabilities. These studies often highlight cybersecurity concerns, redundancy in control systems, and communication resilience under adversarial conditions [24]. Moreover, the integration of swarm technologies and cooperative UAV-UGV missions has emerged as a novel direction in recent years, bringing forward the challenge of real-time coordination and distributed control [25]. ...

Reference:

Prioritizing Design Criteria for Unmanned Helicopter Systems under Uncertainty using Fuzzy Best Worst Method Approach
Understanding and Securing the Risks of Unmanned Aerial Vehicle Services

IEEE Access