Research on security protection of unmanned aerial vehicle systems based on zero trust
In recent years, unmanned aerial vehicles (UAVs) have been widely used in the military and civilian fields, especially since the Russia-Ukraine conflict, their advantages of low cost and strong functions are particularly prominent and have played a huge role. However, the usage environment of drones...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
National Computer System Engineering Research Institute of China
2025-04-01
|
| Series: | Dianzi Jishu Yingyong |
| Subjects: | |
| Online Access: | http://www.chinaaet.com/article/3000171292 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850157303247929344 |
|---|---|
| author | Ji Shengkai Yang Zhiming Zhao Jiankun Li Bin Huang Yilong |
| author_facet | Ji Shengkai Yang Zhiming Zhao Jiankun Li Bin Huang Yilong |
| author_sort | Ji Shengkai |
| collection | DOAJ |
| description | In recent years, unmanned aerial vehicles (UAVs) have been widely used in the military and civilian fields, especially since the Russia-Ukraine conflict, their advantages of low cost and strong functions are particularly prominent and have played a huge role. However, the usage environment of drones is complex and often uncontrollable, facing more serious security threats such as drone hijacking, network attacks, wireless communication interference, malicious access, and data theft. In response to these risks, traditional security measures such as wireless network security and data encryption are currently mainly adopted in drone systems. The zero trust architecture, as a new security model, emphasizes dynamic trust and provides new ideas for the security protection of unmanned aerial vehicle systems. This paper researches on zero trust security protection architecture, combined with typical applications of unmanned aerial vehicle systems, analyzes the security risks faced by unmanned aerial vehicle measurement and control, data transmission, and proposes a zero trust based unmanned aerial vehicle system security protection architecture to address these risks. It designs implementation solutions for zero trust technology in unmanned aerial vehicle measurement and control, data communication, and typical scenarios, providing strong support for the specific implementation of zero trust architecture in military and civilian unmanned aerial vehicle systems. |
| format | Article |
| id | doaj-art-ea4468169c62430eaeecdbf0e2f68221 |
| institution | OA Journals |
| issn | 0258-7998 |
| language | zho |
| publishDate | 2025-04-01 |
| publisher | National Computer System Engineering Research Institute of China |
| record_format | Article |
| series | Dianzi Jishu Yingyong |
| spelling | doaj-art-ea4468169c62430eaeecdbf0e2f682212025-08-20T02:24:13ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982025-04-01514606510.16157/j.issn.0258-7998.2454263000171292Research on security protection of unmanned aerial vehicle systems based on zero trustJi Shengkai0Yang Zhiming1Zhao Jiankun2Li Bin3Huang Yilong4The 6th Research Institute of China Electronics CorporationThe 6th Research Institute of China Electronics CorporationThe 6th Research Institute of China Electronics CorporationThe 6th Research Institute of China Electronics CorporationThe 6th Research Institute of China Electronics CorporationIn recent years, unmanned aerial vehicles (UAVs) have been widely used in the military and civilian fields, especially since the Russia-Ukraine conflict, their advantages of low cost and strong functions are particularly prominent and have played a huge role. However, the usage environment of drones is complex and often uncontrollable, facing more serious security threats such as drone hijacking, network attacks, wireless communication interference, malicious access, and data theft. In response to these risks, traditional security measures such as wireless network security and data encryption are currently mainly adopted in drone systems. The zero trust architecture, as a new security model, emphasizes dynamic trust and provides new ideas for the security protection of unmanned aerial vehicle systems. This paper researches on zero trust security protection architecture, combined with typical applications of unmanned aerial vehicle systems, analyzes the security risks faced by unmanned aerial vehicle measurement and control, data transmission, and proposes a zero trust based unmanned aerial vehicle system security protection architecture to address these risks. It designs implementation solutions for zero trust technology in unmanned aerial vehicle measurement and control, data communication, and typical scenarios, providing strong support for the specific implementation of zero trust architecture in military and civilian unmanned aerial vehicle systems.http://www.chinaaet.com/article/3000171292zero trustunmanned aerial vehiclesecurity |
| spellingShingle | Ji Shengkai Yang Zhiming Zhao Jiankun Li Bin Huang Yilong Research on security protection of unmanned aerial vehicle systems based on zero trust Dianzi Jishu Yingyong zero trust unmanned aerial vehicle security |
| title | Research on security protection of unmanned aerial vehicle systems based on zero trust |
| title_full | Research on security protection of unmanned aerial vehicle systems based on zero trust |
| title_fullStr | Research on security protection of unmanned aerial vehicle systems based on zero trust |
| title_full_unstemmed | Research on security protection of unmanned aerial vehicle systems based on zero trust |
| title_short | Research on security protection of unmanned aerial vehicle systems based on zero trust |
| title_sort | research on security protection of unmanned aerial vehicle systems based on zero trust |
| topic | zero trust unmanned aerial vehicle security |
| url | http://www.chinaaet.com/article/3000171292 |
| work_keys_str_mv | AT jishengkai researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust AT yangzhiming researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust AT zhaojiankun researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust AT libin researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust AT huangyilong researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust |