Research on security protection of unmanned aerial vehicle systems based on zero trust

In recent years, unmanned aerial vehicles (UAVs) have been widely used in the military and civilian fields, especially since the Russia-Ukraine conflict, their advantages of low cost and strong functions are particularly prominent and have played a huge role. However, the usage environment of drones...

Full description

Saved in:
Bibliographic Details
Main Authors: Ji Shengkai, Yang Zhiming, Zhao Jiankun, Li Bin, Huang Yilong
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2025-04-01
Series:Dianzi Jishu Yingyong
Subjects:
Online Access:http://www.chinaaet.com/article/3000171292
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850157303247929344
author Ji Shengkai
Yang Zhiming
Zhao Jiankun
Li Bin
Huang Yilong
author_facet Ji Shengkai
Yang Zhiming
Zhao Jiankun
Li Bin
Huang Yilong
author_sort Ji Shengkai
collection DOAJ
description In recent years, unmanned aerial vehicles (UAVs) have been widely used in the military and civilian fields, especially since the Russia-Ukraine conflict, their advantages of low cost and strong functions are particularly prominent and have played a huge role. However, the usage environment of drones is complex and often uncontrollable, facing more serious security threats such as drone hijacking, network attacks, wireless communication interference, malicious access, and data theft. In response to these risks, traditional security measures such as wireless network security and data encryption are currently mainly adopted in drone systems. The zero trust architecture, as a new security model, emphasizes dynamic trust and provides new ideas for the security protection of unmanned aerial vehicle systems. This paper researches on zero trust security protection architecture, combined with typical applications of unmanned aerial vehicle systems, analyzes the security risks faced by unmanned aerial vehicle measurement and control, data transmission, and proposes a zero trust based unmanned aerial vehicle system security protection architecture to address these risks. It designs implementation solutions for zero trust technology in unmanned aerial vehicle measurement and control, data communication, and typical scenarios, providing strong support for the specific implementation of zero trust architecture in military and civilian unmanned aerial vehicle systems.
format Article
id doaj-art-ea4468169c62430eaeecdbf0e2f68221
institution OA Journals
issn 0258-7998
language zho
publishDate 2025-04-01
publisher National Computer System Engineering Research Institute of China
record_format Article
series Dianzi Jishu Yingyong
spelling doaj-art-ea4468169c62430eaeecdbf0e2f682212025-08-20T02:24:13ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982025-04-01514606510.16157/j.issn.0258-7998.2454263000171292Research on security protection of unmanned aerial vehicle systems based on zero trustJi Shengkai0Yang Zhiming1Zhao Jiankun2Li Bin3Huang Yilong4The 6th Research Institute of China Electronics CorporationThe 6th Research Institute of China Electronics CorporationThe 6th Research Institute of China Electronics CorporationThe 6th Research Institute of China Electronics CorporationThe 6th Research Institute of China Electronics CorporationIn recent years, unmanned aerial vehicles (UAVs) have been widely used in the military and civilian fields, especially since the Russia-Ukraine conflict, their advantages of low cost and strong functions are particularly prominent and have played a huge role. However, the usage environment of drones is complex and often uncontrollable, facing more serious security threats such as drone hijacking, network attacks, wireless communication interference, malicious access, and data theft. In response to these risks, traditional security measures such as wireless network security and data encryption are currently mainly adopted in drone systems. The zero trust architecture, as a new security model, emphasizes dynamic trust and provides new ideas for the security protection of unmanned aerial vehicle systems. This paper researches on zero trust security protection architecture, combined with typical applications of unmanned aerial vehicle systems, analyzes the security risks faced by unmanned aerial vehicle measurement and control, data transmission, and proposes a zero trust based unmanned aerial vehicle system security protection architecture to address these risks. It designs implementation solutions for zero trust technology in unmanned aerial vehicle measurement and control, data communication, and typical scenarios, providing strong support for the specific implementation of zero trust architecture in military and civilian unmanned aerial vehicle systems.http://www.chinaaet.com/article/3000171292zero trustunmanned aerial vehiclesecurity
spellingShingle Ji Shengkai
Yang Zhiming
Zhao Jiankun
Li Bin
Huang Yilong
Research on security protection of unmanned aerial vehicle systems based on zero trust
Dianzi Jishu Yingyong
zero trust
unmanned aerial vehicle
security
title Research on security protection of unmanned aerial vehicle systems based on zero trust
title_full Research on security protection of unmanned aerial vehicle systems based on zero trust
title_fullStr Research on security protection of unmanned aerial vehicle systems based on zero trust
title_full_unstemmed Research on security protection of unmanned aerial vehicle systems based on zero trust
title_short Research on security protection of unmanned aerial vehicle systems based on zero trust
title_sort research on security protection of unmanned aerial vehicle systems based on zero trust
topic zero trust
unmanned aerial vehicle
security
url http://www.chinaaet.com/article/3000171292
work_keys_str_mv AT jishengkai researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust
AT yangzhiming researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust
AT zhaojiankun researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust
AT libin researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust
AT huangyilong researchonsecurityprotectionofunmannedaerialvehiclesystemsbasedonzerotrust