Analyzing Security Issues of Using Drones (UAVs) in Smart Cities
VerifiedAdded on 2023/06/13
|27
|5842
|222
Report
AI Summary
This report examines the security issues associated with using drones (Unmanned Aerial Vehicles or UAVs) as base stations to provide wireless coverage in smart cities, particularly in the context of 5G technology. It discusses the potential benefits of drones in providing internet access to remote are...
Read More
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: THE SECURITY ISSUES OF USING DRONE
The Security Issues of Using Drone
Name of the Student
Name of the University
Author note
The Security Issues of Using Drone
Name of the Student
Name of the University
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

2THE SECURITY ISSUES OF USING DRONE
Table of Contents
Chapter 1: Introduction..................................................................................................5
Aims and Objectives..................................................................................................5
Primary Aim:..............................................................................................................5
Secondary aim:...........................................................................................................6
Research questions:....................................................................................................6
Scope of the study:.....................................................................................................6
Justification................................................................................................................7
Significance of the study:...........................................................................................7
Chapter 2: Literature review..........................................................................................8
Introduction:...............................................................................................................8
Previous research works:............................................................................................8
Security issues of using drone in smart cities............................................................8
Drones (UAVs) as Base Station.................................................................................9
Problem associated with Drones (UAVs)................................................................10
Future direction of using drone................................................................................13
Rules and regulations of drone (UAVs)...................................................................16
Chapter 3: Research Methodology:..............................................................................18
Introduction..................................................................................................................18
Research approach:..................................................................................................19
Data collection method:...........................................................................................20
Ethical and practical considerations.........................................................................20
Table of Contents
Chapter 1: Introduction..................................................................................................5
Aims and Objectives..................................................................................................5
Primary Aim:..............................................................................................................5
Secondary aim:...........................................................................................................6
Research questions:....................................................................................................6
Scope of the study:.....................................................................................................6
Justification................................................................................................................7
Significance of the study:...........................................................................................7
Chapter 2: Literature review..........................................................................................8
Introduction:...............................................................................................................8
Previous research works:............................................................................................8
Security issues of using drone in smart cities............................................................8
Drones (UAVs) as Base Station.................................................................................9
Problem associated with Drones (UAVs)................................................................10
Future direction of using drone................................................................................13
Rules and regulations of drone (UAVs)...................................................................16
Chapter 3: Research Methodology:..............................................................................18
Introduction..................................................................................................................18
Research approach:..................................................................................................19
Data collection method:...........................................................................................20
Ethical and practical considerations.........................................................................20

3THE SECURITY ISSUES OF USING DRONE
Chapter 4: Summery....................................................................................................20
Work plan.....................................................................................................................22
References....................................................................................................................24
Chapter 4: Summery....................................................................................................20
Work plan.....................................................................................................................22
References....................................................................................................................24

4THE SECURITY ISSUES OF USING DRONE
Abstract
An unmanned Ariel vehicle or the UAVS also known as the drone are expected to
play a major role in communication in smart cities in the near future especially in the next
generation of mobile wireless (5G). 5G expected by launch in early 2020 and drone will be
used to boost the wireless coverage and hotspot for mobile phone. As already drones
involving in many services, in surveillance, managing traffic, border monitoring, and other
security applications for example in Australia a book company called ZOOKAL already
using drones to deliver books to customers.
Google loon’s project has already conducted several trails in testing flying balloons
which provides internet connection to remote access areas for providing free access of
internet in the times of the natural disaster as humanitarian help, the results were huge
success. Similarly Facebook have also performed various testing in the Arizona desert at
United Stated, using the drone as a base station, conducting several trials testing. The aim of
the project was to offer an affordable internet connection to the unserved, and deserted areas.
Both Google and Facebook has proven that is possible to rely on drone (UAVs) to serve as
base station to provide internet services to remote access and when the infrastructure
damaged by the unexpected events or if there is no possible way of having a base station.
In this proposal specification I will provide an overview about the nature of the
project. Hence I will be conducting a lab experiment using a DJI Phantom Drone, Controller
with an Android mobile device, and Lab-Sat for GPS simulator, and Mac-Pro laptop, the aim
is to use the hacking tools for performing attacks on the drone equipped with camera flying
on the lab and to hack the drone and take full control of it. The duration of the project should
take 15 weeks to complete.
Abstract
An unmanned Ariel vehicle or the UAVS also known as the drone are expected to
play a major role in communication in smart cities in the near future especially in the next
generation of mobile wireless (5G). 5G expected by launch in early 2020 and drone will be
used to boost the wireless coverage and hotspot for mobile phone. As already drones
involving in many services, in surveillance, managing traffic, border monitoring, and other
security applications for example in Australia a book company called ZOOKAL already
using drones to deliver books to customers.
Google loon’s project has already conducted several trails in testing flying balloons
which provides internet connection to remote access areas for providing free access of
internet in the times of the natural disaster as humanitarian help, the results were huge
success. Similarly Facebook have also performed various testing in the Arizona desert at
United Stated, using the drone as a base station, conducting several trials testing. The aim of
the project was to offer an affordable internet connection to the unserved, and deserted areas.
Both Google and Facebook has proven that is possible to rely on drone (UAVs) to serve as
base station to provide internet services to remote access and when the infrastructure
damaged by the unexpected events or if there is no possible way of having a base station.
In this proposal specification I will provide an overview about the nature of the
project. Hence I will be conducting a lab experiment using a DJI Phantom Drone, Controller
with an Android mobile device, and Lab-Sat for GPS simulator, and Mac-Pro laptop, the aim
is to use the hacking tools for performing attacks on the drone equipped with camera flying
on the lab and to hack the drone and take full control of it. The duration of the project should
take 15 weeks to complete.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

5THE SECURITY ISSUES OF USING DRONE
Chapter 1: Introduction
This research is about evaluating and understanding the process of hacking a drone
using simple gadgets used from a lab and to take full control of the device using some
techniques and sitting in a lab. The paper also focuses on the importance of such drones in the
areas of natural disaster and the area where it is not possible to provide internet connection.
The paper also focuses on the concept how the use of the drones for providing internet can
help in the smart cities. Drones (UAVs) has captured an interest of many researches
especially in using drones as base station to provide a hotspot for Mobile phone and wireless
coverage in smart cities in 5G next generation wireless mobile. Google and Facebook have
performed test on drones and balloon to provide internet service for rural and remote access
areas also it covers the ideas whether the people living in a smart city will accept the use of
the drones for various purposes like the delivery of the goods and the internet. There are also
provided some of the drawbacks of the drones that can affect the normal activity of the
drones like for example hacking. Understanding the vulnerability of the drones is one of the
major concerns of the researchers in these days. This proposal shall contain the manner and
purpose of data protection, principles of data protection, superiority of data protection.
Further the importance of the use of the drones whether can help in the modern day wireless
technology is also a part of this paper. A large number of international organisations like the
Google, Facebook and other organisation s are also researching in this matter as this is one of
the major project of the future.
Aims and Objectives
The aims of this research are as follows:
Chapter 1: Introduction
This research is about evaluating and understanding the process of hacking a drone
using simple gadgets used from a lab and to take full control of the device using some
techniques and sitting in a lab. The paper also focuses on the importance of such drones in the
areas of natural disaster and the area where it is not possible to provide internet connection.
The paper also focuses on the concept how the use of the drones for providing internet can
help in the smart cities. Drones (UAVs) has captured an interest of many researches
especially in using drones as base station to provide a hotspot for Mobile phone and wireless
coverage in smart cities in 5G next generation wireless mobile. Google and Facebook have
performed test on drones and balloon to provide internet service for rural and remote access
areas also it covers the ideas whether the people living in a smart city will accept the use of
the drones for various purposes like the delivery of the goods and the internet. There are also
provided some of the drawbacks of the drones that can affect the normal activity of the
drones like for example hacking. Understanding the vulnerability of the drones is one of the
major concerns of the researchers in these days. This proposal shall contain the manner and
purpose of data protection, principles of data protection, superiority of data protection.
Further the importance of the use of the drones whether can help in the modern day wireless
technology is also a part of this paper. A large number of international organisations like the
Google, Facebook and other organisation s are also researching in this matter as this is one of
the major project of the future.
Aims and Objectives
The aims of this research are as follows:

6THE SECURITY ISSUES OF USING DRONE
Aim:
The primary aim of the research is to identify the network topology for the project. Further
the need to identify the network topology for the project is also a part if the research. The
analysis and to identify software to monitor background traffic and collect data. The
Secondary aims are to investigate the security and privacy in smart cities, to investigate the
problem associated with drones (UAVs), to identify whether drone (UAVs) could be used for
wireless coverage in future or not.
Research questions:
The following are some of the questions that will be answered in the following paper.
1. What are the advantages of the using the drones?
2. What are some of the major disadvantages of drone?
3. How drones can help in the smart cities in regular use?
Scope of the study:
The scope of this study is to get the basic knowledge of the project scope change and
the impact of the objectives in the society. The main focus is on the hacking the drone and
using it for the purpose of the hacker that is bringing out the major risks of such bots and the
how these can be mad more efficient and advanced in order to make things more secure.
Justification
This topic has been chosen because of the factor that in the modern day world the use
of the technology is one of the major factor that has been influencing many researchers for
developing new and advanced technology. The use of the drones in the modern day has not
only helped the people in accessing internet connections where it was never possible to
access like the deserts of the Arizona. The drones are proving to be one of the major
technology that is being developed but there are some of the consequences of this. The
Aim:
The primary aim of the research is to identify the network topology for the project. Further
the need to identify the network topology for the project is also a part if the research. The
analysis and to identify software to monitor background traffic and collect data. The
Secondary aims are to investigate the security and privacy in smart cities, to investigate the
problem associated with drones (UAVs), to identify whether drone (UAVs) could be used for
wireless coverage in future or not.
Research questions:
The following are some of the questions that will be answered in the following paper.
1. What are the advantages of the using the drones?
2. What are some of the major disadvantages of drone?
3. How drones can help in the smart cities in regular use?
Scope of the study:
The scope of this study is to get the basic knowledge of the project scope change and
the impact of the objectives in the society. The main focus is on the hacking the drone and
using it for the purpose of the hacker that is bringing out the major risks of such bots and the
how these can be mad more efficient and advanced in order to make things more secure.
Justification
This topic has been chosen because of the factor that in the modern day world the use
of the technology is one of the major factor that has been influencing many researchers for
developing new and advanced technology. The use of the drones in the modern day has not
only helped the people in accessing internet connections where it was never possible to
access like the deserts of the Arizona. The drones are proving to be one of the major
technology that is being developed but there are some of the consequences of this. The

7THE SECURITY ISSUES OF USING DRONE
research aims to bring out the vulnerabilities like hacking of the drones and taking the control
of the same. This type of research is not done in the past and hence will provide some of the
key outcomes for the purpose of study.
Significance of the study:
The study will help to bring out the major reasons why to use the drones for the
objectives, how can it help in the process of the making the drones more secure and
advanced. Also the study will play a major role in understanding the concept of using the
drones for the purpose of providing internet connections in the smart cities.
research aims to bring out the vulnerabilities like hacking of the drones and taking the control
of the same. This type of research is not done in the past and hence will provide some of the
key outcomes for the purpose of study.
Significance of the study:
The study will help to bring out the major reasons why to use the drones for the
objectives, how can it help in the process of the making the drones more secure and
advanced. Also the study will play a major role in understanding the concept of using the
drones for the purpose of providing internet connections in the smart cities.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8THE SECURITY ISSUES OF USING DRONE
Chapter 2: Literature review
Introduction:
In this section, the paper will explore the security issues of using drones or the UAVs
as base station to provide wireless coverage in smart cities, the vulnerability of drones, the
future direction of using Unmanned Aerial Vehicle (UAVs), and the rules & regulations.
Scholarly paper and articles will be reviewed to get the substantive ideas and findings of the
topic of project scope management.There were various researches conducted in similar area
which it can be used as back, but first we need to define the problem associated with using
drone (UAVs) in smart cities. Also this paper will include the process by which the data is
to be collected for the justifications of the claims made in this paper.
Previous research works:
IT has been observed that there are various recherché have been made for the purpose
of understanding the concept of the unmanned Ariel drones. Also there has been a substantial
amount of research have been done in order for understanding the concept of the use of the
drones for the betterment and implementation on the IOT of the smart cities. But there are
some of the major problems in the UAD’s like the hacking. According to researches done by
Edwin Vattapparamban the drones uses the Wi-Fi for the controlling purpose and
professional drones can easily be hijacked because of the fact that the signals in these systems
are not encrypted and hence does not provide any firewall against any attack. One of the
examples that is given by the Edwin Vattapparamban is the Skyjack software, using this it
one can easily access any drone in the perimeter of the software.
Security issues of using drone in smart cities
In recent year we have witnessed drone Unmanned Aerial Vehicles (UAVs) has
become widely available and very much cheaper to purchase. (Vattapparamban, E et al 2016)
Chapter 2: Literature review
Introduction:
In this section, the paper will explore the security issues of using drones or the UAVs
as base station to provide wireless coverage in smart cities, the vulnerability of drones, the
future direction of using Unmanned Aerial Vehicle (UAVs), and the rules & regulations.
Scholarly paper and articles will be reviewed to get the substantive ideas and findings of the
topic of project scope management.There were various researches conducted in similar area
which it can be used as back, but first we need to define the problem associated with using
drone (UAVs) in smart cities. Also this paper will include the process by which the data is
to be collected for the justifications of the claims made in this paper.
Previous research works:
IT has been observed that there are various recherché have been made for the purpose
of understanding the concept of the unmanned Ariel drones. Also there has been a substantial
amount of research have been done in order for understanding the concept of the use of the
drones for the betterment and implementation on the IOT of the smart cities. But there are
some of the major problems in the UAD’s like the hacking. According to researches done by
Edwin Vattapparamban the drones uses the Wi-Fi for the controlling purpose and
professional drones can easily be hijacked because of the fact that the signals in these systems
are not encrypted and hence does not provide any firewall against any attack. One of the
examples that is given by the Edwin Vattapparamban is the Skyjack software, using this it
one can easily access any drone in the perimeter of the software.
Security issues of using drone in smart cities
In recent year we have witnessed drone Unmanned Aerial Vehicles (UAVs) has
become widely available and very much cheaper to purchase. (Vattapparamban, E et al 2016)

9THE SECURITY ISSUES OF USING DRONE
Drones expected to play a major role in smart cities in future, and the drones are already
involve in many services like surveillance, providing internet, delivery process and in some
cases providing security in smart cities. However use of drones possess a threat to areas of
safety, privacy and security. As we already know that use of drones can be beneficial to smart
cities, but also can a malicious entity to either cyber or physical attacks. The increased
number of the drones in smart cities will make it harder to distinguish and identify between
legitimate drone and malicious one. Study conducted by Giray & Saint Murat Giray (2013)
on Anatomy of UAVs hijacking warning about the threat because if a successful attack on
drones’ performed it could result of obtaining vital information. According to BBC (British
Broadcasting Corporation) gangs managed to smuggled drugs, mobile phone and a prohibited
item into a prisons in several cities in UK. That also added another concern to the smart cities
inhabitants.
Drones (UAVs) as Base Station
Drones (UAVs) are expected to be dominant in the sky of smart cities to provide
various services, (Vattapparamban, E et al 2016) especially in connectivity as many of the
researches suggested that drones will serving as flying Base Station providing Mobile Hot-
Spot, and Broadband wireless access. Akarsu, A, and Girici, T (2017) with the advancement
of the technology, drones will be used as base station to improve connectivity and to support
the next generation of wireless network. As we know that drones are already in uses in
different security applications in smart cities and it would be an advantage to use drone to
cover network gaps. Several researchers focused on studying drones (UAVs) to be used as
base station in future (Khan, et al 2017, Fotouhi A 2017, Girici, T 2017) drone expected to be
flying base station in future especially in 5G (Fifth Generation of Mobile wireless
technology) to support massive connectivity.
Drones expected to play a major role in smart cities in future, and the drones are already
involve in many services like surveillance, providing internet, delivery process and in some
cases providing security in smart cities. However use of drones possess a threat to areas of
safety, privacy and security. As we already know that use of drones can be beneficial to smart
cities, but also can a malicious entity to either cyber or physical attacks. The increased
number of the drones in smart cities will make it harder to distinguish and identify between
legitimate drone and malicious one. Study conducted by Giray & Saint Murat Giray (2013)
on Anatomy of UAVs hijacking warning about the threat because if a successful attack on
drones’ performed it could result of obtaining vital information. According to BBC (British
Broadcasting Corporation) gangs managed to smuggled drugs, mobile phone and a prohibited
item into a prisons in several cities in UK. That also added another concern to the smart cities
inhabitants.
Drones (UAVs) as Base Station
Drones (UAVs) are expected to be dominant in the sky of smart cities to provide
various services, (Vattapparamban, E et al 2016) especially in connectivity as many of the
researches suggested that drones will serving as flying Base Station providing Mobile Hot-
Spot, and Broadband wireless access. Akarsu, A, and Girici, T (2017) with the advancement
of the technology, drones will be used as base station to improve connectivity and to support
the next generation of wireless network. As we know that drones are already in uses in
different security applications in smart cities and it would be an advantage to use drone to
cover network gaps. Several researchers focused on studying drones (UAVs) to be used as
base station in future (Khan, et al 2017, Fotouhi A 2017, Girici, T 2017) drone expected to be
flying base station in future especially in 5G (Fifth Generation of Mobile wireless
technology) to support massive connectivity.

10THE SECURITY ISSUES OF USING DRONE
Problem associated with Drones (UAVs)
Previously drones (UAVs) were only used by military for various task, such as
surveillance, reconnaissance, information gathering, other military purposes
(Vattapparamban, E et al 2016). With the time recently we have noticed increased number of
drones and very rapidly especially in commercial use (Williams, D 2015). The DHL
(German-Logistic-Company), and Amazon have recently lunch new method of delivery using
drone for package delivery. Currently in Australia a textbook company called ZOOKAL is
already using drones to deliver books. However, the increased number of the drones in smart
cities in future will come up with difficult challenges, especially in public safety, airspace. A
study conducted by (Wright, A 2015) the uses of drones in future will cause major concern to
public safety, cybersecurity, and privacy.
An experiment conducted by a group of researchers (Javaid, A et al 2012, Vishal, D et
al 2017) have identified various path to exploit the vulnerabilities in drones in order to take
full control, an attack can be launch from a distance to drones by software called Skyjack. It
seeks for a drones wirelessly in order to hack and take full control within the respected
distance of the Wi-Fi range and turn them into zombies. Vishal indicated that drones are
extremely harmless if, it uses properly, and it can cause catastrophic damage to airplane and
result in serious personal injury. Vishal and team performed cracking DJI SDK active attack
to Phantom Drone in order to remove authentication between drone and DJI server, which
located on the Android mobile phone. The attack was successful, it resulted in the of
changing portion of the software coding the SDK, they managed to gain root access of the
drone and took total control of it. Also they performed De-authentication attack as is shown
in Fig1 which allow them to captured background traffic without connecting to the drone.
Furthermore, they managed to successful lunch attack on drone process which it governs the
Problem associated with Drones (UAVs)
Previously drones (UAVs) were only used by military for various task, such as
surveillance, reconnaissance, information gathering, other military purposes
(Vattapparamban, E et al 2016). With the time recently we have noticed increased number of
drones and very rapidly especially in commercial use (Williams, D 2015). The DHL
(German-Logistic-Company), and Amazon have recently lunch new method of delivery using
drone for package delivery. Currently in Australia a textbook company called ZOOKAL is
already using drones to deliver books. However, the increased number of the drones in smart
cities in future will come up with difficult challenges, especially in public safety, airspace. A
study conducted by (Wright, A 2015) the uses of drones in future will cause major concern to
public safety, cybersecurity, and privacy.
An experiment conducted by a group of researchers (Javaid, A et al 2012, Vishal, D et
al 2017) have identified various path to exploit the vulnerabilities in drones in order to take
full control, an attack can be launch from a distance to drones by software called Skyjack. It
seeks for a drones wirelessly in order to hack and take full control within the respected
distance of the Wi-Fi range and turn them into zombies. Vishal indicated that drones are
extremely harmless if, it uses properly, and it can cause catastrophic damage to airplane and
result in serious personal injury. Vishal and team performed cracking DJI SDK active attack
to Phantom Drone in order to remove authentication between drone and DJI server, which
located on the Android mobile phone. The attack was successful, it resulted in the of
changing portion of the software coding the SDK, they managed to gain root access of the
drone and took total control of it. Also they performed De-authentication attack as is shown
in Fig1 which allow them to captured background traffic without connecting to the drone.
Furthermore, they managed to successful lunch attack on drone process which it governs the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

11THE SECURITY ISSUES OF USING DRONE
whole system of the flight control, by telnet command (dragon-prog) they are able to stop the
wing immediately resulting in drone fall down on the ground.
Fig1 De-authentication attack on a drone
(Source: Vattapparamban, E et al 2016).
Vishal and team performed various hacking techniques to find out the vulnerability
such as Network Mapping (Nmap) command to show number of open ports and which
services are running on the drone, also found that the drone using open WiFi IEEE 802.1AC
unencrypted to allow which make it easier to hack drone. (Giray, S, and Giray 2013) lack
of encryption on board of drones especially in GPS signal spoofing attack results in success
in losing control to malicious attackers. Giray to hack a drone is not a simple task it requires
knowledge of hacking tools; they have detailed the steps on how to exploit vulnerabilities (Al
Barghuthi et al. 2017).
whole system of the flight control, by telnet command (dragon-prog) they are able to stop the
wing immediately resulting in drone fall down on the ground.
Fig1 De-authentication attack on a drone
(Source: Vattapparamban, E et al 2016).
Vishal and team performed various hacking techniques to find out the vulnerability
such as Network Mapping (Nmap) command to show number of open ports and which
services are running on the drone, also found that the drone using open WiFi IEEE 802.1AC
unencrypted to allow which make it easier to hack drone. (Giray, S, and Giray 2013) lack
of encryption on board of drones especially in GPS signal spoofing attack results in success
in losing control to malicious attackers. Giray to hack a drone is not a simple task it requires
knowledge of hacking tools; they have detailed the steps on how to exploit vulnerabilities (Al
Barghuthi et al. 2017).

12THE SECURITY ISSUES OF USING DRONE
Fig 2 DJI phantom 3 drone equip with camera.
(Source: Amazon 2018)
The experiment conducted on a Phantom drone as it shown below on fig3 with
controller, and LabSet which is a GPS attack based on the navigation system and the lack of
encryption in civilian drone, the drone can be spoofed easily (Apvrille, Roudier and Tanzi,
2015). The labSet allow them to spoof falsify signal forcing the drone to synchronize with
attacker signal, and they able to deny legitimate signal and moved the drone from it path to
attacker direction.
Fig 2 DJI phantom 3 drone equip with camera.
(Source: Amazon 2018)
The experiment conducted on a Phantom drone as it shown below on fig3 with
controller, and LabSet which is a GPS attack based on the navigation system and the lack of
encryption in civilian drone, the drone can be spoofed easily (Apvrille, Roudier and Tanzi,
2015). The labSet allow them to spoof falsify signal forcing the drone to synchronize with
attacker signal, and they able to deny legitimate signal and moved the drone from it path to
attacker direction.

13THE SECURITY ISSUES OF USING DRONE
Fig3 Phantom Drone GPS Spoofing
(Source: Vishal et al 2017)
Vattapparamban, E et al (2016) back in 2011 Iranian forces have claimed that they
have captured an American drone (Lockheed-Martian RQ-170 Sentinel). As a consequence
President Obama had to request the Iranian forces to return it back but the Iranian official
refused to comply, according to Information Technology Institute probably a GPS Spoofing
attack have led to loss of the drone (Bor-Yaliniz and Yanikomeroglu 2016). However, the
attack on US drone succeed, because lake of encryption on the signal which enable attacker
easily to spoof. According to CNN (American Cable News Network) Iraqi Insurgent have
managed to hack a US drone by software developed by Russian Company called Sky-
Grabber and is available to download from the internet, they be able to view live video-feeds
on monitoring targets in Iraqi (Merabti, 2017). Again lack of encryption on feed link
contributed to the succession of the hacking.
Fig3 Phantom Drone GPS Spoofing
(Source: Vishal et al 2017)
Vattapparamban, E et al (2016) back in 2011 Iranian forces have claimed that they
have captured an American drone (Lockheed-Martian RQ-170 Sentinel). As a consequence
President Obama had to request the Iranian forces to return it back but the Iranian official
refused to comply, according to Information Technology Institute probably a GPS Spoofing
attack have led to loss of the drone (Bor-Yaliniz and Yanikomeroglu 2016). However, the
attack on US drone succeed, because lake of encryption on the signal which enable attacker
easily to spoof. According to CNN (American Cable News Network) Iraqi Insurgent have
managed to hack a US drone by software developed by Russian Company called Sky-
Grabber and is available to download from the internet, they be able to view live video-feeds
on monitoring targets in Iraqi (Merabti, 2017). Again lack of encryption on feed link
contributed to the succession of the hacking.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

14THE SECURITY ISSUES OF USING DRONE
Future direction of using drone
Drones or the unmanned Ariel vehicles are expected to play a major role in the
wireless coverage at the near future especially in 5G era and beyond the deployment. The
drones will help in providing internet and multipoint transmissions (Sekander, S, Tabassum,
H and Hossain, E 2018). In the recent years the wireless access of the internet has become
one of the most very reliable and available almost around the clock especially in the smart
cities, but the rural areas still suffer from reliable network coverage. (Andurkar, A, G and
PrsvhiZodpe 2016) roughly 4.5 Billion of the World population does not have access to
internet, google has developed a project loon to overcome the network gaps by providing
internet access to rural and remote areas (Wu et al. 2016). Google loon uses high altitude of
2000 metres in the air and the balloon placed in the stratosphere to create an Ariel wireless
network, the aims of the project was to improve internet connectivity to rural & remote areas
and to maintain network connectivity during natural disasters (Tanzi et al. 2017). The
benefits of the project is to provide free broadband access to rural areas during the disaster as
a humanitarian effort to allow flow of significant information because it could be lifesaving.
This loon project could be solutions to many countries in the future to reduce the cost of
using expensive cable infrastructure. Fig2 below is the balloon in the stratosphere
Future direction of using drone
Drones or the unmanned Ariel vehicles are expected to play a major role in the
wireless coverage at the near future especially in 5G era and beyond the deployment. The
drones will help in providing internet and multipoint transmissions (Sekander, S, Tabassum,
H and Hossain, E 2018). In the recent years the wireless access of the internet has become
one of the most very reliable and available almost around the clock especially in the smart
cities, but the rural areas still suffer from reliable network coverage. (Andurkar, A, G and
PrsvhiZodpe 2016) roughly 4.5 Billion of the World population does not have access to
internet, google has developed a project loon to overcome the network gaps by providing
internet access to rural and remote areas (Wu et al. 2016). Google loon uses high altitude of
2000 metres in the air and the balloon placed in the stratosphere to create an Ariel wireless
network, the aims of the project was to improve internet connectivity to rural & remote areas
and to maintain network connectivity during natural disasters (Tanzi et al. 2017). The
benefits of the project is to provide free broadband access to rural areas during the disaster as
a humanitarian effort to allow flow of significant information because it could be lifesaving.
This loon project could be solutions to many countries in the future to reduce the cost of
using expensive cable infrastructure. Fig2 below is the balloon in the stratosphere

15THE SECURITY ISSUES OF USING DRONE
Fig4 balloon in the stratosphere
(Source: Andurkar, AG and Miss PrachiZodpe 2016)
According to Indradasa, S et al (2016) the balloon will last approximately 100 days in
the stratosphere and the balloon have the capacity to cover up to 40 Km diameter, the cab will
be extended by using modern technologies like 5G which will allow up to 1000 people to
download 10 Mbps, 5G expected to operate up to 5GHz signal better than the current 4G
connection (Xiao et al. 2017). Fig5 below is the representation of Google Project Loon in the
air above the flying airspace.
Fig4 balloon in the stratosphere
(Source: Andurkar, AG and Miss PrachiZodpe 2016)
According to Indradasa, S et al (2016) the balloon will last approximately 100 days in
the stratosphere and the balloon have the capacity to cover up to 40 Km diameter, the cab will
be extended by using modern technologies like 5G which will allow up to 1000 people to
download 10 Mbps, 5G expected to operate up to 5GHz signal better than the current 4G
connection (Xiao et al. 2017). Fig5 below is the representation of Google Project Loon in the
air above the flying airspace.

16THE SECURITY ISSUES OF USING DRONE
Fig5 Spread of Google Loon
(Source: Indradasa S et al 2016).
Facebook has adapted similar idea compare to Google Loon project to provide
internet connection to rural area by using drone instead. (Kim, S, and Park, J 2016) Facebook
has developed a drone in Aquila lab to provide wider internet by beaming down from the
drones, the aim was to make internet affordable and accessible to any unwired places in the
World. The drone weighs up to 400 Kg and have the capacity to operate between ranges of
18-27Km in the Stratosphere (ADVISORS, 2017). The drone provides speed links of 10
Mbps from approximately 10 miles away, the drone powered by solar energy and capable of
flying up to three months. The Aquila test completed in 2016 in Arizona USA, and Facebook
is planning to test in other regions within the United State and other countries. Fig4 below
represent the Facebook drone (Aquila project)
Fig5 Spread of Google Loon
(Source: Indradasa S et al 2016).
Facebook has adapted similar idea compare to Google Loon project to provide
internet connection to rural area by using drone instead. (Kim, S, and Park, J 2016) Facebook
has developed a drone in Aquila lab to provide wider internet by beaming down from the
drones, the aim was to make internet affordable and accessible to any unwired places in the
World. The drone weighs up to 400 Kg and have the capacity to operate between ranges of
18-27Km in the Stratosphere (ADVISORS, 2017). The drone provides speed links of 10
Mbps from approximately 10 miles away, the drone powered by solar energy and capable of
flying up to three months. The Aquila test completed in 2016 in Arizona USA, and Facebook
is planning to test in other regions within the United State and other countries. Fig4 below
represent the Facebook drone (Aquila project)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

17THE SECURITY ISSUES OF USING DRONE
Fig6 Can internet access go truly globally
(Source: the Guardian 2018).
Drones (UAVs) are already involving in active role in smart cities providing various
types of support from monitoring traffic management, detecting floods, and natural disaster
etc. (Mohammed, F et al 2014). The drones are not currently used for wireless coverage, still
under development and testing for future use, however if the project is successful, it would be
great support for rural, remote, unserved areas, and everyone will have connection to the
networks (Bor-Yaliniz, Szyszkowicz and Yanikomeroglu 2017). The other advantage of
using drone it will eliminate the use of laying fibre optic cable, as we all know that internet
become necessity in our daily life. (Andurkar, A,G, and ParachiZodpe 2016)
Rules and regulations of drone (UAVs)
There are various rules and regulation nay industry needs to follow in order to fly a
UAD. The United Kingdom (UK) have an air navigation system law which applies to the
drones, the regulation is to ensure the safety inhabitants around drones. The Civil Aviation
Authority prohibited drones carrying camera on board to record in restricted areas, therefore
currently no legislative to regulate drones and the government is seeking actively new
methods regulation to drones (GPS World 2015). The restriction on drone weigh 20kg
prohibited on dropping object that cause injury to person or property, it requires permission
Fig6 Can internet access go truly globally
(Source: the Guardian 2018).
Drones (UAVs) are already involving in active role in smart cities providing various
types of support from monitoring traffic management, detecting floods, and natural disaster
etc. (Mohammed, F et al 2014). The drones are not currently used for wireless coverage, still
under development and testing for future use, however if the project is successful, it would be
great support for rural, remote, unserved areas, and everyone will have connection to the
networks (Bor-Yaliniz, Szyszkowicz and Yanikomeroglu 2017). The other advantage of
using drone it will eliminate the use of laying fibre optic cable, as we all know that internet
become necessity in our daily life. (Andurkar, A,G, and ParachiZodpe 2016)
Rules and regulations of drone (UAVs)
There are various rules and regulation nay industry needs to follow in order to fly a
UAD. The United Kingdom (UK) have an air navigation system law which applies to the
drones, the regulation is to ensure the safety inhabitants around drones. The Civil Aviation
Authority prohibited drones carrying camera on board to record in restricted areas, therefore
currently no legislative to regulate drones and the government is seeking actively new
methods regulation to drones (GPS World 2015). The restriction on drone weigh 20kg
prohibited on dropping object that cause injury to person or property, it requires permission

18THE SECURITY ISSUES OF USING DRONE
to fly with altitude 400ft and 500 metre near airport. Drones attached with camera must not
flown 150metres in populated area, or above 50 metres person or property. CAA currently
enforcing laws on drones because UK has many restricted areas, and permission required
before flying in certain areas. (Library of Congress 2017).
Chapter 3: Research Methodology:
Introduction:
The orderly method for the collection of the data, following a certain research
technique is popularly known as the research methodology (Shirazi, Kazemipoor and
Tavakkoli-Moghaddam 2017). The research methodologies are basically arranged, logical
and the esteemed impartial. The research methodology can also contains, or incorporate
hypothetical issues and trial and run techniques, numerical and measurable techniques. This
are done in order to get the correct result of the research done. For doing this research the
techniques used is the qualitative assessment of the papers and studying and making the
hypothesis of the research a true one.
Research onion:
With the help of the research onion outline, the researcher has inspired the to
help in planning of the research paper in different types of the layers. Every layer of the
research onion has helped the researcher with enough evidence and data needed for the
conduction of the research. The investigation onion copes three major layers of the research,
epistemology, ontology and axiology. Given below is the onion graph of the research.
to fly with altitude 400ft and 500 metre near airport. Drones attached with camera must not
flown 150metres in populated area, or above 50 metres person or property. CAA currently
enforcing laws on drones because UK has many restricted areas, and permission required
before flying in certain areas. (Library of Congress 2017).
Chapter 3: Research Methodology:
Introduction:
The orderly method for the collection of the data, following a certain research
technique is popularly known as the research methodology (Shirazi, Kazemipoor and
Tavakkoli-Moghaddam 2017). The research methodologies are basically arranged, logical
and the esteemed impartial. The research methodology can also contains, or incorporate
hypothetical issues and trial and run techniques, numerical and measurable techniques. This
are done in order to get the correct result of the research done. For doing this research the
techniques used is the qualitative assessment of the papers and studying and making the
hypothesis of the research a true one.
Research onion:
With the help of the research onion outline, the researcher has inspired the to
help in planning of the research paper in different types of the layers. Every layer of the
research onion has helped the researcher with enough evidence and data needed for the
conduction of the research. The investigation onion copes three major layers of the research,
epistemology, ontology and axiology. Given below is the onion graph of the research.

19THE SECURITY ISSUES OF USING DRONE
Figure 7: Research Onion
(Source: Saunders et al. 2015)
Research approach:
The research approach is the procedure or the plan which used for the collection of
data with broad assumptions. The research approach helps in the detailed method for the
collection of the data. As stated by many of the scientists, the research approach is commonly
based on much on the problem of the research (Saunders, et al.2015). However it can be said
the research approach inductive approach and the deductive approach. The feature of the
inductive study is the collection of the new theories, whereas the deductive approach tests the
occurred theories.
Figure 7: Research Onion
(Source: Saunders et al. 2015)
Research approach:
The research approach is the procedure or the plan which used for the collection of
data with broad assumptions. The research approach helps in the detailed method for the
collection of the data. As stated by many of the scientists, the research approach is commonly
based on much on the problem of the research (Saunders, et al.2015). However it can be said
the research approach inductive approach and the deductive approach. The feature of the
inductive study is the collection of the new theories, whereas the deductive approach tests the
occurred theories.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

20THE SECURITY ISSUES OF USING DRONE
Figure 8: Research Design
(Source: Mackey and Gass 2015)
Data collection method:
The researcher for this specific purpose of the research has used the technique
of qualitative data. Under the qualitative data, same interviews were made in order to get the
most accurate data in the end. Opinion of many experts were used for the better outcomes of
the result. Under this the most desired outcome for the experiments are to be understood
(Taylor, Bogdan and DeVault 2015). The number of times the hacking takes place is one
thing that was measured by the quantitative method, part form this all the research were done
by using the qualitative method.
Figure 8: Research Design
(Source: Mackey and Gass 2015)
Data collection method:
The researcher for this specific purpose of the research has used the technique
of qualitative data. Under the qualitative data, same interviews were made in order to get the
most accurate data in the end. Opinion of many experts were used for the better outcomes of
the result. Under this the most desired outcome for the experiments are to be understood
(Taylor, Bogdan and DeVault 2015). The number of times the hacking takes place is one
thing that was measured by the quantitative method, part form this all the research were done
by using the qualitative method.

21THE SECURITY ISSUES OF USING DRONE
Ethical and practical considerations
The project is experimental based and hence will be conducted in the laboratory
environment no human involvement in the project, therefore it requires no ethical approval
from the University, but would require the require access to laboratory environment (Snyder
2014). Wire shark software, hacking tool in order to configure the network topology, and
perform the scenarios. Any materials used or cited in the project it will be properly
referenced. The report will follow the University Code of Ethics and guideline. Example if
any changes made in the plan of conducting the experiment in the filed than will consider
seeking approval from the University
Chapter 4: Summery
This chapter is about the summery of the entire project. Concluding the topic it can be
said that the use of the drones in the smart cities can help us with key values like low power
taking input for the out like input. Also it can help in the area where there is any natural
disaster and internet cannot be accessed. Also the drones can help in the future of the wireless
technology that is the 5g technology. Also the chances of accessing a very high speed
internet increases with time. This research study intended to evaluate the possible reasons for
project scope change while controlling and managing a project. Needs can be varied from the
perspectives of beneficiaries and these changes are related to adding values to project scope.
The scope change in a project can result to adjustment of the activities and it can provide
satisfaction to the beneficiaries. But also there are some of the problems that are needed to be
overcomes, like the hacking of the drones which was a part of the research. Which helped us
to know that it is easy for a good developer to access the controls of the drones without the
permission of the user. There can be many substitutes of this technology but this is one of the
best thing that can be done in low budget. If there is proper process of providing the security
in aspect then this can be said as one of the major advantage in the near future.
Ethical and practical considerations
The project is experimental based and hence will be conducted in the laboratory
environment no human involvement in the project, therefore it requires no ethical approval
from the University, but would require the require access to laboratory environment (Snyder
2014). Wire shark software, hacking tool in order to configure the network topology, and
perform the scenarios. Any materials used or cited in the project it will be properly
referenced. The report will follow the University Code of Ethics and guideline. Example if
any changes made in the plan of conducting the experiment in the filed than will consider
seeking approval from the University
Chapter 4: Summery
This chapter is about the summery of the entire project. Concluding the topic it can be
said that the use of the drones in the smart cities can help us with key values like low power
taking input for the out like input. Also it can help in the area where there is any natural
disaster and internet cannot be accessed. Also the drones can help in the future of the wireless
technology that is the 5g technology. Also the chances of accessing a very high speed
internet increases with time. This research study intended to evaluate the possible reasons for
project scope change while controlling and managing a project. Needs can be varied from the
perspectives of beneficiaries and these changes are related to adding values to project scope.
The scope change in a project can result to adjustment of the activities and it can provide
satisfaction to the beneficiaries. But also there are some of the problems that are needed to be
overcomes, like the hacking of the drones which was a part of the research. Which helped us
to know that it is easy for a good developer to access the controls of the drones without the
permission of the user. There can be many substitutes of this technology but this is one of the
best thing that can be done in low budget. If there is proper process of providing the security
in aspect then this can be said as one of the major advantage in the near future.

22THE SECURITY ISSUES OF USING DRONE
Work plan
Figure 9: Proposed Dates
(Source: Author)
Work plan
Figure 9: Proposed Dates
(Source: Author)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

23THE SECURITY ISSUES OF USING DRONE
Figure 10: Proposed Dates
(Source: Author)
Figure 10: Proposed Dates
(Source: Author)

24THE SECURITY ISSUES OF USING DRONE
References
ADVISORS, S., 2017. FEATURE TOPIC: SERVICES AND COMMUNICATIONS IN
FOG COMPUTING. China Communications.
Akarsu, Alper, and Girici Togla (2017) “Fairness aware multiple drone base station
deployment” [Online] Available from<Journals-Institute of Engineering and Technology
IET.[Accessed 09/04/2018].
Al Barghuthi, N.B., Saleh, M., Alsuwaidi, S. and Alhammadi, S., 2017, October. Evaluation
of portable penetration testing on smart cities applications using Raspberry Pi III. In HCT
Information Technology Trends (ITT), 2017 Fourth (pp. 67-72). IEEE.
Andurkar, A, G and PrachiZodpe (2016). A review paper on Project “LOONS” [Online]
International journal research in Computer and Communication Engineering-Vol. 5 Available
from < http://www.ijarcce.com/upload/2016/march-16/IJARCCE%2035.pdf > Google-
Scholar [30-03- 2018]
Apvrille, L., Roudier, Y. and Tanzi, T.J., 2015, May. Autonomous drones for disasters
management: Safety and security verifications. In Radio Science Conference (URSI AT-
RASC), 2015 1st URSI Atlantic (pp. 1-2). IEEE.
BBC (2017) “Ten Sentenced for smuggling drugs into prisons by drones” [online] available
from http://www.bbc.co.uk/news/uk-42341416, [accessed 09/04/2018].
Bor-Yaliniz, I. and Yanikomeroglu, H., 2016. The new frontier in RAN heterogeneity: Multi-
tier drone-cells. IEEE Communications Magazine, 54(11), pp.48-55.
References
ADVISORS, S., 2017. FEATURE TOPIC: SERVICES AND COMMUNICATIONS IN
FOG COMPUTING. China Communications.
Akarsu, Alper, and Girici Togla (2017) “Fairness aware multiple drone base station
deployment” [Online] Available from<Journals-Institute of Engineering and Technology
IET.[Accessed 09/04/2018].
Al Barghuthi, N.B., Saleh, M., Alsuwaidi, S. and Alhammadi, S., 2017, October. Evaluation
of portable penetration testing on smart cities applications using Raspberry Pi III. In HCT
Information Technology Trends (ITT), 2017 Fourth (pp. 67-72). IEEE.
Andurkar, A, G and PrachiZodpe (2016). A review paper on Project “LOONS” [Online]
International journal research in Computer and Communication Engineering-Vol. 5 Available
from < http://www.ijarcce.com/upload/2016/march-16/IJARCCE%2035.pdf > Google-
Scholar [30-03- 2018]
Apvrille, L., Roudier, Y. and Tanzi, T.J., 2015, May. Autonomous drones for disasters
management: Safety and security verifications. In Radio Science Conference (URSI AT-
RASC), 2015 1st URSI Atlantic (pp. 1-2). IEEE.
BBC (2017) “Ten Sentenced for smuggling drugs into prisons by drones” [online] available
from http://www.bbc.co.uk/news/uk-42341416, [accessed 09/04/2018].
Bor-Yaliniz, I. and Yanikomeroglu, H., 2016. The new frontier in RAN heterogeneity: Multi-
tier drone-cells. IEEE Communications Magazine, 54(11), pp.48-55.

25THE SECURITY ISSUES OF USING DRONE
Bor-Yaliniz, I., Szyszkowicz, S.S. and Yanikomeroglu, H., 2017. Environment-Aware
Drone-Base-Station Placements in Modern Metropolitans. IEEE Wireless Communications
Letters.
CNN (2009) “ Iraqi Insurgents Hacked Predator drone feeds, US Official Indicates:” [Online]
Available from http://edition.cnn.com/2009/US/12/17/drone.video.hacked/index.html
[Accessed 09/04/208]
D. Williams, “Ten ways drone technology is shaping our future,” 2015.I. Bucaille, S.
Hethuin, T. Rasheed, A. Munari, R. Hermenier, and S. Allsopp, “Rapidly deployable network
for tactical applications: Aerial base station with opportunistic links for unattended and
temporary events ABSOLUTE example,” in Proc. Military Commun.Conf., Nov. 2013, pp.
1116–1120.
E. Vattapparamban, ˙I. G¨uvenc,, A. ˙I. Yurekli, K. Akkaya, and S. Ulua˘gac,,“Drones for
smart cities: Issues in cybersecurity, privacy, and publicsafety,” in Wireless Communications
and Mobile Computing Conference(IWCMC), 2016 International. IEEE, 2016, pp. 216–221.
Gayashani, K, Indradasa, S, T, Kahatapitiya, K, P, Umaraji, S, De Seram, S, R &
Dhammearatchi Dhishan (2016). Loon Balloon plus: Future Implementations of Google Loon
project [Online] Available from: <
http://www.imperial-journals.com/index.php/IJIR/article/view/588/561 > Imperial Journal of
Interdisciplinary Research [Accessed 18/03/2018].
GPS World (2015), “2015 Simulator buyers guide”, [Online], Available from<
http://gpsworld.com/2015-simulator-buyers-guide/>, [accessed 10/04/2018].
Information Security Institute “Hacking drones: Overview of the main threats,” Jun.2013.
[Online]. Available: http://resources.infosecinstitute.com/hacking-drones-overview-of-the-
main-threats/
Bor-Yaliniz, I., Szyszkowicz, S.S. and Yanikomeroglu, H., 2017. Environment-Aware
Drone-Base-Station Placements in Modern Metropolitans. IEEE Wireless Communications
Letters.
CNN (2009) “ Iraqi Insurgents Hacked Predator drone feeds, US Official Indicates:” [Online]
Available from http://edition.cnn.com/2009/US/12/17/drone.video.hacked/index.html
[Accessed 09/04/208]
D. Williams, “Ten ways drone technology is shaping our future,” 2015.I. Bucaille, S.
Hethuin, T. Rasheed, A. Munari, R. Hermenier, and S. Allsopp, “Rapidly deployable network
for tactical applications: Aerial base station with opportunistic links for unattended and
temporary events ABSOLUTE example,” in Proc. Military Commun.Conf., Nov. 2013, pp.
1116–1120.
E. Vattapparamban, ˙I. G¨uvenc,, A. ˙I. Yurekli, K. Akkaya, and S. Ulua˘gac,,“Drones for
smart cities: Issues in cybersecurity, privacy, and publicsafety,” in Wireless Communications
and Mobile Computing Conference(IWCMC), 2016 International. IEEE, 2016, pp. 216–221.
Gayashani, K, Indradasa, S, T, Kahatapitiya, K, P, Umaraji, S, De Seram, S, R &
Dhammearatchi Dhishan (2016). Loon Balloon plus: Future Implementations of Google Loon
project [Online] Available from: <
http://www.imperial-journals.com/index.php/IJIR/article/view/588/561 > Imperial Journal of
Interdisciplinary Research [Accessed 18/03/2018].
GPS World (2015), “2015 Simulator buyers guide”, [Online], Available from<
http://gpsworld.com/2015-simulator-buyers-guide/>, [accessed 10/04/2018].
Information Security Institute “Hacking drones: Overview of the main threats,” Jun.2013.
[Online]. Available: http://resources.infosecinstitute.com/hacking-drones-overview-of-the-
main-threats/
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

26THE SECURITY ISSUES OF USING DRONE
Kim Seongcheol, and Park Jieun (2016), flying Internet for the Unwired: [Online] Available
from< https://online.ptc.org/assets/uploads/papers/ptc18/RTS16_Kim_SeongCheol.pdf> How
to implement sky-streaming internet in the developing World- Pacific Telecommunications
Council. [Accessed 18/03/2018]
Krijnen, D. and Dekker, C., 2014. AR Drone 2.0 with subsumption architecture. In Artificial
intelligence research seminar.
Library of Congress (2014) “Regulation of Drones: United Kingdon” [Online] Available <
https://www.loc.gov/law/help/regulation-of-drones/united-kingdom.php>, [Accessed on
09/04/2017].
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design.
Abingdon: Routledge
Merabti, M., 2017, December. Keynote speech 1: 21st Century smart cities: The challenges
for sustainability, security, and privacy. In Applications of Information Technology in
Developing Renewable Energy Processes & Systems (IT-DREPS), 2017 2nd International
Conference on the (pp. 1-3). IEEE.
Mohammed, F, Idres, A, Mohamed, N, Al-Jaroodi, J, and Imad, J (2014). Opportunities and
Challenges of Using UAVs for Dubai Smart City [Online] New Technologies, Mobility and
Security (NTMS) 2014 6th Conference Available from < IEEE-Xplore> [Accessed 18-03-
2018]
Saunders, M., Lewis, P., Thornhill, A. and Bristow, A., 2015. Understanding research
philosophy and approaches to theory development. M. Saunders, P. Lewis, & A. Thornhill,
Research Methods for Business Students, pp.122-161.
Kim Seongcheol, and Park Jieun (2016), flying Internet for the Unwired: [Online] Available
from< https://online.ptc.org/assets/uploads/papers/ptc18/RTS16_Kim_SeongCheol.pdf> How
to implement sky-streaming internet in the developing World- Pacific Telecommunications
Council. [Accessed 18/03/2018]
Krijnen, D. and Dekker, C., 2014. AR Drone 2.0 with subsumption architecture. In Artificial
intelligence research seminar.
Library of Congress (2014) “Regulation of Drones: United Kingdon” [Online] Available <
https://www.loc.gov/law/help/regulation-of-drones/united-kingdom.php>, [Accessed on
09/04/2017].
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design.
Abingdon: Routledge
Merabti, M., 2017, December. Keynote speech 1: 21st Century smart cities: The challenges
for sustainability, security, and privacy. In Applications of Information Technology in
Developing Renewable Energy Processes & Systems (IT-DREPS), 2017 2nd International
Conference on the (pp. 1-3). IEEE.
Mohammed, F, Idres, A, Mohamed, N, Al-Jaroodi, J, and Imad, J (2014). Opportunities and
Challenges of Using UAVs for Dubai Smart City [Online] New Technologies, Mobility and
Security (NTMS) 2014 6th Conference Available from < IEEE-Xplore> [Accessed 18-03-
2018]
Saunders, M., Lewis, P., Thornhill, A. and Bristow, A., 2015. Understanding research
philosophy and approaches to theory development. M. Saunders, P. Lewis, & A. Thornhill,
Research Methods for Business Students, pp.122-161.

27THE SECURITY ISSUES OF USING DRONE
Shirazi, F., Kazemipoor, H. and Tavakkoli-Moghaddam, R., 2017. Fuzzy decision analysis
for project scope change management. Decision Science Letters, 6(4), pp.395-406.
Snyder, C.S., 2014. A Guide to the Project Management Body of Knowledge: PMBOK (®)
Guide. Project Management Institute
Tanzi, T.J., Chandra, M., Isnard, J., Camara, D., Olivier, S. and Harivelo, F., 2016. Towards"
drone-borne" disaster management: future application scenarios. ISPRS Annals of the
Photogrammetry, Remote Sensing and Spatial Information Sciences, 3, p.181.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research
methods: A guidebook and resource. New Jersey: John Wiley & Sons
Wright, “Drones offer risks, underwriting challenges,” Jan. 2015. [Online]. Available:
http://www.riskandinsurance.com/ drones-offer-risks-underwriting-challenges/
Wu, J., Ota, K., Dong, M. and Li, C., 2016. A hierarchical security framework for defending
against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4,
pp.416-424.
Xiao, Z., Yang, J.J., Huang, M., Ponnambalam, L., Fu, X. and Goh, R.S.M., 2017. QLDS: A
Novel Design Scheme for Trajectory Privacy Protection with Utility Guarantee in
Participatory Sensing. IEEE Transactions on Mobile Computing.
Shirazi, F., Kazemipoor, H. and Tavakkoli-Moghaddam, R., 2017. Fuzzy decision analysis
for project scope change management. Decision Science Letters, 6(4), pp.395-406.
Snyder, C.S., 2014. A Guide to the Project Management Body of Knowledge: PMBOK (®)
Guide. Project Management Institute
Tanzi, T.J., Chandra, M., Isnard, J., Camara, D., Olivier, S. and Harivelo, F., 2016. Towards"
drone-borne" disaster management: future application scenarios. ISPRS Annals of the
Photogrammetry, Remote Sensing and Spatial Information Sciences, 3, p.181.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research
methods: A guidebook and resource. New Jersey: John Wiley & Sons
Wright, “Drones offer risks, underwriting challenges,” Jan. 2015. [Online]. Available:
http://www.riskandinsurance.com/ drones-offer-risks-underwriting-challenges/
Wu, J., Ota, K., Dong, M. and Li, C., 2016. A hierarchical security framework for defending
against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4,
pp.416-424.
Xiao, Z., Yang, J.J., Huang, M., Ponnambalam, L., Fu, X. and Goh, R.S.M., 2017. QLDS: A
Novel Design Scheme for Trajectory Privacy Protection with Utility Guarantee in
Participatory Sensing. IEEE Transactions on Mobile Computing.
1 out of 27

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.