Enhancing Cybersecurity for UAV Systems: Implementing NIS2 Provisions for Safe Drone Deployment in Albania
Downloads
Unmanned Aerial Vehicles (UAVs) have become essential tools in both military and civilian applications, from surveillance to infrastructure monitoring. However, their increased use has raised significant cybersecurity concerns, particularly regarding vulnerabilities to cyberattacks such as GPS spoofing, signal jamming, and data link interception. This paper reviews the key cybersecurity challenges facing UAVs and explores mitigation strategies to enhance UAV security, with a focus on potential applications in Albania. Drawing on recent studies, we examine common attack vectors, including man-in-the-middle (MITM) attacks, denial-of-service (DoS) attacks, and unauthorized data interception. These vulnerabilities pose risks not only to the safe operation of UAVs but also to the integrity of the critical infrastructure they monitor. To address these issues, the paper proposes robust encryption protocols, real-time monitoring systems, and the integration of machine learning-based intrusion detection techniques to safeguard UAV communications and operations. Furthermore, this research highlights the importance of aligning UAV security measures with the EU’s NIS2 Directive, offering recommendations on regulatory frameworks tailored to the Albanian context. The findings emphasize the need for a comprehensive approach to UAV cybersecurity, combining technological innovation with stringent regulatory oversight to ensure safe and secure UAV deployment in Albania's rapidly evolving digital landscape.
Downloads
Costa, D. G., Bittencourt, J. C. N., Oliveira, F., Peixoto, J. P. J., & Jesus, T. C. (2024). Achieving sustainable smart cities through geospatial data-driven approaches. Sustainability, 16(640).
Dahlman, E., & Lagrelius, K. (2019). A game of drones: Cyber security in UAVs (KTH Bachelor Thesis Report). KTH Royal Institute of Technology, School of Electrical Engineering and Computer Science.
Hartmann, K., & Giles, K. (2016). UAV exploitation: A new domain for cyber power. In N. Pissanidis, H. Rõigas, & M. Veenendaal (Eds.), 2016 8th International Conference on Cyber Conflict (pp. 205-215). NATO CCD COE Publications
Sanghavi, P., & Kaur, H. (2023). A comprehensive study on cyber security in unmanned aerial vehicles. 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom).
“Law No. 72 of 28.6.2012.” Accessed: Oct. 21, 2024. [Online]. Available: https://sane27.com/wp-content/uploads/Law-no.72-of-28.6.2012.pdf
“INSPIRE Directive.” Accessed: Oct. 21, 2024. [Online]. Available: https://knowledge-base.inspire.ec.europa.eu/legislation/inspire-directive_en
“Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union (NIS2 Directive).” Accessed: Oct. 21, 2024. [Online]. Available: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555