788
Views
0
CrossRef citations to date
0
Altmetric
Review Article

Security and privacy risks in drone-based last mile delivery

&
Received 03 Sep 2022, Accepted 05 May 2023, Published online: 17 May 2023

References

  • Aerit. (2023). https://aerit.io/
  • Albalawi, M., & Song, H. (2019). Data security and privacy issues in swarms of drones. In 2019 Integrated Communications, Navigation and Surveillance Conference, (ICNS), Herndon, VA, USA (pp. 1–11). https://doi.org/10.1109/ICNSURV.2019.8735133
  • Altawy, R., & Youssef, A. M. (2016). Security, privacy, and safety aspects of civilian drones: A survey. ACM Transactions on Cyber-Physical Systems, 1(2), 1–25. https://doi.org/10.1145/3001836
  • Amazon. (2022) https://www.amazon.jobs/en/teams/prime-air
  • Banu, A. S., & Padmavathi, G. (2022). Taxonomy of UAVs GPS spoofing and jamming attack detection methods. In Computational Intelligence for Unmanned Aerial Vehicles Communication Networks, 167–201
  • Beck, R. R., Vijeev, A., & Ganapathy, V. (2020). Privaros: A framework for privacy-compliant delivery drones. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual event (pp. 181–194).
  • Bisio, I., Garibotto, C., Lavagetto, F., Sciarrone, A., & Zappatore, S. (2018). Blind detection: Advanced techniques for WiFi-based drone surveillance. IEEE Transactions on Vehicular Technology, 68(1), 938–946. https://doi.org/10.1109/TVT.2018.2884767
  • Bose, I., & Leung, A. C. M. (2013). The impact of adoption of identity theft countermeasures on firm value. Decision Support Systems, 55(3), 753–763. https://doi.org/10.1016/j.dss.2013.03.001
  • Bose, I., Ngai, E. W. T., Teo, T. S. H., & Spiekermann, S. (2009). Managing RFID projects in organizations. European Journal of Information Systems, 18(6), 534–540. https://doi.org/10.1057/ejis.2009.43
  • Bose, I., & Pal, R. (2012). Do green supply chain management initiatives impact stock prices of firms? Decision Support Systems, 52(3), 624–634. https://doi.org/10.1016/j.dss.2011.10.020
  • Brown, P. (2021). Commercial dual-payload delivery drone launched. https://electronics360.globalspec.com/article/17126/video-commercial-dual-payload-delivery-drone-launched
  • Chang, V., Chundury, P., & Chetty, M. (2017). Spiders in the sky: User perceptions of drones, privacy, and security. In Proceedings of the 2017 CHI conference on human factors in computing systems, Denver, CO, USA (pp. 6765–6776).
  • Chen, W., Dong, Y., & Duan, Z. (2018). Attacking altitude estimation in drone navigation. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops, Honolulu, HI, USA (pp. 888–893).
  • Chen, W., Dong, Y., & Duan, Z. (2019). Manipulating drone position control. In 2019 IEEE Conference on Communications and Network Security, Washington, D.C, USA (pp. 1–9).
  • Cheung, K. F., Bell, M. G., & Bhattacharjya, J. (2021). Cybersecurity in logistics and supply chain management: An overview and future research directions. Transportation Research Part E, 146, 102217. https://doi.org/10.1016/j.tre.2020.102217
  • Choudhary, G., Sharma, V., & You, I. (2019). Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient medium access control (MAC) protocol. Computers & Electrical Engineering, 74, 59–73. https://doi.org/10.1016/j.compeleceng.2019.01.007
  • Clark, G. W., Doran, M. V., & Andel, T. R. (2017). Cybersecurity issues in robotics. In 2017 IEEE conference on cognitive and computational aspects of situation management, Savannah, GA, USA (pp. 1–5).
  • Clarke, R. (2014). Understanding the drone epidemic. Computer Law & Security Review, 30(3), 230–246. https://doi.org/10.1016/j.clsr.2014.03.002
  • Collins, C., Dennehy, D., Conboy, K., & Mikalef, P. (2021). Artificial intelligence in information systems research: A systematic literature review and research agenda. International Journal of Information Management, 60, 102383. https://doi.org/10.1016/j.ijinfomgt.2021.102383
  • Coyote Logistics. (2022). https://coyote.com/ship-freight/final-mile/
  • Curlander, J. C., Gilboa-Amir, A., Kisser, L. M., Koch, R. A., & Welsh, R. D. (2017). Multi-level fulfillment center for unmanned aerial vehicles. https://patentimages.storage.googleapis.com/cb/07/c0/3cd597a07d5198/US9777502.pdf
  • Cyr, B., Mahmod, J., & Guin, U. (2019). Low-cost and secure firmware obfuscation method for protecting electronic systems from cloning. IEEE Internet of Things Journal, 6(2), 3700–3711. https://doi.org/10.1109/JIOT.2018.2890277
  • Donalds, C., & Barclay, C. (2022). Beyond technical measures: A value-focused thinking appraisal of strategic drivers in improving information security policy compliance. European Journal of Information Systems, 31(1), 58–73. https://doi.org/10.1080/0960085X.2021.1978344
  • Doroftei, D., De Cubber, G., & De Smet, H. (2020). Reducing drone incidents by incorporating human factors in the drone and drone pilot accreditation process. In International Conference on Applied Human Factors and Ergonomics, San Diego, CA, USA (pp. 71–77).
  • Drones-for-commercial-use. (2022), https://bestoflens.com/best-drones-for-commercial-use/
  • Ever, Y. K. (2020). A secure authentication scheme framework for mobile-sinks used in the internet of drones applications. Computer Communications, 155, 143–149. https://doi.org/10.1016/j.comcom.2020.03.009
  • FAA. (2016). Summary of Small Unmanned Aircraft Rule (Part 107). 21 June. https://www.faa.gov/uas/media/Part_107_Summary.pdf
  • FAA. (2020). Executive summary: Final rule on operation of small unmanned aircraft systems over people. https://www.faa.gov/news/media/attachments/OOP_Executive_Summary.pdf
  • FAA Integration program. (2022) https://www.faa.gov/uas/programs_partnerships/completed/integration_pilot_program
  • Figliozzi, M. A., Tucker, C., & Polikakhina, P. (2018). Drone deliveries logistics, efficiency, safety and last mile trade-offs, Proceedings 7th International Conference on Information Systems, Logistics and Supply Chain, July 8-11, Lyon, France.
  • Flytrex. (2023) https://www.flytrex.com/
  • Fotouhi, A., Qiang, H., Ding, M., Hassan, M., Giordano, L. G., Garcia-Rodriguez, A., & Yuan, J. (2020). Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges. IEEE Communications Surveys & Tutorials, 21(4), 3417–3442. https://doi.org/10.1109/COMST.2019.2906228
  • Fouda, R. M. (2018). Security vulnerabilities of cyberphysical unmanned aircraft systems. IEEE Aerospace and Electronic Systems Magazine, 33(9), 4–17. https://doi.org/10.1109/MAES.2018.170021
  • Fu, Z., Zhi, Y., Ji, S., & Sun, X. (2021). Remote attacks on drones vision sensors: An empirical study. IEEE Transactions on Dependable and Secure Computing, 19, 3125–3135.
  • Globenewswire, (2020) https://www.globenewswire.com/news-release/2020/07/06/2057928/0/en/Last-Mile-Delivery-is-the-Most-Inefficient-Process-for-More-Than-Half-of-North-American-Transportation-Logistics-Companies.html
  • Gluck, T., Kravchik, M., Chocron, S., Elovici, Y., & Shabtai, A. (2020). Spoofing attack on ultrasonic distance sensors using a continuous signal. Sensors, 20(21), 6157. https://doi.org/10.3390/s20216157
  • Guo, R., Wang, B., & Weng, J. (2020). Vulnerabilities and attacks of UAV cyber physical systems. In Proceedings of the 2020 International Conference on Computing, Networks and Internet of Things, Sanya, China (pp. 8–12).
  • Hassija, V., Chamola, V., Agrawal, A., Goyal, A., Luong, N. C., Niyato, D., & Guizani, M. (2021). Fast, reliable, and secure drone communication: A comprehensive survey. IEEE Communications Surveys & Tutorials, 23(4), 2802–2832.
  • He, D., Chan, S., & Guizani, M. (2016). Communication security of unmanned aerial vehicles. IEEE Wireless Communications, 24(4), 134–139. https://doi.org/10.1109/MWC.2016.1600073WC
  • Hobbs, A., & Herwitz, S. R. (2006). Human challenges in the maintenance of unmanned aircraft systems. FAA and NASA Report.
  • Hongsong, C., Yongpeng, Z., Yongrui, C., & Bhargava, B. (2021). Security threats and defensive approaches in machine learning system under big data environment. Wireless Personal Communications, 117(4), 3505–3525. https://doi.org/10.1007/s11277-021-08284-8
  • Iqbal, S. (2021). A study on UAV operating system security and future research challenges. In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference, Las Vegas, USA (pp. 0759–0765).
  • Kapoor, G., Zhou, W., & Piramuthu, S. (2009). Challenges associated with RFID tag implementations in supply chains. European Journal of Information Systems, 18(6), 526–533. https://doi.org/10.1057/ejis.2009.41
  • Khan, A., Kim, H., Lee, B., Xu, D., Bianchi, A., & Tian, D. J. (2021). M2MON: Building an MMIO-based security reference monitor for unmanned vehicles. 30th USENIX Security Symposium (USENIX Security 21), Virtual event.
  • Kim, S. H. (2018). Conflict risk analysis of small unmanned aircraft systems. Journal of Aerospace Information Systems, 15(12), 684–695. https://doi.org/10.2514/1.I010665
  • Kim, S. G., Lee, E., Hong, I. P., & Yook, J. G. (2022). Review of intentional electromagnetic interference on UAV sensor modules and experimental study. Sensors, 22(6), 2384. https://doi.org/10.3390/s22062384
  • Kong, P. Y. (2021). A survey of cyberattack countermeasures for unmanned aerial vehicles. IEEE Access, 9, 148244–148263. https://doi.org/10.1109/ACCESS.2021.3124996
  • Koutroumpouchos, N., Ntantogian, C., & Xenakis, C. (2021). Building trust for smart connected devices: The challenges and pitfalls of TrustZone. Sensors, 21(2), 520. https://doi.org/10.3390/s21020520
  • Krishna, C. L., & Murphy, R. R. (2017). A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In 2017 IEEE International Symposium on Safety, Security and Rescue Robotics, Shanghai, China (pp. 194–199).
  • Kumar, M. S., Kasbekar, G. S., & Maity, A. (2022). Efficacy of asynchronous GPS spoofing against high volume consumer GNSS receivers. ArXiv Preprint, arXiv:2206.09133.
  • Lowry, P. B., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems, 26(6), 546–563. https://doi.org/10.1057/s41303-017-0066-x
  • Manna. (2023). https://www.manna.aero/balbriggan
  • Market. (2022). https://www.insiderintelligence.com/insights/drone-industry-analysis-market-trends-growth-forecasts/
  • Memos, V. A., Psannis, K. E., & Lv, Z. (2022). A secure network model against bot attacks in edge-enabled industrial Internet of Things. IEEE Transactions on Industrial Informatics, 18(11), 7998–8006. https://doi.org/10.1109/TII.2022.3162837
  • Merkert, R., & Bushell, J. (2020). Managing the drone revolution: A systematic literature review into the current use of airborne drones and future strategic directions for their effective control. Journal of Air Transport Management, 89, 101929. https://doi.org/10.1016/j.jairtraman.2020.101929
  • MIT. (2019), https://ctl.mit.edu/sites/ctl.mit.edu/files/theses43823404-20190517_Drone_Delivery_Evaluation-Executive_Summary_v6.pdf
  • Mora-Camino, F., Raoul, J. -L., Lamiscarre, B., & Mykoniatis, G. (2021). Last mile delivery model for sustainable development. 9th International Conference on Experiments/Process/System Modeling/Simulation/Optimization. https://hal-enac.archives-ouvertes.fr/hal-03313087/document
  • Morris, C. (2017). UPS tests drone launched from EV for last-mile delivery. Charged – Electric Vehicles Magazine https://chargedevs.com/newswire/ups-tests-drone-launched-from-ev-for-last-mile-delivery/
  • Multerer, T., Ganis, A., Prechtel, U., Miralles, E., Meusling, A., Mietzner, J., & Ziegler, V. (2017). Low-cost jamming system against small drones using a 3D MIMO radar based tracking. IEEE 2017 European Radar Conference (EURAD), Nuremburg, Germany (pp. 299–302).
  • Nassi, B., Bitton, R., Masuoka, R., Shabtai, A., & Elovici, Y. (2021). SoK: Security and privacy in the age of commercial drones. 2021 IEEE Symposium on Security and Privacy (SP), Virtual event (pp. 73–90).
  • Nassi, B., Nassi, D., Ben-Netanel, R., & Elovici, Y. (2021). Spoofing mobileye 630’s video camera using a projector. In Workshop on Automotive and Autonomous Vehicle Security, Virtual.
  • News on Apr 24. 2022. https://news.walgreens.com/our-stories/walgreens-and-wing-launch-drone-delivery-in-first-major-us-metropolitan-area.htm
  • News on Jun 16. 2022. https://arstechnica.com/gadgets/2022/06/amazon-drone-delivery-service-seeks-faa-approval-to-launch-in-2022/
  • News on Jun 17. 2022. https://techstory.in/papa-johns-testing-pizza-delivery-on-drones-at-atlanta/
  • News on Jun 23. 2022. https://www.suasnews.com/2022/06/skydrop-dominos-gear-up-to-launch-commercial-drone-delivery-trial-in-new-zealand/
  • News on Mar 30. 2022. https://www.forbes.com/sites/edgarsten/2022/03/30/fedex-to-demo-elroy-air-autonomous-drones/?sh=1c1081752994
  • News on May 05. 2022. https://electronics360.globalspec.com/article/18091/new-drone-delivery-service-starts-in-florida
  • News on May 24. 2022. https://corporate.walmart.com/newsroom/2022/05/24/were-bringing-the-convenience-of-drone-delivery-to-4-million-u-s-households-in-partnership-with-droneup
  • Nguyen, H. P. D., & Nguyen, D. D. (2021). Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication. Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead (pp. 185–210).
  • Nier, R. D. J., Wahab, S. N., & Daud, D. (2020). A qualitative case study on the use of drone technology for stock take activity in a third-party logistics firm in Malaysia. In IOP Conference Series: IOP Conference Series, Chennai, India, 780(6), 062014.
  • Park, J., Kim, S., & Suh, K. (2018). A comparative analysis of the environmental benefits of drone-based delivery services in urban and rural areas. Sustainability, 10(3), 888. https://doi.org/10.3390/su10030888
  • Park, I., Sharman, R., & Rao, H. R. (2015). Disaster experience and hospital information systems: An examination of perceived information assurance, risk, resilience, and HIS usefulness. MIS Quarterly, 39(2), 317–344. https://doi.org/10.25300/MISQ/2015/39.2.03
  • Pauner, C., Kamara, I., & Viguri, J. (2015). Drones. Current challenges and standardisation solutions in the field of privacy and data protection. 2015 ITU Kaleidoscope: Trust in the Information Society, Barcelona, Spain (pp. 1–7).
  • Pournader, M., Kach, A., & Talluri, S. (2020). A review of the existing and emerging topics in the supply chain risk management literature. Decision Sciences, 51(4), 867–919. https://doi.org/10.1111/deci.12470
  • Rodrigues, M., Amaro, J., Osorio, F. S., & Rljc, B. K. (2019). Authentication methods for UAV communication. In 2019 IEEE Symposium on Computers and Communications, Barcelona, Spain (pp. 1210–1215).
  • Rowe, F. (2014). What literature review is not: Diversity, boundaries and recommendations. European Journal of Information Systems, 23(3), 241–255. https://doi.org/10.1057/ejis.2014.7
  • Rugo, A., Ardagna, C. A., & Ioini, N. E. (2022). A security review in the UAVNet Era: threats, countermeasures, and gap analysis. ACM Computing Surveys (CSUR), 55(1), 1–35. https://doi.org/10.1145/3485272
  • Sandoval, S., & Thulasiraman, P. (2021). Cyber security assessment of the robot operating system 2 for aerial networks. In 2019 IEEE International Systems Conference, Orlando, Florida, USA (pp. 1–8).
  • Seo, S. H., Won, J. B., Kang, E., Kang, Y., & Choi, D. (2016) A security framework for a drone delivery service. In Proceedings of the 2nd Workshop on Micro Aerial Vehicle Network, Systems, and Applications for Civilian Use, Singapore.
  • Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2021). IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet of Things Journal, 8(7), 5164–5171. https://doi.org/10.1109/JIOT.2020.3033131
  • Stergiou, C. L., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustainable Computing: Informatics and Systems, 19, 174–184. https://doi.org/10.1016/j.suscom.2018.06.003
  • Stergiou, C. L., Psannis, K. E., Kim, B. -G., & Gupta, B. B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78(3), 964–975. https://doi.org/10.1016/j.future.2016.11.031
  • Tallon, P. P., Ramirez, R. V., & Short, J. E. (2013). The information artifact in IT governance: Toward a theory of information governance. Journal of Management Information Systems, 30(3), 141–178. https://doi.org/10.2753/MIS0742-1222300306
  • Tanveer, M., Khan, A. U., Nguyen, T., Ahmad, M., & Abdei Latif, A. (2022). Towards a secure and computational framework for internet of drones enabled aerial computing. IEEE Transactions on Network Science and Engineering. https://doi.org/10.1109/TNSE.2022.3151843
  • Tu, Y. J., & Piramuthu, S. (2020). On addressing RFID/NFC-based relay attacks: An overview. Decision Support Systems, 129, 113194. https://doi.org/10.1016/j.dss.2019.113194
  • Tu, Y. J., Zhou, W., & Piramuthu, S. (2021). Critical risk considerations in auto-ID security: Barcode vs. RFID. Decision Support Systems, 142, 113471. https://doi.org/10.1016/j.dss.2020.113471
  • Vanitha, N., & Padmavathi, G. (2017). A study on various cyber-attacks and their classification in UAV assisted vehicular ad-hoc networks. In International Conference on Computational Intelligence, Cyber Security, and Computational Models, Coimbatore, India (pp. 124–131).
  • Walmart. (2022). newsroom/2022/05/24/were-bringing-the-convenience-of-drone-delivery-to-4-million-u-s-households-in-partnership-with-droneup
  • Wang, W., Teh, K. C., Luo, S., & Li, K. H. (2018). Physical layer security in heterogeneous networks with pilot attack: A stochastic geometry approach. IEEE Transactions on Communications, 66(12), 6437–6449. https://doi.org/10.1109/TCOMM.2018.2859954
  • Wang, W., Yao, Y., Liu, X., Li, X., Hao, P., & Zhu, T. (2021). I can see the light: Attacks on autonomous vehicles using invisible lights. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual event (pp. 1930–1944).
  • Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 26(2), xiii–xxiii.
  • Weill, P., & Ross, J. W. (2004). IT Governance. Harvard Business School Press.
  • Wing. (2023). https://wing.com
  • Wolfswinkel, J. F., Furtmueller, E., & Wilderom, C. P. (2013). Using grounded theory as a method for rigorously reviewing literature. European Journal of Information Systems, 22(1), 45–55. https://doi.org/10.1057/ejis.2011.51
  • Xu, J. (2017). Design perspectives on delivery drones. RAND Research Report. www.rand.org/t/RR1718z2
  • Yaacoub, J. P., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218. https://doi.org/10.1016/j.iot.2020.100218
  • Zhi, Y., Fu, Z., Sun, X., & Yu, J. (2020). Security and privacy issues of UAV: A survey. Mobile Networks & Applications, 25(1), 95–101. https://doi.org/10.1007/s11036-018-1193-x
  • Zipline. (2023). https://www.flyzipline.com/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.