purchase  and  access  at  low  prices  to  boot.  Due  to 
high  mobility  and  flexibility  more  and more  UAVs 
are being employed in civil applications, although it 
suffers  from  potential  risk.  Various  threats  that  are 
associated with drones are the source of some risks; 
it  may  get  collide  with  buildings,  aircrafts  or  other 
objects,  even  it  may  get  involved  with  potential 
terrorist acts as well. 
Researchers show their concerns and choose this 
area as their research and presented their thoughts in 
various  forms.  Yuliya  Averyanova,  Lyudmila 
Blahaja  in  their  works  focuses  on  identifying  UAV 
risks and vulnerabilities in order to better implement 
the  risk-oriented  approach  of  integrated  UAVs  into 
the  airspace  safely  and  improving  the  security  of 
unmanned  aerial  systems.  Nature,  economic 
engineering,  and  vulnerabilities  and  threats  specific 
to humans are quickly taken into account and certain 
potential  approaches  to  reduce  vulnerabilities  and 
threats are also addressed in the paper.   
Menaka  Pushpa  Arthur  talks  about  various 
possible cyber and physical risks that could emerge 
from the use of UAVs, and then investigate multiple 
methods of identifying, monitoring, and interdicting 
hostile  drones  by  utilizing  techniques  that  focus  on 
UAV-emitted  ambient  radio  frequency  signals, 
radars,  acoustic  sensors,  and  UAV-detection 
computer vision techniques.  Yuliya  Averyanova, 
Lyudmila  Blahaja  showed  their  concers  about 
durability  of  such  vehicles.  H.  Shakhatreh,  A.H. 
Sawalmeh,  A.I.  Al-Fuqaha,  Z.  Dou,  E.K.  Almaita, 
I.M.  Khalil  emphasis  on  key  research challenges  in 
this  area  that  need  to  be  addressed  properly.    A.A. 
Zhilenkov,  I.R.  Epifantsev  talks  about  trajectories 
planning in navigation system. H. Sedjelmaci, S. M. 
Senouci and N. Ansari depicted that UAVs or drones 
have  been  vulnerable  to  multiple  malware  attacks 
such as the jamming attack since FANET.  
The  paper  proposes  a  security  framework  for 
FANET  for  Federated  Learning-based  on-device 
jamming  attack  detection.  It  concludes  that  GPS 
Jamming and Spoofing concentrate on UAV-related 
research  to  address  cybersecurity  risks  but  avoids 
assaults  on  the  stream  of  controls  and  data 
communications.  L.  Xiao,  C.  Xie,  M.  Min  and  W. 
Zhuang  [8]  discussed  the  practicality  of  using 
Identity  Based  Encryption  in  the  UAV  resource 
restriction  network.  A  major  architecture  challenge 
when  encryption  is  applied  is  the  space  limitation 
existence  of  such  WiFi-based  UAV  networks  as 
elaborated by Park, K. J., Kim, J., Lim, H., & Eun, 
Y. It also discusses the practicality and performance 
of  IBE  Identity  Based  Encryption  in  the  UAV 
network  and  thus  provides  an  important  wireless 
UAV network resource limited security system. 
From literature  review  it  has been observed  that 
most of the failures are due to: 
 
•  Technical breakdown.  
•  Human factor. 
•  Adverse weather. 
•  Other factors. 
 
However,  in  some  intricate  surroundings,  UAV 
cannot  sense  the  environment  parameters  due  to 
limited  communication  and  traditional  sensor 
perception  capabilities.  Despite  many  efforts  to 
overcome  these  weaknesses,  it  is  essential  to 
develop more efficient and effective method in order 
to  perform  more  stability,  predictability,  and 
security.  Therefore,  high  performance  independent 
navigation  is  of  great  importance  to  develop  the 
application  of  UAV  is  of  great  importance.  The 
control  of  each  drone  falls  on  pilot  to  use  visual 
tracking to determine position and orientation. More 
advanced  drones  use  global  positioning  system 
(GPS)  receivers  to  play  a  significant  role,  that  is, 
navigation  and  control  loop.  Some  smart  features 
include  drone  memorization  to  track  the  position 
track.  The  trajectory  of  the  drone  can  be 
predetermined  to  establish  GPS  waypoints.  When 
this function is executed, the drone will use autopilot 
to follow this path. 
There  exist  various  forms  of  UAV  attacks;  the 
initial stages of  UAV attack start  with  affecting the 
physical  configuration  and  the  loss  of  mobility 
which  is  also  known  as  manoeuvrability.  It  is  very 
much  difficult  to  detect,  and  to  prevent  or 
countermeasure which includes the proper capturing 
of  vulnerabilities.  On  the  basis  of  certain  factors, 
UAV attack can be categorized into four major parts 
which  are  named  as,  UAV  freezing,  waypoint 
alterations, enforced collision, and UAV hijacking. 
These various attacks are as follows: 
 
•  UAV  freezing:  This  attack  starts  with  the 
failure  of  node  which  is  caused  due  to 
modification  in  physical  configuration  of 
unmanned armed vehicles which leads to loss 
in  mobility  of  UAV.    These  mobility  losses 
result  in  network  failures.  Intrusion,  signal 
jamming, and session hijacking are the main 
cause to this attack.  
 
•  Waypoint alterations: Another major threat to 
fully  functional  UAVs  is  waypoint 
modifications.  This  attack  leads  to 
overlapping  of  mobility  patterns  which  in 
turn  results  in  enforced  collision.  This  is  a