• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • DroneRacingLife
  • DroneFlyers
  • Newsletter
DroneLife

DRONELIFE

Stay up to date on all the latest Drone News

  • News
  • Products
  • Industries
    • Agriculture
    • Construction
    • Delivery
    • Dual Use
    • Inspection
    • Public Safety
    • Surveying
  • Enthusiasts
  • Regulations
  • Business
  • Video
  • Podcasts

DRONEII: Drones and Data Security – A Progressive Look into the Future

May 25, 2018 by Miriam McNabb 6 Comments

Guest Post: This article published with permission from our partners at DroneII, Drone Industry Insights.

Drone data security is in a very early stage – not in terms of infrastructure and opportunities, but in terms of adoption. Now, let us paint the bigger picture and put drone data security into context.

Data security is always temporary – everything is secure, until it isn’t. IT companies find themselves in a constant cat-and-mouse game with those who proof existing security standards to be insufficient. The degree of connectivity increases at light speed, making the whole topic of data security in a highly-connected world hugely important and inconceivably complex.

But let us start at the beginning and see what this means for commercial drones today and in the future. Drone data security is essential on three major levels: The first level considers the interaction between drone and user. The second and third level concerns the wireless data transfer and cloud storage. Transmitting large amounts of data wirelessly might still seem far from reality due to today’s bandwidth limitations, but that does not make data security less important for the future. “Security layers are important factors for drones’ success going forward. In fact, we believe it will be a critical enabling factor for the success of the drone revolution.” Oren Elkayam, Founder & CEO of Mobilicom recently underlined in an interview.

The Layers 

Today level 1, the link between device and user is the only focus of discussion. For instance, the rather insecure link between user and device is used by counter-drone devices to stop a drone in-air or even force it to land, and there is already a great variety of non-physical counter drone (CUAV) solutions available. Greater drone data security provided by encrypted data-links help to reduce the risk to be hacked – in return, however, this also means an increased risk through encrypted rogue drones.

Layers 2 and 3 are just as crucial – in this case, the hijacking of the platform is not in the foreground but the wiretapping of the collected data. With increasing automation, however, this will also include the control of the platform. The list of threats is growing every day, making it essential to create an ecosystem that is secure and reliable.

Imagine the following scenario: you are sitting in an autonomous aerial taxi and ransomware forces you to transfer money to an account within the next 15 minute. If you do not comply, the platform will shut down the engines and make you crash over a highly-populated area. Especially when piloted aircraft become unpiloted, there must be extremely reliable safety mechanisms in place. From a programming point of view, it appears to be a thin line to make robots work efficiently and having all necessary safety nets in place at the same time. It is basically the same with commercial aircrafts today, where system redundancy is traded for payload and range.

Degree of Automation

Drones, just like aerial taxis will only be effective when they work at an extremely high degree of automation – this includes the ability to interact with other systems (e.g. air traffic management, weather forecast, etc.). The ecosystem for all that to happen already exists – it is called the internet (the internet of things or IoT, to be accurate), which is not necessarily a safe place for data.

Today you can control a thermostat via your smartphone – that is a classic IoT use-case. With an increasing level of automation, complex flying robots (like drones) will soon be just as easy to control. But according to which standards will they interact with other devices? How do you protect devices that could do harm to others when hijacked? This requires safety mechanisms on each level. The graphic above shows the main trust boundaries of drone data security (transition of data/info from one source to another) but our view forward should not stop here.

Artificial Intelligence

AI will boost automation! We are on the verge of a second industrial revolution. AI will be spread on the grid like once electric power. Everything that in the past got electrified will soon be cogni-fied. The AI train already left the station, full steam ahead and there are no brakes to pull. Today we are teaching machines how to think, how to understand our behavior and how to defend themselves. What could possibly go wrong?

Data scientists and developers will create the future of AI, but again – according to what rule-book? What standards are out there to respect when creating, what scientist claim to be the last big invention that humanity will ever need to make? What is the foundation of a world where smart robots will design and manufacture other robots? Personally, it feels a lot like chemistry class. We have nothing on hand but a few basic principles and a lot of elements in the equation, while we have absolutely no idea of what happens when we mix it all together and how to control it.

The Control Problem 

To make sure this control problem is solved by the time needed, it is essential to work it out in advance. It might be difficult to solve the entire control problem from the start because many elements can only be put in place once we know the details of the architecture where it will be implemented. However, the more we consider these developments and try to solve potential control problems early on, the better the odds that the transition to the machine intelligence era will go well.

There are already many possibilities to safely and securely connect drones to the internet of things and we are only in minute one of the game. A lot of money is and will be spent on drone data security to trial-and-error the way forward. This, unfortunately, will include failures. New and very complex technologies are not always 100% safe from the beginning (e.g. self-driving cars) – we simply expect technology to do what it is supposed to do. And if the machine does not always know what that is, artificial intelligence will allow the machine to react to changing conditions.

If you now think that this is so far away and will not bother us for the next fifty years, try to look at it from a different point of view. The computer scientist Stuart Russell put it this way: Imagine that we received a message from an alien civilization, which read: “People of Earth, we will arrive on your planet in 50 years. Get ready!”

Do you think we would just sit here, counting down the months until the mothership lands? We would feel a little more urgency to work the switches. For the commercial drone market – the incredible melting pot of technologies – this means to truly think progressively and to better be safe than sorry, when it comes to drone data security.

Learn more about data security and the commercial drone industry on: www.droneii.com.

 

 

Miriam McNabb

Miriam McNabb is the Editor-in-Chief of DRONELIFE and CEO of JobForDrones, a professional drone services marketplace, and a fascinated observer of the emerging drone industry and the regulatory environment for drones. Miriam has penned over 3,000 articles focused on the commercial drone space and is an international speaker and recognized figure in the industry.  Miriam has a degree from the University of Chicago and over 20 years of experience in high tech sales and marketing for new technologies.
For drone industry consulting or writing, Email Miriam.

TWITTER:@spaldingbarker

Subscribe to DroneLife here.

Filed Under: News Tagged With: Commercial Drones, drone data protection, drone data security, droneii, industrial drones

Reader Interactions

Trackbacks

  1. DRONEII เผย Layer ต่างๆ ที่ควรพิจารณาสำหรับ Drone Data Protection ให้องค์กรนำไปใช้เป็นแนวทางได้ - TechTalkThai says:
    May 28, 2018 at 5:15 am

    […] ที่มา: https://dronelife.com/2018/05/25/droneii-drones-and-data-security-a-progressive-look-into-the-future… […]

    Reply
  2. South Carolina plans to use drones to remotely watch inmates – WACH.com | MUSIC 4 DRONES says:
    May 26, 2018 at 6:11 am

    […] post DRONEII: Drones and Data Security – A Progressive Look into the Future appeared first on […]

    Reply
  3. DRONEII: Drones and Data Security – A Progressive Look into the Future - Drone Services Company | Aerial Photo and Video | Miami Florida says:
    May 25, 2018 at 1:50 pm

    […] post DRONEII: Drones and Data Security – A Progressive Look into the Future appeared first on […]

    Reply
  4. DRONEII: Drones and Data Security – A Progressive Look into the Future | News and Reviews about Drones, Quadcopter, Camera says:
    May 25, 2018 at 11:31 am

    […] Source link […]

    Reply
  5. DRONEII: Drones and Data Security – A Progressive Look into the Future - Drones Crunch says:
    May 25, 2018 at 11:23 am

    […] DRONELIFE […]

    Reply
  6. DRONEII: Drones and Data Security – A Progressive Look into the Future - King Drones Review | The Drones Kingdom says:
    May 25, 2018 at 10:01 am

    […] post DRONEII: Drones and Data Security – A Progressive Look into the Future appeared first on […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

LATEST

UK Government Backs Drone Expansion with £50 Million Investment

Windracers among companies recognized as UK moves to scale routine drone operations and advanced air mobility The UK government has…

Continue Reading UK Government Backs Drone Expansion with £50 Million Investment

U.S. Navy Awards Packet Digital $9.8 Million to Scale Drone Battery Production in North Dakota

North Dakota facility will manufacture NDAA-compliant battery cells for drones and defense systems Packet Digital and its subsidiary Badland Batteries…

Continue Reading U.S. Navy Awards Packet Digital $9.8 Million to Scale Drone Battery Production in North Dakota

Danish Startup Launches 10K Drone Sensor for Wide-Area Search, Surveillance, and Mine Detection

Danish start-up promotes innovative sensor system By DRONELIFE Features Editor Jim Magill Marine rescue teams using drones to search for…

Continue Reading Danish Startup Launches 10K Drone Sensor for Wide-Area Search, Surveillance, and Mine Detection

FAA Publishes Proposed Rule for Drone Restrictions Around Critical Infrastructure

New Section 2209 NPRM would create a formal process for restricting drone flights near sensitive facilities The Federal Aviation Administration…

Continue Reading FAA Publishes Proposed Rule for Drone Restrictions Around Critical Infrastructure

Public Comment Window Closing: FCC Weighs DJI Challenge to Covered List Ruling

Public input period highlights ongoing divide over foreign drone policy and market access The deadline to submit comments on the…

Continue Reading Public Comment Window Closing: FCC Weighs DJI Challenge to Covered List Ruling

FAA Advances Long-Delayed Rule to Restrict Drones Over Sensitive Sites

Long-awaited proposal aims to balance security and access in low-altitude airspace The Federal Aviation Administration (FAA) has announced a long-anticipated…

Continue Reading FAA Advances Long-Delayed Rule to Restrict Drones Over Sensitive Sites

WaiV Robotics Debuts Maritime VTOL Landing Pad with $7.5M Seed Round

The London-based maritime startup unveils a gyro-stabilized landing pad that recovers VTOL drones on vessels as small as 10 meters…

Continue Reading WaiV Robotics Debuts Maritime VTOL Landing Pad with $7.5M Seed Round

Perceptual Robotics Raises Funding to Automate Wind Turbine Inspection Drones

Loggerhead Ventures leads the round with follow-on from One Planet Capital, fueling AI-powered drones for wind farm maintenance. Perceptual Robotics…

Continue Reading Perceptual Robotics Raises Funding to Automate Wind Turbine Inspection Drones

Teledyne FLIR OEM Launches Prism Software to Detect Small Drones at Longer Range

New AI-enabled software aims to identify small drone threats earlier and support faster response Teledyne FLIR OEM, part of Teledyne…

Continue Reading Teledyne FLIR OEM Launches Prism Software to Detect Small Drones at Longer Range

When Commercial Drone Technology Meets Defense: A Closer Look at Civil–Military Integration

New analysis highlights how shared innovation pipelines are shaping both commercial drone markets and military capabilities A recent report from…

Continue Reading When Commercial Drone Technology Meets Defense: A Closer Look at Civil–Military Integration

Secondary Sidebar

Footer

SPONSORED

Inspired Flight Gremsy IF800 VIO F1 drones geo week

What Will It Take to Strengthen U.S. Drone Manufacturing? A Conversation with Inspired Flight’s CEO

Global Mapper Mobile data collection

Collection Ground Control Points with Global Mapper Mobile

Military Drone Mapping Solutions

How SimActive’s Correlator3D™ is Revolutionizing Military Mapping: An Exclusive Interview with CEO Philippe Simard

Photogrammetry Accuracy Standards

SimActive Photogrammetry Software: Enabling Users to Meet Accuracy Standards for Over 20 Years

NACT Engineering Parrot ANAFI tether indoor shot

Smart Tether for Parrot ANAFI USA from NACT Engineering

Blue Marble, features global mapper, features Blue Marble

Check Out These New Features in Global Mapper v25 from Blue Marble

About Us | Contact Us | Advertise With Us | Write for Us | Privacy Policy | Terms of Service

The Trusted Source for the Business of Drones.

This website uses cookies and third party services. By clicking OK, you are agreeing to our privacy policy. ACCEPT

Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT