Mostrar el registro sencillo del ítem

dc.contributor.authorMartinez Rueda, Julián Aldeisy
dc.coverage.spatialBogota, Escuela Superior de Guerra "General Rafael Reyes Prieto"
dc.date.accessioned2026-04-28T20:44:08Z
dc.date.available2026-04-28T20:44:08Z
dc.date.issued2025
dc.date.submitted2025
dc.identifier.urihttps://hdl.handle.net/20.500.14205/11747
dc.description.abstractLa proliferación de sistemas aéreos no tripulados (drones) y su adaptación para fines maliciosos constituye una amenaza asimétrica creciente para la seguridad nacional, desafiando las capacidades defensivas del Ejército Nacional de Colombia. Este artículo analiza las vulnerabilidades técnicas de los drones tipo multirrotor, con énfasis en sus sistemas de comunicación, navegación y firmware, y evalúa las herramientas de ciberseguridad actuales, incluyendo métodos de detección de spoofing y jamming. A través de una revisión sistemática de literatura especializada y del análisis de modelos internacionales, se propone un protocolo de ciberdefensa adaptado al contexto colombiano que incorpora elementos tecnológicos, jurídicos y éticos en el ámbito de la dimensión cognitiva del ciberespacio. Los hallazgos evidencian la necesidad de fortalecer la doctrina nacional en ciberseguridad mediante capacidades autónomas, interoperables y humanamente supervisadas.es_ES
dc.description.abstractThe proliferation of unmanned aerial systems (drones) and their adaptation for malicious purposes pose an increasing asymmetric threat to national security, challenging the defensive capabilities of the Colombian National Army. This article analyzes the technical vulnerabilities of multirotor UAVs, focusing on their communication, navigation, and firmware systems, and evaluates current cybersecurity tools, including spoofing and jamming detection techniques. Through a systematic literature review and an analysis of international models, a cybersecurity protocol is proposed, tailored to the Colombian context, which integrates technological, legal, and ethical components within the cognitive dimension of cyberspace. The findings highlight the need to strengthen national cybersecurity doctrine through autonomous, interoperable capabilities that remain under meaningful human control.es_ES
dc.format.extent42 paginas
dc.format.mimetypeapplication/pdfes_ES
dc.language.isospaes_ES
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleEstrategias de Ciberdefensa para contrarrestar el uso malicioso de drones en el Ejército Nacional de Colombiaes_ES
dc.title.alternativeCyberdefense strategies to counter the malicious use of drones in the Colombian National Armyes_ES
dcterms.bibliographicCitationAlrajeh, N. A., Khan, M. A., & Masood, S. (2019). Security challenges in unmanned aerial vehicles (UAVs): A survey. International Journal of Advanced Computer Science and Applications, 10(1), 62–71.es_ES
dcterms.bibliographicCitationAmerican Psychological Association. (2020). Publication manual of the American Psychological Association (7th ed.).es_ES
dcterms.bibliographicCitationCortellese, N. (2022). Algorithmic warfare and human rights: Charting the course of an arms race. International Review of Law, Computers & Technology.es_ES
dcterms.bibliographicCitationDorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 618–623). IEEE.es_ES
dcterms.bibliographicCitationFink, A. (2019). Conducting research literature reviews: From the internet to paper (5th ed.). Sage Publications.es_ES
dcterms.bibliographicCitationFloreano, D., & Wood, R. J. (2015). Science, technology and the future of small flying robots. Nature, 521(7553), 460–466.es_ES
dcterms.bibliographicCitationGao, G., Grove, T., Lo, S., & Lachapelle, G. (2019). Anti-jamming and anti-spoofing techniques for GNSS: Recent advances. Sensors, 19(19), 4315.es_ES
dcterms.bibliographicCitationGunduz, M. Z., & Ozdemir, M. A. (2020). Internet of drones (IoD) security issues and challenges. In Cyber Security and Privacy: Second International Conference, ICSP 2020 (pp. 71–85). Springer.es_ES
dcterms.bibliographicCitationGupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2018). Security and privacy challenges in unmanned aerial vehicles. IEEE Internet of Things Journal, 5(5), 4295–4304.es_ES
dcterms.bibliographicCitationHaque, S., Azad, M. A., Rahman, M. S., & Hasan, M. K. (2024). Zero trust architecture and deep learning: Enhancing cyber defense of UAV networks. Computers & Security, 134, 103175.es_ES
dcterms.bibliographicCitationHasan, M., Azad, M. A., & Rahman, M. S. (2022). Predictive cyber defense frameworks in autonomous aerial vehicles. IEEE Transactions on Aerospace and Electronic Systems, 58(6), 5012–5024.es_ES
dcterms.bibliographicCitationHorowitz, M. C., Allen, G., Bekoff, A., & Scharre, P. (2018). Artificial intelligence and international security. Belfer Center for Science and International Affairs, Harvard Kennedy School. https://www.belfercenter.org/publication/artificial-intelligence-and-international-securityes_ES
dcterms.bibliographicCitationIslam, S. H., Islam, M. M., Sarker, I. H., & Hossain, M. A. (2021). A systematic literature review on security and privacy issues in unmanned aerial vehicles. Journal of Network and Computer Applications, 184, 103075.es_ES
dcterms.bibliographicCitationKerns, A. J., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4), 617–636.es_ES
dcterms.bibliographicCitationKhan, S., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). UAVs cyber security and threats analysis. Computer Standards & Interfaces, 69, 103408.es_ES
dcterms.bibliographicCitationKhan, S., Jhanjhi, N. Z., Brohi, S. N., & Almazroi, A. A. (2022). Secure UAV communication protocol using blockchain and lightweight cryptography. Journal of Network and Computer Applications, 198, 103279.es_ES
dcterms.bibliographicCitationLi, B., Zhang, Y., & Chen, J. (2019). Security vulnerabilities and countermeasures in drone systems: A survey. Journal of Computer and System Sciences, 105, 1–16.es_ES
dcterms.bibliographicCitationLin, C. H., Chen, Y. P., & Chen, K. T. (2019). Anti-jamming communication techniques for unmanned aerial vehicles: A survey. IEEE Access, 7, 178656–178673.es_ES
dcterms.bibliographicCitationMagazzeni, D., McInnes, L., & Teso, S. (2022). Secure satellite navigation: Cryptographic approaches in Galileo and beyond. Journal of Navigation, 75(1), 137–154.es_ES
dcterms.bibliographicCitationMotlagh, N. H., Taleb, T., & Zeadally, S. (2017). Internet of drones: Challenges, opportunities, and open issues. IEEE Internet of Things Journal, 3(6), 879–902.es_ES
dcterms.bibliographicCitationMoyes, L. (2021). Autonomous weapons systems: What does 'meaningful human control' really mean in practice? Journal of Conflict & Security Law, 26(2), 205–231. https://doi.org/10.1093/jcsl/krz041es_ES
dcterms.bibliographicCitationOmolara, A. E., Alawida, M., & Abiodun, O. I. (2023). Cyber-physical security threats in unmanned aerial vehicles: Spoofing, jamming and countermeasures. Future Generation Computer Systems, 145, 1–15.es_ES
dcterms.bibliographicCitationPotkonjak, M., & Rabaey, J. M. (2016). Secure embedded systems: Design challenges. Proceedings of the IEEE, 104(6), 1200–1219.es_ES
dcterms.bibliographicCitationPsiaki, M. L., & Humphreys, T. E. (2016). GNSS spoofing and detection. Proceedings of the IEEE, 104(6), 1258–1270.es_ES
dcterms.bibliographicCitationRoff, H. M. (2016). Meaningful human control in weapon systems: A primer. The RUSI Journal, 161(1), 14–21. https://doi.org/10.1080/03071847.2016.1149360es_ES
dcterms.bibliographicCitationSantoro, C. (2019). The ethics of neurotechnology in warfare: Emerging issues. In J. Forge (Ed.), Emerging military technologies: Ethical and legal perspectives (pp. 105–121). Springer.es_ES
dcterms.bibliographicCitationShafique, K., Khawaja, B. A., Sabir, F., Qayyum, A., & Mustaqim, M. (2021). Internet of drones for smart cities: Recent advancements and challenges. IEEE Access, 9, 44583–44600.es_ES
dcterms.bibliographicCitationSharkey, N. (2015). Saying ‘No!’ to lethal autonomous robots. AI & Society, 30(2), 177–183. https://doi.org/10.1007/s00146-014-0541-7es_ES
dcterms.bibliographicCitationSuryadi, K., Putra, D. A., & Setiawan, R. (2020). Firmware security analysis of unmanned aerial vehicle. In 2020 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (pp. 109–114). IEEE.es_ES
dcterms.bibliographicCitationTakahashi, T., Kubo, N., & Arai, T. (2018). A study on GPS spoofing attack against unmanned aerial vehicle. In 2018 International Conference on Unmanned Aircraft Systems (ICUAS) (pp. 1247–1253). IEEE.es_ES
dcterms.bibliographicCitationTlili, M., Ayed, H. B., & Fourati, L. C. (2024). Legal implications of predictive analytics in UAV-based military operations. Journal of Military Ethics, 23(1), 55–73.es_ES
dcterms.bibliographicCitationUNIDIR. (2017). The weaponization of increasingly autonomous technologies: Considering ethics and international law. United Nations Institute for Disarmament Research. https://unidir.org/publication/weaponization-increasingly-autonomous-technologies-considering-ethics-and-international-lawes_ES
dcterms.bibliographicCitationWei, Z., Sun, J., Li, K., & Ma, H. (2024). Lightweight GPS spoofing detection techniques in low-cost UAVs. IEEE Transactions on Aerospace and Electronic Systems, 60(2), 1334–1346.es_ES
dcterms.bibliographicCitationWei, Z., Wang, J., & Sun, J. (2022). PerDet: A perception-based framework for detecting GPS spoofing and jamming in UAVs. Ad Hoc Networks, 130, 102781.es_ES
dcterms.bibliographicCitationWei, Z., Zhang, Y., & Ma, H. (2022). ConstDet: Semantic control anomaly detection under spoofing attacks in UAV navigation. Sensors, 22(9), 3251.es_ES
dcterms.bibliographicCitationYazdani, M., & Kazemi, A. (2020). The internet of drones: Architecture, applications, and challenges. Journal of Industrial Information Integration, 20, 100172.es_ES
dcterms.bibliographicCitationZhang, Y., Chen, J., & Li, B. (2023). A survey on security in unmanned aerial vehicle networks. IEEE Access, 11, 195–210.es_ES
datacite.rightshttp://purl.org/coar/access_right/c_16eces_ES
oaire.resourcetypehttp://purl.org/coar/resource_type/c_2df8fbb1es_ES
oaire.versionhttp://purl.org/coar/version/c_ab4af688f83e57aaes_ES
dc.audiencePúblico generales_ES
dc.contributor.tutorBecerra Ortiz, Jairo Andrés (metodológico)
dc.contributor.tutorBueno Atencio, Aldair José (temático)
dc.identifier.instnameEscuela Superior de Guerra "General Rafael Reyes Prieto"es_ES
dc.identifier.reponameRepositorio ESDEGes_ES
dc.publisher.placeBogotáes_ES
dc.publisher.programMaestría en Ciberseguridad y Ciberdefensaes_ES
dc.relation.citationEdition42 paginases_ES
dc.rights.accessrightsinfo:eu-repo/semantics/restrictedAccesses_ES
dc.rights.ccAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.subject.keywordsCiberdefensaes_ES
dc.subject.keywordsUAVes_ES
dc.subject.keywordsSpoofinges_ES
dc.subject.keywordsJamminges_ES
dc.subject.keywordsEjército Nacional de Colombiaes_ES
dc.subject.keywordsC-UASes_ES
dc.subject.keywordsGuerra Asimétricaes_ES
dc.subject.keywordsCyberdefensees_ES
dc.subject.keywordsUAVes_ES
dc.subject.keywordsColombian National Armyes_ES
dc.subject.keywordsAsymmetric Warfarees_ES
dc.type.driverinfo:eu-repo/semantics/articlees_ES
dc.type.hasversioninfo:eu-repo/semantics/restrictedAccesses_ES
dc.type.spaArtículoes_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

http://creativecommons.org/licenses/by-nc-nd/4.0/
Excepto si se señala otra cosa, la licencia del ítem se describe como http://creativecommons.org/licenses/by-nc-nd/4.0/