Mostrar el registro sencillo del ítem
Estrategias de Ciberdefensa para contrarrestar el uso malicioso de drones en el Ejército Nacional de Colombia
| dc.contributor.author | Martinez Rueda, Julián Aldeisy | |
| dc.coverage.spatial | Bogota, Escuela Superior de Guerra "General Rafael Reyes Prieto" | |
| dc.date.accessioned | 2026-04-28T20:44:08Z | |
| dc.date.available | 2026-04-28T20:44:08Z | |
| dc.date.issued | 2025 | |
| dc.date.submitted | 2025 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14205/11747 | |
| dc.description.abstract | La proliferación de sistemas aéreos no tripulados (drones) y su adaptación para fines maliciosos constituye una amenaza asimétrica creciente para la seguridad nacional, desafiando las capacidades defensivas del Ejército Nacional de Colombia. Este artículo analiza las vulnerabilidades técnicas de los drones tipo multirrotor, con énfasis en sus sistemas de comunicación, navegación y firmware, y evalúa las herramientas de ciberseguridad actuales, incluyendo métodos de detección de spoofing y jamming. A través de una revisión sistemática de literatura especializada y del análisis de modelos internacionales, se propone un protocolo de ciberdefensa adaptado al contexto colombiano que incorpora elementos tecnológicos, jurídicos y éticos en el ámbito de la dimensión cognitiva del ciberespacio. Los hallazgos evidencian la necesidad de fortalecer la doctrina nacional en ciberseguridad mediante capacidades autónomas, interoperables y humanamente supervisadas. | es_ES |
| dc.description.abstract | The proliferation of unmanned aerial systems (drones) and their adaptation for malicious purposes pose an increasing asymmetric threat to national security, challenging the defensive capabilities of the Colombian National Army. This article analyzes the technical vulnerabilities of multirotor UAVs, focusing on their communication, navigation, and firmware systems, and evaluates current cybersecurity tools, including spoofing and jamming detection techniques. Through a systematic literature review and an analysis of international models, a cybersecurity protocol is proposed, tailored to the Colombian context, which integrates technological, legal, and ethical components within the cognitive dimension of cyberspace. The findings highlight the need to strengthen national cybersecurity doctrine through autonomous, interoperable capabilities that remain under meaningful human control. | es_ES |
| dc.format.extent | 42 paginas | |
| dc.format.mimetype | application/pdf | es_ES |
| dc.language.iso | spa | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.title | Estrategias de Ciberdefensa para contrarrestar el uso malicioso de drones en el Ejército Nacional de Colombia | es_ES |
| dc.title.alternative | Cyberdefense strategies to counter the malicious use of drones in the Colombian National Army | es_ES |
| dcterms.bibliographicCitation | Alrajeh, N. A., Khan, M. A., & Masood, S. (2019). Security challenges in unmanned aerial vehicles (UAVs): A survey. International Journal of Advanced Computer Science and Applications, 10(1), 62–71. | es_ES |
| dcterms.bibliographicCitation | American Psychological Association. (2020). Publication manual of the American Psychological Association (7th ed.). | es_ES |
| dcterms.bibliographicCitation | Cortellese, N. (2022). Algorithmic warfare and human rights: Charting the course of an arms race. International Review of Law, Computers & Technology. | es_ES |
| dcterms.bibliographicCitation | Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 618–623). IEEE. | es_ES |
| dcterms.bibliographicCitation | Fink, A. (2019). Conducting research literature reviews: From the internet to paper (5th ed.). Sage Publications. | es_ES |
| dcterms.bibliographicCitation | Floreano, D., & Wood, R. J. (2015). Science, technology and the future of small flying robots. Nature, 521(7553), 460–466. | es_ES |
| dcterms.bibliographicCitation | Gao, G., Grove, T., Lo, S., & Lachapelle, G. (2019). Anti-jamming and anti-spoofing techniques for GNSS: Recent advances. Sensors, 19(19), 4315. | es_ES |
| dcterms.bibliographicCitation | Gunduz, M. Z., & Ozdemir, M. A. (2020). Internet of drones (IoD) security issues and challenges. In Cyber Security and Privacy: Second International Conference, ICSP 2020 (pp. 71–85). Springer. | es_ES |
| dcterms.bibliographicCitation | Gupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2018). Security and privacy challenges in unmanned aerial vehicles. IEEE Internet of Things Journal, 5(5), 4295–4304. | es_ES |
| dcterms.bibliographicCitation | Haque, S., Azad, M. A., Rahman, M. S., & Hasan, M. K. (2024). Zero trust architecture and deep learning: Enhancing cyber defense of UAV networks. Computers & Security, 134, 103175. | es_ES |
| dcterms.bibliographicCitation | Hasan, M., Azad, M. A., & Rahman, M. S. (2022). Predictive cyber defense frameworks in autonomous aerial vehicles. IEEE Transactions on Aerospace and Electronic Systems, 58(6), 5012–5024. | es_ES |
| dcterms.bibliographicCitation | Horowitz, M. C., Allen, G., Bekoff, A., & Scharre, P. (2018). Artificial intelligence and international security. Belfer Center for Science and International Affairs, Harvard Kennedy School. https://www.belfercenter.org/publication/artificial-intelligence-and-international-security | es_ES |
| dcterms.bibliographicCitation | Islam, S. H., Islam, M. M., Sarker, I. H., & Hossain, M. A. (2021). A systematic literature review on security and privacy issues in unmanned aerial vehicles. Journal of Network and Computer Applications, 184, 103075. | es_ES |
| dcterms.bibliographicCitation | Kerns, A. J., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4), 617–636. | es_ES |
| dcterms.bibliographicCitation | Khan, S., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). UAVs cyber security and threats analysis. Computer Standards & Interfaces, 69, 103408. | es_ES |
| dcterms.bibliographicCitation | Khan, S., Jhanjhi, N. Z., Brohi, S. N., & Almazroi, A. A. (2022). Secure UAV communication protocol using blockchain and lightweight cryptography. Journal of Network and Computer Applications, 198, 103279. | es_ES |
| dcterms.bibliographicCitation | Li, B., Zhang, Y., & Chen, J. (2019). Security vulnerabilities and countermeasures in drone systems: A survey. Journal of Computer and System Sciences, 105, 1–16. | es_ES |
| dcterms.bibliographicCitation | Lin, C. H., Chen, Y. P., & Chen, K. T. (2019). Anti-jamming communication techniques for unmanned aerial vehicles: A survey. IEEE Access, 7, 178656–178673. | es_ES |
| dcterms.bibliographicCitation | Magazzeni, D., McInnes, L., & Teso, S. (2022). Secure satellite navigation: Cryptographic approaches in Galileo and beyond. Journal of Navigation, 75(1), 137–154. | es_ES |
| dcterms.bibliographicCitation | Motlagh, N. H., Taleb, T., & Zeadally, S. (2017). Internet of drones: Challenges, opportunities, and open issues. IEEE Internet of Things Journal, 3(6), 879–902. | es_ES |
| dcterms.bibliographicCitation | Moyes, L. (2021). Autonomous weapons systems: What does 'meaningful human control' really mean in practice? Journal of Conflict & Security Law, 26(2), 205–231. https://doi.org/10.1093/jcsl/krz041 | es_ES |
| dcterms.bibliographicCitation | Omolara, A. E., Alawida, M., & Abiodun, O. I. (2023). Cyber-physical security threats in unmanned aerial vehicles: Spoofing, jamming and countermeasures. Future Generation Computer Systems, 145, 1–15. | es_ES |
| dcterms.bibliographicCitation | Potkonjak, M., & Rabaey, J. M. (2016). Secure embedded systems: Design challenges. Proceedings of the IEEE, 104(6), 1200–1219. | es_ES |
| dcterms.bibliographicCitation | Psiaki, M. L., & Humphreys, T. E. (2016). GNSS spoofing and detection. Proceedings of the IEEE, 104(6), 1258–1270. | es_ES |
| dcterms.bibliographicCitation | Roff, H. M. (2016). Meaningful human control in weapon systems: A primer. The RUSI Journal, 161(1), 14–21. https://doi.org/10.1080/03071847.2016.1149360 | es_ES |
| dcterms.bibliographicCitation | Santoro, C. (2019). The ethics of neurotechnology in warfare: Emerging issues. In J. Forge (Ed.), Emerging military technologies: Ethical and legal perspectives (pp. 105–121). Springer. | es_ES |
| dcterms.bibliographicCitation | Shafique, K., Khawaja, B. A., Sabir, F., Qayyum, A., & Mustaqim, M. (2021). Internet of drones for smart cities: Recent advancements and challenges. IEEE Access, 9, 44583–44600. | es_ES |
| dcterms.bibliographicCitation | Sharkey, N. (2015). Saying ‘No!’ to lethal autonomous robots. AI & Society, 30(2), 177–183. https://doi.org/10.1007/s00146-014-0541-7 | es_ES |
| dcterms.bibliographicCitation | Suryadi, K., Putra, D. A., & Setiawan, R. (2020). Firmware security analysis of unmanned aerial vehicle. In 2020 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (pp. 109–114). IEEE. | es_ES |
| dcterms.bibliographicCitation | Takahashi, T., Kubo, N., & Arai, T. (2018). A study on GPS spoofing attack against unmanned aerial vehicle. In 2018 International Conference on Unmanned Aircraft Systems (ICUAS) (pp. 1247–1253). IEEE. | es_ES |
| dcterms.bibliographicCitation | Tlili, M., Ayed, H. B., & Fourati, L. C. (2024). Legal implications of predictive analytics in UAV-based military operations. Journal of Military Ethics, 23(1), 55–73. | es_ES |
| dcterms.bibliographicCitation | UNIDIR. (2017). The weaponization of increasingly autonomous technologies: Considering ethics and international law. United Nations Institute for Disarmament Research. https://unidir.org/publication/weaponization-increasingly-autonomous-technologies-considering-ethics-and-international-law | es_ES |
| dcterms.bibliographicCitation | Wei, Z., Sun, J., Li, K., & Ma, H. (2024). Lightweight GPS spoofing detection techniques in low-cost UAVs. IEEE Transactions on Aerospace and Electronic Systems, 60(2), 1334–1346. | es_ES |
| dcterms.bibliographicCitation | Wei, Z., Wang, J., & Sun, J. (2022). PerDet: A perception-based framework for detecting GPS spoofing and jamming in UAVs. Ad Hoc Networks, 130, 102781. | es_ES |
| dcterms.bibliographicCitation | Wei, Z., Zhang, Y., & Ma, H. (2022). ConstDet: Semantic control anomaly detection under spoofing attacks in UAV navigation. Sensors, 22(9), 3251. | es_ES |
| dcterms.bibliographicCitation | Yazdani, M., & Kazemi, A. (2020). The internet of drones: Architecture, applications, and challenges. Journal of Industrial Information Integration, 20, 100172. | es_ES |
| dcterms.bibliographicCitation | Zhang, Y., Chen, J., & Li, B. (2023). A survey on security in unmanned aerial vehicle networks. IEEE Access, 11, 195–210. | es_ES |
| datacite.rights | http://purl.org/coar/access_right/c_16ec | es_ES |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_2df8fbb1 | es_ES |
| oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | es_ES |
| dc.audience | Público general | es_ES |
| dc.contributor.tutor | Becerra Ortiz, Jairo Andrés (metodológico) | |
| dc.contributor.tutor | Bueno Atencio, Aldair José (temático) | |
| dc.identifier.instname | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.identifier.reponame | Repositorio ESDEG | es_ES |
| dc.publisher.place | Bogotá | es_ES |
| dc.publisher.program | Maestría en Ciberseguridad y Ciberdefensa | es_ES |
| dc.relation.citationEdition | 42 paginas | es_ES |
| dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.subject.keywords | Ciberdefensa | es_ES |
| dc.subject.keywords | UAV | es_ES |
| dc.subject.keywords | Spoofing | es_ES |
| dc.subject.keywords | Jamming | es_ES |
| dc.subject.keywords | Ejército Nacional de Colombia | es_ES |
| dc.subject.keywords | C-UAS | es_ES |
| dc.subject.keywords | Guerra Asimétrica | es_ES |
| dc.subject.keywords | Cyberdefense | es_ES |
| dc.subject.keywords | UAV | es_ES |
| dc.subject.keywords | Colombian National Army | es_ES |
| dc.subject.keywords | Asymmetric Warfare | es_ES |
| dc.type.driver | info:eu-repo/semantics/article | es_ES |
| dc.type.hasversion | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.type.spa | Artículo | es_ES |


