Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions

Pietro Tedeschi, Fatima Ali Al Nuaimi, Ali Ismail Awad, Enrico Natalizio

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)


The Federal Aviation Administration (FAA) recently introduced a new standard, namely, remote identification, to improve accountability for unmanned aerial vehicles (UAVs) operations. This rule requires UAV operators to broadcast messages revealing sensitive data, such as identity and location on the wireless channel. However, this leads to security and privacy concerns among UAV operators. Unauthorized parties may easily discover the location and identity of a UAV flying in a specific area and launch attacks on it such as using wireless jamming or tracking its activity. This review investigates and systematizes the main weaknesses affecting the Remote ID capability required of modern UAVs, and the approaches through which attackers can exploit these weaknesses to disrupt safety and accountability. Moreover, this article analyzes current solutions that mitigate privacy issues associated with Remote ID. Finally, we identify multiple challenges that require to be addressed by both industry and academia, and we propose future research directions to improve the security and privacy of UAVs.

Original languageEnglish
Pages (from-to)1-12
Number of pages12
JournalIEEE Transactions on Industrial Informatics
Issue number2
Publication statusAccepted/In press - 2023


  • Anonymity
  • Autonomous aerial vehicles
  • Drones
  • privacy
  • Privacy
  • Regulation
  • remote ID
  • Security
  • security
  • Standards
  • unmanned aerial vehicles (UAVs)
  • Wireless fidelity

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions'. Together they form a unique fingerprint.

Cite this