Artificial Intelligence-Enhanced Intrusion Detection Systems for Drone Security: a Real-Time Evaluation of Algorithmic Efficacy in Mitigating Wireless Vulnerabilities

No Thumbnail Available

Date

2025

Journal Title

Journal ISSN

Volume Title

Publisher

Springer

Open Access Color

Green Open Access

No

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

Advancements in science and technology have provided extensive opportunities and conveniences for mankind. One prime example of these advancements is wireless communication technology. This technology provides users with mobility during communication, initiating a paradigm shift. The convenience of wireless communication technology has initiated the production of versatile devices. Among these technologies developed in recent years for observation and detection purposes in various fields, drones have taken a leading role. Drones, with their versatile applications and access to real-time data, are being used in various operations. With such utilization, humans are increasingly interacting with these systems, leading to natural human-drone interaction. However, in these human-drone interactions, as is the case with many wireless devices, security often becomes an afterthought, leaving many drones vulnerable to cyber attacks. The most effective way to protect against these attackers is to conduct vulnerability analyses of the systems we use against emerging threats and address the detected vulnerabilities. This paper investigates the vulnerabilities of wireless communication regarding remote connectivity usage of a commercial drone, the DJI Ryze Tello, with the aim of examining its weaknesses. In this context, a test environment was created to reveal problems and threats in drone technology through attacks executed on the test environment (DEAUTH ATTACK, Port Scan DOS, DDoS, and MitM). Following the identification of these vulnerabilities, an artificial intelligence-based study was carried out to detect these attacks. In the study, the percentages of attack detection using different algorithms were verified with graphs.

Description

Keywords

Drones, Drone Security, Cyber Security, Artificial Intelligence, Iot, Artificial intelligence, IoT, Drone security, Cyber security, Drones

Turkish CoHE Thesis Center URL

Fields of Science

Citation

WoS Q

Q1

Scopus Q

Q1
OpenCitations Logo
OpenCitations Citation Count
N/A

Source

Cluster Computing

Volume

28

Issue

3

Start Page

End Page

PlumX Metrics
Citations

Scopus : 1

Captures

Mendeley Readers : 13

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
10.33004814

Sustainable Development Goals

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

13

CLIMATE ACTION
CLIMATE ACTION Logo

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

15

LIFE ON LAND
LIFE ON LAND Logo