Artificial Intelligence-Enhanced Intrusion Detection Systems for Drone Security: a Real-Time Evaluation of Algorithmic Efficacy in Mitigating Wireless Vulnerabilities

dc.authorwosid Senturk, Kenan/Aap-4177-2020
dc.authorwosid Gonen, Serkan/Aat-6971-2020
dc.authorwosid Barışkan, Mehmet/Abc-2773-2022
dc.contributor.author Durmaz, Ahmet Kaan
dc.contributor.author Gormus, Ahmet Faruk
dc.contributor.author Gonen, Serkan
dc.contributor.author Bariskan, Mehmet Ali
dc.contributor.author Durmaz, Ahmet Kaan
dc.contributor.other Mechatronics Engineering
dc.date.accessioned 2025-03-15T20:07:13Z
dc.date.available 2025-03-15T20:07:13Z
dc.date.issued 2025
dc.department Kadir Has University en_US
dc.department-temp [Senturk, Kenan; Gonen, Serkan; Bariskan, Mehmet Ali] Istanbul Gelisim Univ, Fac Engn & Architecture, Istanbul, Turkiye; [Gormus, Ahmet Faruk] Arsoft Engn LC, Istanbul, Turkiye; [Durmaz, Ahmet Kaan] Kadir Has Univ, Fac Engn & Nat Sci, Istanbul, Turkiye en_US
dc.description.abstract Advancements in science and technology have provided extensive opportunities and conveniences for mankind. One prime example of these advancements is wireless communication technology. This technology provides users with mobility during communication, initiating a paradigm shift. The convenience of wireless communication technology has initiated the production of versatile devices. Among these technologies developed in recent years for observation and detection purposes in various fields, drones have taken a leading role. Drones, with their versatile applications and access to real-time data, are being used in various operations. With such utilization, humans are increasingly interacting with these systems, leading to natural human-drone interaction. However, in these human-drone interactions, as is the case with many wireless devices, security often becomes an afterthought, leaving many drones vulnerable to cyber attacks. The most effective way to protect against these attackers is to conduct vulnerability analyses of the systems we use against emerging threats and address the detected vulnerabilities. This paper investigates the vulnerabilities of wireless communication regarding remote connectivity usage of a commercial drone, the DJI Ryze Tello, with the aim of examining its weaknesses. In this context, a test environment was created to reveal problems and threats in drone technology through attacks executed on the test environment (DEAUTH ATTACK, Port Scan DOS, DDoS, and MitM). Following the identification of these vulnerabilities, an artificial intelligence-based study was carried out to detect these attacks. In the study, the percentages of attack detection using different algorithms were verified with graphs. en_US
dc.description.woscitationindex Science Citation Index Expanded
dc.identifier.doi 10.1007/s10586-024-04911-8
dc.identifier.issn 1386-7857
dc.identifier.issn 1573-7543
dc.identifier.issue 3 en_US
dc.identifier.scopus 2-s2.0-85217280418
dc.identifier.scopusquality Q1
dc.identifier.uri https://doi.org/10.1007/s10586-024-04911-8
dc.identifier.volume 28 en_US
dc.identifier.wos WOS:001401578800005
dc.identifier.wosquality Q1
dc.language.iso en en_US
dc.publisher Springer en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.scopus.citedbyCount 0
dc.subject Drones en_US
dc.subject Drone Security en_US
dc.subject Cyber Security en_US
dc.subject Artificial Intelligence en_US
dc.subject Iot en_US
dc.title Artificial Intelligence-Enhanced Intrusion Detection Systems for Drone Security: a Real-Time Evaluation of Algorithmic Efficacy in Mitigating Wireless Vulnerabilities en_US
dc.type Article en_US
dc.wos.citedbyCount 0
dspace.entity.type Publication
relation.isAuthorOfPublication 11454812-48b2-4ae9-9938-b84ed95e031c
relation.isAuthorOfPublication.latestForDiscovery 11454812-48b2-4ae9-9938-b84ed95e031c
relation.isOrgUnitOfPublication 01f3d407-6823-4ad3-8298-0b6a2a6e5cff
relation.isOrgUnitOfPublication.latestForDiscovery 01f3d407-6823-4ad3-8298-0b6a2a6e5cff

Files