Hexacopter Drone

Authors

  • Adarsh Kumar B.E Final Year Students, Dept Of ISE, Dr. Ambedkar Institute of Technology, Bengaluru. Author
  • M Sreyas Krishna B.E Final Year Students, Dept Of ISE, Dr. Ambedkar Institute of Technology, Bengaluru. Author
  • Tarun H R B.E Final Year Students, Dept Of ISE, Dr. Ambedkar Institute of Technology, Bengaluru. Author
  • Nischal H N B.E Final Year Students, Dept Of ISE, Dr. Ambedkar Institute of Technology, Bengaluru. Author
  • Mrs. Neetha Natesh Asst. Prof, Dept Of ISE, Dr. Ambedkar Institute of Technology, Bengaluru. Author
  • Dr. Vidyarani H J Asst. Prof, Dept Of ISE, Dr. Ambedkar Institute of Technology, Bengaluru. Author

Keywords:

GPS, FHSS, UAV, IDS

Abstract

Drones, or Unmanned Aerial Vehicles (UAVs), have become integral to various industries, offering applications in agriculture, surveillance, logistics, and emergency response. However, the increasing reliance on drones raises significant security concerns due to vulnerabilities in their hardware, software, and communication systems. This report provides a comprehensive analysis of drone security, focusing on threats such as GPS spoofing, signal jamming, and unauthorized access. It highlights vulnerabilities in key components like the Pixhawk 2.4.8 flight controller, u-blox 7M GPS module, FS-iA10B receiver, and RFD868UX-SMT telemetry module. The document examines the risks posed by communication protocols, including MAVLink, and the potential for attacks like man-in-the-middle (MitM), replay, and denial-of-service (DoS). It also explores strategies to secure drone systems, emphasizing encryption, geofencing, redundancy, intrusion detection systems (IDS), and secure key exchange mechanisms to prevent hacking and ensure operational safety.

The report further investigates the implementation of frequency hopping spread spectrum (FHSS) technology to enhance signal security and the integration of companion computers for advanced monitoring and anomaly detection. It provides case studies of real-world drone hacking incidents, illustrating the impact of security breaches and the effectiveness of countermeasures. Advanced solutions, such as secure boot processes, firmware updates, and multi-layered encryption protocols, are discussed to safeguard drones against emerging cyber threats. Additionally, it outlines future directions, including the use of machine learning for threat detection and the development of cyber-secure autopilot systems. As drones continue to evolve and play vital roles in critical applications, this report underscores the importance of adopting robust security frameworks to protect against potential attacks and maintain the reliability of UAV operations.

Downloads

Download data is not yet available.

Published

2025-01-13

Issue

Section

Articles

How to Cite

Hexacopter Drone. (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(1), 47-57. https://ijmec.com/index.php/multidisciplinary/article/view/525