Artificial Intelligence-Enhanced Intrusion Detection Systems for Drone Security: a Real-Time Evaluation of Algorithmic Efficacy in Mitigating Wireless Vulnerabilities

dc.authorscopusid26424750000
dc.authorscopusid59490321500
dc.authorscopusid57201743399
dc.authorscopusid57447588400
dc.authorscopusid59548736500
dc.contributor.authorSenturk, K.
dc.contributor.authorGormus, A.F.
dc.contributor.authorGonen, S.
dc.contributor.authorBariskan, M.A.
dc.contributor.authorDurmaz, A.K.
dc.date.accessioned2025-03-15T20:07:13Z
dc.date.available2025-03-15T20:07:13Z
dc.date.issued2025
dc.departmentKadir Has Universityen_US
dc.department-tempSenturk K., Faculty of Engineering & Architecture, Istanbul Gelisim University, Istanbul, Türkiye; Gormus A.F., Arsoft Engineering LC, Istanbul, Türkiye; Gonen S., Faculty of Engineering & Architecture, Istanbul Gelisim University, Istanbul, Türkiye; Bariskan M.A., Faculty of Engineering & Architecture, Istanbul Gelisim University, Istanbul, Türkiye; Durmaz A.K., Faculty of Engineering and Natural Sciences, Kadir Has University, Istanbul, Türkiyeen_US
dc.description.abstractAdvancements in science and technology have provided extensive opportunities and conveniences for mankind. One prime example of these advancements is wireless communication technology. This technology provides users with mobility during communication, initiating a paradigm shift. The convenience of wireless communication technology has initiated the production of versatile devices. Among these technologies developed in recent years for observation and detection purposes in various fields, drones have taken a leading role. Drones, with their versatile applications and access to real-time data, are being used in various operations. With such utilization, humans are increasingly interacting with these systems, leading to natural human-drone interaction. However, in these human-drone interactions, as is the case with many wireless devices, security often becomes an afterthought, leaving many drones vulnerable to cyber attacks. The most effective way to protect against these attackers is to conduct vulnerability analyses of the systems we use against emerging threats and address the detected vulnerabilities. This paper investigates the vulnerabilities of wireless communication regarding remote connectivity usage of a commercial drone, the DJI Ryze Tello, with the aim of examining its weaknesses. In this context, a test environment was created to reveal problems and threats in drone technology through attacks executed on the test environment (DEAUTH ATTACK, Port Scan DOS, DDoS, and MitM). Following the identification of these vulnerabilities, an artificial intelligence-based study was carried out to detect these attacks. In the study, the percentages of attack detection using different algorithms were verified with graphs. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.en_US
dc.identifier.doi10.1007/s10586-024-04911-8
dc.identifier.issn1386-7857
dc.identifier.issue3en_US
dc.identifier.scopus2-s2.0-85217280418
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.1007/s10586-024-04911-8
dc.identifier.urihttps://hdl.handle.net/20.500.12469/7237
dc.identifier.volume28en_US
dc.identifier.wosqualityQ1
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.relation.ispartofCluster Computingen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectCyber Securityen_US
dc.subjectDrone Securityen_US
dc.subjectDronesen_US
dc.subjectIoten_US
dc.titleArtificial Intelligence-Enhanced Intrusion Detection Systems for Drone Security: a Real-Time Evaluation of Algorithmic Efficacy in Mitigating Wireless Vulnerabilitiesen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files