[{“box”:0,”content”:”n[if 992 equals=”Open Access”]n
n
Open Access
nn
n
n[/if 992]n[if 2704 equals=”Yes”]n
nThis is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.n
n[/if 2704]n
n
n
nn
n
Syed Salman Naqvi,
n t
n
n[/foreach]
n
n[if 2099 not_equal=”Yes”]n
- [foreach 286] [if 1175 not_equal=””]n t
- Independent Researcher, Cyber Security Specialist, Hobart, TAS 7000, Launceston, Tasmania, Tasmania, Australia
n[/if 1175][/foreach]
n[/if 2099][if 2099 equals=”Yes”][/if 2099]n
Abstract
n
n
nThis paper explores the current cybersecurity landscape surrounding Unmanned Aerial Systems (UAS), commonly known as drones. With rapid growth in commercial and recreational drone use, the risk of cyber-attacks has also increased. This study highlights real-world vulnerabilities such as GPS spoofing, Wi-Fi hijacking, and firmware exploitation. It also suggests practical mitigation techniques, including encryption, real-time anomaly detection using machine learning, and secure communication protocols. The goal is to support researchers, developers, and regulators in creating more secure drone systems.
What are the main findings?
The research provides actionable guidance for engineers and regulators in securing drone operations.
Findings support the development of robust cybersecurity frameworks for drone integration in civilian and defense sectors.
What is the implication of the main finding?
The identification of real-world vulnerabilities like GPS spoofing, Wi-Fi hijacking, and firmware exploits underscores that drone manufacturers and integrators must bake robust security measures—such as encrypted communications, authenticated GPS modules, and digitally signed firmware—into every stage of system design rather than treating security as an afterthought.
To keep pace with evolving cyber threats, operators and regulators alike will need to adopt and enforce standards around practices such as real-time anomaly detection (leveraging lightweight ML models onboard), rotating encryption keys, and frequency-hopping RF protocols, ensuring that both commercial and recreational drone deployments maintain a baseline of resilience against sophisticated attacks.nn
n
Keywords: Unmanned aerial systems: drone cyber security: GPS spoofing: Wifi hijacking
n[if 424 equals=”Regular Issue”][This article belongs to International Journal on Drones ]
n
n
n
n
nSyed Salman Naqvi. [if 2584 equals=”][226 wpautop=0 striphtml=1][else]A Study on Drone Hacking: Vulnerabilities and Mitigation Techniques[/if 2584]. International Journal on Drones. 18/09/2025; 01(02):1-8.
n
nSyed Salman Naqvi. [if 2584 equals=”][226 striphtml=1][else]A Study on Drone Hacking: Vulnerabilities and Mitigation Techniques[/if 2584]. International Journal on Drones. 18/09/2025; 01(02):1-8. Available from: https://journals.stmjournals.com/ijd/article=18/09/2025/view=0
nn
n
n[if 992 not_equal=”Open Access”]n
n
n[/if 992]n
nn
Browse Figures
n
n
n[/if 379]
n
n
n
References n
n[if 1104 equals=””]n
- Humphreys, T.E. Protecting UAVs from GPS Spoofing. IEEE Secur. Priv. 2023, Volume, page range.
- Pidikiti, S.; et al. Drone Wi-Fi Security Analysis. Wirel. Netw. 2024, Volume, page range.
- Trend Micro. Firmware Bugs in DJI Systems. Res. Rep. 2024, Volume, page range.
- Sharma, R. Command Injection Attacks on UAV Protocols. CyberTech J. 2025, Volume, page range.
- Khan, A.; et al. Bluetooth and RF Vulnerabilities in Drones. Infosec Today 2023, Volume, page range.
- Garg, S.; et al. ML-Based Intrusion Detection for IoT Systems. Cybersecur. 2024, Volume, page range.
- Raza, A.; Hardy, L.; Roehrer, E.; Yeom, S.; Kang, B.H. GPSPiChain: Blockchain and AI-Based Self-Contained Anomaly Detection Family Security System in Smart Home. Journal of Systems Science and Systems Engineering, 2021, 30, 433–449.
- Hameed, K.; Raza, A.; Garg, S.; Amin, M.B. A Blockchain-Based Decentralised and Dynamic Authorisation Scheme for the Internet of Things. SSRN, 2023.
- Omolara, A.E.; Alawida, M.; Abiodun, O.I. Drone Cybersecurity Issues, Solutions, Trend Insights and Future Perspectives: A Survey. Neural Computing and Applications, 2023, 35, 23063–23101.
- Pyzynski, M.; Balcerzak, T. Cybersecurity of the Unmanned Aircraft System (UAS). Journal of Intelligent & Robotic Systems, 2021, 102, 35
nn[/if 1104][if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
n[/foreach]
n[/if 1104]
n
nn[if 1114 equals=”Yes”]n
n[/if 1114]
n
n
n
| Volume | 01 | |
| [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] | 02 | |
| Received | 24/07/2025 | |
| Accepted | 08/09/2025 | |
| Published | 18/09/2025 | |
| Retracted | ||
| Publication Time | 56 Days |
n
n
nn
n
PlumX Metrics
n
n
n[if 1746 equals=”Retracted”]n
[/if 1746]nnn
nnn”}]

