Intelligent Drone Systems for Confidential Data Gathering


Authors : Pranav Shivanand Patil; Prasanna Prasad Shenoy; Pavan YDG; Prajwal Prakash Shetti; Sai Gagan Sirigeri; Shobha T

Volume/Issue : Volume 10 - 2025, Issue 1 - January


Google Scholar : https://tinyurl.com/4m5j4fzj

Scribd : https://tinyurl.com/5hdpwsvn

DOI : https://doi.org/10.5281/zenodo.14724977


Abstract : Artificial Intelligence integrated into Unmanned Aerial Vehicles has transformed data collection for a better cause in ensuring enhanced security, operation efficiency, and accuracy. Based on the literature available, the paper goes ahead to describe recent advances in the quest toward secure and autonomous acquisition techniques making use of drones by underlining state-of-the-art approaches: AI-based decision-making processes, real-time threat detection, and multi-layered encryption protocols. The proposed framework has incorporated the advanced model of machine learning, enabling the drones to navigate through difficult terrains and respond dynamically to environmental changes independently. It has enhanced the security and integrity of the data. Due to AI-driven algorithms, the system will be able to continuously monitor and respond to a possible threat. Real-time anomaly detection thus enables any cyberattack and unauthorized access to the data. Secure encryption and communication channels even further enhance this in high-risk or remote environments, disaster locations, and even zones of conflict. In all such scenarios, critical functions like safe surveillance, mapping, and gathering could be conducted without risking lives when the works are undertaken through UAVs. Integration with blockchain enhances the level of integrity of the information and its traceability with a unique permanent ledger to record data throughout, from creation until delivery. The capability for data verification and auditing in this blockchain component will, therefore, be very important for sectors dealing in sensitive or regulated information. By integrating machine learning into the tamper-proof record-keeping capability of blockchain, the system identifies any unauthorized access or tampering at any stage of operation and thus assures integrity in end-to-end data management. Versatile in their nature, their applications span diversified fields: environmental monitoring, emergency response, border security, where the secure, precise handling of data is essential. These would include industrial areas where drones are able to view hazardous areas like oil spills to offer a much safer and efficient alternative than human intervention could. This paper also considers emerging trends and possible applications that underline how continued technological advancements keep further extending the scope for AI-enabled secure UAV operations both in the public and private

Keywords : Secured Data Collection, Encryption, Machine Learning, Blockchain, Autonomous UAV.

References :

  1.  C. Feng, K. Yu, A. Bashir, Y. Al-Otaibi, Y. Lu, S. Chen, and D. Zhang, “Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach,” IEEE Network, vol. 35, no. 1, pp. 130–137, 2021.
  2. J. Pozner, “A Comprehensive List of Commercial Drone Use Cases,” 2020. [Online]. Available: https://www.dronegenuity.com/commercial-drone-use-cases-comprehensive-list.
  3. A. Lemert, M. Meyer, R. Mills, J. Paine, and A. Wong, “Drone Policy Overview,” Purdue Policy Research Institute Policy Briefs, vol. 4, no. 1, p. 5, 2018.
  4. C. Pu, A. Wall, K. Choo, I. Ahmed, and S. Lim, “A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment,” IEEE Internet of Things Journal, pp. 1–1, 2022.
  5. A. Gameros, “The Use of Composite Materials in Unmanned Aerial Vehicles,” [Online]. Available: https://www.azom.com/article.aspx?ArticleID=12234.
  6. S. Zaidi, M. Atiquzzaman, and C. Calafate, “Internet of Flying Things (IoFT): A Survey,” Computer Communications, vol. 165, pp. 53–74, 2021.
  7. C. Pu and L. Carpenter, “Psched: A Priority-Based Service Scheduling Scheme for the Internet of Drones,” IEEE Systems Journal, vol. 15, no. 3, pp. 4230–4239, 2021.
  8. C. Pu and P. Zhu, “Defending against Flooding Attacks in the Internet of Drones Environment,” in Proc. IEEE GLOBECOM, 2021, pp. 1–6.
  9. J. Zhang and Y. Zhang, “A Method for UAV Reconnaissance and Surveillance in Complex Environments,” in Proc. IEEE ICCAR, 2020, pp. 482–485.
  10. C. Pu and P. Zhu, “Mitigating Routing Misbehavior in the Internet of Drones Environment,” in Proc. IEEE VTC2022-Spring, 2022, pp. 1–6.
  11. C. Pu and Y. Li, “Lightweight Authentication Protocol for Unmanned Aerial Vehicles Using Physical Unclonable Function and Chaotic System,” in Proc. IEEE LANMAN, 2020, pp. 1–6.
  12. J. Yaacoub and O. Salman, “Security Analysis of Drones Systems: Attacks, Limitations, and Recommendations,” Internet of Things, vol. 11, p. 100218, 2020.
  13. W. Stallings, Cryptography and Network Security - Principles and Practices, 8th Edition. Pearson, 2020.
  14. M. Ozmen and A. Yavuz, “Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones,” in Proc. IEEE MILCOM, 2018, pp. 1–6.
  15. Y. Li and C. Pu, “Lightweight Digital Signature Solution to Defend Micro Aerial Vehicles Against Man-In-The-Middle Attack,” in Proc. IEEE CSE, 2020, pp. 92–97.
  16. C. Li, L. Guan, J. Lin, B. Luo, Q. Cai, J. Jing, and J. Wang, “Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1196–1213, 2021.
  17. Automated Validation of Internet Security Protocols and Applications. [Online]. Available: http://www.avispa-project.org/.
  18. The Scyther Tool. [Online]. Available: https://people.cispa.io/cas.cremers/scyther/ index.html.
  19. Laptop Computers. [Online]. Available: https://www.hp.com/us-en/shop/cat/laptops.
  20. Latte Panda. [Online]. Available: https://www.lattepanda.com/.
  21. S. Aggarwal, M. Shojafar, N. Kumar, and M. Conti, “A New Secure Data Dissemination Model in Internet of Drones,” in Proc. IEEE ICC, 2019, pp. 1–6.
  22. B. Bera, D. Chattaraj, and A. Das, “Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment,” Computer Communications, vol. 153, pp. 229– 249, 2020.
  23. D. Schwartz, N. Youngs, A. Britto et al., “The Ripple Protocol Consensus Algorithm,” Ripple Labs Inc White Paper, vol. 5, no. 8, p. 151, 2014.
  24. M. Singh, G. Aujla, and R. Bali, “A Deep Learning-Based Blockchain Mechanism for Secure Internet of Drones Environment,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4404–4413, 2021.
  25. D. Wang, L. Yuan, L. Pang, Q. Xu, and Y. He, “Age of Information-Inspired Data Collection and Secure Upload Assisted by the Unmanned Aerial Vehicle and Reconfigurable Intelligent Surface in Maritime Wireless Sensor Networks,” Journal/Conference Name, vol. XX, no. YY, pp. ZZ–ZZ, Year.
  26. C. Pu, A. Wall, I. Ahmed, and K.-K. R. Choo, “SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones,” in Proceedings of the 23rd IEEE International Conference on Mobile Data Management (MDM), 2022.
  27. X. Xu, H. Zhao, H. Yao, and S. Wang, “A Blockchain-enabled Energy Efficient Data Collection System for UAV-assisted IoT,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2431–2443, 2021.
  28. P. Mehta, R. Gupta, and S. Tanwar, “Blockchain envisioned UAV networks: Challenges, solutions, and comparisons,” Computer Communications, vol. 151, pp. 518–538, 2020.
  29. G. Bansal, N. Naren, V. Chamola, B. Sikdar, N. Kumar, and M. Guizani, “Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function,” IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7234–7246, 2020.
  30. M. Henon, “A Two-Dimensional Mapping with A Strange Attractor,” Springer, 1976.
  31. B. Hammi, A. Fayad, R. Khatoun, S. Zeadally, and Y. Begriche, “A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT),” IEEE Systems Journal, vol. 14, no. 3, pp. 3440–3450, 2020.
  32. Dronebuster, accessed on:        June 07, 2020. [Online]. Available: http://flexforce.us/ product/dronebuster/. 

Artificial Intelligence integrated into Unmanned Aerial Vehicles has transformed data collection for a better cause in ensuring enhanced security, operation efficiency, and accuracy. Based on the literature available, the paper goes ahead to describe recent advances in the quest toward secure and autonomous acquisition techniques making use of drones by underlining state-of-the-art approaches: AI-based decision-making processes, real-time threat detection, and multi-layered encryption protocols. The proposed framework has incorporated the advanced model of machine learning, enabling the drones to navigate through difficult terrains and respond dynamically to environmental changes independently. It has enhanced the security and integrity of the data. Due to AI-driven algorithms, the system will be able to continuously monitor and respond to a possible threat. Real-time anomaly detection thus enables any cyberattack and unauthorized access to the data. Secure encryption and communication channels even further enhance this in high-risk or remote environments, disaster locations, and even zones of conflict. In all such scenarios, critical functions like safe surveillance, mapping, and gathering could be conducted without risking lives when the works are undertaken through UAVs. Integration with blockchain enhances the level of integrity of the information and its traceability with a unique permanent ledger to record data throughout, from creation until delivery. The capability for data verification and auditing in this blockchain component will, therefore, be very important for sectors dealing in sensitive or regulated information. By integrating machine learning into the tamper-proof record-keeping capability of blockchain, the system identifies any unauthorized access or tampering at any stage of operation and thus assures integrity in end-to-end data management. Versatile in their nature, their applications span diversified fields: environmental monitoring, emergency response, border security, where the secure, precise handling of data is essential. These would include industrial areas where drones are able to view hazardous areas like oil spills to offer a much safer and efficient alternative than human intervention could. This paper also considers emerging trends and possible applications that underline how continued technological advancements keep further extending the scope for AI-enabled secure UAV operations both in the public and private

Keywords : Secured Data Collection, Encryption, Machine Learning, Blockchain, Autonomous UAV.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe