New Research Designed to Protect Drones From Cyber Threats

Adelaide University researchers have initiated the development of a world-first cybersecurity system designed to protect drones from increasingly sophisticated cyber threats.

A new study led by the Industrial AI Research Centre and published in the international journal Computers and Industrial Engineering, paves the way for safer and more resilient unmanned aerial systems (UAS) that are less vulnerable to hacking, signal disruption and malicious software.

Senior author Professor Javaan Chahl says the research addresses a growing but often overlooked problem: modern drones are effectively flying computers that can be attacked.

“Today’s drones are used in warfare, for emergency response, infrastructure inspections, agriculture, environmental monitoring, logistics and even medical deliveries,” Prof Chahl says.

“They collect large amounts of data, process it onboard, and communicate continuously with operators or cloud-based systems. While this makes drones powerful and versatile, it also makes them vulnerable.”

To solve this, the team has developed a new onboard security architecture based on Software-Defined Wide Area Networking, or SD-WAN, which acts as a smart traffic controller for internet connections.

“Instead of relying on a single link, the drone can use multiple communication pathways at once – such as mobile networks, Wi-Fi or other radio links – and automatically switch between them if one fails or is attacked.”

According to first author Tom Scully, PhD candidate and cybersecurity expert, if a drone is hacked, the impact is just not digital.

“A cyber-attack can interfere with flight controls, disrupt communications, expose sensitive data, and even cause a physical accident.”

The researchers say that many drones still rely on basic communication methods that lack encryption – the digital equivalent of sending sensitive information on an open radio channel.

This means that attackers could intercept data, inject false commands or overwhelm the drone’s systems.

The system also includes a next-generation firewall, which works like an advanced security gate. It monitors incoming and outgoing data in real time, blocks suspicious activity, and ensures that only authorized communications are allowed.

Importantly, this firewall runs directly on the drone, rather than relying on remote systems.

One of the most innovative aspects of the research is the inclusion of malware sandboxing – a technology normally found in large corporate networks – where suspicious files can be opened and examined without risking damage. If malicious behavior is detected, the system can block it immediately.

The researchers have successfully demonstrated the software on a drone platform, using real-world onboard computing hardware with cloud-based control systems.

The team plans to conduct future trials to further validate the system in real time, potentially supporting its adoption in commercial, emergency and government drone operations.

“Our goal is simple,” Scully says. “As drones become part of everyday life, we need to ensure they are not only smart and autonomous, but also secure, resilient and trustworthy.

Tell Us What You Think

Do you have a review, update or anything you would like to add to this news story?

Leave your feedback
Your comment type
Submit

Sign in to keep reading

We're committed to providing free access to quality science. By registering and providing insight into your preferences you're joining a community of over 1m science interested individuals and help us to provide you with insightful content whilst keeping our service free.

or

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.