Security of Drone Hacking with Raspberry-Pi using Internet-of-Things

  • Marimuthu* P
  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet-of-Things (IoT) implementation in technological application is developing at higher speed because of more demand from the customers and firms which reply with the advantages proposed through the brilliant and elegant hardware unit. Using Drone concept, it is finding more applications in various areas which rises the threat of data hacking and also poses safety risk to common people. We must appreciate due to online data collection from the application of commercial drones which is widespread across varieties of drone use. Implementation of IoT enabled drones in large quantity causes more number of drones which is exposed to the possibility of being attacked or harmed by the fraudster. This research work examine the various issues concerned to drone security, safety, threat, attacks and illustrate a group of wireless fidelity risk possibilities. My research work has observed different types of threat and attacks on commercial drones. The propagation channel risk analyzed are, Access Denial, Authorization techniques, unauthorized third party presence, illegal source access gain and frame misuse of device characteristic features. Our work prohibits illegal connection entry controlled based on Raspberry-pi & wireless fidelity between access point and drone happens using tell-net with the help on IP address and sign up process. The investigation work explains the execution of methodology which includes attack steps and data security enabling using RSA Algorithm. The main work focuses on the data collected on parrot security OS and to secure the communication in Wi-Fi mode using drone and another devices were analyzed.

Cite

CITATION STYLE

APA

Marimuthu*, P., & Sekar, S. K. (2020). Security of Drone Hacking with Raspberry-Pi using Internet-of-Things. International Journal of Innovative Technology and Exploring Engineering, 9(6), 1629–1634. https://doi.org/10.35940/ijitee.f4124.049620

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free