AI-Powered Defense Mechanisms for Securing Autonomous Drones Against Cyber Threats

Authors

  • Nischay Reddy Mitta Independent Researcher, USA Author

Keywords:

autonomous drones, AI-powered defense, machine learning, cyber threats

Abstract

The use of autonomous drones has increased significantly in various sectors, including military, agriculture, and delivery services. However, their growing reliance on digital communication and autonomous decision-making makes them susceptible to cyber threats, which can lead to severe consequences such as data breaches, hijacking, or system malfunctions. This paper explores the integration of artificial intelligence (AI) into defense mechanisms designed to secure autonomous drones from evolving cyber threats. It examines the application of machine learning models for anomaly detection, intrusion prevention systems (IPS), and real-time threat intelligence to enhance drone security. The paper also discusses the challenges of implementing AI-powered solutions in drones, focusing on performance, resource constraints, and adaptive capabilities. Through a review of current research and case studies, this paper outlines the effectiveness of AI-based defense strategies and provides recommendations for future advancements in autonomous drone security.

Downloads

Download data is not yet available.

References

Al-Riyami, A., & Al-Sabahi, M. (2022). Cybersecurity challenges in autonomous drone systems: A survey. Journal of Cybersecurity and Information Protection, 9(3), 45-60.

Zhang, S., & Wang, Y. (2023). AI-based intrusion detection systems for securing UAV communications. International Journal of Drone Security, 12(2), 78-91.

Liu, Y., & Zhang, J. (2021). Real-time threat intelligence for autonomous drone defense. Cyber Defense Journal, 19(4), 112-125.

Kumar, V., & Singh, S. (2020). Machine learning models for anomaly detection in autonomous drone operations. Journal of Machine Learning in Cybersecurity, 14(1), 33-47.

Madupati, Bhanuprakash. "Web Development in the Next Generation Using AI and Data Science." Available at SSRN 5076682 (2022).

Gupta, Neha, and Vivek Kapoor. "Hybrid cryptographic technique to secure data in web application." Journal of Discrete Mathematical Sciences and Cryptography 23.1 (2020): 125-135.

Kalluri, Kartheek. "ENHANCING CUSTOMER SERVICE EFFICIENCY: A COMPARATIVE STUDY OF PEGA'S AI-DRIVEN SOLUTIONS."

S. Kumari, “Agile Cloud Transformation in Enterprise Systems: Integrating AI for Continuous Improvement, Risk Management, and Scalability”, Australian Journal of Machine Learning Research & Applications, vol. 2, no. 1, pp. 416–440, Mar. 2022

Madupati, Bhanuprakash. "Data Science in Public Relations Software Development." Available at SSRN 5076688 (2022).

Gondaliya, Jayraj, et al. "Hybrid security RSA algorithm in application of web service." 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 2018.

Kalluri, Kartheek. "Federate Machine Learning: A Secure Paradigm for Collaborative AI in Privacy-Sensitive Domains." International Journal on Science and Technolo-gy 13.4 (2022): 1-13.

S. Kumari, “AI-Enhanced Agile Development for Digital Product Management: Leveraging Data-Driven Insights for Iterative Improvement and Market Adaptation”, Adv. in Deep Learning Techniques, vol. 2, no. 1, pp. 49–68, Mar. 2022

Singu, Santosh Kumar. "Impact of Data Warehousing on Business Intelligence and Analytics." ESP Journal of Engineering & Technology Advancements 2.2 (2022): 101-113.

Madupati, Bhanuprakash. "Machine Learning for Cybersecurity in Industrial Control Systems (ICS)." Available at SSRN 5076696 (2022).

Kalluri, Kartheek. "Optimizing Financial Services Implementing Pega's Decisioning Capabilities for Fraud Detection." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 10.1 (2022): 1-9.

S. Kumari, “AI-Driven Cybersecurity in Agile Cloud Transformation: Leveraging Machine Learning to Automate Threat Detection, Vulnerability Management, and Incident Response”, J. of Art. Int. Research, vol. 2, no. 1, pp. 286–305, Apr. 2022

Singu, Santosh Kumar. "ETL Process Automation: Tools and Techniques." ESP Journal of Engineering & Technology Advancements 2.1 (2022): 74-85.

S. Kumari, “AI-Driven Cloud Transformation for Product Management: Optimizing Resource Allocation, Cost Management, and Market Adaptation in Digital Products ”, IoT and Edge Comp. J, vol. 2, no. 1, pp. 29–54, Jun. 2022

Madupati, Bhanuprakash. "Cybersecurity in Day-to-Day Life: A Technical Perspective." Available at SSRN 5076692 (2022).

Kalluri, Kartheek. "Blockchain Augment AI: Securing Decision Pipelines Decentralized in Systems."

S. Kumari, “Cybersecurity in Digital Transformation: Using AI to Automate Threat Detection and Response in Multi-Cloud Infrastructures ”, J. Computational Intel. & Robotics, vol. 2, no. 2, pp. 9–27, Aug. 2022

Madupati, Bhanuprakash. "Cybersecurity in the Airline Industry: A Technical Perspective." Available at SSRN 5076684 (2022)

Downloads

Published

18-12-2023

How to Cite

[1]
Nischay Reddy Mitta, “AI-Powered Defense Mechanisms for Securing Autonomous Drones Against Cyber Threats”, American J Auton Syst Robot Eng, vol. 3, pp. 103–108, Dec. 2023, Accessed: Dec. 12, 2025. [Online]. Available: https://ajasre.org/index.php/publication/article/view/39