{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T20:41:16Z","timestamp":1778100076286,"version":"3.51.4"},"reference-count":47,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T00:00:00Z","timestamp":1648512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100009392","name":"Prince Sattam Bin Abdulaziz University","doi-asserted-by":"publisher","award":["IF-PSAU-2021\/01\/17795"],"award-info":[{"award-number":["IF-PSAU-2021\/01\/17795"]}],"id":[{"id":"10.13039\/100009392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Drone advancements have ushered in new trends and possibilities in a variety of sectors, particularly for small-sized drones. Drones provide navigational interlocation services, which are made possible by the Internet of Things (IoT). Drone networks, on the other hand, are subject to privacy and security risks due to design flaws. To achieve the desired performance, it is necessary to create a protected network. The goal of the current study is to look at recent privacy and security concerns influencing the network of drones (NoD). The current research emphasizes the importance of a security-empowered drone network to prevent interception and intrusion. A hybrid ML technique of logistic regression and random forest is used for the purpose of classification of data instances for maximal efficacy. By incorporating sophisticated artificial-intelligence-inspired techniques into the framework of a NoD, the proposed technique mitigates cybersecurity vulnerabilities while making the NoD protected and secure. For validation purposes, the suggested technique is tested against a challenging dataset, registering enhanced performance results in terms of temporal efficacy (34.56 s), statistical measures (precision (97.68%), accuracy (98.58%), recall (98.59%), F-measure (99.01%), reliability (94.69%), and stability (0.73).<\/jats:p>","DOI":"10.3390\/s22072630","type":"journal-article","created":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T21:45:51Z","timestamp":1648590351000},"page":"2630","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["Smart Cybersecurity Framework for IoT-Empowered Drones: Machine Learning Perspective"],"prefix":"10.3390","volume":"22","author":[{"given":"Abdulaziz","family":"Aldaej","sequence":"first","affiliation":[{"name":"College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4525-0738","authenticated-orcid":false,"given":"Tariq Ahamed","family":"Ahanger","sequence":"additional","affiliation":[{"name":"College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9440-7669","authenticated-orcid":false,"given":"Mohammed","family":"Atiquzzaman","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Oklahoma, Norman, OK 73019, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8188-2601","authenticated-orcid":false,"given":"Imdad","family":"Ullah","sequence":"additional","affiliation":[{"name":"College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia"}]},{"given":"Muhammad","family":"Yousufudin","sequence":"additional","affiliation":[{"name":"College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2022,3,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Diaz Linares, I., Pardo, A., Patch, E., Dehghantanha, A., and Choo, K.K.R. (2022). IoT Privacy, Security and Forensics Challenges: An Unmanned Aerial Vehicle (UAV) Case Study. Handbook of Big Data Analytics and Forensics, Springer.","DOI":"10.1007\/978-3-030-74753-4_2"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MNET.011.2000170","article-title":"Design guidelines for blockchain-assisted 5G-UAV networks","volume":"35","author":"Aloqaily","year":"2021","journal-title":"IEEE Netw."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Aldhyani, T.H., and Alkahtani, H. (2022). Attacks to automatous vehicles: A deep learning algorithm for cybersecurity. Sensors, 22.","DOI":"10.3390\/s22010360"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Aloqaily, M., Hussain, R., Khalaf, D., Hani, D., and Oracevic, A. (2022). On the Role of Futuristic Technologies in Securing UAV-Supported Autonomous Vehicles. IEEE Consum. Electron. Mag.","DOI":"10.1109\/MCE.2022.3141065"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Abdani, S.R., Zulkifley, M.A., and Zulkifley, N.H. (2020, January 17\u201318). A lightweight deep learning model for covid-19 detection. Proceedings of the 2020 IEEE Symposium on Industrial Electronics & Applications (ISIEA), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ISIEA49364.2020.9188133"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/s11276-021-02861-2","article-title":"Testing Solar-MAODV energy efficient model on various modulation techniques in wireless sensor and optical networks","volume":"28","author":"Angurala","year":"2022","journal-title":"Wirel. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"132547","DOI":"10.1016\/j.chemosphere.2021.132547","article-title":"Continuous and near real-time measurements of gaseous elemental mercury (GEM) from an Unmanned Aerial Vehicle: A new approach to investigate the 3D distribution of GEM in the lower atmosphere","volume":"288","author":"Cabassi","year":"2022","journal-title":"Chemosphere"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., and Campolo, C. (2020, January 19\u201321). Ad-Hoc, Mobile, and Wireless Networks. Proceedings of the 19th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020, Bari, Italy.","DOI":"10.1007\/978-3-030-61746-2"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Supramongkonset, J., Duangsuwan, S., and Promwong, S. (2021, January 1\u20133). A WiFi Link Budget Analysis of Drone-based Communication and IoT Ground Sensors. Proceedings of the 2021 7th International Conference on Engineering, Applied Sciences and Technology (ICEAST), Pattaya, Thailand.","DOI":"10.1109\/ICEAST52143.2021.9426305"},{"key":"ref_10","first-page":"108350Q","article-title":"Unmanned optical warning system for drones","volume":"Volume 10835","author":"Yin","year":"2018","journal-title":"Global Intelligence Industry Conference (GIIC 2018)"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1093\/isp\/eky002","article-title":"Drones along borders: Border security UAVs in the United States and the European Union","volume":"19","author":"Koslowski","year":"2018","journal-title":"Int. Stud. Perspect."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ozmen, M.O., and Yavuz, A.A. (2018, January 29\u201331). Dronecrypt-an efficient cryptographic framework for small aerial drones. Proceedings of the MILCOM 2018\u20132018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA.","DOI":"10.1109\/MILCOM.2018.8599784"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"9718580","DOI":"10.1155\/2022\/9718580","article-title":"An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones","volume":"2022","author":"Khan","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_14","unstructured":"Ranjitha, K., Pathak, D., Tammana, P., Antony, F.A., and Alladi, T. (2022, January 4\u20138). Accelerating PUF-based UAV Authentication Protocols Using Programmable Switch. Proceedings of the 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India."},{"key":"ref_15","first-page":"1027735","article-title":"Deep Learning and Improved HMM Training Algorithm and Its Analysis in Facial Expression Recognition of Sports Athletes","volume":"2022","author":"Li","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Tuli, E.A., Golam, M., Kim, D.S., and Lee, J.M. (2022). Performance Enhancement of Optimized Link State Routing Protocol by Parameter Configuration for UANET. Drones, 6.","DOI":"10.3390\/drones6010022"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/TII.2021.3101651","article-title":"A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems","volume":"18","author":"Khan","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_18","unstructured":"Maghazei, O., Netland, T.H., Frauenberger, D., and Thalmann, T. Automatic drones for factory inspection: The role of virtual simulation. Proceedings of the IFIP International Conference on Advances in Production Management Systems."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"107029","DOI":"10.1016\/j.compeleceng.2021.107029","article-title":"Building synergetic consensus for dynamic gas-plume tracking applications using UAV platforms","volume":"91","author":"Kapoutsis","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Nguyen, H.P.D., and Nguyen, D.D. (2021). Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication. Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead, Springer.","DOI":"10.1007\/978-3-030-63339-4_7"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kumar, A., Elsersy, M., Darwsih, A., and Hassanien, A.E. (2021). Drones combat COVID-19 epidemic: Innovating and monitoring approach. Digital Transformation and Emerging Technologies for Fighting COVID-19 Pandemic: Innovative Approaches, Springer.","DOI":"10.1007\/978-3-030-63307-3_11"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Aydin, Y., Kurt, G.K., Ozdemir, E., and Yanikomeroglu, H. (2021, January 12\u201314). Group authentication for drone swarms. Proceedings of the 2021 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), Cleveland, OH, USA.","DOI":"10.1109\/WiSEE50203.2021.9613831"},{"key":"ref_23","first-page":"100257","article-title":"Industry 5.0: A survey on enabling technologies and potential applications","volume":"26","author":"Maddikunta","year":"2021","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Saha, H.N., Roy, R., Chakraborty, M., and Sarkar, C. (2021). IoT-Enabled Agricultural System Application, Challenges and Security Issues. Agricultural Informatics: Automation Using the IoT and Machine Learning, Wiley Online Library.","DOI":"10.1002\/9781119769231.ch11"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MAES.2021.3115205","article-title":"Global Analysis of Active Defense Technologies for Unmanned Aerial Vehicle","volume":"37","author":"Lyu","year":"2022","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Jares, G.A., and Valasek, J. (2022, January 3\u20137). Flight Demonstration and Validation of Control Acquisition Autopilot Attack. Proceedings of the AIAA SCITECH 2022 Forum, San Diego, CA, USA.","DOI":"10.2514\/6.2022-2341"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Talaei Khoei, T., Ismail, S., and Kaabouch, N. (2022). Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs. Sensors, 22.","DOI":"10.3390\/s22020662"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1186\/s13638-022-02087-6","article-title":"Toward UAV-based communication: Improving throughput by optimum trajectory and power allocation","volume":"2022","author":"Nasrollahi","year":"2022","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Rajasekaran, A.S., Maria, A., Al-Turjman, F., Altrjman, C., and Mostarda, L. (2022). Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET. Drones, 6.","DOI":"10.3390\/drones6010014"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Zhai, L., Kanellopoulos, A., Fotiadis, F., Vamvoudakis, K.G., and Hugues, J. (2022, January 3\u20137). Towards Intelligent Security for Unmanned Aerial Vehicles: A Taxonomy of Attacks, Faults, and Detection Mechanisms. Proceedings of the AIAA SCITECH 2022 Forum, San Diego, CA, USA.","DOI":"10.2514\/6.2022-0969"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3485272","article-title":"A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis","volume":"55","author":"Rugo","year":"2022","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1021\/acssensors.1c02444","article-title":"Development of a Sub-ppb Resolution Methane Sensor Using a GaSb-Based DFB Diode Laser near 3270 nm for Fugitive Emission Measurement","volume":"7","author":"Sabourin","year":"2022","journal-title":"ACS Sens."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Ouiazzane, S., Addou, M., and Barramou, F. (2022). A Multiagent and Machine Learning Based Denial of Service Intrusion Detection System for Drone Networks. Geospatial Intelligence, Springer.","DOI":"10.1007\/978-3-030-80458-9_5"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Kong, W., Li, X., Hou, L., Yuan, J., Gao, Y., and Yu, S. (2022). A Reliable and Efficient Task Offloading Strategy Based on Multi-feedback Trust Mechanism for IoT Edge Computing. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2022.3143572"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Pushpa, S.X., and Raja, S.K. (2022). Elliptic Curve Cryptography Based Authentication Protocol Enabled with Optimized Neural Network Based DoS Mitigation. Wirel. Pers. Commun., 1\u201325.","DOI":"10.1007\/s11277-021-08902-5"},{"key":"ref_36","first-page":"1","article-title":"Secured and privacy-based IDS for healthcare systems on E-medical data using machine learning approach","volume":"11","author":"Sengan","year":"2022","journal-title":"Int. J. Reliab. Qual. Healthc. (IJRQEH)"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Vedula, V., Lama, P., Boppana, R.V., and Trejo, L.A. (2021). On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers. Electronics, 10.","DOI":"10.3390\/electronics10172105"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Hosseinzadeh, M., and Sinopoli, B. (2021). Active Attack Detection and Control in Constrained Cyber-Physical Systems Under Prevented Actuation Attack. arXiv.","DOI":"10.23919\/ACC50511.2021.9483322"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"9097","DOI":"10.1109\/TVT.2020.3000576","article-title":"Blockchain-envisioned secure data delivery and collection scheme for 5g-based iot-enabled internet of drones environment","volume":"69","author":"Bera","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Yijing, Z., Zheng, Z., Xiaoyi, Z., and Yang, L. (2017, January 26\u201328). Q learning algorithm based UAV path learning and obstacle avoidence approach. Proceedings of the 2017 36th Chinese Control Conference (CCC), Dalian, China.","DOI":"10.23919\/ChiCC.2017.8027884"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"106543","DOI":"10.1016\/j.compag.2021.106543","article-title":"An intelligent system for crop identification and classification from UAV images using conjugated dense convolutional neural network","volume":"192","author":"Pandey","year":"2022","journal-title":"Comput. Electron. Agric."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"106682","DOI":"10.1016\/j.compag.2021.106682","article-title":"Assessing the efficacy of machine learning techniques to characterize soybean defoliation from unmanned aerial vehicles","volume":"193","author":"Zhang","year":"2022","journal-title":"Comput. Electron. Agric."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Jiang, J., Johansen, K., Stanschewski, C.S., Wellman, G., Mousa, M.A., Fiene, G.M., Asiry, K.A., Tester, M., and McCabe, M.F. (2022). Phenotyping a diversity panel of quinoa using UAV-retrieved leaf area index, SPAD-based chlorophyll and a random forest approach. Precis. Agric., 1\u201323.","DOI":"10.1007\/s11119-021-09870-3"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Avola, D., Cinque, L., Di Mambro, A., Diko, A., Fagioli, A., Foresti, G.L., Marini, M.R., Mecca, A., and Pannone, D. (2022). Low-Altitude Aerial Video Surveillance via One-Class SVM Anomaly Detection from Textural Features in UAV Images. Information, 13.","DOI":"10.3390\/info13010002"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"91119","DOI":"10.1109\/ACCESS.2021.3092039","article-title":"6G enabled unmanned aerial vehicle traffic management: A perspective","volume":"9","author":"Shrestha","year":"2021","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A. (2009, January 8\u201310). A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2009 IEEE symposium on computational intelligence for security and defense applications, Ottawa, ON, Canada.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2018.2888764","article-title":"KDD cup 99 data sets: A perspective on the role of data sets in network intrusion detection research","volume":"52","author":"Siddique","year":"2019","journal-title":"Computer"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/7\/2630\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:45:55Z","timestamp":1760136355000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/7\/2630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,29]]},"references-count":47,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["s22072630"],"URL":"https:\/\/doi.org\/10.3390\/s22072630","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,29]]}}}