Security of Drone Hacking with Raspberry-Pi using Internet-of-Things
Pratheepa Marimuthu1, Saran Kumar Sekar2

1Pratheepa Marimuthu*, M. Tech in CSE from Prist University and MCA from Bharathidasan University, India.
2Saran Kumar Sekar, M.E. in Aeronautical Engineering, Lecturer-Department of Aeronautics, St. Theresa International College, Nakhhonnayok – Thailand.
Manuscript received on March 15, 2020. | Revised Manuscript received on March 28, 2020. | Manuscript published on April 10, 2020. | PP: 1629-1634 | Volume-9 Issue-6, April 2020. | Retrieval Number: F4124049620/2020©BEIESP | DOI: 10.35940/ijitee.F4124.049620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Internet-of-Things (IoT) implementation in technological application is developing at higher speed because of more demand from the customers and firms which reply with the advantages proposed through the brilliant and elegant hardware unit. Using Drone concept, it is finding more applications in various areas which rises the threat of data hacking and also poses safety risk to common people. We must appreciate due to online data collection from the application of commercial drones which is widespread across varieties of drone use. Implementation of IoT enabled drones in large quantity causes more number of drones which is exposed to the possibility of being attacked or harmed by the fraudster. This research work examine the various issues concerned to drone security, safety, threat, attacks and illustrate a group of wireless fidelity risk possibilities. My research work has observed different types of threat and attacks on commercial drones. The propagation channel risk analyzed are, Access Denial, Authorization techniques, unauthorized third party presence, illegal source access gain and frame misuse of device characteristic features. Our work prohibits illegal connection entry controlled based on Raspberry-pi & wireless fidelity between access point and drone happens using tell-net with the help on IP address and sign up process. The investigation work explains the execution of methodology which includes attack steps and data security enabling using RSA Algorithm. The main work focuses on the data collected on parrot security OS and to secure the communication in Wi-Fi mode using drone and another devices were analyzed. 
Keywords: Cryptography, Networking, IoT, Cloud
Scope of the Article: Cryptography and Applied Mathematics