P. Santhi Thilagam

Work place: National Institute of Technology Karnataka, Surathkal, 575025, India

E-mail: santhi@nitk.edu.in

Website: https://orcid.org/0000-0002-8359-1330

Research Interests:

Biography

P. Santhi Thilagam is currently working as a Professor in the Department of computer science and engineering at NITK Surathkal, where she began her career in 1996. Her current research interests lie in the areas of data security, data analysis and data management. She has been the investigator for many sponsored projects and has been involved in the supervision of several PhD scholars and M.Tech projects. The innovative work of her research group has been recognised with several best paper awards. She is also a member of several technical associations, scientific committees, and editorial boards.

Author Articles
Securing Drone Communications: A Vulnerability Analysis of MAVLink

By Anuhya Murki Mahati A. Kalale Shriya Anil P. Santhi Thilagam

DOI: https://doi.org/10.5815/ijwmt.2025.06.02, Pub. Date: 8 Dec. 2025

Unmanned Aerial Vehicles (UAVs) are increasingly being integrated into a wide range of industries and ap- plications, including but not limited to surveillance, logistics, environmental monitoring, infrastructure inspection, and disaster management. The growing deployment of UAVs in both civilian and defence sectors highlights their versatil- ity and operational efficiency. However, one of the core enablers of UAV functionality is their dependence on wireless communication systems and network protocols to facilitate control, telemetry, and coordination with ground control sta- tions or other UAVs. This reliance on open and often unsecured communication channels exposes UAVs to a variety of significant security threats. This paper focuses on performing a comprehensive vulnerability analysis of the MAVLink protocol, which is currently the most extensively adopted communication protocol for UAVs. We analyse key security weaknesses inherent in the MAVLink protocol’s design, as well as additional vulnerabilities that may arise from specific implementations of the protocol. These vulnerabilities can enable a wide range of potential attacks, including spoofing, message injection, replay attacks, and unauthorised access. In addition, we assess the effectiveness of existing security mechanisms that have been proposed or implemented, such as encryption techniques, authentication frameworks, and intrusion detection systems. By systematically highlighting these vulnerabilities and their real-world implications, this study aims to offer meaningful insights into improving MAVLink protocol security and fostering more resilient and secure UAV communication systems.

[...] Read more.
Other Articles