Securing Drone Communications: A Vulnerability Analysis of MAVLink

PDF (610KB), PP.14-26

Views: 0 Downloads: 0

Author(s)

Anuhya Murki 1 Mahati A. Kalale 1 Shriya Anil 1,* P. Santhi Thilagam 1

1. National Institute of Technology Karnataka, Surathkal, 575025, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2025.06.02

Received: 13 Nov. 2024 / Revised: 22 Mar. 2025 / Accepted: 12 Aug. 2025 / Published: 8 Dec. 2025

Index Terms

UAV (Unmanned Aerial Vehicle), Drone Security, Mavlink, Communication Threats, Network Security

Abstract

Unmanned Aerial Vehicles (UAVs) are increasingly being integrated into a wide range of industries and ap- plications, including but not limited to surveillance, logistics, environmental monitoring, infrastructure inspection, and disaster management. The growing deployment of UAVs in both civilian and defence sectors highlights their versatil- ity and operational efficiency. However, one of the core enablers of UAV functionality is their dependence on wireless communication systems and network protocols to facilitate control, telemetry, and coordination with ground control sta- tions or other UAVs. This reliance on open and often unsecured communication channels exposes UAVs to a variety of significant security threats. This paper focuses on performing a comprehensive vulnerability analysis of the MAVLink protocol, which is currently the most extensively adopted communication protocol for UAVs. We analyse key security weaknesses inherent in the MAVLink protocol’s design, as well as additional vulnerabilities that may arise from specific implementations of the protocol. These vulnerabilities can enable a wide range of potential attacks, including spoofing, message injection, replay attacks, and unauthorised access. In addition, we assess the effectiveness of existing security mechanisms that have been proposed or implemented, such as encryption techniques, authentication frameworks, and intrusion detection systems. By systematically highlighting these vulnerabilities and their real-world implications, this study aims to offer meaningful insights into improving MAVLink protocol security and fostering more resilient and secure UAV communication systems.

Cite This Paper

Anuhya Murki, Mahati A. Kalale, Shriya Anil, P. Santhi Thilagam, "Securing Drone Communications: A Vulnerability Analysis of MAVLink", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.15, No.6, pp. 14-26, 2025. DOI:10.5815/ijwmt.2025.06.02

Reference

[1]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, and A Selcuk Uluagac. A survey on security and privacy issues of uavs. Computer Networks, 224:109626, 2023.
[2]Gaurav Kumar Pandey, Devendra Singh Gurjar, Ha H Nguyen, and Suneel Yadav. Security threats and mitigation techniques in uav communications: A comprehensive survey. IEEE Access, 10:112858–112897, 2022.
[3]Vikas Hassija, Vinay Chamola, Adhar Agrawal, Adit Goyal, Nguyen Cong Luong, Dusit Niyato, Fei Richard Yu, and Mohsen Guizani. Fast, reliable, and secure drone communication: A comprehensive survey. IEEE Communications Surveys & Tutorials, 23(4):2802–2832, 2021.
[4]Lav Gupta, Raj Jain, and Gabor Vaszkun. Survey of important issues in uav communication networks. IEEE communications surveys & tutorials, 18(2):1123–1152, 2015.
[5]Zhaoxuan Wang, Yang Li, Shihao Wu, Yuan Zhou, Libin Yang, Yuan Xu, Tianwei Zhang, and Quan Pan. A survey on cybersecurity attacks and defenses for unmanned aerial systems. Journal of Systems Architecture, 138:102870, 2023.
[6]Harshad Sathaye, Martin Strohmeier, Vincent Lenders, and Aanjhan Ranganathan. An experimental study of {GPS} spoofing and takeover attacks on {UAVs}. In 31st USENIX security symposium (USENIX security 22), pages 3503– 3520, 2022.
[7]Francesco Betti Sorbelli, Mauro Conti, Cristina M Pinotti, and Giulio Rigoni. Uavs path deviation attacks: Sur- vey and research challenges. In 2020 IEEE international conference on sensing, communication and networking (SECON Workshops), pages 1–6. IEEE, 2020.
[8]Young-Min Kwon, Jaemin Yu, Byeong-Moon Cho, Yongsoon Eun, and Kyung-Joon Park. Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles. IEEE Access, 6:43203–43212, 2018.
[9]John Glossner, Samantha Murphy, and Daniel Iancu. An overview of the drone open-source ecosystem. arXiv preprint arXiv:2110.02260, 2021.
[10]Johan Gustafsson and Daniel Mogensen. Streamlining uav communication: Investigating and implementing an accessible communication interface between a ground control station and a companion computer, 2023.
[11]Anis Koubaˆa, Azza Allouch, Maram Alajlan, Yasir Javed, Abdelfettah Belghith, and Mohamed Khalgui. Micro air vehicle link (mavlink) in a nutshell: A survey. IEEE Access, 7:87658–87680, 2019.
[12]Manh-Dung Nguyen, Naipeng Dong, and Abhik Roychoudhury. Security analysis of unmanned aircraft systems.  The National University of Singapore, 2017.
[13]Nathan Butcher, Angus Stewart, and Saad Biaz. Securing the mavlink communication protocol for unmanned aircraft systems. Applied Research Associates, 2013.
[14]Kai Domin, Eder Marin, and Iraklis Symeonidis. Security considerations in the design of uav systems. In Pro- ceedings of the 2016 International Conference on Unmanned Aircraft Systems (ICUAS), pages 1028–1037. IEEE, 2016.
[15]Seung-Hyun Seo, Jungho Yim, and Joonsang Baek. Efficient digital signature scheme for mavlink communica- tion system. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), pages 994–997. IEEE, 2019.
[16]Bijit Bera, Subhasis Saha, Ashok Kumar Das, and Athanasios V Vasilakos. Blockchain-enabled secure communica- tion for drone delivery: a case study in covid-19 scenario. IEEE Network, 35(1):30–36, 2021.
[17]Jeongkyu Lee, Jian Wang, Jedidiah R Crandall, Junghee Sawin, and Jingyuan Shen. Dronechaindb: A blockchain- based secure drone database framework. IEEE Transactions on Mobile Computing, 20(3):1116–1131, 2020.
[18]Amit Vyas, Koushik Mitra, and Narendra Saxena. Decentralized authentication framework for drone communica- tions using blockchain. In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocur- rency (ICBC), pages 1–8. IEEE, 2022.
[19]Mohamed Amine Ferrag, Leandros Maglaras, and Abdelouahid Derhab. Blocksdn: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Network, 36(1):114–121, 2022.
[20]Robert Mitchell and Ing-Ray Chen. A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4):1–29, 2014.
[21]Hichem Sedjelmaci, Sidi Mohammed Senouci, and Mosa Ali Abu-Rgheff. An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks. IEEE Internet of things journal, 1(6):570–577, 2014.
[22]Hao Wu, Baichuan Yuan, Zhiguo Chen, and Ziming Zhao. Federated learning for intrusion detection in uav commu- nications. In Proceedings of the 2021 IEEE International Conference on Communications (ICC), pages 1–6. IEEE, 2021.
[23]Seonghoon Jeong, Eunji Park, Kang Uk Seo, Jeong Do Yoo, and Huy Kang Kim. Muvids: false mavlink injection attack detection in communication for unmanned vehicles. In Workshop on automotive and autonomous vehicle security (AutoSec), volume 2021, page 25, 2021.