Skip to main content
Log in

Enhancing Security and Privacy in Small Drone Networks Using 6G-IOT Driven Cyber Physical System

  • Research
  • Published:
Wireless Personal Communications Aims and scope Submit manuscript


The purpose of this abstract is to present a concise summary of a study that sought to enhance the cybersecurity of 6G-IoT drone devices through the use of a layered architectural framework and machine learning methodologies. An improved seven-layered architecture that can classify various types of attacks with a 99% accuracy rate is presented in the paper as a means to enhance drone security and privacy. You may encounter Prob, DoS, R2L, and U2R assaults, among others. On the drone dataset, the RegressionNet model—a combination of Logistic Regression and Multilayer Perceptron—performs best. Impressively, it attains a rate of 99.89% accuracy. Both the STIN security dataset and a combined dataset underwent additional validation testing, with the combined dataset producing an average accuracy of 97.90% and the STIN security dataset 91.64%, respectively, proving that the suggested method is both effective and resilient. By enhancing the cybersecurity of 6G-IoT drones, We can see the importance of the suggested architecture and ML models from these outcomes. This, in turn, guarantees secure drone operations across many fields while reducing privacy issues.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.


  1. Khalid, W., Rehman, M. A. U., Van Chien, T., Kaleem, Z., Lee, H., & Yu, H. (2023). Reconfigurable intelligent surface for physical layer security in 6G-IoT: Designs, issues, and advances. IEEE Internet of Things Journal, 11(2), 3599–3613.

    Article  Google Scholar 

  2. Abdel Hakeem, S. A., Hussein, H. H., & Kim, H. (2022). Security requirements and challenges of 6G technologies and applications. Sensors, 22(5), 1969.

    Article  Google Scholar 

  3. Yuvaraj, D., Anitha, M., Singh, B., Karyemsetty, N., Krishnamoorthy R., Arun S. (2022) "Systematic Review of Security Authentication based on Block Chain," In 3rd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, pp. 768–771,

  4. Ahad, A., Jiangbina, Z., Tahir, M., Shayea, I., Sheikh, M. A., & Rasheed, F. (2024). 6G and Intelligent Healthcare: Taxonomy, technologies, open issues and future research directions. Internet of Things, 25, 101068.

    Article  Google Scholar 

  5. Chakrapani, K. C. K. , Malathi, P., Iniyan, U., Thiagarajan, R., Padmapriya S., Krishnamoorthy, R. (2022) "Regressive Based Classifier Analytics for the Mechanism of CryptoSystems Security Using EHE Scheme," In 8th International Conference on Smart Structures and Systems (ICSSS), Chennai, India, 2022, pp. 1–5,

  6. Chowdhury, M. Z., Shahjalal, M., Ahmed, S., & Jang, Y. M. (2020). 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open Journal of the Communications Society, 1, 957–975.

    Article  Google Scholar 

  7. Nguyen, D. C., Ding, M., Pathirana, P. N., Seneviratne, A., Li, J., Niyato, D., & Poor, H. V. (2021). 6G Internet of Things: A comprehensive survey. IEEE Internet of Things Journal, 9(1), 359–383.

    Article  Google Scholar 

  8. Mao, B., Liu, J., Wu, Y., & Kato, N. (2023). Security and privacy on 6G network edge: A survey. IEEE Communications Surveys & Tutorials., 25(2), 1095–1127.

    Article  Google Scholar 

  9. Anand, S. J., Krishnamoorthy, R., Kumar, U. S., & Kamalakkannan, D. (2022). An effective hybrid mobility aware energy efficient low latency protocol (HMEL-MAC) for Wireless Sensor Network. Cybernetics and Systems.

    Article  Google Scholar 

  10. Kamruzzaman, M. M. (2023). 6G wireless communication assisted security management using cloud edge computing. Expert Systems, 40(4), e13061.

    Article  Google Scholar 

  11. Alturki, N., Aljrees, T., Umer, M., Ishaq, A., Alsubai, S., Saidani, O., & Ashraf, I. (2023). An intelligent framework for cyber-physical satellite system and IoT-aided aerial vehicle security threat detection. Sensors, 23(16), 7154.

    Article  Google Scholar 

  12. Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2018). Future developments in cyber risk assessment for the internet of things. Computers in industry, 102, 14–22.

    Article  Google Scholar 

  13. D. Yuvaraj, V. P. Kumar, H. Anandaram, B. Samatha, R. Krishnamoorthy and R. Thiyagarajan, (2022) "Secure De-Duplication Over Wireless Sensing Data Using Convergent Encryption," In IEEE 3rd Global Conference for Advancement in Technology (GCAT), Bangalore, India, 2022, pp. 1–5,

  14. IvyPanda. Unmanned Aerial Vehicles Essay. Available online: (accessed on 1 March 2024)

  15. Valavanis, K. P., & Vachtsevanos, G. J. (Eds.). (2015). Handbook of unmanned aerial vehicles, (Vol. 1). Dordrecht: Springer.

    Google Scholar 

  16. Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., & Guizani, M. (2019). Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges. Ieee Access, 7, 48572–48634.

    Article  Google Scholar 

  17. Mugheri, A. A., Siddiqui, M. A., & Khoso, M. (2018). Analysis on security methods of wireless sensor network (WSN). Sukkur IBA Journal of Computing and Mathematical Sciences, 2(1), 52–60.

    Article  Google Scholar 

  18. Cavoukian, A. (2012). Privacy and drones: Unmanned aerial vehicles. Ontario: Information and Privacy Commissioner of Ontario, Canada. pp. 1–30.

  19. G. Saritha, A. Subbarayudu, G. Premalatha, C. A. Christa, S. Arun and R. Krishnamoorthy, (2022) "Determination of Crisis on Climatic Fluctuations and Smog Deterioration by Categorizing the Condition Using Predictive Analytics," In 8th International Conference on Smart Structures and Systems (ICSSS), Chennai, India, 2022, pp. 1–7, doi:

Download references


The authors have not disclosed any funding.

Author information

Authors and Affiliations



Nagarjuna Tandra & C. N. Gireesh Babu contributed to do Design, C. N. Gireesh Babu & Jyoti Dhanke contributed for Interpretation of results, A. V. V. Sudhakar & M. Kameswara Rao wrote the main manuscript, S. Ravichandran contributed towards preparation of figures. All authors reviewed the results and approved the final version of the manuscript. The authors certify that this material or similar material has not been and will not be submitted to or published in any other publication before. Furthermore, the authors certify that they have participated sufficiently in the work to take public responsibility for the content, including participation in the concept, design, analysis, writing, or revision of the manuscript.

Corresponding author

Correspondence to Nagarjuna Tandra.

Ethics declarations

Conflict of interest

No, I declare that the authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tandra, N., Babu, C.N.G., Dhanke, J. et al. Enhancing Security and Privacy in Small Drone Networks Using 6G-IOT Driven Cyber Physical System. Wireless Pers Commun (2024).

Download citation

  • Accepted:

  • Published:

  • DOI: