Case Study : UAV Security Management
- Steven Chang
- Dec 28, 2020
- 3 min read
Updated: Jun 25

Currently(2017), there are around 550,000 drones in the United States, and this number will only continue to grow worldwide. The vast majority of drones are built on the Android platform—some have dedicated flight controllers, while others rely entirely on Android for control.
Remote vulnerabilities in Android pose a significant security risk. If a UAV communication module is compromised, the drone could be remotely hijacked and misused for criminal activities. However, by integrating an iSDNA hardware firewall between the flight module and the communication module, we can ensure that only authenticated devices—such as authorized smartphones and backend control systems—can issue commands. Even if hackers gain root access to the drone’s communication module, they would not be able to take control of the UAV. The only entities capable of controlling the drone would be the registered smartphone and backend system.
With this architecture, drones benefit from:
Blocking Insecure Network Attacks – Prevent unauthorized remote control attempts.
Seamless Security Updates and Workflow Enhancements – Java applets, which are only a few kilobytes in size, allow for low-cost updates, even via satellite connections.
Flexible End-to-End Encryption Upgrades – Encryption mechanisms can be updated at any time, supporting AES-128, AES-256, RSA, elliptic curve cryptography, or even future quantum cryptographic methods.
Through an OTA (Over-the-Air) backend mechanism, we can also:
Report GPS locations in real time.
Update restricted no-fly zones dynamically.
Modify flight modes and command protocols as needed.
Example Scenario: Large-Scale UAV Management in China
In the future, the number of drones in China will likely exceed 1 million. Effective management of such a massive fleet is crucial. If China's Ministry of Industry and Information Technology (MIIT) adopts this solution, it would enable instantaneous security adjustments.
For instance, during a national military parade, MIIT could expand restricted airspace from a 10-kilometer radius to a 30-kilometer radius in just one second. This would effectively regulate UAV flights across Beijing’s Sixth Ring Road, ensuring enhanced security and control over drone operations.
2017年美國當前無人機有55萬台。後續全世界只會多不會少。絕大部份的無人機。都用 android 平台當基礎的。有的有飛行控制器。有的直接就是用android 去控制。遠程漏洞在 android 又是最恐怖的了UAV通訊模組 若被攻破。可以隨意控制無人機。那可能就變成別人犯罪的工具了。但是若在飛行模組與通訊模組間加上了iSDNA 硬件防火牆。優勢是。控制指令只能從認證過的 手機與後台控制這台飛機。駭客無法因為破解獲取了飛行器通訊模組的Root權限。就挾持無人機。能控制他的只有你的手機與後台系統。
用了這個架構。無人機可以
1. Block insecurity network 攻擊。
2.可以更新安全機制與業務流程,java applet 只有幾K byte. 成本很低。使用衛星都可以更新。3. 可以隨時變更端到端的加密機制。AES128 or AES256. 或者 RSA / 橢圓算法。甚至未來的量子通訊密碼。
透過後台 OTA機制。我們還可以主動回報GPS位置。即時更新飛行限制禁止區域。或是變換飛行模式與指令。
舉个例子:未來無人機在中國,數目肯定大於 100萬台以上。如何有效的管理。 若是中國工信部採用本方案。他可以在閱兵典禮時。ㄧ秒鐘將 無人機限制禁止區域從 10公里改成 30公里。那時候北京六環內將可有效控制無人機的飛行。