Drone Deliveries Face Cybersecurity Vulnerabilities. Advanced IoT Systems Are Both Their Risk and Their Defense.

 

 

The FAA recently granted UPS the green light to perform Beyond Visual Line Of Sight (BVLOS) drone deliveries. This approval is a big win for the company in allowing them to make more longer-distance drone shipments, but maybe more interesting is the underlying technology that’s making these at-scale deliveries possible. A key part of UPS’ drone delivery launch is the suite of on-board and supplemental IoT systems providing visibility, oversight and data during deliveries. This includes ground-based RADAR technology, which will be a major player in the drones’ abilities to report possible issues in transporting and notifying its operators, as well as advanced sensors in the drones to help collect data on the overall function of the drones and their lifespans.

While these various sensors and nodes providing computer vision for BVLOS drone deliveries are necessary for smooth and scalable operations, IoT systems also bring several concerns along with them. More edge computers on mobile in-flight hardware means a host of major cybersecurity vulnerabilities, both for the drones and the networks that are supporting their operations.

Dr. Syed Attique Shah is a lecturer in Smart Computer Systems at Birmingham City University. Shah has extensive knowledge and focus on cybersecurity, IoT, and big data analysis. He has over a decade of experience in researching IoT, big data analytics, information management, and software-defined networking. Shah, commenting on the UPS drone delivery green-lighting, detailed why IoT will come into play as BVLOS drones see expansion, and why edge computing can be a resource for building up cybersecurity resilience in these burgeoning networks and use cases.

Dr. Shah’s Thoughts on IoT Systems

“My name is Dr. Syed Atik Shah and I’m working as a lecturer at Birmingham City University. My research area is mostly focused on cybersecurity, Internet of Things, and big data analysis that are basically utilized for efficient and effective IOT security, as well as benchmarking and performance analysis of different large data sets. First of all, this is like a very significant milestone in terms of drone delivery and the drone delivery industry.

“This development creates several research opportunities and new openings in research and particularly in commercial research and also in academic research in terms of Internet of Things, the sensors that can help delivery services with regards to this particular opening that we have nowadays. I would imagine that this approval paves the way for widespread adoption of future research opportunities in beyond visual line-of-sight drone delivery services. More opportunities will arise for commercial and academic usage of ideas that are related to drone swarming, better drone-to-drone communication, and to enhance drone efficiency. More work will be focusing on implementation of IOT drone geofencing because, as you know, beyond visual line-of-sight, we would need some sensors that would be working on certain areas and we cannot fly over restricted zones.

“So for that, I think playing with the dynamics of no-flying zone, sensors can be very helpful, especially what I feel is utilization of cybersecurity measures to safeguard IOT systems in beyond visual line-of-sight drone delivery would be increased more. This particular approval would give more boost to that area as well. As we know already that IOT sensors on drones can monitor battery life, maintenance needs, and operational performances, this data from IOT sensors can be further analyzed to optimize delivery routes and schedules and to improve the efficiency of the delivery and the drones themselves.

“This approval would definitely help IOT sensors to effectively make sure the drone services are being handled properly. Edge computing allows for resource efficient data processing at the source. In terms of IOT network security, and in the context of especially DDoS attacks, distributed denial-of-service attacks, and its detection and its mitigation, it’s quite beneficial to involve edge computing. It will align the needs of how to resourcefully utilize computational resources. Through that, we can detect and mitigate attacks that are happening on the IOT networks.

“And with IOT edge computing, what is important is that we can host machine learning models locally on the edge devices, on the drones especially as well. So this would allow real-time analysis of the data. This would obviously enhance the framework’s ability to detect anonymous patterns that can be associated with any potential attack on the IOT network itself. What we do as researchers, we also have like different research papers in this area that focus on this particular issue of identifying these network anomalies in the IOT networks and also focusing on this context of IOT networks to detect DDoS attacks locally through edge computing. And obviously this can also be very beneficial for drone anomalies in the IOT networks and in delivery services as well with regards to cybersecurity.”

Article written by Alexandra Simon.

Follow us on social media for the latest updates in B2B!

Image

Latest

Stop Guessing: How Reality Capture Improves Construction Productivity
January 20, 2026

Construction projects lose time and money when teams rely on assumptions. Someone says a section is “done,” another trade arrives, and then problems appear: wrong levels, missing openings, clashing services, or unfinished areas. That leads to rework, delays, and arguments. Reality capture helps because it replaces opinions with clear evidence. Reality capture means using tools…

Read More
Human Trafficking
National Human Trafficking Prevention Month
January 20, 2026

School Safety Today podcast, presented by Raptor Technologies. In this episode of School Safety Today, host Dr. Amy Grosso speaks with Kelly Brickl, a trainer with SPEAK UP, in recognition of National Human Trafficking Prevention Month. During the conversation, Brickl shares data, real-world warning signs, and explains how age-appropriate, research-based prevention curricula can empower…

Read More
college
A One-Year College Alternative: How Pega6 Is Preparing to Train AI-First, Job-Ready Talent
January 19, 2026

The traditional four-year college model is facing growing pressure as rising tuition, shifting labor market demands, and new technological realities expose gaps between education and employment outcomes. Confidence in the traditional college pathway is eroding among parents, students, and employers as rising costs and persistent skills gaps collide with the reality that many new…

Read More
radio
Where Experience Meets the Extreme: John F5VHQ at the World’s Most Isolated Radio Outpost
January 16, 2026

For some operators, Bouvet Island is the final frontier. For John (F5VHQ), it is a challenge that stands apart even after decades of DXpedition experience. A veteran of more than twenty years in the field and Vice President of the Clipperton DX Club, John joins the multinational 3Y0K team with both experience and conviction….

Read More