Skip to main content

Game of Drones - Detecting Spying Drones Using Time Domain Analysis

  • Conference paper
  • First Online:
Cyber Security Cryptography and Machine Learning (CSCML 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12716))

Abstract

Drones have created a new threat to people’s privacy. We are now in an era in which anyone with a drone equipped with a video camera can use it to invade a subject privacy by filming the subject in his/her private space using encrypted First Person View (FPV) channel. Although many methods have been suggested to detect a nearby drone, they all suffer from the same shortcoming: they cannot detect what specifically is being captured and therefore they fail to distinguish between the legitimate use of a drone that does not invade a subject’s privacy (for example, neighbor’s drone flying and shoot his garden) and illegitimate use (same drone shooting the subject’s property), where in many cases depends on the orientation of the drone’s video camera rather than on the drone’s location. In this paper we present a method that utilizes a flicker in order to detect whether the drone’s camera is directed towards the private space by analyzing the encrypted video stream sent from the drone in real time. We investigate the influence of changing pixels on the transmitted traffic (in a lab setup). We leverage our conclusions and demonstrate how an interceptor can apply a side-channel attack to detect that a subject is video streamed by DJI Mavic drone from its encrypted FPV channel when the subject is located inside a private house.

Video - https://youtu.be/3wEsbafsUxg.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Airmon-ng: https://www.aircrack-ng.org/doku.php?id=airmon-ng

  2. 360, L.: An update on drone privacy concerns. https://www.law360.com/articles/848165/an-update-on-drone-privacy-concerns

  3. Androidauthority: 8 fun drones you can control with your smartphone

    Google Scholar 

  4. Ben-Netanel, R., Nassi, B., Shamir, A., Elovici, Y.: Detecting spying drones. IEEE Secur. Priv. (2020). https://doi.org/10.1109/msec.2020.3034171

  5. Birnbach, S., Baker, R., Martinovic, I.: Wi-fly?: detecting privacy invasion attacks by consumer drones. NDSS (2017)

    Google Scholar 

  6. Busset, J.: Detection and tracking of drones using advanced acoustic cameras. In: Unmanned/Unattended Sensors and Sensor Networks XI; and Advanced Free-Space Optical Communication Techniques and Applications, vol. 9647, p. 96470F. International Society for Optics and Photonics (2015)

    Google Scholar 

  7. Case, E.E., Zelnio, A.M., Rigling, B.D.: Low-cost acoustic array for small uav detection and tracking. In: Aerospace and Electronics Conference, 2008. NAECON 2008. IEEE National, pp. 110–113. IEEE (2008)

    Google Scholar 

  8. DJI: Mavic pro. https://www.dji.com/mavic

  9. DJI: Spark remote controller. https://store.dji.com/product/spark-remote-controller

  10. Eshel, T.: Mobile radar optimized to detect UAVS, precision guided weapons. Defense Update (2013)

    Google Scholar 

  11. Guri, M., Bykhovsky, D.: Air-jumper: covert air-gap exfiltration/infiltration via security cameras and infrared (IR). Comput. Secur. 82, 15–29 (2019)

    Article  Google Scholar 

  12. Insider, B.: Commercial unmanned aerial vehicle (UAV) market analysis. http://www.businessinsider.com/commercial-uav-market-analysis-2017-8

  13. Intel: Intel dual band wireless ac 8265. http://ark.intel.com/products/94150/Intel-Dual-Band-Wireless-AC-8265

  14. Jack, K.: Video Demystified: A Handbook for the Digital Engineer. Elsevier (2011)

    Google Scholar 

  15. Liu, Y., Sadeghi, A.R., Ghosal, D., Mukherjee, B.: Video streaming forensic-content identification with traffic snooping. In: Burmester, M., Tsudik, G., Magliveras, S., Ilic, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 129–135. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-18178-8_11

  16. Mail, D.: Woman grabs gun shoots nosy neighbour’s drone. http://www.dailymail.co.uk/news/article-4283486/Woman-grabs-gun-shoots-nosy-neighbour-s-drone.html

  17. Mitrovic, D.: Video Compression. University of Edinburgh

    Google Scholar 

  18. Nassi, B., Bitton, R., Masuoka, R., Shabtai, A., Elovici, Y.: Sok: security and privacy in the age of commercial drones. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 73–90. IEEE Computer Society, Los Alamitos, CA, USA (2021). https://doi.org/10.1109/SP40001.2021.00005, https://doi.ieeecomputersociety.org/10.1109/SP40001.2021.00005

  19. Nassi, B., Ben-Netanel, R., Shamir, A., Elovici, Y.: Drones’ cryptanalysis-smashing cryptography with a flicker. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1397–1414. IEEE (2019)

    Google Scholar 

  20. Nassi, B., Shamir, A., Elovici, Y.: Xerox day vulnerability. IEEE Trans. Inf. Forensics Secur. 14(2), 415–430 (2018)

    Article  Google Scholar 

  21. News, N.: Case dismissed against William H. merideth, kentucky man arrested for shooting down drone. http://www.nbcnews.com/news/us-news/case-dismissed-against-william-h-merideth-kentucky-man-arrested-shooting-n452281

  22. News, N.: Kentucky man arrested after shooting down neighbor’s drone. http://www.nbcnews.com/news/us-news/not-my-backyard-man-arrested-after-shooting-drone-down-n402271

  23. Ostermann, J.: Video coding with h. 264/avc: tools, performance, and complexity. IEEE Circ. Syst. Mag. 4(1), 7–28 (2004)

    Google Scholar 

  24. Parrot: Parrot skycontroller. https://www.parrot.com/global/accessories/drones/parrot-skycontroller#parrot-skycontroller

  25. Peacock, M., Johnstone, M.N.: Towards detection and control of civilian unmanned aerial vehicles (2013)

    Google Scholar 

  26. Post, N.Y.: Husband uses drone to catch cheating wife (2016). https://nypost.com/2016/11/16/husband-uses-drone-to-catch-cheating-wife/

  27. Reed, A., Klimkowski, B.: Leaky streams: identifying variable bitrate dash videos streamed over encrypted 802.11 n connections. In: 2016 13th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 1107–1112. IEEE (2016)

    Google Scholar 

  28. Reed, A., Kranch, M.: Identifying https-protected netflix videos in real-time. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 361–368. ACM (2017)

    Google Scholar 

  29. Rozantsev, A., Lepetit, V., Fua, P.: Flying objects detection from a single moving camera. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4128–4136 (2015)

    Google Scholar 

  30. Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T., et al.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: USENIX Security Symposium, pp. 55–70 (2007)

    Google Scholar 

  31. Schuster, R., Shmatikov, V., Tromer, E.: Beauty and the burst: remote identification of encrypted video streams. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1357–1374. USENIX Association, Vancouver, BC (2017). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/schuster

  32. Vasquez, J.R., Tarplee, K.M., Case, E.E., Zelnio, A.M., Rigling, B.D.: Multisensor 3d tracking for counter small unmanned air vehicles (CSUAV). In: Proceedings of the SPIE, vol. 6971, p. 697107 (2008)

    Google Scholar 

  33. Wampler, C., Uluagac, S., Beyah, R.: Information leakage in encrypted IP video traffic. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–7 (2015). https://doi.org/10.1109/GLOCOM.2015.7417767

  34. Washington, N.: Virginia woman shoots down drone near actor robert duvalls home. http://www.nbcwashington.com/news/local/Virginia-Woman-Shoots-Down-Drone-Near-Actor-Robert-Duvalls-Home-391423411.html

  35. White, A.M., Matthews, A.R., Snow, K.Z., Monrose, F.: Phonotactic reconstruction of encrypted VOIP conversations: hookt on fon-iks. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 3–18. IEEE (2011)

    Google Scholar 

  36. Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the h. 264/avc video coding standard. IEEE Trans. Circ. Syst. Video Technol. 13(7), 560–576 (2003)

    Google Scholar 

  37. World, N.: You cant shoot a drone so what can you do if it invades your privacy. http://www.networkworld.com/article/2941952/opensource-subnet/you-cant-shoot-a-drone-so-what-can-you-do-if-it-invades-your-privacy.html

  38. Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted VOIP conversations. In: IEEE Symposium on Security and Privacy, 2008. SP 2008, pp. 35–49. IEEE (2008)

    Google Scholar 

  39. Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob? USENIX Secur. Symp. 3, 43–54 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ben Nassi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nassi, B., Ben-Netanel, R., Shamir, A., Elovici, Y. (2021). Game of Drones - Detecting Spying Drones Using Time Domain Analysis. In: Dolev, S., Margalit, O., Pinkas, B., Schwarzmann, A. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2021. Lecture Notes in Computer Science(), vol 12716. Springer, Cham. https://doi.org/10.1007/978-3-030-78086-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78086-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78085-2

  • Online ISBN: 978-3-030-78086-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics