Skip to main content

Security Analysis of FHSS-type Drone Controller

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9503))

Abstract

Unmanned Aerial Vehicles (UAVs), or drones, have attracted a considerable amount of attentions due to their utility to civilian as well as military applications. However, the security issues involved in UAV technology have not been extensively discussed in the literature. As a first step toward analyzing these security issuxes, we investigate security in drone controllers, especially controllers that adopt Frequency Hopping Spread Spectrum (FHSS). In order to affect an FHSS-type controller, an attacker first has to access its physical layer. This is difficult because of the pseudorandomness of the hopping sequence and the rapidly changing channels. However, these difficulties can be relaxed when the attacker acquires the hopping sequence and when the hopping speed of the target system is not significant. In this paper, we propose a general scheme to extract the hopping sequence of FHSS-type controllers using a software-defined radio (SDR). We also propose a method to address the issue of the limited bandwidth of the SDR. We implemented our scheme on a Universal Software Radio Peripheral (USRP), successfully extracted the hopping sequence of the target system, and exposed the baseband signal.

This research was supported by (1) Next-Generation Information Computing Development Program through the NRF (National Research Foundation of Korea) funded by the MSIP (Ministry of Science, ICT & Future Planning) (No. NRF-2014M3C4A7030648), Korea, and (2) the MSIP, Korea, under the ITRC (Information Technology Research Center) support program (IITP-2015-R0992-15-1006) supervised by the IITP (Institute for Information & communications Technology Promotion).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. 4 GHz Radio Control Explained. http://www.rcmodelreviews.com/spreadspectrum01.shtml

  2. Amazon Prime Air. http://www.amazon.com/b?node=8037720011

  3. CBX 1200–6000 MHz Rx/Tx (40 MHz). http://www.ettus.com/product/details/CBX

  4. DHL launches first commercial drone ‘parcelcopter’ delivery service. http://www.theguardian.com/technology/2014/sep/25/german-dhl-launches-first-commercial-drone-delivery-service

  5. How compatible are 2.4 GHz RC systems?. http://www.rcmodelreviews.com/rxcompatibility.shtml

  6. USRP N210 Datasheet. http://www.ettus.com/content/files/~07495_Ettus_N200-210_DS_Flyer_HR_1.pdf

  7. Chaudhuri, S., Chatterjee, S., Katz, N., Nelson, M., Goldbaum, M.: Detection of blood vessels in retinal images using two-dimensional matched filters. IEEE T-MI 8(3), 263–269 (1989)

    Google Scholar 

  8. Chen, Q., Defrise, M., Deconinck, F.: Symmetric phase-only matched filtering of fourier-mellin transforms for image registration and recognition. TPAMI 16(12), 1156–1168 (1994)

    Article  Google Scholar 

  9. Gardner, W., et al.: Exploitation of spectral redundancy in cyclostationary signals. IEEE Sig. Process. Mag. 8(2), 14–36 (1991)

    Article  Google Scholar 

  10. Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., OHanlon, B.W., Kintner, Jr., P.M.: Assessing the spoofing threat: Development of aportable gps civilian spoofer. In: ION GNSS+., vol. 55, p. 56 (2008)

    Google Scholar 

  11. James, M.: What are DSM RC Controllers and Receivers and What DoThey Do? http://rcvehicles.about.com/od/frequency/f/dsmtechnology.htm

  12. Kamkar, S.: SkyJack. http://www.samy.pl/skyjack/

  13. Nychis, G., Hottelier, T., Yang, Z., Seshan, S., Steenkiste, P.: Enabling mac protocol implementations on software-defined radios. NSDI 9, 91–105 (2009)

    Google Scholar 

  14. Q, Atlas, Cutaway Smash, Slugs on Toast: Hop hacking hedy (2011). https://www.youtube.com/watch?v=aMBaO94Q49U

  15. Ryan, M.: Bluetooth: With low energy comes low security. In: WOOT (2013)

    Google Scholar 

  16. Song, M., Allison, T.: Frequency hopping pattern recognition algorithms for wireless sensor networks. In: ISCA, pp. 264–269 (2005)

    Google Scholar 

  17. Stahlberg, M.: Radio jamming attacks against two popular mobile networks. In: Tik-110.501, vol. 3 (2000)

    Google Scholar 

  18. Tang, H.: Some physical layer issues of wide-band cognitive radio systems. In: DySPAN, pp. 151–159. IEEE (2005)

    Google Scholar 

  19. Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55(4), 523–531 (1967)

    Article  Google Scholar 

  20. Wikipedia: General Atomics MQ-1 Predator (2015). http://en.wikipedia.org/wiki/General_Atomics_MQ-1_Predator

  21. Wikipedia: Iran-U.S. RQ-170 incident (2015). http://en.wikipedia.org/wiki/Iran%E2%80%93U.S._RQ-170_incident

  22. Wikipedia: Sequence alignment (2015). http://en.wikipedia.org/wiki/Sequence_alignment

  23. Yücek, T., Arslan, H.: Spectrum characterization for opportunistic cognitive radio systems. In: MILCOM, pp. 1–6. IEEE (2006)

    Google Scholar 

  24. Yücek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutorials 11(1), 116–130 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hocheol Shin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Shin, H., Choi, K., Park, Y., Choi, J., Kim, Y. (2016). Security Analysis of FHSS-type Drone Controller. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31875-2_20

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31874-5

  • Online ISBN: 978-3-319-31875-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics