ABSTRACT
The purpose of this paper is to outline and summarize the latest technology on UAV security. This is driven by the growing market share represented by the technology. A silent yet vital revolution is happening: UAVs are becoming cheaper and more widely used. Unfortunately, the security and safety aspects were overlooked by manufacturers who eliminated potential threats and considered small UAVs as toys. To demonstrate the importance of UAV security once again, real examples of vulnerabilities and dangerous attacks are shown.
- Federal Aviation Administration (FAA). Online source available at: https://www.faa.govGoogle Scholar
- Federal Aviation Administration, "2017-2037 Aviation Forecast," March 2017. Online source available at: https://www.faa.gov/data research/aviationGoogle Scholar
- M. McFarland, "Google drones will deliver chipotle burritos at Virginia Tech," CNN Money, September 2016. Online source available at: http://money.cnn.com/2016/09/08/technology/google-drone-chipotleburrito/index.htmlGoogle Scholar
- Amazon, Amazon prime air, 2016. Online source available at:https://www.amazon.com/Amazon-Prime Air/b?node=8037720011Google Scholar
- Siobhan Gorman, Yochi J. Dreazen and August Cole, Wall Street Journal, "Insurgents Hack U.S. Drones," December 2009. Online source available at: https://www.wsj.com/articles/SB126102247889095011Google Scholar
- CNN Wire Staff, CNN, "Obama says U.S. has asked Iran to return drone aircraft," December 2011. Online source available at: http://edition.cnn.com/2011/12/12/world/meast/iran-us-drone/index.htmlGoogle Scholar
- Saeed Kamali Dehghan, The Guardian, "Iran gives Russia copy of US ScanEagle drone as proof of mass production," October 2013. Online source available at: https://www.theguardian.com/world/2013/oct/21/iranrussia-us-scaneagle-spy-drone-production-captureGoogle Scholar
- C.G.L. Krishna and R.R. Murphy, "A review on cybersecurity vulnerabilities for unmanned aerial vehicles," 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR), Shanghai, 2017, pp. 194--199.Google Scholar
- D. He, S. Chan and M. Guizani, "Drone-Assisted Public Safety Networks: The Security Aspect," in IEEE Communications Magazine, vol. 55, no. 8, pp. 218--223, 2017.Google ScholarDigital Library
- E. Vattapparamban. Gven, A.. Yurekli, K. Akkaya and S. Uluaa, "Drones for smart cities: Issues in cybersecurity, privacy, and public safety," 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, 2016, pp. 216--221.Google Scholar
- Vemi S.G., Panchev C., "Vulnerability Testing of Wireless Access Points Using Unmanned Aerial Vehicles (UAV)," in Proceedings of the European Conference on e-Learning, Academic Conferences and Publishing International, 2015.Google Scholar
- S. M. Giray, "Anatomy of unmanned aerial vehicle hijacking with signal spoofing," 2013 6th International Conference on Recent Advances in Space Technologies (RAST), Istanbul, 2013, pp. 795--800.Google Scholar
- Z. Feng et al., "Efficient drone hijacking detection using onboard motion sensors," Design, Automation & Test in Europe Conference & Exhibition (2017), 2017, Lausanne, 2017, pp. 1414--1419.Google ScholarCross Ref
- K. Yoon, D. Park, Y. Yim, K. Kim, S. K. Yang and M. Robinson, "Security Authentication System Using Encrypted Channel on UAV Network," 2017 First IEEE International Conference on Robotic Computing (IRC), Taichung, 2017, pp. 393--398.Google Scholar
- A. Shoufan, H. Alnoon and J. Baek, "On the power consumption of cryptographic processors in civil microdrones," 2015 International Conference on Information Systems Security and Privacy (ICISSP), Angers, 2015, pp. 283--290.Google Scholar
- G. Vasconcelos, G. Carrijo, R. Miani, J. Souza and V. Guizilini, "The Impact of DoS Attacks on the AR.Drone 2.0," 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS/SBR), Recife, 2016, pp. 127--132.Google Scholar
- Parrot, AR.Drone 2.0. Online source available at: https://www.parrot.com/global/drones/parrot-ardrone-20-eliteedition#parrot-ardrone-20-elite-editionGoogle Scholar
- Parrot, Bebop Drone. Online source available at: http://global.parrot.com/au/products/bebop-droneGoogle Scholar
- M. Hooper et al., "Securing commercial WiFi-based UAVs from common security attacks," MILCOM 2016-2016 IEEE Military Communications Conference, Baltimore, MD, 2016, pp. 1213--1218.Google Scholar
- N. M. Rodday, R. d. O. Schmidt and A. Pras, "Exploring security vulnerabilities of unmanned aerial vehicles," NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, 2016, pp. 993--994.Google Scholar
- Reed Theodore, Geis Joseph and Dietrich Sven., "SkyNET: A 3GEnabled Mobile Attack Drone and Stealth Botmaster," 2011, pp. 28--36.Google Scholar
- DJI, Phantom 2 Vision Drone. Online source available at: https://www.dji.com/phantom-2-visionGoogle Scholar
- 3D Robotics, Solo Drone. Online source available at: https://3dr.com/solo-droneGoogle Scholar
- Darren Kitchen and Sebastian Kinne, Wi-Fi Pineapple. Online source available at: https://www.wifipineapple.comGoogle Scholar
- K. Hartmann and K. Giles, "UAV exploitation: A new domain for cyber power," 2016 8th International Conference on Cyber Conflict (CyCon), Tallinn, 2016, pp. 205--221.Google Scholar
- Raspberry Pi Foundation, Raspberry Pi. Online source available at: https://www.raspberrypi.orgGoogle Scholar
- Jim Sciutto and Dominique van Heerden, CNN, "Exclusive: CNN witnesses US Navy's drone-killing laser," July 2017. Online source available at: https://edition.cnn.com/2017/07/17/politics/us-navy-dronelaserweapon/index.htmlGoogle Scholar
- Keith Wagstaff, NBC, "Drone Shoots Net to Safely Capture Rogue Drones," January 2016. Online source available at: https://www.nbcnews.com/tech/innovation/drone-shoots-net-safelycapture-rogue-drones-n494881Google Scholar
- Tyler Essary, Time, "These Drone-Hunting Eagles Aren't Messing Around," February 2017. Online source available at: http://time.com/4675164/drone-hunting-eaglesGoogle Scholar
- Glenn Wilkinson, Snoopy Drone software. Online source available at:https://github.com/sensepost/SnoopyGoogle Scholar
- Thomas d'Otreppe de Bouvette, aircrack-ng. Online source available at:http://www.aircrack-ng.orgGoogle Scholar
- Samy Kamkar, SkyJack. Online source available at: https://samy.pl/skyjackGoogle Scholar
- Praetox Technologies and Jorge Oliveira, Low Orbit Ionic Cannon. Online source available at: https://github.com/NewEraCracker/LOICGoogle Scholar
- Laurent Constantin, Netwox. Online source available at: http://www.laurentconstantin.com/en/netw/netwoxGoogle Scholar
- Salvatore Sanfilippo, Hping3. Online source available at: http://www.hping.orgGoogle Scholar
Index Terms
- Vulnerabilities and Attacks of UAV Cyber Physical Systems
Recommendations
Comparing cyber physical systems with RFID applications: common attacks and countermeasure challenges
The RFID technology is widely used in industrial control systems (ICS) and cyber physical systems (CPS). However, the design of the current RFID protocol is optimal in performance but with less effort invested into security. As such, RIFD infrastructure ...
Security analysis for cyber-physical systems against stealthy cyber attacks
CERIAS '13: Proceedings of the 14th Annual Information Security SymposiumSecurity of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific ...
An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measurement Unit
With the fast growth of civil drones, their security problems meet significant challenges. A commercial drone may be hijacked by a GPS-spoofing attack for illegal activities, such as terrorist attacks. The target of this article is to develop a ...
Comments