skip to main content
10.1145/3398329.3398331acmotherconferencesArticle/Chapter ViewAbstractPublication PagescniotConference Proceedingsconference-collections
research-article

Vulnerabilities and Attacks of UAV Cyber Physical Systems

Authors Info & Claims
Published:31 May 2020Publication History

ABSTRACT

The purpose of this paper is to outline and summarize the latest technology on UAV security. This is driven by the growing market share represented by the technology. A silent yet vital revolution is happening: UAVs are becoming cheaper and more widely used. Unfortunately, the security and safety aspects were overlooked by manufacturers who eliminated potential threats and considered small UAVs as toys. To demonstrate the importance of UAV security once again, real examples of vulnerabilities and dangerous attacks are shown.

References

  1. Federal Aviation Administration (FAA). Online source available at: https://www.faa.govGoogle ScholarGoogle Scholar
  2. Federal Aviation Administration, "2017-2037 Aviation Forecast," March 2017. Online source available at: https://www.faa.gov/data research/aviationGoogle ScholarGoogle Scholar
  3. M. McFarland, "Google drones will deliver chipotle burritos at Virginia Tech," CNN Money, September 2016. Online source available at: http://money.cnn.com/2016/09/08/technology/google-drone-chipotleburrito/index.htmlGoogle ScholarGoogle Scholar
  4. Amazon, Amazon prime air, 2016. Online source available at:https://www.amazon.com/Amazon-Prime Air/b?node=8037720011Google ScholarGoogle Scholar
  5. Siobhan Gorman, Yochi J. Dreazen and August Cole, Wall Street Journal, "Insurgents Hack U.S. Drones," December 2009. Online source available at: https://www.wsj.com/articles/SB126102247889095011Google ScholarGoogle Scholar
  6. CNN Wire Staff, CNN, "Obama says U.S. has asked Iran to return drone aircraft," December 2011. Online source available at: http://edition.cnn.com/2011/12/12/world/meast/iran-us-drone/index.htmlGoogle ScholarGoogle Scholar
  7. Saeed Kamali Dehghan, The Guardian, "Iran gives Russia copy of US ScanEagle drone as proof of mass production," October 2013. Online source available at: https://www.theguardian.com/world/2013/oct/21/iranrussia-us-scaneagle-spy-drone-production-captureGoogle ScholarGoogle Scholar
  8. C.G.L. Krishna and R.R. Murphy, "A review on cybersecurity vulnerabilities for unmanned aerial vehicles," 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR), Shanghai, 2017, pp. 194--199.Google ScholarGoogle Scholar
  9. D. He, S. Chan and M. Guizani, "Drone-Assisted Public Safety Networks: The Security Aspect," in IEEE Communications Magazine, vol. 55, no. 8, pp. 218--223, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Vattapparamban. Gven, A.. Yurekli, K. Akkaya and S. Uluaa, "Drones for smart cities: Issues in cybersecurity, privacy, and public safety," 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, 2016, pp. 216--221.Google ScholarGoogle Scholar
  11. Vemi S.G., Panchev C., "Vulnerability Testing of Wireless Access Points Using Unmanned Aerial Vehicles (UAV)," in Proceedings of the European Conference on e-Learning, Academic Conferences and Publishing International, 2015.Google ScholarGoogle Scholar
  12. S. M. Giray, "Anatomy of unmanned aerial vehicle hijacking with signal spoofing," 2013 6th International Conference on Recent Advances in Space Technologies (RAST), Istanbul, 2013, pp. 795--800.Google ScholarGoogle Scholar
  13. Z. Feng et al., "Efficient drone hijacking detection using onboard motion sensors," Design, Automation & Test in Europe Conference & Exhibition (2017), 2017, Lausanne, 2017, pp. 1414--1419.Google ScholarGoogle ScholarCross RefCross Ref
  14. K. Yoon, D. Park, Y. Yim, K. Kim, S. K. Yang and M. Robinson, "Security Authentication System Using Encrypted Channel on UAV Network," 2017 First IEEE International Conference on Robotic Computing (IRC), Taichung, 2017, pp. 393--398.Google ScholarGoogle Scholar
  15. A. Shoufan, H. Alnoon and J. Baek, "On the power consumption of cryptographic processors in civil microdrones," 2015 International Conference on Information Systems Security and Privacy (ICISSP), Angers, 2015, pp. 283--290.Google ScholarGoogle Scholar
  16. G. Vasconcelos, G. Carrijo, R. Miani, J. Souza and V. Guizilini, "The Impact of DoS Attacks on the AR.Drone 2.0," 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS/SBR), Recife, 2016, pp. 127--132.Google ScholarGoogle Scholar
  17. Parrot, AR.Drone 2.0. Online source available at: https://www.parrot.com/global/drones/parrot-ardrone-20-eliteedition#parrot-ardrone-20-elite-editionGoogle ScholarGoogle Scholar
  18. Parrot, Bebop Drone. Online source available at: http://global.parrot.com/au/products/bebop-droneGoogle ScholarGoogle Scholar
  19. M. Hooper et al., "Securing commercial WiFi-based UAVs from common security attacks," MILCOM 2016-2016 IEEE Military Communications Conference, Baltimore, MD, 2016, pp. 1213--1218.Google ScholarGoogle Scholar
  20. N. M. Rodday, R. d. O. Schmidt and A. Pras, "Exploring security vulnerabilities of unmanned aerial vehicles," NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, 2016, pp. 993--994.Google ScholarGoogle Scholar
  21. Reed Theodore, Geis Joseph and Dietrich Sven., "SkyNET: A 3GEnabled Mobile Attack Drone and Stealth Botmaster," 2011, pp. 28--36.Google ScholarGoogle Scholar
  22. DJI, Phantom 2 Vision Drone. Online source available at: https://www.dji.com/phantom-2-visionGoogle ScholarGoogle Scholar
  23. 3D Robotics, Solo Drone. Online source available at: https://3dr.com/solo-droneGoogle ScholarGoogle Scholar
  24. Darren Kitchen and Sebastian Kinne, Wi-Fi Pineapple. Online source available at: https://www.wifipineapple.comGoogle ScholarGoogle Scholar
  25. K. Hartmann and K. Giles, "UAV exploitation: A new domain for cyber power," 2016 8th International Conference on Cyber Conflict (CyCon), Tallinn, 2016, pp. 205--221.Google ScholarGoogle Scholar
  26. Raspberry Pi Foundation, Raspberry Pi. Online source available at: https://www.raspberrypi.orgGoogle ScholarGoogle Scholar
  27. Jim Sciutto and Dominique van Heerden, CNN, "Exclusive: CNN witnesses US Navy's drone-killing laser," July 2017. Online source available at: https://edition.cnn.com/2017/07/17/politics/us-navy-dronelaserweapon/index.htmlGoogle ScholarGoogle Scholar
  28. Keith Wagstaff, NBC, "Drone Shoots Net to Safely Capture Rogue Drones," January 2016. Online source available at: https://www.nbcnews.com/tech/innovation/drone-shoots-net-safelycapture-rogue-drones-n494881Google ScholarGoogle Scholar
  29. Tyler Essary, Time, "These Drone-Hunting Eagles Aren't Messing Around," February 2017. Online source available at: http://time.com/4675164/drone-hunting-eaglesGoogle ScholarGoogle Scholar
  30. Glenn Wilkinson, Snoopy Drone software. Online source available at:https://github.com/sensepost/SnoopyGoogle ScholarGoogle Scholar
  31. Thomas d'Otreppe de Bouvette, aircrack-ng. Online source available at:http://www.aircrack-ng.orgGoogle ScholarGoogle Scholar
  32. Samy Kamkar, SkyJack. Online source available at: https://samy.pl/skyjackGoogle ScholarGoogle Scholar
  33. Praetox Technologies and Jorge Oliveira, Low Orbit Ionic Cannon. Online source available at: https://github.com/NewEraCracker/LOICGoogle ScholarGoogle Scholar
  34. Laurent Constantin, Netwox. Online source available at: http://www.laurentconstantin.com/en/netw/netwoxGoogle ScholarGoogle Scholar
  35. Salvatore Sanfilippo, Hping3. Online source available at: http://www.hping.orgGoogle ScholarGoogle Scholar

Index Terms

  1. Vulnerabilities and Attacks of UAV Cyber Physical Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CNIOT '20: Proceedings of the 2020 International Conference on Computing, Networks and Internet of Things
      April 2020
      234 pages
      ISBN:9781450377713
      DOI:10.1145/3398329

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 May 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      CNIOT '20 Paper Acceptance Rate39of82submissions,48%Overall Acceptance Rate39of82submissions,48%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader