Advertisement

Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles

  • Fekadu Lakew Yihunie
  • Aman Kumar Singh
  • Sajal BhatiaEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 141)

Abstract

The demand for unmanned aerial vehicles (UAVs), popularly known by their generic term drones, is rapidly increasing not only for recreational UAVs but also for sophisticated and professional UAVs largely deployed for sensitive and critical missions. This exponential growth of UAVs and it’s applications has necessitated the need to assess their resilience to security and privacy threats. This paper primarily focuses on assessing the security vulnerabilities of two drones, Parrot Mambo FPV and Eachine E010. While the former drone was found to be vulnerable against de-authentication and FTP service attacks, successful attacks on the latter were radio frequency (RF) replay attack and custom made controller attack. Besides exploiting the security vulnerabilities of two UAVs, the paper also discusses potential countermeasures to improve the resilience of UAVs against the identified attacks.

Keywords

UAV Drone Vulnerabilities Security Radio frequency 

References

  1. 1.
    Schlinkheider, J., Ramarao, P., Tully, T., Banga, V., Deokar, V.: Insights in engineering leadership white paper commercial drones are coming-sooner than you think?. Technical Report, UC Berkeley (2014)Google Scholar
  2. 2.
    Valente, J., Cardenas, A.A.: Understanding security threats in consumer drones through the lens of the discovery quadcopter family. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp. 31–36. ACM (2017)Google Scholar
  3. 3.
    Pleban, J.S., Band, R., Creutzburg, R.: Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications, vol. 9030, p. 90300L. International Society for Optics and Photonics (2014)Google Scholar
  4. 4.
    Clark, D.R., Meffert, C., Baggili, I., Breitinger, F.: Drop (drone open source parser) your drone: forensic analysis of the dji phantom iii. Digit. Investig. 22, S3–S14 (2017)CrossRefGoogle Scholar
  5. 5.
    Rodday, N.M., Schmidt, R.D.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 993–994. IEEE (2016)Google Scholar
  6. 6.
    Choudhary, G., Sharma, V., Gupta, T., You, I.: Internet of drones (iod): threats, vulnerability, and security perspectives. arXiv preprint arXiv:180800203 (2018)
  7. 7.
    Shepard, D.P., Bhatti, J.A., Humphreys, T.E., Fansler, A.A.: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Radionavigation Laboratory Conference Proceedings (2012)Google Scholar
  8. 8.
    Roberts, G.A.: Open-source unmanned aerial vehicles: vulnerabilities, exploits, and risk. Ph.D. thesis, Utica College (2016)Google Scholar
  9. 9.
    Harrison, A.J.: Analyzing the impact of commercial drone use on united states society. Ph.D. thesis, Utica College (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Fekadu Lakew Yihunie
    • 1
  • Aman Kumar Singh
    • 1
  • Sajal Bhatia
    • 1
    Email author
  1. 1.School of Computer Science and EngineeringSacred Heart UniversityFairfieldUSA

Personalised recommendations