Abstract
The proliferation of unmanned aerial vehicles (UAVs), commonly known as drones, has brought substantial benefits across various industries. However, the increasing use of drones has also raised concerns about their security, particularly with regard to open-source operating systems. Open-source operating systems serve as a foundational framework for drone enthusiasts and companies alike. Unfortunately, security considerations have been disregarded by some who directly appropriate open-source code, introducing inadvertent vulnerabilities. Given the evolving role of drones in mission-critical systems, the demand for resilient and secure operating systems becomes increasingly evident. This study addresses the critical need to assess the security of open-source operating systems used in drones.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Iqbal S (2021). A study on UAV operating system security and future research challenges. https://doi.org/10.1109/CCWC51732.2021.9376151
Kumar CRS, Mohanty S (2021) Current trends in cyber security for drones. In: 2021 International Carnahan Conference on Security Technology (ICCST). IEEE, pp 1–5
Marshall DM, Barnhart RK, Hottman SB, Shappee E, Thomas M (2016). Introduction to unmanned aircraft systems. CRC Press
Dey V, Pudi V, Chattopadhyay A, Elovici Y (2018) Security vulnerabilities of unmanned aerial vehicles and countermeasures: an experimental study. In: 31st International conference on VLSI design and 2018 17th international conference on embedded systems (VLSID). https://doi.org/10.1109/vlsid.2018.97
Krishna CGL, Murphy RR (2017) A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In: IEEE international symposium on safety, security and rescue robotics (SSRR). https://doi.org/10.1109/ssrr.2017.8088163
Cebeloglu FS, Karakose M (2019). A cyber security analysis used for unmanned aerial vehicles in the smart city. https://doi.org/10.1109/UBMYK48245.2019.8965591
Zhai G, Li Y (2008) Analysis and study of security mechanisms inside Linux Kernel. International conference on security technology. https://doi.org/10.1109/sectech.2008.17
Richards RJ (2010) Modeling and security analysis of a commercial real-time operating system kernel. Springer EBooks, pp 301–322. https://doi.org/10.1007/978-1-4419-1539-9_10
Luna R, Islam SA (2021) Security and reliability of safety-critical RTOS. SN Comput Sci 2(5). https://doi.org/10.1007/s42979-021-00753-y
Yu Weider D (2010) Real-time operating system security
Dieber B, Breiling B, Taurer S, Kacianka S, Rass S, Schartner P (2017) Security for the robot operating system. Robot Auton Syst 98:192–203. https://doi.org/10.1016/j.robot.2017.09.017
Recchia L, Procopio G, Onofrii A, Rogo F (2014) Security evaluation of a Linux system: common criteria EAL4+ certification experience. https://doi.org/10.1109/ISSREW.2014.45
Zhang T, Tech V, Shen W, University Z, Lee D, Azab A, Wang R (2019) PeX: a permission check analysis framework for Linux Kernel PeX: a permission check analysis framework for Linux Kernel. https://www.usenix.org/system/files/sec19-zhang-tong.pdf
Sedano WK, Salman M (2021) Auditing Linux operating system with center for internet security (CIS) standard. https://doi.org/10.1109/ICIT52682.2021.9491663
Wita R, Teng-Amnuay Y (2005). Vulnerability profile for Linux. https://doi.org/10.1109/AINA.2005.343
Teplyuk PA, Yakunin AG, Sharlaev EV (2020) Study of security flaws in the Linux Kernel by fuzzing. In: International multi-conference on industrial engineering and modern technologies (FarEastCon). https://doi.org/10.1109/fareastcon50210.2020.9271516
Gallus P, Frantis P (2021) Security analysis of the Raspbian Linux operating system and its settings to increase resilience against attacks via network interface. In: International conference on military technologies (ICMT). https://doi.org/10.1109/icmt52455.2021.9502746
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Patil, D., Pournouri, S. (2024). Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles. In: Jahankhani, H. (eds) Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs. ICGS3 2023. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-47594-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-47594-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47593-1
Online ISBN: 978-3-031-47594-8
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)