Skip to main content

Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles

  • Conference paper
  • First Online:
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs (ICGS3 2023)

Abstract

The proliferation of unmanned aerial vehicles (UAVs), commonly known as drones, has brought substantial benefits across various industries. However, the increasing use of drones has also raised concerns about their security, particularly with regard to open-source operating systems. Open-source operating systems serve as a foundational framework for drone enthusiasts and companies alike. Unfortunately, security considerations have been disregarded by some who directly appropriate open-source code, introducing inadvertent vulnerabilities. Given the evolving role of drones in mission-critical systems, the demand for resilient and secure operating systems becomes increasingly evident. This study addresses the critical need to assess the security of open-source operating systems used in drones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Iqbal S (2021). A study on UAV operating system security and future research challenges. https://doi.org/10.1109/CCWC51732.2021.9376151

    Article  Google Scholar 

  2. Kumar CRS, Mohanty S (2021) Current trends in cyber security for drones. In: 2021 International Carnahan Conference on Security Technology (ICCST). IEEE, pp 1–5

    Google Scholar 

  3. Marshall DM, Barnhart RK, Hottman SB, Shappee E, Thomas M (2016). Introduction to unmanned aircraft systems. CRC Press

    Google Scholar 

  4. Dey V, Pudi V, Chattopadhyay A, Elovici Y (2018) Security vulnerabilities of unmanned aerial vehicles and countermeasures: an experimental study. In: 31st International conference on VLSI design and 2018 17th international conference on embedded systems (VLSID). https://doi.org/10.1109/vlsid.2018.97

  5. Krishna CGL, Murphy RR (2017) A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In: IEEE international symposium on safety, security and rescue robotics (SSRR). https://doi.org/10.1109/ssrr.2017.8088163

  6. Cebeloglu FS, Karakose M (2019). A cyber security analysis used for unmanned aerial vehicles in the smart city. https://doi.org/10.1109/UBMYK48245.2019.8965591

    Article  Google Scholar 

  7. Zhai G, Li Y (2008) Analysis and study of security mechanisms inside Linux Kernel. International conference on security technology. https://doi.org/10.1109/sectech.2008.17

  8. Richards RJ (2010) Modeling and security analysis of a commercial real-time operating system kernel. Springer EBooks, pp 301–322. https://doi.org/10.1007/978-1-4419-1539-9_10

  9. Luna R, Islam SA (2021) Security and reliability of safety-critical RTOS. SN Comput Sci 2(5). https://doi.org/10.1007/s42979-021-00753-y

  10. Yu Weider D (2010) Real-time operating system security

    Google Scholar 

  11. Dieber B, Breiling B, Taurer S, Kacianka S, Rass S, Schartner P (2017) Security for the robot operating system. Robot Auton Syst 98:192–203. https://doi.org/10.1016/j.robot.2017.09.017

    Article  Google Scholar 

  12. Recchia L, Procopio G, Onofrii A, Rogo F (2014) Security evaluation of a Linux system: common criteria EAL4+ certification experience. https://doi.org/10.1109/ISSREW.2014.45

  13. Zhang T, Tech V, Shen W, University Z, Lee D, Azab A, Wang R (2019) PeX: a permission check analysis framework for Linux Kernel PeX: a permission check analysis framework for Linux Kernel. https://www.usenix.org/system/files/sec19-zhang-tong.pdf

  14. Sedano WK, Salman M (2021) Auditing Linux operating system with center for internet security (CIS) standard. https://doi.org/10.1109/ICIT52682.2021.9491663

  15. Wita R, Teng-Amnuay Y (2005). Vulnerability profile for Linux. https://doi.org/10.1109/AINA.2005.343

    Article  Google Scholar 

  16. Teplyuk PA, Yakunin AG, Sharlaev EV (2020) Study of security flaws in the Linux Kernel by fuzzing. In: International multi-conference on industrial engineering and modern technologies (FarEastCon). https://doi.org/10.1109/fareastcon50210.2020.9271516

  17. Gallus P, Frantis P (2021) Security analysis of the Raspbian Linux operating system and its settings to increase resilience against attacks via network interface. In: International conference on military technologies (ICMT). https://doi.org/10.1109/icmt52455.2021.9502746

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sina Pournouri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, D., Pournouri, S. (2024). Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles. In: Jahankhani, H. (eds) Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs. ICGS3 2023. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-47594-8_2

Download citation

Publish with us

Policies and ethics