Security Analysis of Drone Communication Protocols

被引:14
|
作者
Bunse, Christian [1 ]
Plotz, Sebastian [1 ]
机构
[1] Hsch Stralsund, Schwedenschanze 15, D-18435 Stralsund, Germany
关键词
Drone; UAV; Security; Wireless; Radio protocol; Reverse engineering;
D O I
10.1007/978-3-319-94496-8_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAV) are increasingly used by hobbyists, companies, and the public sector [1] for a number of purposes. Although this is good, UAVs bear the physical risks of aircrafts as well as those of unmanned systems. Taken into account the exponentially increasing number of UAVs (i.e., there will be approximately 1.26 million UAVs in Germany by 2018), these risks are becoming more likely to occur. In addition to operational risks, there are also security related risks. UAVs are typically remotely controlled, which, in turn, opens ways for cyber-attacks (e.g., denial of service or taking over control). In this paper we demonstrate that taking over control of commercially available UAVs is feasible and simple. In detail, we examine and analyze a standard UAV communication and control protocol (i.e., the DSM protocol family by Spektrum Inc.). We discuss common approaches for attacks, minor observations, and associated security vulnerabilities of this protocol. Since the number of commercially available communication components is small, these findings can easily be ported to other protocols such as (HOTT, S-FHSS, FrSky, and others). Finally, we make some recommendations which, if implemented, will significantly improve the security of UAV operations.
引用
收藏
页码:96 / 107
页数:12
相关论文
共 50 条
  • [1] Software Defined Radio for Analyzing Drone Communication Protocols
    Mototolea, Dan
    Stolk, Cornelis
    [J]. 2018 12TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2018, : 485 - 490
  • [2] IoT: Communication protocols and security threats
    Gerodimos A.
    Maglaras L.
    Ferrag M.A.
    Ayres N.
    Kantzavelou I.
    [J]. Internet of Things and Cyber-Physical Systems, 2023, 3 : 1 - 13
  • [3] Cyber Security of Industrial Communication Protocols
    Su, Weilian
    Antoniou, Anastasios
    Eagle, Chris
    [J]. 2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [4] Performance Evaluation of Three Routing Protocols for Drone Communication Networks
    Ahmed, Gamil
    Sheltami, Tarek
    Mahmoud, Ashraf
    Imam, Muhammad
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, : 13149 - 13161
  • [5] Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios
    Massimiliano Masi
    Rosario Pugliese
    Francesco Tiezzi
    [J]. Journal of Medical Systems, 2012, 36 : 3695 - 3711
  • [6] Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios
    Masi, Massimiliano
    Pugliese, Rosario
    Tiezzi, Francesco
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3695 - 3711
  • [7] Comparative Analysis of TCP/IP Security Protocols for Use in Vehicle Communication
    Lastinec, Jan
    Hudec, Ladislav
    [J]. PROCEEDINGS OF THE 2016 17TH INTERNATIONAL CARPATHIAN CONTROL CONFERENCE (ICCC), 2016, : 429 - 433
  • [8] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    [J]. CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [9] Linguistic security testing for text communication protocols
    Kam, Ben W. Y.
    Dean, Thomas R.
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2013, 43 (09): : 1103 - 1120
  • [10] Security assessment of in-vehicle communication protocols
    Anwar, Akib
    Anwar, Anika
    Moukahal, Lama
    Zulkernine, Mohammad
    [J]. VEHICULAR COMMUNICATIONS, 2023, 44