Abstract
Personal unmanned aerial vehicles (UAVs) have become popular in recent years. While their extreme mobility enables exciting new applications, they also raise security concerns. However, currently we understand little about UAV’s vulnerabilities, feasible attacks, and defense options. Toward securing UAVs, we analyzed two of the most popular personal UAVs. We discovered a series of vulnerabilities, including insecure communication channels and misuse of cryptography. By exploiting these vulnerabilities, an attacker can eavesdrop on the data acquired or transmitted by the aircraft, impersonate the aircraft to send bogus data to the user’s mobile device, hijack the camera on the aircraft or the aircraft itself, and prevent the aircraft from communicating with the user’s mobile device.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Our malware needs the KILL_BACKGROUND_PROCESSES permission to invoke this operation.
References
Android Debug Bridge. http://developer.android.com/tools/help/adb.html
Android Security Tips. http://developer.android.com/training/articles/ security-tips.html
DJI Phantom 2 Vision+. http://www.dji.com/product/phantom-2-vision-plus
DJI Phantom 3 Professional. http://www.dji.com/product/phantom-3
Floyd, S.: Inappropriate TCP Resets Considered Harmful. RFC, United States (2002). 3360
Gu, Y., Grossman, R.L.: UDT: UDP-based data transfer for high-speed wide area networks. Comput. Netw. 51(7), 1777–1799 (2007)
ser2net. http://ser2net.sourceforge.net/
Watson, P.: Slipping in the Window: TCP Reset attacks (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, P., Chen, H. (2017). POSTER: Security Analysis of Personal Unmanned Aerial Vehicles. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 198. Springer, Cham. https://doi.org/10.1007/978-3-319-59608-2_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-59608-2_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59607-5
Online ISBN: 978-3-319-59608-2
eBook Packages: Computer ScienceComputer Science (R0)