Skip to main content

Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles

  • Conference paper
  • First Online:
Smart Systems and IoT: Innovations in Computing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 141))

Abstract

The demand for unmanned aerial vehicles (UAVs), popularly known by their generic term drones, is rapidly increasing not only for recreational UAVs but also for sophisticated and professional UAVs largely deployed for sensitive and critical missions. This exponential growth of UAVs and it’s applications has necessitated the need to assess their resilience to security and privacy threats. This paper primarily focuses on assessing the security vulnerabilities of two drones, Parrot Mambo FPV and Eachine E010. While the former drone was found to be vulnerable against de-authentication and FTP service attacks, successful attacks on the latter were radio frequency (RF) replay attack and custom made controller attack. Besides exploiting the security vulnerabilities of two UAVs, the paper also discusses potential countermeasures to improve the resilience of UAVs against the identified attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.wireshark.org/.

  2. 2.

    https://www.aircrack-ng.org/.

References

  1. Schlinkheider, J., Ramarao, P., Tully, T., Banga, V., Deokar, V.: Insights in engineering leadership white paper commercial drones are coming-sooner than you think?. Technical Report, UC Berkeley (2014)

    Google Scholar 

  2. Valente, J., Cardenas, A.A.: Understanding security threats in consumer drones through the lens of the discovery quadcopter family. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp. 31–36. ACM (2017)

    Google Scholar 

  3. Pleban, J.S., Band, R., Creutzburg, R.: Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications, vol. 9030, p. 90300L. International Society for Optics and Photonics (2014)

    Google Scholar 

  4. Clark, D.R., Meffert, C., Baggili, I., Breitinger, F.: Drop (drone open source parser) your drone: forensic analysis of the dji phantom iii. Digit. Investig. 22, S3–S14 (2017)

    Google Scholar 

  5. Rodday, N.M., Schmidt, R.D.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 993–994. IEEE (2016)

    Google Scholar 

  6. Choudhary, G., Sharma, V., Gupta, T., You, I.: Internet of drones (iod): threats, vulnerability, and security perspectives. arXiv preprint arXiv:180800203 (2018)

  7. Shepard, D.P., Bhatti, J.A., Humphreys, T.E., Fansler, A.A.: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Radionavigation Laboratory Conference Proceedings (2012)

    Google Scholar 

  8. Roberts, G.A.: Open-source unmanned aerial vehicles: vulnerabilities, exploits, and risk. Ph.D. thesis, Utica College (2016)

    Google Scholar 

  9. Harrison, A.J.: Analyzing the impact of commercial drone use on united states society. Ph.D. thesis, Utica College (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sajal Bhatia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lakew Yihunie, F., Singh, A.K., Bhatia, S. (2020). Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles. In: Somani, A.K., Shekhawat, R.S., Mundra, A., Srivastava, S., Verma, V.K. (eds) Smart Systems and IoT: Innovations in Computing. Smart Innovation, Systems and Technologies, vol 141. Springer, Singapore. https://doi.org/10.1007/978-981-13-8406-6_66

Download citation

Publish with us

Policies and ethics