Abstract
The demand for unmanned aerial vehicles (UAVs), popularly known by their generic term drones, is rapidly increasing not only for recreational UAVs but also for sophisticated and professional UAVs largely deployed for sensitive and critical missions. This exponential growth of UAVs and it’s applications has necessitated the need to assess their resilience to security and privacy threats. This paper primarily focuses on assessing the security vulnerabilities of two drones, Parrot Mambo FPV and Eachine E010. While the former drone was found to be vulnerable against de-authentication and FTP service attacks, successful attacks on the latter were radio frequency (RF) replay attack and custom made controller attack. Besides exploiting the security vulnerabilities of two UAVs, the paper also discusses potential countermeasures to improve the resilience of UAVs against the identified attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Schlinkheider, J., Ramarao, P., Tully, T., Banga, V., Deokar, V.: Insights in engineering leadership white paper commercial drones are coming-sooner than you think?. Technical Report, UC Berkeley (2014)
Valente, J., Cardenas, A.A.: Understanding security threats in consumer drones through the lens of the discovery quadcopter family. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp. 31–36. ACM (2017)
Pleban, J.S., Band, R., Creutzburg, R.: Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy. In: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications, vol. 9030, p. 90300L. International Society for Optics and Photonics (2014)
Clark, D.R., Meffert, C., Baggili, I., Breitinger, F.: Drop (drone open source parser) your drone: forensic analysis of the dji phantom iii. Digit. Investig. 22, S3–S14 (2017)
Rodday, N.M., Schmidt, R.D.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 993–994. IEEE (2016)
Choudhary, G., Sharma, V., Gupta, T., You, I.: Internet of drones (iod): threats, vulnerability, and security perspectives. arXiv preprint arXiv:180800203 (2018)
Shepard, D.P., Bhatti, J.A., Humphreys, T.E., Fansler, A.A.: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Radionavigation Laboratory Conference Proceedings (2012)
Roberts, G.A.: Open-source unmanned aerial vehicles: vulnerabilities, exploits, and risk. Ph.D. thesis, Utica College (2016)
Harrison, A.J.: Analyzing the impact of commercial drone use on united states society. Ph.D. thesis, Utica College (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lakew Yihunie, F., Singh, A.K., Bhatia, S. (2020). Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles. In: Somani, A.K., Shekhawat, R.S., Mundra, A., Srivastava, S., Verma, V.K. (eds) Smart Systems and IoT: Innovations in Computing. Smart Innovation, Systems and Technologies, vol 141. Springer, Singapore. https://doi.org/10.1007/978-981-13-8406-6_66
Download citation
DOI: https://doi.org/10.1007/978-981-13-8406-6_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8405-9
Online ISBN: 978-981-13-8406-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)