Security Vulnerability Analysis of Wi-Fi Connection Hijacking on the Linux-Based Robot Operating System for Drone Systems

  • Jinyeong Kang
  • Inwhee JoeEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 931)


In this paper we describe the security vulnerabilities of the Erle-Copter quadcopters. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which make it a target for harmful attacks. In addition, the video stream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we perform a security threat analysis on this particular family of drones. We set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We show how the drone can be hacked in order to hijack the Erle-Copter. Our aim is to sensitize the end-user of Erle-Copters by describing the security vulnerabilities and to show how the Erle-Copter can be secured from unauthorized access. We provide instructions to secure the drones Wi-Fi connection and its operation with the official smartphone app or third party PC software.



This work was supported by the Technology development Program (S2521883) funded by the Ministry of SMEs and Startups (MSS, Korea).


  1. 1.
    Demgen, A.: AR.Drone-Academy: Soziales Netzwerk für Drohnen-Flieger verfügbar, August 2012.
  2. 2.
  3. 3.
    Sharkey, N., Knuckey, S.: OWS Fights Back Against Police Surveillance by Launching “Occucopter” Citizen Drone, December 2011.
  4. 4.
    Wagstaff, K.: Occupy Wall Street’s New Drone: ‘The Occucopter’, December 2011.
  5. 5.
    Méchaly, A.: One flew over the cornfield, October 2012.
  6. 6.
    Samland, F., Fruth, J., Hildebrandt, M., Hoppe, T., Dittmann, J.: Erle-Copter: security threat analysis and exemplary attack to track persons. In: Casasent, D.P. (eds.) SPIE Proceedings, Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, Juha Röning; 83010G, vol. 8301 (2012)Google Scholar
  7. 7.
    Ackerman, E.: AR Drone that infects other drones with virus wins DroneGames, December 2012.
  8. 8.
    Kamkar, S.: SkyJack, December 2013.
  9. 9.
    Hacking Drones and the Dangers It Presents, July 2012.
  10. 10.
    Drone hack explained: Professor details UAV hijacking, July 2012.
  11. 11.
  12. 12.
  13. 13.

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer and SoftwareHanyang UniversitySeoulSouth Korea

Personalised recommendations