Abstract
With the increase of technological capabilities of automated systems, the use of unmanned aerial vehicles (UAVs) has also increased in many military and civilian applications. UAVs today play an important role in many other areas like wildlife surveys, weather monitoring, monitoring natural disasters affects etc. It is also expected that UAVs will be a major part of future smart cities. The amount and type of information present with UAVs makes it an extremely interesting target for cyber-attacks. However, the cybersecurity aspect of UAVs has not been fully considered while building UAVs. As a result, UAVs are more vulnerable to cyber-attacks. Potential security vulnerability may exist in the modules, which are responsible for their proper working or may exist during communication between UAVs and control station. Out of these two, communication security is critically important for the success of UAVs as they often carry sensitive information that adversaries might try to get hold of. Wi-Fi attacks such as Eavesdropping, Information Injection, Denial-of-Service, and Distributed DoS are the possible security threats to UAV communications. Recently, GPS spoofing attack, session hijacking, and compromised surveillance are also reported. The goal of this paper is to provide the different levels of vulnerabilities along with the prevention measures required at each level, some major attacks that can be performed on a UAV along with their cause, impact and the precautions required to avoid that attack. It has been observed that the most easily attackable vulnerability on the UAV system is flooding the UAV using the radio communication and the most harmful vulnerability is acquiring complete control through Man-in-the-Middle attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim A, Wampler B, Goppert J, Hwang I, Aldridge H (2012) Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In: AIAA Infotech@Aerospace. https://doi.org/10.2514/6.2012-2438
Gupta SG, Ghonge MM, Jawandhiya PM (2013) Review of unmanned aircraft system (UAS). Int J Adv Res Comput Eng Technol (IJARCET) 2(4)
Udeanu G, Dobrescu A, Oltean M (2016) Unmanned aerial vehicle in military operations. Sci Res Educ Air Force 18(1):199–206. https://doi.org/10.19062/2247-3173.2016.18.1.26
Debusk W (2010) Unmanned aerial vehicle systems for disaster relief: Tornado Alley. In: AIAA Infotech@Aerospace 2010. https://doi.org/10.2514/6.2010-3506
Waharte S, Trigoni N (2010) Supporting search and rescue operations with UAVs. In: 2010 international conference on emerging security technologies. https://doi.org/10.1109/est.2010.31
Javaid AY, Sun W, Devabhaktuni VK, Alam M (2012) Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE conference on technologies for homeland security (HST), Waltham, MA, pp 585–590. https://doi.org/10.1109/ths.2012.6459914
Benkraouda H, Barka E, Shuaib K (2018) Cyber-attacks on the data communication of drones monitoring critical infrastructure. Comput Sci Inf Technol (CS & IT) 8:83–93. https://doi.org/10.5121/csit.2018.81708
Brauch H (2019) Security threats, challenges, vulnerability and risks international security, peace, development and environment, vol I. In: Security threats, challenges, vulnerability and risks
Aslanishvili I, Khvedelidze T (2015) Simple model for transmission control protocol (TCP). Int J Inf Models Anal 4(1)
Rafique S, Humayun M, Hamid B, Abbas A, Akhtar M, Iqbal K (2015) Web application security vulnerabilities detection approaches: A systematic mapping study. In: 2015 IEEE/ACIS 16th international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD), Takamatsu, 2015, pp 1–6. https://doi.org/10.1109/snpd.2015.7176244
Gudla C, Rana MS, Sung AH (2018) Defense techniques against cyber attacks on unmanned aerial vehicles. In: International conference on embedded systems, cyber-physical systems, and applications (ESCS’18), pp 110–116
Secure BOX Page. https://securebox.comodo.com/ssl-sniffing/man-in-the-middle-attack/. Last accessed 2019/02/24
https://www.reuters.com/article/us-venezuela-politics-drones/apparent-attack-in-ve-nezuela-highlights-risk-of-drone-strikes-idUSKBN1KQ0MG. Last accessed 2019/03/01
DoS Attacks. https://www.thewindowsclub.com/ddos-distributed-denial-service-attacks. Last accessed 2019/02/24
He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles. IEEE Wirel Commun 24(4):134–139
https://sputniknews.com/middleeast/201902221072659058-iran-hack-us-drones/. Last accessed 2019/03/02
https://www.forbes.com/sites/thomasbrewster/2017/04/25/vulnerable-quadcopter-d-rone-hacked-by-ut-dallas-cyber-researchers/#1b4103871037. Last accessed 2019/03/03
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dahiya, S., Garg, M. (2020). Unmanned Aerial Vehicles: Vulnerability to Cyber Attacks. In: Jain, K., Khoshelham, K., Zhu, X., Tiwari, A. (eds) Proceedings of UASG 2019. UASG 2019. Lecture Notes in Civil Engineering, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-030-37393-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-37393-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37392-4
Online ISBN: 978-3-030-37393-1
eBook Packages: EngineeringEngineering (R0)