Skip to main content

Unmanned Aerial Vehicles: Vulnerability to Cyber Attacks

  • Conference paper
  • First Online:
Book cover Proceedings of UASG 2019 (UASG 2019)

Part of the book series: Lecture Notes in Civil Engineering ((LNCE,volume 51))

Included in the following conference series:

Abstract

With the increase of technological capabilities of automated systems, the use of unmanned aerial vehicles (UAVs) has also increased in many military and civilian applications. UAVs today play an important role in many other areas like wildlife surveys, weather monitoring, monitoring natural disasters affects etc. It is also expected that UAVs will be a major part of future smart cities. The amount and type of information present with UAVs makes it an extremely interesting target for cyber-attacks. However, the cybersecurity aspect of UAVs has not been fully considered while building UAVs. As a result, UAVs are more vulnerable to cyber-attacks. Potential security vulnerability may exist in the modules, which are responsible for their proper working or may exist during communication between UAVs and control station. Out of these two, communication security is critically important for the success of UAVs as they often carry sensitive information that adversaries might try to get hold of. Wi-Fi attacks such as Eavesdropping, Information Injection, Denial-of-Service, and Distributed DoS are the possible security threats to UAV communications. Recently, GPS spoofing attack, session hijacking, and compromised surveillance are also reported. The goal of this paper is to provide the different levels of vulnerabilities along with the prevention measures required at each level, some major attacks that can be performed on a UAV along with their cause, impact and the precautions required to avoid that attack. It has been observed that the most easily attackable vulnerability on the UAV system is flooding the UAV using the radio communication and the most harmful vulnerability is acquiring complete control through Man-in-the-Middle attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim A, Wampler B, Goppert J, Hwang I, Aldridge H (2012) Cyber attack vulnerabilities analysis for unmanned aerial vehicles. In: AIAA Infotech@Aerospace. https://doi.org/10.2514/6.2012-2438

  2. Gupta SG, Ghonge MM, Jawandhiya PM (2013) Review of unmanned aircraft system (UAS). Int J Adv Res Comput Eng Technol (IJARCET) 2(4)

    Google Scholar 

  3. Udeanu G, Dobrescu A, Oltean M (2016) Unmanned aerial vehicle in military operations. Sci Res Educ Air Force 18(1):199–206. https://doi.org/10.19062/2247-3173.2016.18.1.26

    Article  Google Scholar 

  4. Debusk W (2010) Unmanned aerial vehicle systems for disaster relief: Tornado Alley. In: AIAA Infotech@Aerospace 2010. https://doi.org/10.2514/6.2010-3506

  5. Waharte S, Trigoni N (2010) Supporting search and rescue operations with UAVs. In: 2010 international conference on emerging security technologies. https://doi.org/10.1109/est.2010.31

  6. Javaid AY, Sun W, Devabhaktuni VK, Alam M (2012) Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE conference on technologies for homeland security (HST), Waltham, MA, pp 585–590. https://doi.org/10.1109/ths.2012.6459914

  7. Benkraouda H, Barka E, Shuaib K (2018) Cyber-attacks on the data communication of drones monitoring critical infrastructure. Comput Sci Inf Technol (CS & IT) 8:83–93. https://doi.org/10.5121/csit.2018.81708

    Article  Google Scholar 

  8. Brauch H (2019) Security threats, challenges, vulnerability and risks international security, peace, development and environment, vol I. In: Security threats, challenges, vulnerability and risks

    Google Scholar 

  9. Aslanishvili I, Khvedelidze T (2015) Simple model for transmission control protocol (TCP). Int J Inf Models Anal 4(1)

    Google Scholar 

  10. Rafique S, Humayun M, Hamid B, Abbas A, Akhtar M, Iqbal K (2015) Web application security vulnerabilities detection approaches: A systematic mapping study. In: 2015 IEEE/ACIS 16th international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD), Takamatsu, 2015, pp 1–6. https://doi.org/10.1109/snpd.2015.7176244

  11. Gudla C, Rana MS, Sung AH (2018) Defense techniques against cyber attacks on unmanned aerial vehicles. In: International conference on embedded systems, cyber-physical systems, and applications (ESCS’18), pp 110–116

    Google Scholar 

  12. Secure BOX Page. https://securebox.comodo.com/ssl-sniffing/man-in-the-middle-attack/. Last accessed 2019/02/24

  13. https://www.reuters.com/article/us-venezuela-politics-drones/apparent-attack-in-ve-nezuela-highlights-risk-of-drone-strikes-idUSKBN1KQ0MG. Last accessed 2019/03/01

  14. DoS Attacks. https://www.thewindowsclub.com/ddos-distributed-denial-service-attacks. Last accessed 2019/02/24

  15. He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles. IEEE Wirel Commun 24(4):134–139

    Article  Google Scholar 

  16. https://doi.org/10.1109/mwc.2016.1600073wc

    Article  Google Scholar 

  17. https://sputniknews.com/middleeast/201902221072659058-iran-hack-us-drones/. Last accessed 2019/03/02

  18. https://www.forbes.com/sites/thomasbrewster/2017/04/25/vulnerable-quadcopter-d-rone-hacked-by-ut-dallas-cyber-researchers/#1b4103871037. Last accessed 2019/03/03

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dahiya, S., Garg, M. (2020). Unmanned Aerial Vehicles: Vulnerability to Cyber Attacks. In: Jain, K., Khoshelham, K., Zhu, X., Tiwari, A. (eds) Proceedings of UASG 2019. UASG 2019. Lecture Notes in Civil Engineering, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-030-37393-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37393-1_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37392-4

  • Online ISBN: 978-3-030-37393-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics