Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230800086-6.doi: 10.11896/jsjkx.230800086

• Information Security • Previous Articles     Next Articles

Overview of Unmanned Aerial Vehicle Systems Security

WANG Zhen, ZHOU Chao, FAN Yongwen, Shi Pengfei   

  1. Unit.No.63891,Luoyang,Henan 471000,China
  • Published:2024-06-06
  • About author:WANG Zhen,born in 1986,master.His main research interest is information security.

Abstract: In recent years,with the increasing popularity of unmanned aerial vehicle(UAV),UAVs have enormous potential in various industries such as military,agriculture,transportation,film,supply chain,and surveillance.Despite the various conve-niences provided by UAVs,security incidents related to UAVs are constantly emerging today.Malicious parties may attack UAVs and use them for life-threatening activities.Therefore,governments around the world have begun to regulate the use of UAVs.UAVs require an intelligent and automated defense mechanism to ensure the safety of humans,property,and the UAV itself.The protection of UAV operating systems is an important part of preventing intrusion attacks.Firstly,a brief introduction to the structure of UAVs is given,and then the security of existing operating systems for consumer and commercial UAVs is studied.Finally,various security issues and possible solutions for the UAV operating system are investigated.

Key words: Unmanned aerial vehicle, Unmanned aerial vehicle security, Operating system security, Solution

CLC Number: 

  • TP393
[1]YANUSHEVSKY R.Guidance of unmanned aerial vehicles[M].CRC Press,2011.
[2]ILLMAN M.9 cool ways drones are being used to deliver goods to you[EB/OL].https://www.pocket-lint.com/drones/news/146105-things-drones-can-deliver-to-you.
[3]MOON M.Faa makes it easy for drone hobbyists to fly in con-trolled airspace[EB/OL].https://www.engadget.com/2019/07/24/faa-opens-laanc-to-drone-hobbyists/.
[4]CONSTANTINIDES C,PARKINSON P.Security challenges in uav devel-opment[C]//27th Digital Avionics Systems Confe-rence.IEEE,2008:1-8.
[5]EVANS A.Not in my backyard! Woman throws stones before using a gun to get rid of nosy neighbour’s drone[EB/OL].https://www.dailymail.co.uk/news/article-4283486/Woman-grabs-gun-shoots-nosy-neighbour-s-drone.html.
[6]GETTINGER D.The soleimani killing and 5 things to knowabout drones in iraq[EB/OL].https://thebulletin.org/2020/01/soleimani-and-beyond-5-ways-that-drones-have-destabilized-iraq/.
[7]MARGARITOFF M.Tobacco-smuggling drone found by uk-raine border patrol reveals region’s black market[EB/OL].https://www.thedrive.com/tech/23447/tobacco-smuggling-drone-found-by-ukraine-border-patrol-reveals-regions-black-market.
[8]NASSI B,SHABTAI A,MASUOKA R,et al.SoK-security and privacy in the age of drones:threats,challenges,solution mechanisms,and scientific gaps[J].arXiv:1903.05155,2019.
[9]CLARKE R.Understanding the drone epidemic[J].Computer Law & Security Review,2014,30(3):230-246.
[10]AUSTIN R.Unmanned aircraft systems:UAVS design,deve-lopment and deployment[M].John Wiley & Sons,2011.
[11]WANG H,ZHAO H,ZHANG J,et al.Survey on unmanned aerial vehicle networks:A cyber physical system perspective[J].IEEE Communications Surveys & Tutorials,2019,22(2):1027-1070.
[12]Ardupilot[EB/OL].https://ardupilot.org/.
[13]Mavlink[EB/OL].https://mavlink.io/en/.
[14]ALLOUCH A,CHEIKHROUHOU O,KOUBÂA A,et al.MAVSec:Securing the MAVLink protocol for ardupilot/PX4 unmanned aerial systems[C]//2019 15th International Wireless Communications & Mobile Computing Conference(IWCMC).IEEE,2019:621-628.
[15]BUTCHER N,STEWART A,BIAZ S.Securing the mavlinkcommunication protocol for unmanned aircraft systems[J/OL].https://eng.auburn.edu/files/acad_depts/csse/csse_technical_reports/csse14-02.pdf.
[16]Px4[EB/OL].https://px4.io/.
[17]Paparazziuav[EB/OL].https://wiki.paparazziuav.org/wiki/Main Page.
[18]DEY V,PUDI V,CHATTOPADHYAY A,et al.Security vulnerabilities of unmanned aerial vehicles and countermeasures:An experimental study[C]//2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems(VLSID).IEEE,2018:398-403.
[19]LIAO S.Dji drones can get past no-fly zones thanks to this rus-sian software company[EB/OL].https://www.theverge.com/2017/6/21/15848344/drones-russian-software-hack-dji-jailbreak.
[20]TRUJANO F,CHAN B,BEAMS G,et al.Security analysis of dji phantom 3 standard[J/OL].https://courses.csail.mit.edu/6.857/2016/files/9.pdf.
[21]Dji lightbridge[EB/OL].https://www.dji.com/ca/dji-lightbridge.
[22]Chibios[EB/OL].http://chibios.org/dokuwiki/doku.php.
[23]Apache nuttx[EB/OL].https://nuttx.apache.org/.
[24]KERNS A J,SHEPARD D P,BHATTI J A,et al.Unmanned aircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636.
[25]LUO A.Drones hijacking[J/OL].https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEF%20CON%2024%20-%20Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf.
[26]VERVISCH-PICOIS A,SAMAMA N,TAILLANDIER-LOIZE T.Influence of GNSS spoofing on drone in automatic flight mode[C]//ITSNT 2017:4th International Symposium of Navigation and Timing.Ecole nationale de l’aviation civile,2017:1-9.
[27]HE D,QIAO Y,CHEN S,et al.A friendly and low-cost technique for capturing non-cooperative civilian unmanned aerial vehicles[J].IEEE Network,2018,33(2):146-151.
[28]FENG Z,GUAN N,LV M,et al.Efficient drone hijacking detec-tion using onboard motion sensors[C]//Design,Automation & Test in Europe Conference & Exhibition(DATE),2017.IEEE,2017:1414-1419.
[29]FENG Z,GUAN N,LV M,et al.An efficient UAV hijacking detection method using onboard inertial measurement unit[J].ACM Transactions on Embedded Computing Systems(TECS),2018,17(6):1-19.
[30]WEN H,HUANG P Y R,DYER J,et al.Countermeasures for GPS signal spoofing[C]//Proceedings of the 18th International Technical Meeting of the Satellite Division of the Institute of Navigation(ION GNSS 2005).2005:1285-1290.
[31]ELDOSOUKY A R,FERDOWSI A,SAAD W.Drones in distress:A game-theoretic countermeasure for protecting UAVs against GPS spoofing[J].IEEE Internet of Things Journal,2019,7(4):2840-2854.
[32]SON Y,SHIN H,KIM D,et al.Rocking drones with intentionalsound noise on gyroscopic sensors[C]//24th USENIX Security Symposium(USENIX Security 15).2015:881-896.
[33]CHOI H,LEE W C,AAFER Y,et al.Detecting attacks against robotic vehicles:A control invariant approach[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:801-816.
[34]Dji adds airplane and helicopter detectors to new consumerdrones[EB/OL].https://www.dji.com/ca/newsroom/news/dji-adds-airplane-and-helicopter-detectors-to-new-consumer-drones.
[35]MCCALLIE D,BUTTS J,MILLS R.Security analysis of theADS-B implementation in the next generation air transportation system[J].International Journal of Critical Infrastructure Protection,2011,4(2):78-87.
[36]KIM Y,JO J Y,LEE S.A secure location verification method for ADS-B[C]//2016 IEEE/AIAA 35th Digital Avionics Systems Conference(DASC).IEEE,2016:1-10.
[37]KACEM T,WIJESEKERA D,COSTA P,et al.An ADS-B intrusion detection system[C]//2016 IEEE Trustcom/BigDataSE/ISPA.IEEE,2016:544-551.
[38]DAVIDSON D,WU H,JELLINEK R,et al.Controlling {UAVs} with sensor input spoofing attacks[C]//10th USENIX workshop on offensive technologies(WOOT 16).2016.
[39]ABUNADA A H,OSMAN A Y,KHANDAKAR A,et al.Design and implementation of a RF based anti-drone system[C]//2020 IEEE International Conference on Informatics,IoT,and Enabling Technologies(ICIoT).IEEE,2020:35-42.
[40]MULTERER T,GANIS A,PRECHTEL U,et al.Low-costjamming system against small drones using a 3D MIMO radar based tracking[C]//2017 European Radar Conference(EURAD).IEEE,2017:299-302.
[41]CURPEN R,BĂLAN T,MICLOŞ I A,et al.Assessment of signal jamming efficiency against LTE UAVs[C]//2018 International Conference on Communications(COMM).IEEE,2018:367-370.
[42]PÄRLIN K,ALAM M M,LE MOULLEC Y.Jamming of UAV remote control systems using software defined radio[C]//2018 International Conference on Military Communications and Information Systems(ICMCIS).IEEE,2018:1-6.
[43]WANG Q,NGUYEN T,PHAM K,et al.Mitigating jamming attack:A game-theoretic perspective[J].IEEE Transactions on Vehicular Technology,2018,67(7):6063-6074.
[44]DI PIETRO R,OLIGERI G.Freedom of speech:Thwarting jammers via a probabilistic approach[C]//Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks.2015:1-6.
[45]DI PIETRO R,OLIGERI G,TEDESCHI P.JAM-ME:exploiting jamming to accomplish drone mission[C]//2019 IEEE Conference on Communications and Network Security(CNS).IEEE,2019:1-9.
[46]SODERI S,MUCCHI L,HÄMÄLÄINEN M,et al.Physical la-yer security based on spread-spectrum watermarking and jamming receiver[J].Transactions on Emerging Telecommunications Technologies,2017,28(7):e3142.
[47]RODDAY N M,SCHMIDT R O,PRAS A.Exploring security vulnerabilities of unmanned aerial vehicles[C]//2016 IEEE/IFIP Network Operations and Management Symposium(NOMS 2016).IEEE,2016:993-994.
[48]KRISHNA C G L,MURPHY R R.A review on cybersecurity vulnerabilities for unmanned aerial vehicles[C]//2017 IEEE International Symposium on Safety,Security and Rescue Robotics(SSRR).IEEE,2017:194-199.
[49]HE D,CHAN S,GUIZANI M.Communication security of unmanned aerial vehicles[J].IEEE Wireless Communications,2016,24(4):134-139.
[1] SUN Yang, DING Jianwei, ZHANG Qi, WEI Huiwen, TIAN Bowen. Study on Super-resolution Image Reconstruction Using Residual Feature Aggregation NetworkBased on Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600039-6.
[2] MA Yinghong, LI Xu’nan, DONG Xu, JIAO Yi, CAI Wei, GUO Youguang. Fast Path Recovery Algorithm for Obstacle Avoidance Scenarios [J]. Computer Science, 2024, 51(6): 331-337.
[3] LU Yanfeng, WU Tao, LIU Chunsheng, YAN Kang, QU Yuben. Survey of UAV-assisted Energy-Efficient Edge Federated Learning [J]. Computer Science, 2024, 51(4): 270-279.
[4] PANG Yuxiang, CHEN Zemao. Security Scheme of UAV Flight Control Based on Attribute Access Control Policy [J]. Computer Science, 2024, 51(4): 366-372.
[5] GAO Mengqi, FENG Xiang, YU Huiqun, WANG Mengling. Large-scale Multi-objective Evolutionary Algorithm Based on Online Learning of Sparse Features [J]. Computer Science, 2024, 51(3): 56-62.
[6] ZHANG Guohao, WANG Yi, ZHOU Xi, WANG Baoquan. Deep Collaborative Truth Discovery Based on Variational Multi-hop Graph Attention Encoder [J]. Computer Science, 2024, 51(3): 109-117.
[7] WANG Xinlong, LIN Bing, CHEN Xing. Computation Offloading with Wardrop Routing Game in Multi-UAV-aided MEC Environment [J]. Computer Science, 2024, 51(3): 309-316.
[8] LIU Changxin, WU Ning, HU Lirui, GAO Ba, GAO Xueshan. Recursive Gated Convolution Based Super-resolution Network for Remote Sensing Images [J]. Computer Science, 2024, 51(2): 205-216.
[9] ZHAO Ran, YUAN Jiabin, FAN Lili. Medical Ultrasound Image Super-resolution Reconstruction Based on Video Multi-frame Fusion [J]. Computer Science, 2023, 50(7): 143-151.
[10] YANG Da, LUO Liang, ZHENG Long. New Global Optimization Algorithm:Carbon Cycle Algorithm [J]. Computer Science, 2023, 50(6A): 220300131-7.
[11] LIANG Meiyan, ZHANG Yu, LIANG Jianan, CHEN Qinghui, WANG Ru, WANG Lin. Pathological Image Super-resolution Reconstruction Based on Sparse Coding Non-local AttentionDual Network [J]. Computer Science, 2023, 50(6A): 220700016-8.
[12] YU Jiuyang, ZHANG Dean, DAI Yaonan, HU Tianhao, XIA Wenfeng. Image Super-resolution Reconstruction Based on Structured Fusion Attention Network [J]. Computer Science, 2023, 50(6A): 220600240-5.
[13] QIAN Jiang, ZHANG Ding. Numerical Solution of Saint-Venant Equation by Cubic B-spline Quasi-interpolation [J]. Computer Science, 2023, 50(4): 125-132.
[14] HUAN Zhigang, JIANG Guoquan, ZHANG Yujian, LIU Liu, LIU Shanshan. Employing Gated Mechanism to Incorporate Multi-features into Chinese Event Coreference Resolution [J]. Computer Science, 2023, 50(3): 291-297.
[15] ZHENG Hongqiang, ZHANG Jianshan, CHEN Xing. Deployment Optimization and Computing Offloading of Space-Air-Ground Integrated Mobile Edge Computing System [J]. Computer Science, 2023, 50(2): 69-79.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!