File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-59608-2_41
- Scopus: eid_2-s2.0-85021747371
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: POSTER: Security analysis of personal unmanned aerial vehicles
Title | POSTER: Security analysis of personal unmanned aerial vehicles |
---|---|
Authors | |
Keywords | DJI Security vulnerabilities Unmanned aerial vehicles |
Issue Date | 2017 |
Citation | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2017, v. 198 LNICST, p. 743-746 How to Cite? |
Abstract | Personal unmanned aerial vehicles (UAVs) have become popular in recent years. While their extreme mobility enables exciting new applications, they also raise security concerns. However, currently we understand little about UAV’s vulnerabilities, feasible attacks, and defense options. Toward securing UAVs, we analyzed two of the most popular personal UAVs. We discovered a series of vulnerabilities, including insecure communication channels and misuse of cryptography. By exploiting these vulnerabilities, an attacker can eavesdrop on the data acquired or transmitted by the aircraft, impersonate the aircraft to send bogus data to the user’s mobile device, hijack the camera on the aircraft or the aircraft itself, and prevent the aircraft from communicating with the user’s mobile device. |
Persistent Identifier | http://hdl.handle.net/10722/346643 |
ISSN | 2023 SCImago Journal Rankings: 0.160 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Peng | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:12:17Z | - |
dc.date.available | 2024-09-17T04:12:17Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2017, v. 198 LNICST, p. 743-746 | - |
dc.identifier.issn | 1867-8211 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346643 | - |
dc.description.abstract | Personal unmanned aerial vehicles (UAVs) have become popular in recent years. While their extreme mobility enables exciting new applications, they also raise security concerns. However, currently we understand little about UAV’s vulnerabilities, feasible attacks, and defense options. Toward securing UAVs, we analyzed two of the most popular personal UAVs. We discovered a series of vulnerabilities, including insecure communication channels and misuse of cryptography. By exploiting these vulnerabilities, an attacker can eavesdrop on the data acquired or transmitted by the aircraft, impersonate the aircraft to send bogus data to the user’s mobile device, hijack the camera on the aircraft or the aircraft itself, and prevent the aircraft from communicating with the user’s mobile device. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | - |
dc.subject | DJI | - |
dc.subject | Security vulnerabilities | - |
dc.subject | Unmanned aerial vehicles | - |
dc.title | POSTER: Security analysis of personal unmanned aerial vehicles | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-59608-2_41 | - |
dc.identifier.scopus | eid_2-s2.0-85021747371 | - |
dc.identifier.volume | 198 LNICST | - |
dc.identifier.spage | 743 | - |
dc.identifier.epage | 746 | - |