File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: POSTER: Security analysis of personal unmanned aerial vehicles

TitlePOSTER: Security analysis of personal unmanned aerial vehicles
Authors
KeywordsDJI
Security vulnerabilities
Unmanned aerial vehicles
Issue Date2017
Citation
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2017, v. 198 LNICST, p. 743-746 How to Cite?
AbstractPersonal unmanned aerial vehicles (UAVs) have become popular in recent years. While their extreme mobility enables exciting new applications, they also raise security concerns. However, currently we understand little about UAV’s vulnerabilities, feasible attacks, and defense options. Toward securing UAVs, we analyzed two of the most popular personal UAVs. We discovered a series of vulnerabilities, including insecure communication channels and misuse of cryptography. By exploiting these vulnerabilities, an attacker can eavesdrop on the data acquired or transmitted by the aircraft, impersonate the aircraft to send bogus data to the user’s mobile device, hijack the camera on the aircraft or the aircraft itself, and prevent the aircraft from communicating with the user’s mobile device.
Persistent Identifierhttp://hdl.handle.net/10722/346643
ISSN
2023 SCImago Journal Rankings: 0.160

 

DC FieldValueLanguage
dc.contributor.authorChen, Peng-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:12:17Z-
dc.date.available2024-09-17T04:12:17Z-
dc.date.issued2017-
dc.identifier.citationLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2017, v. 198 LNICST, p. 743-746-
dc.identifier.issn1867-8211-
dc.identifier.urihttp://hdl.handle.net/10722/346643-
dc.description.abstractPersonal unmanned aerial vehicles (UAVs) have become popular in recent years. While their extreme mobility enables exciting new applications, they also raise security concerns. However, currently we understand little about UAV’s vulnerabilities, feasible attacks, and defense options. Toward securing UAVs, we analyzed two of the most popular personal UAVs. We discovered a series of vulnerabilities, including insecure communication channels and misuse of cryptography. By exploiting these vulnerabilities, an attacker can eavesdrop on the data acquired or transmitted by the aircraft, impersonate the aircraft to send bogus data to the user’s mobile device, hijack the camera on the aircraft or the aircraft itself, and prevent the aircraft from communicating with the user’s mobile device.-
dc.languageeng-
dc.relation.ispartofLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST-
dc.subjectDJI-
dc.subjectSecurity vulnerabilities-
dc.subjectUnmanned aerial vehicles-
dc.titlePOSTER: Security analysis of personal unmanned aerial vehicles-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-319-59608-2_41-
dc.identifier.scopuseid_2-s2.0-85021747371-
dc.identifier.volume198 LNICST-
dc.identifier.spage743-
dc.identifier.epage746-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats