Basan Elena Sergeevna, Mikhailova Vasilisa Dmitrievna, Silin Oleg Igorevich, Lesnikov Alexander Alexandrovich, Mogilny Anton Bogdanovich
{"title":"Survey of Security Threat and Attack Scenario for Commercial UAVs","authors":"Basan Elena Sergeevna, Mikhailova Vasilisa Dmitrievna, Silin Oleg Igorevich, Lesnikov Alexander Alexandrovich, Mogilny Anton Bogdanovich","doi":"10.1109/SIBCON56144.2022.10002947","DOIUrl":null,"url":null,"abstract":"the purpose of this study is to analyze and study threats and vulnerabilities in Unmanned aerial vehicles (UAVs), as well as to assess the impact of attacks on the functional characteristics of UAVs and their behavior. To achieve this goal, the following tasks were formulated: the study of current threats and vulnerabilities in UAVs, the study and selection of testing tools for instrumental analysis of the security of UAV control protocols, the analysis of external and internal attacks for testing UAVs, the study of the consequences of attacks, the analysis of the security of protocols, based on the results of the attacks. The relevance of the work lies in the fact that the results obtained after completing these tasks will help to expand the methods for detecting attacks for UAVs. A change in the behavior of the UAV, under the influence of various attacks, may indicate anomalous activity. By comparing the behavior of the UAV under normal conditions and when carrying out an attack on the data communication network, it is possible to prove that the attack has a significant impact on the functioning of the UAV. In addition, the results of the work will allow us to determine which of the possible ways of implementing attacks is more rational and efficient. The main practical results of the work were a list of possible attacks and recommendations for their implementation, thanks to which it is possible in practice to analyze the security of specific UAVs.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON56144.2022.10002947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
the purpose of this study is to analyze and study threats and vulnerabilities in Unmanned aerial vehicles (UAVs), as well as to assess the impact of attacks on the functional characteristics of UAVs and their behavior. To achieve this goal, the following tasks were formulated: the study of current threats and vulnerabilities in UAVs, the study and selection of testing tools for instrumental analysis of the security of UAV control protocols, the analysis of external and internal attacks for testing UAVs, the study of the consequences of attacks, the analysis of the security of protocols, based on the results of the attacks. The relevance of the work lies in the fact that the results obtained after completing these tasks will help to expand the methods for detecting attacks for UAVs. A change in the behavior of the UAV, under the influence of various attacks, may indicate anomalous activity. By comparing the behavior of the UAV under normal conditions and when carrying out an attack on the data communication network, it is possible to prove that the attack has a significant impact on the functioning of the UAV. In addition, the results of the work will allow us to determine which of the possible ways of implementing attacks is more rational and efficient. The main practical results of the work were a list of possible attacks and recommendations for their implementation, thanks to which it is possible in practice to analyze the security of specific UAVs.