Survey of Security Threat and Attack Scenario for Commercial UAVs

Basan Elena Sergeevna, Mikhailova Vasilisa Dmitrievna, Silin Oleg Igorevich, Lesnikov Alexander Alexandrovich, Mogilny Anton Bogdanovich
{"title":"Survey of Security Threat and Attack Scenario for Commercial UAVs","authors":"Basan Elena Sergeevna, Mikhailova Vasilisa Dmitrievna, Silin Oleg Igorevich, Lesnikov Alexander Alexandrovich, Mogilny Anton Bogdanovich","doi":"10.1109/SIBCON56144.2022.10002947","DOIUrl":null,"url":null,"abstract":"the purpose of this study is to analyze and study threats and vulnerabilities in Unmanned aerial vehicles (UAVs), as well as to assess the impact of attacks on the functional characteristics of UAVs and their behavior. To achieve this goal, the following tasks were formulated: the study of current threats and vulnerabilities in UAVs, the study and selection of testing tools for instrumental analysis of the security of UAV control protocols, the analysis of external and internal attacks for testing UAVs, the study of the consequences of attacks, the analysis of the security of protocols, based on the results of the attacks. The relevance of the work lies in the fact that the results obtained after completing these tasks will help to expand the methods for detecting attacks for UAVs. A change in the behavior of the UAV, under the influence of various attacks, may indicate anomalous activity. By comparing the behavior of the UAV under normal conditions and when carrying out an attack on the data communication network, it is possible to prove that the attack has a significant impact on the functioning of the UAV. In addition, the results of the work will allow us to determine which of the possible ways of implementing attacks is more rational and efficient. The main practical results of the work were a list of possible attacks and recommendations for their implementation, thanks to which it is possible in practice to analyze the security of specific UAVs.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON56144.2022.10002947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

the purpose of this study is to analyze and study threats and vulnerabilities in Unmanned aerial vehicles (UAVs), as well as to assess the impact of attacks on the functional characteristics of UAVs and their behavior. To achieve this goal, the following tasks were formulated: the study of current threats and vulnerabilities in UAVs, the study and selection of testing tools for instrumental analysis of the security of UAV control protocols, the analysis of external and internal attacks for testing UAVs, the study of the consequences of attacks, the analysis of the security of protocols, based on the results of the attacks. The relevance of the work lies in the fact that the results obtained after completing these tasks will help to expand the methods for detecting attacks for UAVs. A change in the behavior of the UAV, under the influence of various attacks, may indicate anomalous activity. By comparing the behavior of the UAV under normal conditions and when carrying out an attack on the data communication network, it is possible to prove that the attack has a significant impact on the functioning of the UAV. In addition, the results of the work will allow us to determine which of the possible ways of implementing attacks is more rational and efficient. The main practical results of the work were a list of possible attacks and recommendations for their implementation, thanks to which it is possible in practice to analyze the security of specific UAVs.
商用无人机安全威胁与攻击场景研究
本研究的目的是分析和研究无人机(uav)的威胁和漏洞,以及评估攻击对无人机功能特性及其行为的影响。为实现这一目标,制定了以下任务:研究无人机当前面临的威胁和漏洞,研究和选择测试工具,对无人机控制协议的安全性进行仪器分析,分析测试无人机的外部和内部攻击,研究攻击的后果,根据攻击结果分析协议的安全性。这项工作的相关性在于,完成这些任务后获得的结果将有助于扩展无人机攻击检测方法。在各种攻击的影响下,无人机行为的变化可能表明异常活动。通过比较无人机在正常情况下和对数据通信网络进行攻击时的行为,可以证明攻击对无人机的功能有重大影响。此外,这项工作的结果将使我们能够确定哪一种可能的实现攻击的方法更合理和有效。这项工作的主要实际结果是列出了可能的攻击及其实施建议,因此有可能在实践中分析特定无人机的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信