{"title":"无人机安全实验平台MAVLink协议漏洞实验分析","authors":"Haisong Xu, Heng Zhang, Jianwei Sun, Weiwei Xu, Wenshuo Wang, Hongran Li, Jian Zhang","doi":"10.1109/IAI53119.2021.9619330","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) have great potential in the field of information technology due to their flexible deployment, low energy consumption and high adaptability. However, incidents about negative use of UAVs have gradually increased. Therefore, it is urgent to disable malicious UAVs. In this paper, a UAVs security experiment platform has been built to simulate various attacks suffered by UAVs. On this platform, UAVs use the MAVLink protocol and communicate with the ground control station through a wireless network. We analyze and compare the two versions of the MAVLink protocol, which is one of the most widely used protocols for wireless network communication systems. We explore vulnerabilities in the MAVLink protocol and design the strategies of the DoS attack and the hijacking attack. Empirical researches are provided to demonstrate the effectiveness of these attacks.","PeriodicalId":106675,"journal":{"name":"2021 3rd International Conference on Industrial Artificial Intelligence (IAI)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Experimental Analysis of MAVLink Protocol Vulnerability on UAVs Security Experiment Platform\",\"authors\":\"Haisong Xu, Heng Zhang, Jianwei Sun, Weiwei Xu, Wenshuo Wang, Hongran Li, Jian Zhang\",\"doi\":\"10.1109/IAI53119.2021.9619330\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unmanned aerial vehicles (UAVs) have great potential in the field of information technology due to their flexible deployment, low energy consumption and high adaptability. However, incidents about negative use of UAVs have gradually increased. Therefore, it is urgent to disable malicious UAVs. In this paper, a UAVs security experiment platform has been built to simulate various attacks suffered by UAVs. On this platform, UAVs use the MAVLink protocol and communicate with the ground control station through a wireless network. We analyze and compare the two versions of the MAVLink protocol, which is one of the most widely used protocols for wireless network communication systems. We explore vulnerabilities in the MAVLink protocol and design the strategies of the DoS attack and the hijacking attack. Empirical researches are provided to demonstrate the effectiveness of these attacks.\",\"PeriodicalId\":106675,\"journal\":{\"name\":\"2021 3rd International Conference on Industrial Artificial Intelligence (IAI)\",\"volume\":\"115 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 3rd International Conference on Industrial Artificial Intelligence (IAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAI53119.2021.9619330\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 3rd International Conference on Industrial Artificial Intelligence (IAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAI53119.2021.9619330","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Experimental Analysis of MAVLink Protocol Vulnerability on UAVs Security Experiment Platform
Unmanned aerial vehicles (UAVs) have great potential in the field of information technology due to their flexible deployment, low energy consumption and high adaptability. However, incidents about negative use of UAVs have gradually increased. Therefore, it is urgent to disable malicious UAVs. In this paper, a UAVs security experiment platform has been built to simulate various attacks suffered by UAVs. On this platform, UAVs use the MAVLink protocol and communicate with the ground control station through a wireless network. We analyze and compare the two versions of the MAVLink protocol, which is one of the most widely used protocols for wireless network communication systems. We explore vulnerabilities in the MAVLink protocol and design the strategies of the DoS attack and the hijacking attack. Empirical researches are provided to demonstrate the effectiveness of these attacks.