无人机通信系统的网络攻击与漏洞评估

Hassan Jalil Hadi, Yue Cao
{"title":"无人机通信系统的网络攻击与漏洞评估","authors":"Hassan Jalil Hadi, Yue Cao","doi":"10.1109/FIT57066.2022.00047","DOIUrl":null,"url":null,"abstract":"In the developing world, the trend of using Unmanned Aerial Vehicles (UAVs) is being increased in many fields. These UAVs are now available in many different versions which ranges from children toy to military level combat equipment. Manufacturing companies are mostly mainly paying attention on reducing power consumption, high data transfer rate, less weight and more speed. However, by keeping focus on these features, most of the UAVs manufacturing companies overlook the factor of security and the risk in case of exploitation is ignored. This fact cannot be ignored that an exploited/hacked UAV with malicious intent can cause serious harm to the target in many ways. In the UAVs development, focus on the less computation power, restricted correspondence data transfer capacity, light weight data carrying limit and robustness captivity in UAVs has become a challenge for security practitioners and researchers. UAVs use numerous communication protocols and one among these protocols is Micro Air Vehicle (MAV) link protocol which is reliable as well as efficient. Currently, there are two versions of MAVlink communication protocol called MAVlink1 and MAVlink2. This protocol is used to establish a communication between Ground Control Station and UAV. The second version of this protocol (i.e. MAVlink2) is recent and there is not much data available about the potential exploitable vulnerabilities present in this protocol. This research paper has explored and identified security vulnerabilities in MAVlink2, specifically linked to the communication of UAV and their impact on UAV. The paper has further analyzed MAVlink2 communication protocol in order to exploit the vulnerabilities in the MAVlink2 protocol for hijacking the UAV.","PeriodicalId":102958,"journal":{"name":"2022 International Conference on Frontiers of Information Technology (FIT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems\",\"authors\":\"Hassan Jalil Hadi, Yue Cao\",\"doi\":\"10.1109/FIT57066.2022.00047\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the developing world, the trend of using Unmanned Aerial Vehicles (UAVs) is being increased in many fields. These UAVs are now available in many different versions which ranges from children toy to military level combat equipment. Manufacturing companies are mostly mainly paying attention on reducing power consumption, high data transfer rate, less weight and more speed. However, by keeping focus on these features, most of the UAVs manufacturing companies overlook the factor of security and the risk in case of exploitation is ignored. This fact cannot be ignored that an exploited/hacked UAV with malicious intent can cause serious harm to the target in many ways. In the UAVs development, focus on the less computation power, restricted correspondence data transfer capacity, light weight data carrying limit and robustness captivity in UAVs has become a challenge for security practitioners and researchers. UAVs use numerous communication protocols and one among these protocols is Micro Air Vehicle (MAV) link protocol which is reliable as well as efficient. Currently, there are two versions of MAVlink communication protocol called MAVlink1 and MAVlink2. This protocol is used to establish a communication between Ground Control Station and UAV. The second version of this protocol (i.e. MAVlink2) is recent and there is not much data available about the potential exploitable vulnerabilities present in this protocol. This research paper has explored and identified security vulnerabilities in MAVlink2, specifically linked to the communication of UAV and their impact on UAV. The paper has further analyzed MAVlink2 communication protocol in order to exploit the vulnerabilities in the MAVlink2 protocol for hijacking the UAV.\",\"PeriodicalId\":102958,\"journal\":{\"name\":\"2022 International Conference on Frontiers of Information Technology (FIT)\",\"volume\":\"65 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Frontiers of Information Technology (FIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FIT57066.2022.00047\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Frontiers of Information Technology (FIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FIT57066.2022.00047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在发展中国家,在许多领域使用无人驾驶飞行器(uav)的趋势正在增加。这些无人机现在有许多不同的版本,范围从儿童玩具到军事级战斗装备。制造企业主要关注的是降低功耗、提高数据传输速率、减轻重量和提高速度。然而,大多数无人机制造企业只关注这些特性,忽视了安全因素,忽视了被利用的风险。不可忽视的事实是,恶意利用/黑客攻击的无人机可以在许多方面对目标造成严重伤害。在无人机的发展过程中,如何解决无人机的计算能力不足、通信数据传输能力受限、数据承载重量轻以及鲁棒性捕获等问题已经成为安全从业者和研究人员面临的挑战。无人机使用多种通信协议,其中一种协议是微型飞行器(MAV)链路协议,该协议可靠且高效。目前,MAVlink通信协议有两个版本,分别是MAVlink1和MAVlink2。该协议用于建立地面控制站与无人机之间的通信。该协议的第二个版本(即MAVlink2)是最近发布的,关于该协议中存在的潜在可利用漏洞的数据并不多。本研究论文探索并确定了MAVlink2中的安全漏洞,特别是与无人机通信相关的漏洞及其对无人机的影响。为了利用MAVlink2通信协议中的漏洞进行无人机劫持,本文对MAVlink2通信协议进行了进一步分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems
In the developing world, the trend of using Unmanned Aerial Vehicles (UAVs) is being increased in many fields. These UAVs are now available in many different versions which ranges from children toy to military level combat equipment. Manufacturing companies are mostly mainly paying attention on reducing power consumption, high data transfer rate, less weight and more speed. However, by keeping focus on these features, most of the UAVs manufacturing companies overlook the factor of security and the risk in case of exploitation is ignored. This fact cannot be ignored that an exploited/hacked UAV with malicious intent can cause serious harm to the target in many ways. In the UAVs development, focus on the less computation power, restricted correspondence data transfer capacity, light weight data carrying limit and robustness captivity in UAVs has become a challenge for security practitioners and researchers. UAVs use numerous communication protocols and one among these protocols is Micro Air Vehicle (MAV) link protocol which is reliable as well as efficient. Currently, there are two versions of MAVlink communication protocol called MAVlink1 and MAVlink2. This protocol is used to establish a communication between Ground Control Station and UAV. The second version of this protocol (i.e. MAVlink2) is recent and there is not much data available about the potential exploitable vulnerabilities present in this protocol. This research paper has explored and identified security vulnerabilities in MAVlink2, specifically linked to the communication of UAV and their impact on UAV. The paper has further analyzed MAVlink2 communication protocol in order to exploit the vulnerabilities in the MAVlink2 protocol for hijacking the UAV.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信