{"title":"无人机互联网服务:以用户为中心的综合攻击面分析","authors":"Sreejesh Sidharthan, A. Ashok, A. Bourgeois","doi":"10.1145/3477087.3478379","DOIUrl":null,"url":null,"abstract":"Usage of Unmanned Aerial Vehicles (UAVs) in civil application domains such as real-time monitoring, wireless internet, remote sensing, delivery of foods, security, and surveillance, and industrial infrastructure inspection has grown rapidly in recent times. The proliferation of UAVs in commercial and civilian use has increased the importance of security in these applications. In this paper, we are exploring the security threats associated with a civilian UAV use case. We are addressing the use case of UAVs providing internet to users and exploring the attack surface of UAV internet scenarios specifically focused on user-level security. We list specific threats associated with UAV internet scenarios and compiles various attack vectors to present a comprehensive attack surface analysis. This research work has identified 4 attack cases for the initial study. 1) Malicious UAV trying to exploit a user through the service. 2) Adversary targeting the legitimate UAV and users connected to the service. 3) User is targeted through malicious entity or a program in the user's device, and 4) External entity or a hacker attacking the user through a UAV communication channel. We are exploring the attack surfaces of the UAV internet use case extending the 4 cases mentioned above.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"26 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Internet service via UAV: user centric comprehensive attack surface analysis\",\"authors\":\"Sreejesh Sidharthan, A. Ashok, A. Bourgeois\",\"doi\":\"10.1145/3477087.3478379\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Usage of Unmanned Aerial Vehicles (UAVs) in civil application domains such as real-time monitoring, wireless internet, remote sensing, delivery of foods, security, and surveillance, and industrial infrastructure inspection has grown rapidly in recent times. The proliferation of UAVs in commercial and civilian use has increased the importance of security in these applications. In this paper, we are exploring the security threats associated with a civilian UAV use case. We are addressing the use case of UAVs providing internet to users and exploring the attack surface of UAV internet scenarios specifically focused on user-level security. We list specific threats associated with UAV internet scenarios and compiles various attack vectors to present a comprehensive attack surface analysis. This research work has identified 4 attack cases for the initial study. 1) Malicious UAV trying to exploit a user through the service. 2) Adversary targeting the legitimate UAV and users connected to the service. 3) User is targeted through malicious entity or a program in the user's device, and 4) External entity or a hacker attacking the user through a UAV communication channel. We are exploring the attack surfaces of the UAV internet use case extending the 4 cases mentioned above.\",\"PeriodicalId\":62224,\"journal\":{\"name\":\"世界中学生文摘\",\"volume\":\"26 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"世界中学生文摘\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1145/3477087.3478379\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"世界中学生文摘","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1145/3477087.3478379","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet service via UAV: user centric comprehensive attack surface analysis
Usage of Unmanned Aerial Vehicles (UAVs) in civil application domains such as real-time monitoring, wireless internet, remote sensing, delivery of foods, security, and surveillance, and industrial infrastructure inspection has grown rapidly in recent times. The proliferation of UAVs in commercial and civilian use has increased the importance of security in these applications. In this paper, we are exploring the security threats associated with a civilian UAV use case. We are addressing the use case of UAVs providing internet to users and exploring the attack surface of UAV internet scenarios specifically focused on user-level security. We list specific threats associated with UAV internet scenarios and compiles various attack vectors to present a comprehensive attack surface analysis. This research work has identified 4 attack cases for the initial study. 1) Malicious UAV trying to exploit a user through the service. 2) Adversary targeting the legitimate UAV and users connected to the service. 3) User is targeted through malicious entity or a program in the user's device, and 4) External entity or a hacker attacking the user through a UAV communication channel. We are exploring the attack surfaces of the UAV internet use case extending the 4 cases mentioned above.