Defense Techniques Against Cyber Attacks on Unmanned Aerial Vehicles

Unmanned aerial vehicles (UAVs) or drones serve a wide range of applications from surveillance to combat missions. UAVs carry, collect, or communicate sensitive information which becomes a target for the attacks. Securing the communication network between the operator and the UAV is therefore crucial. So far, the networks used in most UAV applications are static, which allows more time and opportunity for the adversary to perform cyber-attacks on the UAV. In this paper we propose to study Moving Target Defense (MTD) technique against cyber-attacks on the drones including wireless network encryption and intrusion detection system. MTD technique change the static nature of the systems to increase both the difficulty and the cost (effort, time, and resources) of mounting attacks. For illustration purpose, a well-known cyberattack is performed on a popular commercial drone and results are presented to show the network vulnerabilities, damages caused due to the attacks and defense techniques to prevent the attacks.

[1]  Wesley M. DeBusk Unmanned Aerial Vehicle Systems for Disaster Relief: Tornado Alley , 2009 .

[2]  Agathoniki Trigoni,et al.  Supporting Search and Rescue Operations with UAVs , 2010, 2010 International Conference on Emerging Security Technologies.

[3]  Weiyi Liu,et al.  Numerical Analysis of Cyberattacks on Unmanned Aerial Systems , 2012, Infotech@Aerospace.

[4]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[5]  Djamel Djenouri,et al.  A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures , 2013, ANT/SEIT.

[6]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[7]  Reiner Creutzburg,et al.  Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy , 2014, Electronic Imaging.

[8]  Gheorghe Udeanu,et al.  UNMANNED AERIAL VEHICLE IN MILITARY OPERATIONS , 2016 .

[9]  Aiko Pras,et al.  Exploring security vulnerabilities of unmanned aerial vehicles , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[10]  Frank L. Lewis,et al.  Security of unmanned aerial vehicle systems against cyber-physical attacks , 2016 .

[11]  Carlos T. Calafate,et al.  Using UAV-Based Systems to Monitor Air Pollution in Areas with Poor Accessibility , 2017 .