How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools

In this report, the authors explore approaches for understanding, inventorying, and modeling cybersecurity implications of the rapid growth in drone usage, focusing specifically on current vulnerabilities and future trends. The authors propose conceptual approaches meant to enable the enumeration and categorization of drone-related cyber threats and explore some of the potential benefits and challenges of modeling the commercial drone threat.

[1]  Craig S. Agate,et al.  Decentralized asset management for collaborative sensing , 2017, Defense + Security.

[2]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[3]  Frank L. Lewis,et al.  Security of unmanned aerial vehicle systems against cyber-physical attacks , 2016 .

[4]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[5]  Ronald C. Arkin,et al.  An Behavior-based Robotics , 1998 .

[6]  Shashank Tamaskar,et al.  UAV Traffic Information Exchange Network , 2018, 2018 Aviation Technology, Integration, and Operations Conference.

[7]  Jeremy Straub,et al.  Using deep learning to detect network intrusions and malware in autonomous robots , 2017, Defense + Security.

[8]  John V. Foster,et al.  Real-Time Risk Assessment Framework for Unmanned Aircraft System (UAS) Traffic Management (UTM) , 2017 .

[9]  Sidi-Mohammed Senouci,et al.  Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution , 2018, The Journal of Supercomputing.

[10]  Owen Brown,et al.  Defense Advanced Research Projects Agency , 2009 .

[11]  Yuval Elovici,et al.  dr0wned - Cyber-Physical Attack with Additive Manufacturing , 2016, WOOT.

[12]  Marcus Johnson,et al.  Unmanned Aircraft System Traffic Management (UTM) Concept of Operations , 2016 .

[13]  Yujun Kuang,et al.  EAI Endorsed Transactions on Scalable Information Systems Research , 2014 .

[14]  Moritz Petersen,et al.  Blockchain in logistics and supply chain : trick or treat? , 2017 .

[15]  Mohsen Guizani,et al.  Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV , 2018, IEEE Communications Magazine.

[16]  Steffen Staab,et al.  Web Science , 2013, Informatik-Spektrum.

[17]  Joao P. Hespanha,et al.  GeoTrack: bio-inspired global video tracking by networks of unmanned aircraft systems , 2009, Defense + Commercial Sensing.

[18]  Carlos C. Solari Designing for security , 2007, Bell Labs Technical Journal.

[19]  Eray Yağdereli,et al.  A study on cyber-security of autonomous and unmanned vehicles , 2015 .

[20]  J. S. Warner,et al.  A Simple Demonstration that the Global Positioning System ( GPS ) is Vulnerable to Spoofing , 2012 .

[21]  韓國航空大學 航空 械工學科 美聯邦航空廳(Federal Aviation Administration)의 航空機 製作檢査 制度의 現況 , 1979 .

[22]  Alvaro A. Cárdenas,et al.  Understanding Security Threats in Consumer Drones Through the Lens of the Discovery Quadcopter Family , 2017, IoT S&P@CCS.

[23]  Han-Lim Choi,et al.  Distributed Observes for Cyberattack Detection and Isolation in Formation-Flying Unmanned Aerial Vehicles , 2017, J. Aerosp. Inf. Syst..

[24]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[25]  Todd E. Humphreys,et al.  Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle , 2012 .

[26]  Philippe Owezarski,et al.  Generic and autonomous system for airborne networks cyber-threat detection , 2013, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC).

[27]  Fernando Trujano,et al.  Security Analysis of DJI Phantom 3 Standard , 2016 .

[28]  Kenneth Kuhn Small Unmanned Aerial System Certification and Traffic Management Systems , 2017 .

[29]  Robert P Otto Small Unmanned Aircraft Systems (SUAS) Flight Plan: 2016-2036. Bridging the Gap Between Tactical and Strategic , 2016 .

[30]  Allan Tomlinson,et al.  Survey on Security Challenges for Swarm Robotics , 2009, 2009 Fifth International Conference on Autonomic and Autonomous Systems.

[31]  Robin R. Murphy,et al.  A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).

[32]  Adi Shamir,et al.  IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[33]  Kang Yen,et al.  Adaptive Neural Network Based Fault Detection Design for Unmanned Quadrotor under Faults and Cyber Attacks , 2017, 2017 25th International Conference on Systems Engineering (ICSEng).

[34]  Mansoor Alam,et al.  Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation , 2015, EAI Endorsed Trans. Scalable Inf. Syst..

[35]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[36]  M. Iansiti,et al.  The Truth about Blockchain , 2017 .

[37]  Ismail Güvenç,et al.  Detection, Tracking, and Interdiction for Amateur Drones , 2018, IEEE Communications Magazine.

[38]  Kim Hartmann,et al.  UAV exploitation: A new domain for cyber power , 2016, 2016 8th International Conference on Cyber Conflict (CyCon).

[39]  Ahmad Y. Javaid,et al.  Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation , 2017, Simul..

[40]  Jon Schmid,et al.  Beyond National Innovation Systems: Incentives and China’s Innovation Performance , 2017 .

[41]  Sven Dietrich,et al.  SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster , 2011, WOOT.

[42]  Sait Murat Giray Anatomy of unmanned aerial vehicle hijacking with signal spoofing , 2013, 2013 6th International Conference on Recent Advances in Space Technologies (RAST).