Drone Pilot Identification by Classifying Radio-Control Signals

Analysis of interactions with remotely controlled devices has been used to detect the onset of hijacking attacks, as well as for forensics analysis, e.g., to identify the human controller. Its effectiveness is known to depend on the remote device type as well as on the properties of the remote control signal. This paper shows that the radio control signal sent to an unmanned aerial vehicle (UAV) using a typical transmitter can be captured and analyzed to identify the controlling pilot using machine learning techniques. Twenty trained pilots have been asked to fly a high-end research drone through three different trajectories. Control data have been collected and used to train multiple classifiers. Best performance has been achieved by a random forest classifier that achieved accuracy around 90% using simple time-domain features. Extensive tests have shown that the classification accuracy depends on the flight trajectory and that the pitch, roll, yaw, and thrust control signals show different levels of significance for pilot identification. This result paves the way to a number of security and forensics applications, including continuous identification of UAV pilots to mitigate the risk of hijacking.

[1]  Reiner Creutzburg,et al.  Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy , 2014, Electronic Imaging.

[2]  Carla E. Brodley,et al.  User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.

[3]  Yangsheng Xu,et al.  Support Vector Machine for Behavior-Based Driver Identification System , 2010, J. Robotics.

[4]  Joonsang Baek,et al.  Secure Communication in Civil Drones , 2015, ICISSP.

[5]  Mohan M. Trivedi,et al.  Driver classification and driving style recognition using inertial sensors , 2013, 2013 IEEE Intelligent Vehicles Symposium (IV).

[6]  Guowei Cai,et al.  A Survey of Small-Scale Unmanned Aerial Vehicles: Recent Advances and Future Development Trends , 2014 .

[7]  A. Karr,et al.  Computer Intrusion: Detecting Masquerades , 2001 .

[8]  T P Colgate Reaction and response times of individuals reacting to auditory, visual, and tactile stimuli. , 1968, Research quarterly.

[9]  Zhenyu Guo,et al.  Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection , 2013, 2013 IEEE Systems and Information Engineering Design Symposium.

[10]  Sait Murat Giray Anatomy of unmanned aerial vehicle hijacking with signal spoofing , 2013, 2013 6th International Conference on Recent Advances in Space Technologies (RAST).

[11]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[12]  Hamid Jahankhani,et al.  A Survey of User Authentication Based on Mouse Dynamics , 2008 .

[13]  Senén Barro,et al.  Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..

[14]  Ning Zhang,et al.  A survey on touch dynamics authentication in mobile devices , 2016, Comput. Secur..

[15]  Tadayoshi Kohno,et al.  Automobile Driver Fingerprinting , 2016, Proc. Priv. Enhancing Technol..

[16]  Kyle Wesson,et al.  Hacking drones. , 2013, Scientific American.

[17]  Engin Erzin,et al.  Driver Status Identification from Driving Behavior Signals , 2012 .

[18]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[19]  K. Itou,et al.  Driver Identification Based on Spectral Analysis of Driving Behavioral Signals , 2007 .

[20]  Antanas Verikas,et al.  Mining data with random forests: A survey and results of new tests , 2011, Pattern Recognit..

[21]  Carmen Sánchez Ávila,et al.  Modeling and Detecting Aggressiveness From Driving Signals , 2014, IEEE Transactions on Intelligent Transportation Systems.

[22]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[23]  Mervyn V. M. Yeo,et al.  Can SVM be used for automatic EEG detection of drowsiness during car driving , 2009 .

[24]  Jana Dittmann,et al.  AR.Drone: security threat analysis and exemplary attack to track persons , 2012, Electronic Imaging.

[25]  Mohan M. Trivedi,et al.  Tactical driver behavior prediction and intent inference: A review , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[26]  Javier Echanobe,et al.  Driving Behavior Signals and Machine Learning: A Personalized Driver Assistance System , 2015, 2015 IEEE 18th International Conference on Intelligent Transportation Systems.

[27]  Roy A. Maxion,et al.  Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.

[28]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[29]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.