Communication Security of Unmanned Aerial Vehicles

Communication security is critically important for the success of Unmanned Aerial Vehicles (UAVs). With the increasing use of UAVs in military and civilian applications, they often carry sensitive information that adversaries might try to get hold of. While UAVs consist of various modules to enable them to function properly, potential security vulnerabilities may also exist in those modules. For example, by launching a GPS spoofing attack or WiFi attack, adversaries can capture the targeted UAV and access the sought after information. In fact, it has become easy to launch such attacks. In this article, we report our low-cost implementation of these attacks and suggest solutions to them.

[1]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[2]  Hamadou Saliah-Hassane,et al.  Improving security and mobility for remote access: A wireless sensor network case , 2015, 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES).

[3]  Ryu Miura,et al.  A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks , 2016, IEEE Network.

[4]  Daniele Borio,et al.  Real-time jamming detection using the sum-of-squares paradigm , 2015, 2015 International Conference on Location and GNSS (ICL-GNSS).

[5]  Todd E. Humphreys,et al.  A blueprint for civil GPS navigation message authentication , 2014, 2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014.

[6]  Mohsen Guizani,et al.  Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.

[7]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[8]  P. Rajakumar,et al.  Security attacks and detection schemes in MANET , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[9]  R. Katulski,et al.  Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing , 2015 .

[10]  Jorge Sá Silva,et al.  Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.

[11]  Ryu Miura,et al.  Toward Fair Maximization of Energy Efficiency in Multiple UAS-Aided Networks: A Game-Theoretic Methodology , 2015, IEEE Transactions on Wireless Communications.

[12]  Ming Yu,et al.  AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments , 2014, IEEE Transactions on Vehicular Technology.

[13]  Lina Zhu,et al.  A random key management scheme for heterogeneous wireless sensor network , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).