Anatomy of unmanned aerial vehicle hijacking with signal spoofing

An important aspect about unmanned aerial vehicle (UAV, drone) hijacking to emphasize is being highly targeted cyber attack in terms of cyber warfare terminology that covers exploitation, offense, defence and asymmetrical war power as a whole. An attempt of hijacking is a combination of cyber and electronic operations/efforts rather than a single click takeover as it requires several tools and different techniques from cyber and electronic warfare domains simultaneously in a series of actions to achieve its objective particularly when the target is a military vehicle. Multi-stage nature of modern cyber attacks based on the coordination of individual offensive actions encompasses a fully executed UAV capturing assault. GPS spoofing is in the center of these scenarios and an obvious threat against civilian signals but also must be seriously handled in military domain too. Anatomical analysis of UAV hijacking attack delivers insights about vulnerabilities, methods to exploit, mechanisms to detect, how to deter the attack and evaluates the impacts.

[1]  Samsung Lim,et al.  Legal and Ethical Implications of GPS Vulnerabilities , 2009 .

[2]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[3]  Magnus Egerstedt,et al.  Optimal multi-UAV convoy protection , 2009, 2009 Second International Conference on Robot Communication and Coordination.

[4]  C. Constantinides,et al.  Security challenges in UAV development , 2008, 2008 IEEE/AIAA 27th Digital Avionics Systems Conference.

[5]  Eddy Deligne ARDrone corruption , 2011, Journal in Computer Virology.

[6]  David Glade,et al.  Unmanned Aerial Vehicles: Implications for Military Operations , 2012 .

[7]  Panagiotis Papadimitratos,et al.  GNSS-based Positioning: Attacks and countermeasures , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[8]  Washington Y. Ochieng,et al.  GPS Integrity and Potential Impact on Aviation Safety , 2003, Journal of Navigation.

[9]  Lijun Qian,et al.  Quickest detection of GPS spoofing attack , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[10]  Gustavus J. Simmons,et al.  Symmetric and Asymmetric Encryption , 1979, CSUR.

[11]  J. Carroll Vulnerability Assessment of the U.S. Transportation Infrastructure that Relies on the Global Positioning System , 2003 .

[12]  J. S. Warner,et al.  GPS Spoofing Countermeasures , 2003 .

[13]  J. S. Warner,et al.  A Simple Demonstration that the Global Positioning System ( GPS ) is Vulnerable to Spoofing , 2012 .

[14]  David Hambling GPS fail: how a little black box could cause chaos , 2011 .

[15]  J. Karl Hedrick,et al.  Autonomous UAV path planning and estimation , 2009, IEEE Robotics & Automation Magazine.

[16]  Tai-Myoung Chung,et al.  Cyber military strategy for cyberspace superiority in cyber warfare , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[17]  Sven Dietrich,et al.  SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster , 2011, WOOT.

[18]  David Brumley,et al.  GPS software attacks , 2012, CCS.

[19]  John Fagan,et al.  Countermeasures for GPS Signal Spoofing , 2005 .

[20]  W.R. Dufrene Mobile military security with concentration on unmanned aerial vehicles , 2005, 24th Digital Avionics Systems Conference.

[21]  D. Hoey,et al.  Civil GPS Systems and Potential Vulnerabilities , 2005 .

[22]  P. Papadimitratos,et al.  Protection and fundamental vulnerability of GNSS , 2008, 2008 IEEE International Workshop on Satellite and Space Communications.

[23]  Daniel P. Shepard,et al.  Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .

[24]  T. Humphreys,et al.  Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .

[25]  Sanguk Lee,et al.  Analysis of effect of spoofing signal in GPS receiver , 2012, 2012 12th International Conference on Control, Automation and Systems.

[26]  Seon-Ho Park,et al.  Active Cyber Attack Model for Network System's Vulnerability Assessment , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).

[27]  T. Humphreys STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .

[28]  Ajay Lele,et al.  Aerial Terrorism and the Threat from Unmanned Aerial Vehicles , 2010 .

[29]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).