12 research outputs found

    Drรณnok elleni fenyegetรฉsek a kibertรฉrbล‘l

    Get PDF

    Use of AI applications for the drone industry

    Get PDF
    The unmanned aerial vehicle (UAV) industry, commonly referred to as the drone industry, has grown rapidly in recent years and changed many industries' operational procedures. Drones are adaptable AUs that have the ability to operate independently or remotely. The drone business has developed into a vibrant, diverse sector with applications in many other industries. Drone technology is set to grow and become more integrated into daily life and corporate operations as long as regulations keep up with technological advancements. Artificial intelligence (AI) technologies are increasingly used in various industries, notably drone companies. AI can improve drone technology's effectiveness, dependability, and efficiency, creating new opportunities for the drone industry to service multiple applications and sectors

    A Multilevel Architecture for Autonomous UAVs

    Get PDF
    In this paper, a multilevel architecture able to interface an on-board computer with a generic UAV flight controller and its radio receiver is proposed. The computer board exploits the same standard communication protocol of UAV flight controllers and can easily access additional data, such as: (i) inertial sensor measurements coming from a multi-sensor board; (ii) global navigation satellite system (GNSS) coordinates; (iii) streaming video from one or more cameras; and (iv) operator commands from the remote control. In specific operating scenarios, the proposed platform is able to act as a โ€œcyber pilotโ€ which replaces the role of a human UAV operator, thus simplifying the development of complex tasks such as those based on computer vision and artificial intelligence (AI) algorithms which are typically employed in autonomous flight operations

    An Empirical Study on the Attack and Defense of Unmanned Vehicle

    Get PDF
    Unmanned Aerial Vehicle, Network Attack, Cyber-Physical System, SecurityOne of the main applications of the Cyber-Physical System, the Unmanned vehicle is gradually expanding its use. Unmanned Aerial Vehicle (UAV), among unmanned vehicle, is used not only for cameras, emergency, and military purposes, but its negative effects are increasing also as its use expands. A terrorist outrage using UAVs in Saudi Arabia in the fall of 2019 is a well-known example. Therefore, research on disabling UAV is also becoming important. The UAV neutralization study can be divided into three phases. First, it is the identification of friend or foe stage that distinguishes whether UAVs are friendly or enemy. However, this step can be omitted in No-drone Zones, such as places where people are concentrated, places where major confidential facilities such as nuclear facilities are located, and places of privacy. The second step is to neutralize the UAV's actual mission. At this stage, the UAV is disabled mainly through network attacks such as jamming attacks and packet injection attacks, or through physical attacks such as nets. The third is a post-processing step to lead the UAV to safe area, that is, to prevent the UAV from flying again and to protect the surroundings from it. Previous UAV neutralization studies have focused on disabling UAV without considering the third phase. In this paper, we focused on the third stage, the post-processing stage, so that UAV can be neutralized. Robot Operating System is useful and used widely in UAV system, but there are also vulnerabilities. Therefore, disabling UAVs using this point and defense techniques are discussed in this paper.Yโ… . INTRODUCTION 1 โ…ก. BACKGROUND 3 2.1 Unmanned Aerial System (UAS) 3 2.2 Robot Operating System (ROS) 5 โ…ข. RELATED WORK 6 โ…ฃ. PROPOSED METHOD 8 4.1 Proposed attack method 8 4.2 Proposed defense method 14 โ…ค. SIMULATION RESULT 18 5.1 Experiment environment for attack and defense on UAV simulation 18 5.2 Simulation result for attack on UAV 21 5.3 Simulation result for defense on UAV 25 โ…ฅ. CONCLUSION 29 REFERENCES 30 SUMMARY (Korean) 32์ตœ๊ทผ CPS์˜ ์ฃผ์š” ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ค‘ ํ•˜๋‚˜์ธ ๋ฌด์ธ ์ด๋™์ฒด๊ฐ€ ์šฉ๋„๋ฅผ ๋„“ํž˜์— ๋”ฐ๋ผ ๋ฌด์ธ ์ด๋™์ฒด์˜ ๋ฌด๋ ฅํ™” ์—ฐ๊ตฌ๋„ ์ค‘์š”ํ•ด์ง€๊ณ  ์žˆ๋‹ค. ์šฐ๋ฆฌ๋Š” ๋ฌด์ธ ์ด๋™์ฒด ์ค‘ UAV๋ฅผ ์ด์šฉํ•˜์˜€๋‹ค. ๋ฌด์ธ๊ธฐ ๋ฌด๋ ฅํ™” ๋‹จ๊ณ„๋Š” ๋ฌด์ธ๊ธฐ ํ”ผ์•„ ์‹๋ณ„ ๋‹จ๊ณ„, ๋ฌด์ธ๊ธฐ ์ž„๋ฌด ๋ฌด๋ ฅํ™” ๋‹จ๊ณ„, ๋ฌด์ธ๊ธฐ ์•ˆ์ „ ํšŒ์ˆ˜ ๋ฐ ์‚ฌํ›„ ์ฒ˜๋ฆฌ๋‹จ๊ณ„๋กœ ํฌ๊ฒŒ ์„ธ ๋‹จ๊ณ„๋กœ ๋‚˜๋‰  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋Œ€๋ถ€๋ถ„์˜ ์—ฐ๊ตฌ๋Š” ๋ฌด์ธ๊ธฐ ์•ˆ์ „ ํšŒ์ˆ˜ ๋ฐ ์‚ฌํ›„ ์ฒ˜๋ฆฌ๋‹จ๊ณ„๊นŒ์ง€ ๊ณ ๋ คํ•˜์ง€ ์•Š๊ณ  ์žˆ์œผ๋ฉฐ ๋ฌด์ธ๊ธฐ ์ž„๋ฌด ๋ฌด๋ ฅํ™” ๋‹จ๊ณ„์— ๊ทธ์น˜๊ณ  ์žˆ๋‹ค. ๋ฌด์ธ๊ธฐ ์•ˆ์ „ ํšŒ์ˆ˜ ๋ฐ ์‚ฌํ›„ ์ฒ˜๋ฆฌ๋‹จ๊ณ„๊นŒ์ง€ ๊ณ ๋ คํ•˜์ง€ ์•Š์€ ๋ฌด๋ ฅํ™”๋Š” ์ผ๋ฐ˜์ ์œผ๋กœ ์ถ”๋ฝ์„ ํ†ตํ•œ ๋ฌด๋ ฅํ™”, ํ˜ธ๋ฒ„๋ง์„ ํ†ตํ•œ ๋ฌด๋ ฅํ™”๊ฐ€ ์žˆ๋‹ค. ์ด๋Š” ๋ฌด๋ ฅํ™” ๋‹จ๊ณ„์—์„œ ์‹ฌ๊ฐํ•œ ์žฌ์‚ฐ, ์ธ๋ช… ๋“ฑ์˜ 2์ฐจ ํ”ผํ•ด๋ฅผ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ž์œจ ์ฃผํ–‰, navigation, ์ถฉ๋Œ ํšŒํ”ผ ๋“ฑ์˜ ๊ธฐ๋Šฅ ๊ตฌํ˜„์„ ์œ„ํ•ด ๋ฌด์ธ ์ด๋™์ฒด์—์„œ ์ผ๋ฐ˜์ ์œผ๋กœ ์‚ฌ์šฉํ•˜๋Š” MAVROS ํ™˜๊ฒฝ์˜ ์ทจ์•ฝ์ ์„ ์ฐพ๊ณ  ๊ทธ ์ทจ์•ฝ์ ์„ ์ด์šฉํ•˜์—ฌ ๊ณต๊ฒฉ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜์˜€๋‹ค. ์ œ์•ˆํ•˜๋Š” ๊ณต๊ฒฉ๋ฐฉ๋ฒ•์€ ์ถ”๋ฝ์„ ํ†ตํ•œ ๋ฌด์ธ๊ธฐ ๋ฌด๋ ฅํ™”๊ฐ€ ์•„๋‹Œ ์›ํ•˜๋Š” ์ง€์ ์œผ๋กœ ์ฐฉ๋ฅ™์‹œํ‚ค๊ฑฐ๋‚˜ ์ด๋ฅ™์ง€์ ์œผ๋กœ ๋Œ๋ ค๋ณด๋‚ด๋Š” ๋ฌด๋ ฅํ™” ๋ฐฉ๋ฒ•์œผ๋กœ ์ด๋กœ ์ธํ•œ 2์ฐจํ”ผํ•ด๊ฐ€ ๋ฐœ์ƒํ•˜์ง€ ์•Š๋Š”๋‹ค. ํŠนํžˆ ์›ํ•˜๋Š” ์ง€์ ์œผ๋กœ ์ฐฉ๋ฅ™์‹œํ‚ค๋Š” ๊ณต๊ฒฉ ๋ฐฉ๋ฒ•์€ ๋ฌด๋ ฅํ™” ๋Œ€์ƒ์ธ UAV๋ฅผ ํƒˆ์ทจํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์ ์ด ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ทจ์•ฝ์ ์„ ๋ง‰๊ธฐ ์œ„ํ•ด ์šฐ๋ฆฌ๋Š” ๋˜ํ•œ ๋ณด์•ˆ์„ ์œ„ํ•œ MAVROS API๋ฅผ ์ œ์•ˆํ•˜์˜€๋‹ค. ์ด๋Š” UAV์˜ ์ƒํƒœ๋ฅผ IDLE, LOCK, UNLOCK ์„ธ๊ฐ€์ง€ ์ƒํƒœ๋กœ ๋‚˜๋ˆ„์–ด ๋™์ž‘ํ•œ๋‹ค. MAVROS์— ์ƒˆ๋กœ์šด publisher node๊ฐ€ ๋“ฑ๋ก๋  ๋•Œ ๋ช‡ ๊ฐ€์ง€ ์ผ๋ จ์˜ ๊ฒ€์‚ฌ๊ณผ์ •์„ ๊ฑฐ์น˜๋ฉฐ ์‚ฌ์šฉ์ž๊ฐ€ ๋™์ ์œผ๋กœ ๊ณ ์œ ๋ฒˆํ˜ธ๋ฅผ ์ด์šฉํ•˜์—ฌ ์ƒํƒœ๋ฅผ ๋ณ€ํ™”์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค๋Š” ์ ์ด ์žˆ๋‹ค. ์‹คํ—˜์„ ํ†ตํ•ด ๊ณต๊ฒฉ์ž์˜ publisher node ๋“ฑ๋ก์„ ๋ง‰์Œ์œผ๋กœ์จ ๊ณต๊ฒฉ์„ ๋ง‰๋Š” ๊ฒƒ์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค.MasterdCollectio

    Drone hacking with Raspberry-Pi 3 and WiFi Pineapple: security and privacy threats for the internet-of-things

    Get PDF
    The use of Internet-of-Things (IoT) technology is growing exponentially as more consumers and businesses acknowledge the benefits offered by the intelligent and smart devices. Drone technology is a rapidly emerging sector within the IoT and the risk of hacking could not only cause a data breach, it could also pose a major risk to the public safety. Thanks to their versatile applications and access to real-time data, commercial drones are used across a wide variety of smart city applications. However, as with many IoT devices, security is often an afterthought, leaving many drones vulnerable to hackers. This paper investigates the current state of drone security and demonstrates a set of WiFi enabled drone vulnerabilities. Five different types of attacks, together with the potential of automation of attacks, was identified and applied to two different types of commercially available drones. The communication links are investigated for the attacks, i.e. Denial of Service, Deauthentication Methods, Man-in-the-Middle, Unauthorised Root Access and Packet Spoofing. Lastly, the unauthorised root access was automated through the use of a Raspberry-Pi 3 and WiFi Pineapple. Furthermore, we outlined the methodology for each attack, and the experimental part outlines the findings and processes of the attacks. Finally, the paper addresses the current state of drone security, management, control, resilience, security, and privacy concerns

    Malicious Digital Penetration of United States Weaponized Military Unmanned Aerial Vehicle Systems: A National Security Perspective Concerning the Complexity of Military UAVs and Hacking

    Get PDF
    The United Statesโ€™ (US) military unmanned aerial vehicle (UAV) has seen increased usage under the post 9/11 military engagements in the Middle East, Afghanistan, and within American borders. However, the very digital networks controlling these aircrafts are now enduring malicious intrusions (hacking) by Americaโ€™s enemies. . The digital intrusions serve as a presage over the very digital networks the US relies upon to safeguard its national security and interests and domestic territory. The complexity surrounding the hacking of US military UAVs appears to be increasing, given the advancements in digital networks and the seemingly inauspicious nature of artificial intelligence and autonomous systems. Being most victimized by malicious digital intrusions, the US continues its military components towards growing dependence upon digital networks in advancing warfare and national security and interests. Thus, Americaโ€™s netcentric warfare perspectives may perpetuate a chaotic environment where the use of military force is the sole means of safeguarding its digital networks

    Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles

    No full text
    corecore