Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles

14Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The demand for unmanned aerial vehicles (UAVs), popularly known by their generic term drones, is rapidly increasing not only for recreational UAVs but also for sophisticated and professional UAVs largely deployed for sensitive and critical missions. This exponential growth of UAVs and it’s applications has necessitated the need to assess their resilience to security and privacy threats. This paper primarily focuses on assessing the security vulnerabilities of two drones, Parrot Mambo FPV and Eachine E010. While the former drone was found to be vulnerable against de-authentication and FTP service attacks, successful attacks on the latter were radio frequency (RF) replay attack and custom made controller attack. Besides exploiting the security vulnerabilities of two UAVs, the paper also discusses potential countermeasures to improve the resilience of UAVs against the identified attacks.

Cite

CITATION STYLE

APA

Lakew Yihunie, F., Singh, A. K., & Bhatia, S. (2020). Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles. In Smart Innovation, Systems and Technologies (Vol. 141, pp. 701–710). Springer. https://doi.org/10.1007/978-981-13-8406-6_66

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free