Consumer UAV Cybersecurity Vulnerability Assessment Using Fuzzing Tests

08/09/2020
by   David Rudo, et al.
0

Unmanned Aerial Vehicles (UAVs) are remote-controlled vehicles capable of flight and are present in a variety of environments from military operations to domestic enjoyment. These vehicles are great assets, but just as their pilot can control them remotely, cyberattacks can be executed in a similar manner. Cyber attacks on UAVs can bring a plethora of issues to physical and virtual systems. Such malfunctions are capable of giving an attacker the ability to steal data, incapacitate the UAV, or hijack the UAV. To mitigate such attacks, it is necessary to identify and patch vulnerabilities that may be maliciously exploited. In this paper, a new UAV vulnerability is explored with related UAV security practices identified for possible exploitation using large streams of data sent at specific ports. The more in-depth model involves strings of data involving FTP-specific keywords sent to the UAV's FTP port in the form of a fuzzing test and launching thousands of packets at other ports on the UAV as well. During these tests, virtual and physical systems are monitored extensively to identify specific patterns and vulnerabilities. This model is applied to a Parrot Bebop 2, which accurately portrays a UAV that had their network compromised by an attacker and portrays many lower-end UAV models for domestic use. During testings, the Parrot Bebop 2 is monitored for degradation in GPS performance, video speed, the UAV's reactivity to the pilot, motor function, and the accuracy of the UAV's sensor data. All these points of monitoring give a comprehensive view of the UAV's reaction to each individual test. In this paper, countermeasures to combat the exploitation of this vulnerability will be discussed as well as possible attacks that can branch from the fuzzing tests.

READ FULL TEXT

page 1

page 4

page 5

page 7

page 9

research
01/16/2022

Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain

Unmanned Aerial Vehicles (UAVs), also known as drones, have exploded in ...
research
06/27/2019

Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification

The proliferation of Unmanned Aerial Vehicles (UAVs) embedded with vulne...
research
07/02/2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey

Unmanned Aerial Vehicles (UAV)-based civilian or military applications b...
research
02/12/2021

UAVs Path Deviation Attacks: Survey and Research Challenges

Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of...
research
03/21/2022

Two methods for Jamming Identification in UAVs Networks using New Synthetic Dataset

Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from sel...
research
05/15/2020

Safety Constrained Multi-UAV Time Coordination: A Bi-level Control Framework in GPS Denied Environment

Unmanned aerial vehicles (UAVs) suffer from sensor drifts in GPS denied ...
research
08/28/2023

Towards enabling reliable immersive teleoperation through Digital Twin: A UAV command and control use case

This paper addresses the challenging problem of enabling reliable immers...

Please sign up or login with your details

Forgot password? Click here to reset