UAVCAN Dataset Description

12/19/2022
by   Dongsung Kim, et al.
0

We collected attack data from unmanned vehicles using the UAVCAN protocol, and public and described technical documents. A testbed was built with a drone using PX4, and a total of three attacks, Flooding, Fuzzy, and Replay, were performed. The attack was carried out in a total of 10 scenarios. We expect that the attack data will help develop technologies such as anomaly detection to solve the security threat problem of drones.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset