An Integrated Framework for Sensing Radio Frequency Spectrum Attacks on
Medical Delivery Drones
- URL: http://arxiv.org/abs/2005.01503v1
- Date: Mon, 4 May 2020 14:13:35 GMT
- Title: An Integrated Framework for Sensing Radio Frequency Spectrum Attacks on
Medical Delivery Drones
- Authors: Philip H. Kulp, Nagi Mei
- Abstract summary: Drone susceptibility to jamming or spoofing attacks presents a danger to future medical delivery systems.
A detection framework capable of sensing attacks on drones could provide the capability for active responses.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Drone susceptibility to jamming or spoofing attacks of GPS, RF, Wi-Fi, and
operator signals presents a danger to future medical delivery systems. A
detection framework capable of sensing attacks on drones could provide the
capability for active responses. The identification of interference attacks has
applicability in medical delivery, disaster zone relief, and FAA enforcement
against illegal jamming activities. A gap exists in the literature for solo or
swarm-based drones to identify radio frequency spectrum attacks. Any
non-delivery specific function, such as attack sensing, added to a drone
involves a weight increase and additional complexity; therefore, the value must
exceed the disadvantages. Medical delivery, high-value cargo, and disaster zone
applications could present a value proposition which overcomes the additional
costs. The paper examines types of attacks against drones and describes a
framework for designing an attack detection system with active response
capabilities for improving the reliability of delivery and other medical
applications.
Related papers
- Obfuscated Location Disclosure for Remote ID Enabled Drones [57.66235862432006]
We propose Obfuscated Location disclOsure for RID-enabled drones (OLO-RID)
Instead of disclosing the actual drone's location, drones equipped with OLO-RID disclose a differentially private obfuscated location in a mobile scenario.
OLO-RID also extends RID messages with encrypted location information, accessible only by authorized entities.
arXiv Detail & Related papers (2024-07-19T12:35:49Z) - AI-based Drone Assisted Human Rescue in Disaster Environments: Challenges and Opportunities [10.803423394127458]
Unmanned aerial vehicles (UAVs) are frequently deployed for search-and-rescue missions during disaster situations.
In some cases, larger drones are used to deliver essential supplies to people stranded in isolated disaster-stricken areas.
The auditory system must distinguish between human cries and sounds that occur naturally, such as animal calls and wind.
To tackle this challenge, one solution involves harnessing artificial intelligence (AI) to analyze sound frequencies and identify common audio signatures.
arXiv Detail & Related papers (2024-06-22T15:39:46Z) - Drone-type-Set: Drone types detection benchmark for drone detection and tracking [0.6294091730968154]
In this paper, we provide a dataset of various drones as well as a comparison of recognized object detection models.
The experimental results of different models are provided along with a description of each method.
arXiv Detail & Related papers (2024-05-16T18:56:46Z) - AdvGPS: Adversarial GPS for Multi-Agent Perception Attack [47.59938285740803]
This study investigates whether specific GPS signals can easily mislead the multi-agent perception system.
We introduce textscAdvGPS, a method capable of generating adversarial GPS signals which are also stealthy for individual agents within the system.
Our experiments on the OPV2V dataset demonstrate that these attacks substantially undermine the performance of state-of-the-art methods.
arXiv Detail & Related papers (2024-01-30T23:13:41Z) - Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol [0.5604521993453262]
Investigation discovered vulnerabilities in the Enhanced Wi-Fi control commands, rendering them susceptible to hijacking attacks.
Study established that even readily available and cost-effective commercial off-the-shelf Wi-Fi routers could be leveraged as effective tools for executing such attacks.
Findings emphasize the critical necessity of implementing robust security measures to safeguard unmanned aerial vehicles.
arXiv Detail & Related papers (2023-09-12T02:03:27Z) - Unauthorized Drone Detection: Experiments and Prototypes [0.8294692832460543]
We present a novel encryption-based drone detection scheme that uses a two-stage verification of the drone's received signal strength indicator ( RSSI) and the encryption key generated from the drone's position coordinates.
arXiv Detail & Related papers (2022-12-02T20:43:29Z) - Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks [76.35478518372692]
We introduce epsilon-illusory, a novel form of adversarial attack on sequential decision-makers.
Compared to existing attacks, we empirically find epsilon-illusory to be significantly harder to detect with automated methods.
Our findings suggest the need for better anomaly detectors, as well as effective hardware- and system-level defenses.
arXiv Detail & Related papers (2022-07-20T19:49:09Z) - URANUS: Radio Frequency Tracking, Classification and Identification of
Unmanned Aircraft Vehicles [9.48595824154853]
URANUS is a cost-effective and real-time framework to detect the presence of drones in restricted airspaces.
We adopt a Multilayer Perceptron neural network to identify and classify UAVs in real-time, with $90$% accuracy.
Our analysis shows that URANUS is an ideal framework for identifying, classifying, and tracking UAVs that most Critical Infrastructure operators can adopt.
arXiv Detail & Related papers (2022-07-13T08:14:18Z) - A dataset for multi-sensor drone detection [67.75999072448555]
The use of small and remotely controlled unmanned aerial vehicles (UAVs) has increased in recent years.
Most studies on drone detection fail to specify the type of acquisition device, the drone type, the detection range, or the dataset.
We contribute with an annotated multi-sensor database for drone detection that includes infrared and visible videos and audio files.
arXiv Detail & Related papers (2021-11-02T20:52:03Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - Dogfight: Detecting Drones from Drones Videos [58.158988162743825]
This paper attempts to address the problem of drones detection from other flying drones variations.
The erratic movement of the source and target drones, small size, arbitrary shape, large intensity, and occlusion make this problem quite challenging.
To handle this, instead of using region-proposal based methods, we propose to use a two-stage segmentation-based approach.
arXiv Detail & Related papers (2021-03-31T17:43:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.