Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
- URL: http://arxiv.org/abs/2403.03858v1
- Date: Wed, 6 Mar 2024 17:09:27 GMT
- Title: Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
- Authors: Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac,
- Abstract summary: The Crazyflie ecosystem is one of the most popular Micro Aerial Drones and has the potential to be deployed worldwide.
In this paper, we empirically investigate two interference attacks against the Crazy Real Time Protocol (CRTP) implemented within the Crazyflie drones.
Our experimental results demonstrate the effectiveness of such attacks in both autonomous and non-autonomous flight modes.
- Score: 14.970216072065861
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Recent advancements in drone technology have shown that commercial off-the-shelf Micro Aerial Drones are more effective than large-sized drones for performing flight missions in narrow environments, such as swarming, indoor navigation, and inspection of hazardous locations. Due to their deployments in many civilian and military applications, safe and reliable communication of these drones throughout the mission is critical. The Crazyflie ecosystem is one of the most popular Micro Aerial Drones and has the potential to be deployed worldwide. In this paper, we empirically investigate two interference attacks against the Crazy Real Time Protocol (CRTP) implemented within the Crazyflie drones. In particular, we explore the feasibility of experimenting two attack vectors that can disrupt an ongoing flight mission: the jamming attack, and the hijacking attack. Our experimental results demonstrate the effectiveness of such attacks in both autonomous and non-autonomous flight modes on a Crazyflie 2.1 drone. Finally, we suggest potential shielding strategies that guarantee a safe and secure flight mission. To the best of our knowledge, this is the first work investigating jamming and hijacking attacks against Micro Aerial Drones, both in autonomous and non-autonomous modes.
Related papers
- Obfuscated Location Disclosure for Remote ID Enabled Drones [57.66235862432006]
We propose Obfuscated Location disclOsure for RID-enabled drones (OLO-RID)
Instead of disclosing the actual drone's location, drones equipped with OLO-RID disclose a differentially private obfuscated location in a mobile scenario.
OLO-RID also extends RID messages with encrypted location information, accessible only by authorized entities.
arXiv Detail & Related papers (2024-07-19T12:35:49Z) - Drone-type-Set: Drone types detection benchmark for drone detection and tracking [0.6294091730968154]
In this paper, we provide a dataset of various drones as well as a comparison of recognized object detection models.
The experimental results of different models are provided along with a description of each method.
arXiv Detail & Related papers (2024-05-16T18:56:46Z) - Cybersecurity Threat Analysis And Attack Simulations For Unmanned Aerial Vehicle Networks [0.0]
This research explores the urgent necessity to defend UAV networks from new cyber threats.
The two essential areas of our study are assault simulation and threat analysis in cybersecurity.
This work demonstrates how easy it is to hack a drone mid-flight using only a Raspberry Pi3 and open-source online tools.
arXiv Detail & Related papers (2024-02-12T10:42:11Z) - Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol [0.5604521993453262]
Investigation discovered vulnerabilities in the Enhanced Wi-Fi control commands, rendering them susceptible to hijacking attacks.
Study established that even readily available and cost-effective commercial off-the-shelf Wi-Fi routers could be leveraged as effective tools for executing such attacks.
Findings emphasize the critical necessity of implementing robust security measures to safeguard unmanned aerial vehicles.
arXiv Detail & Related papers (2023-09-12T02:03:27Z) - Chasing the Intruder: A Reinforcement Learning Approach for Tracking
Intruder Drones [0.08192907805418582]
We propose a reinforcement learning based approach for identifying and tracking any intruder drone using a chaser drone.
Our proposed solution uses computer vision techniques interleaved with the policy learning framework of reinforcement learning.
The results show that the reinforcement learning based policy converges to identify and track the intruder drone.
arXiv Detail & Related papers (2023-09-10T16:31:40Z) - Unauthorized Drone Detection: Experiments and Prototypes [0.8294692832460543]
We present a novel encryption-based drone detection scheme that uses a two-stage verification of the drone's received signal strength indicator ( RSSI) and the encryption key generated from the drone's position coordinates.
arXiv Detail & Related papers (2022-12-02T20:43:29Z) - TransVisDrone: Spatio-Temporal Transformer for Vision-based
Drone-to-Drone Detection in Aerial Videos [57.92385818430939]
Drone-to-drone detection using visual feed has crucial applications, such as detecting drone collisions, detecting drone attacks, or coordinating flight with other drones.
Existing methods are computationally costly, follow non-end-to-end optimization, and have complex multi-stage pipelines, making them less suitable for real-time deployment on edge devices.
We propose a simple yet effective framework, itTransVisDrone, that provides an end-to-end solution with higher computational efficiency.
arXiv Detail & Related papers (2022-10-16T03:05:13Z) - A dataset for multi-sensor drone detection [67.75999072448555]
The use of small and remotely controlled unmanned aerial vehicles (UAVs) has increased in recent years.
Most studies on drone detection fail to specify the type of acquisition device, the drone type, the detection range, or the dataset.
We contribute with an annotated multi-sensor database for drone detection that includes infrared and visible videos and audio files.
arXiv Detail & Related papers (2021-11-02T20:52:03Z) - Dogfight: Detecting Drones from Drones Videos [58.158988162743825]
This paper attempts to address the problem of drones detection from other flying drones variations.
The erratic movement of the source and target drones, small size, arbitrary shape, large intensity, and occlusion make this problem quite challenging.
To handle this, instead of using region-proposal based methods, we propose to use a two-stage segmentation-based approach.
arXiv Detail & Related papers (2021-03-31T17:43:31Z) - University-1652: A Multi-view Multi-source Benchmark for Drone-based
Geo-localization [87.74121935246937]
We introduce a new multi-view benchmark for drone-based geo-localization, named University-1652.
University-1652 contains data from three platforms, i.e., synthetic drones, satellites and ground cameras of 1,652 university buildings around the world.
Experiments show that University-1652 helps the model to learn the viewpoint-invariant features and also has good generalization ability in the real-world scenario.
arXiv Detail & Related papers (2020-02-27T15:24:15Z) - Detection and Tracking Meet Drones Challenge [131.31749447313197]
This paper presents a review of object detection and tracking datasets and benchmarks, and discusses the challenges of collecting large-scale drone-based object detection and tracking datasets with manual annotations.
We describe our VisDrone dataset, which is captured over various urban/suburban areas of 14 different cities across China from North to South.
We provide a detailed analysis of the current state of the field of large-scale object detection and tracking on drones, and conclude the challenge as well as propose future directions.
arXiv Detail & Related papers (2020-01-16T00:11:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.