Analysis of Control Channel Cybersecurity of the Consumer-Grade UAV by the Example of DJI Tello

Author:

Mamchenko M.V.

Abstract

Abstract This paper presents the assessment of cybersecurity of the non-industrial unmanned aerial vehicle (UAV; using DJI Tello as an example) wireless control channel, implemented on the basis of Wi-Fi Wireless Local Area Network technology. As a result of the research, a model of an adversary conducting a cyberattack on the UAV communication channel was developed, and scenarios of an intruder’s actions (aimed at taking control of the UAV or disabling it) were considered. Relevant block diagrams of the actions of an adversary were also developed. Based on the results of the analysis, a security strategy is proposed. It provides the maximum possible protection (based on the technical characteristics of the drone) and comprises not only passive protection in the form of setting a tough password, but also active actions –deploying a system to monitor the injections of deauthentication/dissociation frames and/or the creation of duplicate wireless networks.

Publisher

IOP Publishing

Subject

General Physics and Astronomy

Reference13 articles.

1. Enhancing WPA2-PSK Four-way Handshaking after Re-authentication to Deal with De-authentication Followed by Brute-Force Attack a Novel Re-authentication Protocol;Ghanem,2016

2. Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach;Agarwal,2015

3. Authentication Flooding DOS Attack Detection and Prevention in 802.11;Elhigazi,2020

4. The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual?;Chang,2018

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Secure Communication Between Unmanned Aerial Vehicle and Ground Control Station;Deu Muhendislik Fakultesi Fen ve Muhendislik;2024-05-14

2. 3, 2, 1, Drones Go! A Testbed to Take Off UAV Swarm Intelligence for Distributed Sensing;Advances in Intelligent Systems and Computing;2024

3. Vision-Based Target Localization with Cooperative UAVs Towards Indoor Surveillance;2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall);2023-10-10

4. A Review of Cybersecurity Advancements in Unmanned Aerial Vehicle;Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23);2023

5. Modeling and the Effectiveness Evaluation of Signal-Like Interference Exploiting the Vulnerabilities of the RTS / CTS Mechanism in 802.11 Networks;2022 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO);2022-06-29

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3