Skip to main content

2016 | OriginalPaper | Buchkapitel

Security Analysis of FHSS-type Drone Controller

verfasst von : Hocheol Shin, Kibum Choi, Youngseok Park, Jaeyeong Choi, Yongdae Kim

Erschienen in: Information Security Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Unmanned Aerial Vehicles (UAVs), or drones, have attracted a considerable amount of attentions due to their utility to civilian as well as military applications. However, the security issues involved in UAV technology have not been extensively discussed in the literature. As a first step toward analyzing these security issuxes, we investigate security in drone controllers, especially controllers that adopt Frequency Hopping Spread Spectrum (FHSS). In order to affect an FHSS-type controller, an attacker first has to access its physical layer. This is difficult because of the pseudorandomness of the hopping sequence and the rapidly changing channels. However, these difficulties can be relaxed when the attacker acquires the hopping sequence and when the hopping speed of the target system is not significant. In this paper, we propose a general scheme to extract the hopping sequence of FHSS-type controllers using a software-defined radio (SDR). We also propose a method to address the issue of the limited bandwidth of the SDR. We implemented our scheme on a Universal Software Radio Peripheral (USRP), successfully extracted the hopping sequence of the target system, and exposed the baseband signal.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat Chaudhuri, S., Chatterjee, S., Katz, N., Nelson, M., Goldbaum, M.: Detection of blood vessels in retinal images using two-dimensional matched filters. IEEE T-MI 8(3), 263–269 (1989) Chaudhuri, S., Chatterjee, S., Katz, N., Nelson, M., Goldbaum, M.: Detection of blood vessels in retinal images using two-dimensional matched filters. IEEE T-MI 8(3), 263–269 (1989)
8.
Zurück zum Zitat Chen, Q., Defrise, M., Deconinck, F.: Symmetric phase-only matched filtering of fourier-mellin transforms for image registration and recognition. TPAMI 16(12), 1156–1168 (1994)CrossRef Chen, Q., Defrise, M., Deconinck, F.: Symmetric phase-only matched filtering of fourier-mellin transforms for image registration and recognition. TPAMI 16(12), 1156–1168 (1994)CrossRef
9.
Zurück zum Zitat Gardner, W., et al.: Exploitation of spectral redundancy in cyclostationary signals. IEEE Sig. Process. Mag. 8(2), 14–36 (1991)CrossRef Gardner, W., et al.: Exploitation of spectral redundancy in cyclostationary signals. IEEE Sig. Process. Mag. 8(2), 14–36 (1991)CrossRef
10.
Zurück zum Zitat Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., OHanlon, B.W., Kintner, Jr., P.M.: Assessing the spoofing threat: Development of aportable gps civilian spoofer. In: ION GNSS+., vol. 55, p. 56 (2008) Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., OHanlon, B.W., Kintner, Jr., P.M.: Assessing the spoofing threat: Development of aportable gps civilian spoofer. In: ION GNSS+., vol. 55, p. 56 (2008)
13.
Zurück zum Zitat Nychis, G., Hottelier, T., Yang, Z., Seshan, S., Steenkiste, P.: Enabling mac protocol implementations on software-defined radios. NSDI 9, 91–105 (2009) Nychis, G., Hottelier, T., Yang, Z., Seshan, S., Steenkiste, P.: Enabling mac protocol implementations on software-defined radios. NSDI 9, 91–105 (2009)
15.
Zurück zum Zitat Ryan, M.: Bluetooth: With low energy comes low security. In: WOOT (2013) Ryan, M.: Bluetooth: With low energy comes low security. In: WOOT (2013)
16.
Zurück zum Zitat Song, M., Allison, T.: Frequency hopping pattern recognition algorithms for wireless sensor networks. In: ISCA, pp. 264–269 (2005) Song, M., Allison, T.: Frequency hopping pattern recognition algorithms for wireless sensor networks. In: ISCA, pp. 264–269 (2005)
17.
Zurück zum Zitat Stahlberg, M.: Radio jamming attacks against two popular mobile networks. In: Tik-110.501, vol. 3 (2000) Stahlberg, M.: Radio jamming attacks against two popular mobile networks. In: Tik-110.501, vol. 3 (2000)
18.
Zurück zum Zitat Tang, H.: Some physical layer issues of wide-band cognitive radio systems. In: DySPAN, pp. 151–159. IEEE (2005) Tang, H.: Some physical layer issues of wide-band cognitive radio systems. In: DySPAN, pp. 151–159. IEEE (2005)
19.
Zurück zum Zitat Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55(4), 523–531 (1967)CrossRef Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55(4), 523–531 (1967)CrossRef
23.
Zurück zum Zitat Yücek, T., Arslan, H.: Spectrum characterization for opportunistic cognitive radio systems. In: MILCOM, pp. 1–6. IEEE (2006) Yücek, T., Arslan, H.: Spectrum characterization for opportunistic cognitive radio systems. In: MILCOM, pp. 1–6. IEEE (2006)
24.
Zurück zum Zitat Yücek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutorials 11(1), 116–130 (2009)CrossRef Yücek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutorials 11(1), 116–130 (2009)CrossRef
Metadaten
Titel
Security Analysis of FHSS-type Drone Controller
verfasst von
Hocheol Shin
Kibum Choi
Youngseok Park
Jaeyeong Choi
Yongdae Kim
Copyright-Jahr
2016
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-319-31875-2_20