Font Size: a A A

Research On Information Security Of UAV Based On Attack And Protection

Posted on:2019-09-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y R QiaoFull Text:PDF
GTID:2428330566960762Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years,UAVs have been used in a large number of applications in the civil-ian field.In particular,a large number of consumer-grade drones have emerged on the market.UAV security accidents have frequently occurred and attracted the attention of researchers.Because UAVs are used in a large number of situations involving national security and important assets,information security of UAVs needs to be given high pri-ority.This paper studies some key technologies of UAV information security based on attacks and protection.The vulnerability of single UAV and multiple UAVs is analyzed and evaluated in terms of component and quantification.Starting from the UAV secu-rity weak component,this paper constructs some attacks to identify potential security threats,and provides a reference for UAV security protection,aiming to improve the security of UAVs.Firstly,the security requirements of UAVs are analyzed in terms of availability,con-fidentiality,integrity,non-repudiation,and authentication.In order to clarify the direc-tion of protection of UAVs and identify the parts with higher vulnerability,this paper proposes a quantitative assessment mechanism for UAV vulnerability.The vulnerability of drones is evaluated according to the application scenarios.Typical typical civil scenes and military scenes that emphasize confidentiality are taken as examples.The vulner-ability of single drones and multiple drones is modeled and analyzed,and component-oriented components method of vulnerability assessment are proposed.Combining UAV safety related research and market research,a typical example is given to quantify the weight of UAV components in threat analysis in terms of availability,confidentiality,in-tegrity,non-repudiation and authentication.Based on the comparison results of threat indicators,an overall analysis of the threat of drones is given.Secondly,in order to find out the potential threats of UAV,some attacks on drones are constructed,which are:1)Interrupted communications and password cracking at-tacks have carried on UAV WIFI links.It verifies the threat of traditional attack methods on UAV WIFI communication links;2)Using suppress to drone communications links and satellite navigation signals to achieve forcing landing and hijacking attacks;3)Based on previous work,the traditional GPS spoofing scheme was modified to break through the limitations of GPS spoofing pre-set paths,and GPS real-time dynamic spoofing was implemented.On this basis,a real-time feedback model was established to realize the capture attack on drones under the hovering mode and returning mode.Based on the analysis of the vulnerability and the construction of the attack,the protection methods and recommendations for the UAV are given.Finally,because the functions of the fixed-point hovering,cruising,and returning of UAVs depend on satellite navigation,given the importance of satellite navigation for drones,this paper proposes protective measures for satellite navigation sensors.Due to the limitations of drones' power and load,Most of the traditional satellite naviga-tion spoofing detection algorithms are not suitable for UAVs.This paper uses GPS as an example and uses the drone's own sensors,for the first time,proposes a GPS spoofing detection method based on monocular vision,and uses two algorithms based on speed comparison and displacement comparison to detect GPS spoofing.Through experimen-tal verification,this method can detect GPS spoofing attacks in a short time.For the spoofing attack,we discuss the method of how the UAV safely return home position to realize self protection.
Keywords/Search Tags:Unmanned aerial vehicle, Vulnerability analysis, Construction of attacks, Security, GPS spoofing detection
PDF Full Text Request
Related items