Font Size: a A A

Open-source unmanned aerial vehicles: Vulnerabilities, exploits, and risk

Posted on:2017-09-16Degree:M.SType:Thesis
University:Utica CollegeCandidate:Roberts, Glen AFull Text:PDF
GTID:2468390011496552Subject:Computer Science
Abstract/Summary:
The purpose of this research was to examine the lack of security mechanisms in open-source drone operating systems and communications protocols in order to uncover potential security consequences to the public. This paper focused on UAVs based on open-source software and firmware. Since anyone can examine and manipulate open-source software and firmware, the potential for the code's vulnerabilities to be exploited is more likely than that of proprietary code. However, the potential for exploitation of open-source UAV platforms is only half of the equation. Discussion of the potential security consequences related to the exploitation of vulnerabilities associated with current unmanned aerial system operating systems and communication protocols completes the risk analysis equation. Specifically, the ramifications of the exploitation of open-source UAV systems should address not only the UAV system, but also the risk to the public. That being said, the processes of drone development, use, and risk identification are fluid. The open-source commercial drone industry has the potential for exponential growth. However, the potential for growth is not limited to only the sales figures. There is also potential for growth in the areas of open-source UAV research, development, security testing, insurance sales, and academic programs.
Keywords/Search Tags:Open-source, Security, Potential, Vulnerabilities, Risk
Related items