Cited 0 time in webofscience Cited 0 time in scopus

An Empirical Study on the Attack and Defense of Unmanned Vehicle

Title
An Empirical Study on the Attack and Defense of Unmanned Vehicle
Authors
Yoon, Jiyoung
DGIST Authors
Yoon, Jiyoung; Park, Kyung-JoonKim, Kyoung-Dae
Advisor(s)
박경준
Co-Advisor(s)
Kim, Kyoung-Dae
Issue Date
2020
Available Date
2020-08-06
Degree Date
2020/08
Type
Thesis
Description
Unmanned Aerial Vehicle, Network Attack, Cyber-Physical System, Security
Abstract
One of the main applications of the Cyber-Physical System, the Unmanned vehicle is gradually expanding its use. Unmanned Aerial Vehicle (UAV), among unmanned vehicle, is used not only for cameras, emergency, and military purposes, but its negative effects are increasing also as its use expands. A terrorist outrage using UAVs in Saudi Arabia in the fall of 2019 is a well-known example. Therefore, research on disabling UAV is also becoming important. The UAV neutralization study can be divided into three phases. First, it is the identification of friend or foe stage that distinguishes whether UAVs are friendly or enemy. However, this step can be omitted in No-drone Zones, such as places where people are concentrated, places where major confidential facilities such as nuclear facilities are located, and places of privacy. The second step is to neutralize the UAV's actual mission. At this stage, the UAV is disabled mainly through network attacks such as jamming attacks and packet injection attacks, or through physical attacks such as nets. The third is a post-processing step to lead the UAV to safe area, that is, to prevent the UAV from flying again and to protect the surroundings from it. Previous UAV neutralization studies have focused on disabling UAV without considering the third phase. In this paper, we focused on the third stage, the post-processing stage, so that UAV can be neutralized. Robot Operating System is useful and used widely in UAV system, but there are also vulnerabilities. Therefore, disabling UAVs using this point and defense techniques are discussed in this paper.
Table Of Contents
Ⅰ. INTRODUCTION 1 Ⅱ. BACKGROUND 3 2.1 Unmanned Aerial System (UAS) 3 2.2 Robot Operating System (ROS) 5 Ⅲ. RELATED WORK 6 Ⅳ. PROPOSED METHOD 8 4.1 Proposed attack method 8 4.2 Proposed defense method 14 Ⅴ. SIMULATION RESULT 18 5.1 Experiment environment for attack and defense on UAV simulation 18 5.2 Simulation result for attack on UAV 21 5.3 Simulation result for defense on UAV 25 Ⅵ. CONCLUSION 29 REFERENCES 30 SUMMARY (Korean) 32
URI
http://dgist.dcollection.net/common/orgView/200000321071
http://hdl.handle.net/20.500.11750/12154
DOI
https://doi.org/10.22677/thesis.200000321071
Degree
Master
Department
Department of Information and Communication Engineering
University
DGIST
Related Researcher
Files:
Collection:
Department of Information and Communication EngineeringThesesMaster


qrcode mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE