Detail View
An Empirical Study on the Attack and Defense of Unmanned Vehicle
WEB OF SCIENCE
SCOPUS
- Title
- An Empirical Study on the Attack and Defense of Unmanned Vehicle
- DGIST Authors
- Yoon, Jiyoung ; Park, Kyung-Joon ; Kim, Kyoung-Dae
- Advisor
- 박경준
- Co-Advisor(s)
- Kim, Kyoung-Dae
- Issued Date
- 2020
- Awarded Date
- 2020/08
- Citation
- Yoon, Jiyoung. (2020). An Empirical Study on the Attack and Defense of Unmanned Vehicle. doi: 10.22677/thesis.200000321071
- Type
- Thesis
- Description
- Unmanned Aerial Vehicle, Network Attack, Cyber-Physical System, Security
- Abstract
-
One of the main applications of the Cyber-Physical System, the Unmanned vehicle is gradually expanding its use. Unmanned Aerial Vehicle (UAV), among unmanned vehicle, is used not only for cameras, emergency, and military purposes, but its negative effects are increasing also as its use expands. A terrorist outrage using UAVs in Saudi Arabia in the fall of 2019 is a well-known example. Therefore, research on disabling UAV is also becoming important. The UAV neutralization study can be divided into three phases. First, it is the identification of friend or foe stage that distinguishes whether UAVs are friendly or enemy. However, this step can be omitted in No-drone Zones, such as places where people are concentrated, places where major confidential facilities such as nuclear facilities are located, and places of privacy. The second step is to neutralize the UAV's actual mission. At this stage, the UAV is disabled mainly through network attacks such as jamming attacks and packet injection attacks, or through physical attacks such as nets. The third is a post-processing step to lead the UAV to safe area, that is, to prevent the UAV from flying again and to protect the surroundings from it. Previous UAV neutralization studies have focused on disabling UAV without considering the third phase. In this paper, we focused on the third stage, the post-processing stage, so that UAV can be neutralized. Robot Operating System is useful and used widely in UAV system, but there are also vulnerabilities. Therefore, disabling UAVs using this point and defense techniques are discussed in this paper.
더보기
- Table Of Contents
-
Ⅰ. INTRODUCTION 1
Ⅱ. BACKGROUND 3
2.1 Unmanned Aerial System (UAS) 3
2.2 Robot Operating System (ROS) 5
Ⅲ. RELATED WORK 6
Ⅳ. PROPOSED METHOD 8
4.1 Proposed attack method 8
4.2 Proposed defense method 14
Ⅴ. SIMULATION RESULT 18
5.1 Experiment environment for attack and defense on UAV simulation 18
5.2 Simulation result for attack on UAV 21
5.3 Simulation result for defense on UAV 25
Ⅵ. CONCLUSION 29
REFERENCES 30
SUMMARY (Korean) 32
- URI
-
http://dgist.dcollection.net/common/orgView/200000321071
http://hdl.handle.net/20.500.11750/12154
- Degree
- Master
- Publisher
- DGIST
File Downloads
공유
Total Views & Downloads
???jsp.display-item.statistics.view???: , ???jsp.display-item.statistics.download???:
