Cited time in webofscience Cited time in scopus

An Empirical Study on the Attack and Defense of Unmanned Vehicle

Title
An Empirical Study on the Attack and Defense of Unmanned Vehicle
Author(s)
Yoon, Jiyoung
DGIST Authors
Yoon, JiyoungPark, Kyung-JoonKim, Kyoung-Dae
Advisor
박경준
Co-Advisor(s)
Kim, Kyoung-Dae
Issued Date
2020
Awarded Date
2020/08
Type
Thesis
Description
Unmanned Aerial Vehicle, Network Attack, Cyber-Physical System, Security
Abstract
One of the main applications of the Cyber-Physical System, the Unmanned vehicle is gradually expanding its use. Unmanned Aerial Vehicle (UAV), among unmanned vehicle, is used not only for cameras, emergency, and military purposes, but its negative effects are increasing also as its use expands. A terrorist outrage using UAVs in Saudi Arabia in the fall of 2019 is a well-known example. Therefore, research on disabling UAV is also becoming important. The UAV neutralization study can be divided into three phases. First, it is the identification of friend or foe stage that distinguishes whether UAVs are friendly or enemy. However, this step can be omitted in No-drone Zones, such as places where people are concentrated, places where major confidential facilities such as nuclear facilities are located, and places of privacy. The second step is to neutralize the UAV's actual mission. At this stage, the UAV is disabled mainly through network attacks such as jamming attacks and packet injection attacks, or through physical attacks such as nets. The third is a post-processing step to lead the UAV to safe area, that is, to prevent the UAV from flying again and to protect the surroundings from it. Previous UAV neutralization studies have focused on disabling UAV without considering the third phase. In this paper, we focused on the third stage, the post-processing stage, so that UAV can be neutralized. Robot Operating System is useful and used widely in UAV system, but there are also vulnerabilities. Therefore, disabling UAVs using this point and defense techniques are discussed in this paper.
Table Of Contents
Ⅰ. INTRODUCTION 1

Ⅱ. BACKGROUND 3
2.1 Unmanned Aerial System (UAS) 3
2.2 Robot Operating System (ROS) 5

Ⅲ. RELATED WORK 6

Ⅳ. PROPOSED METHOD 8
4.1 Proposed attack method 8
4.2 Proposed defense method 14

Ⅴ. SIMULATION RESULT 18
5.1 Experiment environment for attack and defense on UAV simulation 18
5.2 Simulation result for attack on UAV 21
5.3 Simulation result for defense on UAV 25

Ⅵ. CONCLUSION 29

REFERENCES 30
SUMMARY (Korean) 32
URI
http://dgist.dcollection.net/common/orgView/200000321071

http://hdl.handle.net/20.500.11750/12154
DOI
10.22677/thesis.200000321071
Degree
Master
Department
Department of Information and Communication Engineering
Publisher
DGIST
Related Researcher
  • 박경준 Park, Kyung-Joon
  • Research Interests Cyber-Physical Systems; Robot Operating System (ROS); Smart Manufacturing
Files in This Item:
200000321071.pdf

200000321071.pdf

기타 데이터 / 1.74 MB / Adobe PDF download
Appears in Collections:
Department of Electrical Engineering and Computer Science Theses Master

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE