Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yoon, Jiyoung | - |
dc.contributor.author | Lee, Hyojun | - |
dc.contributor.author | Park, Kyung-Joon | - |
dc.date.accessioned | 2021-06-09T20:02:27Z | - |
dc.date.available | 2021-06-09T20:02:27Z | - |
dc.date.created | 2021-03-04 | - |
dc.date.issued | 2021-02 | - |
dc.identifier.citation | Journal of Institute of Control, Robotics and Systems, v.27, no.2, pp.111 - 117 | - |
dc.identifier.issn | 1976-5622 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11750/13697 | - |
dc.identifier.uri | http://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE10525849 | - |
dc.description.abstract | Recently, UAVs (Unmanned Aerial Vehicles), which represent a key application of cyber -physical systems, have been used for malicious intent. Accordingly, research on the neutralization of UAV has become critical. The UAV neutralization process can be divided into three phases. The identification stage is aimed at distinguishing whether the UAVs are friendly or adversarial. Next, the actual mission of the UAVs is neutralized. Subsequently, post-processing is performed to guide the UAV to safe areas. Because the existing UAV neutralization studies did not consider phase 3, secondary damage such as that to people and property may occur after an attack. Therefore, we propose a UAV neutralization method in which phase 3 applied. In this paper, to implement functions such as autonomous driving, navigation, and collision avoidance, we investigate the vulnerability of the MAVROS environment commonly used in unmanned vehicles and clarify the method of attack that exploits the vulnerability. Additionally, we propose a MAVROS API to enhance the security to prevent these vulnerabilities. Finally, we verify the proposed attacks and security through empirical research by considering UAVs with MAVROS. © ICROS 2021. | - |
dc.language | Korean | - |
dc.publisher | 제어·로봇·시스템학회 | - |
dc.title | UAV에서의 로봇 운영 시스템에 대한 사이버 공격과 보안 플랫폼을 이용한 방어 실증 연구 | - |
dc.title.alternative | An Empirical Study on Cyber Attack and Defense of Robot Operating System using Security Platform in UAV | - |
dc.type | Article | - |
dc.identifier.doi | 10.5302/J.ICROS.2021.20.0189 | - |
dc.identifier.scopusid | 2-s2.0-85101110499 | - |
dc.type.local | Article(Overseas) | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.citation.publicationname | Journal of Institute of Control, Robotics and Systems | - |
dc.identifier.kciid | ART002682881 | - |
dc.contributor.nonIdAuthor | Yoon, Jiyoung | - |
dc.contributor.nonIdAuthor | Lee, Hyojun | - |
dc.identifier.citationVolume | 27 | - |
dc.identifier.citationNumber | 2 | - |
dc.identifier.citationStartPage | 111 | - |
dc.identifier.citationEndPage | 117 | - |
dc.identifier.citationTitle | Journal of Institute of Control, Robotics and Systems | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | Uunmanned aerial vehicles | - |
dc.subject.keywordAuthor | Cyber-physical systems | - |
dc.subject.keywordAuthor | Network attack | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordPlus | Agricultural robots | - |
dc.subject.keywordPlus | Antennas | - |
dc.subject.keywordPlus | Embedded systems | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Robots | - |
dc.subject.keywordPlus | Autonomous driving | - |
dc.subject.keywordPlus | Empirical research | - |
dc.subject.keywordPlus | Empirical studies | - |
dc.subject.keywordPlus | Neutralization methods | - |
dc.subject.keywordPlus | Neutralization process | - |
dc.subject.keywordPlus | Post processing | - |
dc.subject.keywordPlus | Robot operating system | - |
dc.subject.keywordPlus | Secondary damage | - |
dc.subject.keywordPlus | Unmanned aerial vehicles (UAV) | - |
dc.contributor.affiliatedAuthor | Yoon, Jiyoung | - |
dc.contributor.affiliatedAuthor | Lee, Hyojun | - |
dc.contributor.affiliatedAuthor | Park, Kyung-Joon | - |
There are no files associated with this item.