Detail View
Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles
WEB OF SCIENCE
SCOPUS
- Title
- Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles
- Alternative Title
- MAVLink 프로토콜의 취약점 분석 및 무인기 무력화
- Advisor
- Park, Kyung Joon
- Co-Advisor(s)
- Cho, Min Gyu
- Issued Date
- 2018
- Awarded Date
- 2018. 2
- Citation
- Kwon, Young-Min. (2018). Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles. doi: 10.22677/thesis.200000005425
- Type
- Thesis
- Subject
- UAV ; UAS ; Drones ; MAVLink ; Network attack ; DoS ; Packet injection
- Abstract
-
Recently, interest in the Unmanned Aerial Vehicle (UAV) has increased, and unmanned aircraft are utilized in various fields. Especially UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. However, since UAVs are increasingly used not only for positive purposes but also for negative ones, it is necessary to detect and neutralize malicious drones.
더보기
In this paper, we proposed a method of controlling UAVs and analyzed its operation structure, the MAVLink protocol which is a communication protocol of UAVs. We also experimented with ICMP flooding and packet injection attacks which disables UAVs by exploiting the vulnerability of the MAVLink protocol. Especially, we exploited the vulnerability of the MAVLink waypoint protocol to perform an experiment to disable a UAV executing a mission. As a result of the experiment, we confirmed that the attacked UAV was stopped and the mission disabled. ⓒ 2017 DGIST
- Table Of Contents
-
I. INTRODUCTION 1--
Ⅱ. BACKGROUND 3--
2.1 Drone control structure 3--
2.2 MAVLink protocol 4--
2.3 Network Attack 6--
2.3.1 Man-In-The-Middle 6--
2.3.2 Eavesdropping 7--
2.3.3 Denial-of-Service 7--
2.3.4 Potential threats on UAV systems 7--
Ⅲ. RELATED WORK 9--
Ⅳ. PROPOSED METHOD 10--
4.1 Cain & Abel 11--
4.2 Jpcap 12--
4.3 Packet Sender 12--
Ⅴ. EXPERIMENTS 13--
5.1 Testbed configuration 13--
5.2 ICMP flooding attack 14--
5.3 Packet injection attack 17--
5.4 Software In The Loop (SITL) Simulator 19--
Ⅵ. CONCLUSIONS 21--
REFERENCES 22--
SUMMARY (Korean) 26
- URI
-
http://dgist.dcollection.net/common/orgView/200000005425
http://hdl.handle.net/20.500.11750/6036
- Degree
- Master
- Department
- Information and Communication Engineering
- Publisher
- DGIST
File Downloads
공유
Total Views & Downloads
???jsp.display-item.statistics.view???: , ???jsp.display-item.statistics.download???:
