Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.advisor Park, Kyung Joon -
dc.contributor.author Kwon, Young-Min -
dc.date.accessioned 2018-03-14T02:03:40Z -
dc.date.available 2018-03-14T02:03:40Z -
dc.date.issued 2018 -
dc.identifier.uri http://dgist.dcollection.net/common/orgView/200000005425 en_US
dc.identifier.uri http://hdl.handle.net/20.500.11750/6036 -
dc.description.abstract Recently, interest in the Unmanned Aerial Vehicle (UAV) has increased, and unmanned aircraft are utilized in various fields. Especially UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. However, since UAVs are increasingly used not only for positive purposes but also for negative ones, it is necessary to detect and neutralize malicious drones.

In this paper, we proposed a method of controlling UAVs and analyzed its operation structure, the MAVLink protocol which is a communication protocol of UAVs. We also experimented with ICMP flooding and packet injection attacks which disables UAVs by exploiting the vulnerability of the MAVLink protocol. Especially, we exploited the vulnerability of the MAVLink waypoint protocol to perform an experiment to disable a UAV executing a mission. As a result of the experiment, we confirmed that the attacked UAV was stopped and the mission disabled. ⓒ 2017 DGIST
-
dc.description.statementofresponsibility open -
dc.description.tableofcontents I. INTRODUCTION 1--

Ⅱ. BACKGROUND 3--

2.1 Drone control structure 3--

2.2 MAVLink protocol 4--

2.3 Network Attack 6--

2.3.1 Man-In-The-Middle 6--

2.3.2 Eavesdropping 7--

2.3.3 Denial-of-Service 7--

2.3.4 Potential threats on UAV systems 7--

Ⅲ. RELATED WORK 9--

Ⅳ. PROPOSED METHOD 10--

4.1 Cain & Abel 11--

4.2 Jpcap 12--

4.3 Packet Sender 12--

Ⅴ. EXPERIMENTS 13--

5.1 Testbed configuration 13--

5.2 ICMP flooding attack 14--

5.3 Packet injection attack 17--

5.4 Software In The Loop (SITL) Simulator 19--

Ⅵ. CONCLUSIONS 21--

REFERENCES 22--

SUMMARY (Korean) 26
-
dc.format.extent 34 -
dc.language eng -
dc.publisher DGIST -
dc.subject UAV -
dc.subject UAS -
dc.subject Drones -
dc.subject MAVLink -
dc.subject Network attack -
dc.subject DoS -
dc.subject Packet injection -
dc.title Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles -
dc.title.alternative MAVLink 프로토콜의 취약점 분석 및 무인기 무력화 -
dc.type Thesis -
dc.identifier.doi 10.22677/thesis.200000005425 -
dc.description.alternativeAbstract 최근 무인기에 대한 관심이 증가하며 무인기를 다양한 분야에서 활용하고 있다. 특히 인명 구조 시스템, 재난 감지, 군사적 목적뿐만 아니라 레저, 상업적인 목적으로 까지 사용되고 있다. 하지만 무인기를 긍정적인 용도로만 쓰이지 않고, 악용하는 경우도 증가하고 있으므로 악의적인 무인기를 탐지하여 무력화시켜야 할 필요가 있다.

본 논문에서는 무인기를 제어하는 방법과 동작 구조, 무인기의 통신 프로토콜인 MAVLink 프로토콜을 분석하고 MAVLink 프로토콜의 취약점을 이용하여 무인기를 무력화하는 패킷 injection 공격을 실험하였다. 특히 MAVLink waypoint 프로토콜의 취약점을 이용하여 mission을 수행중인 무인기를 무력화하는 실험을 수행하였다. 실험 결과, 임무를 수행중인 무인기가 임무를 중단하여 가만히 호버링 하며 무력화 된 것을 확인하였고, 동일한 시나리오를 시뮬레이터를 통해 확인하였다.
-
dc.description.degree Master -
dc.contributor.department Information and Communication Engineering -
dc.contributor.coadvisor Cho, Min Gyu -
dc.date.awarded 2018. 2 -
dc.publisher.location Daegu -
dc.description.database dCollection -
dc.date.accepted 2018-01-05 -
dc.contributor.alternativeDepartment 대학원 정보통신융합전공 -
dc.contributor.alternativeName 권영민 -
dc.contributor.alternativeName 박경준 -
dc.contributor.alternativeName 조민규 -
Files in This Item:
정보통신_권영민.pdf

정보통신_권영민.pdf

기타 데이터 / 1.45 MB / Adobe PDF download
Appears in Collections:
Department of Electrical Engineering and Computer Science Theses Master

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE