Detail View

Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

Title
Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles
Alternative Title
MAVLink 프로토콜의 취약점 분석 및 무인기 무력화
Advisor
Park, Kyung Joon
Co-Advisor(s)
Cho, Min Gyu
Issued Date
2018
Awarded Date
2018. 2
Citation
Kwon, Young-Min. (2018). Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles. doi: 10.22677/thesis.200000005425
Type
Thesis
Subject
UAVUASDronesMAVLinkNetwork attackDoSPacket injection
Abstract
Recently, interest in the Unmanned Aerial Vehicle (UAV) has increased, and unmanned aircraft are utilized in various fields. Especially UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. However, since UAVs are increasingly used not only for positive purposes but also for negative ones, it is necessary to detect and neutralize malicious drones.

In this paper, we proposed a method of controlling UAVs and analyzed its operation structure, the MAVLink protocol which is a communication protocol of UAVs. We also experimented with ICMP flooding and packet injection attacks which disables UAVs by exploiting the vulnerability of the MAVLink protocol. Especially, we exploited the vulnerability of the MAVLink waypoint protocol to perform an experiment to disable a UAV executing a mission. As a result of the experiment, we confirmed that the attacked UAV was stopped and the mission disabled. ⓒ 2017 DGIST
Table Of Contents
I. INTRODUCTION 1--

Ⅱ. BACKGROUND 3--

2.1 Drone control structure 3--

2.2 MAVLink protocol 4--

2.3 Network Attack 6--

2.3.1 Man-In-The-Middle 6--

2.3.2 Eavesdropping 7--

2.3.3 Denial-of-Service 7--

2.3.4 Potential threats on UAV systems 7--

Ⅲ. RELATED WORK 9--

Ⅳ. PROPOSED METHOD 10--

4.1 Cain & Abel 11--

4.2 Jpcap 12--

4.3 Packet Sender 12--

Ⅴ. EXPERIMENTS 13--

5.1 Testbed configuration 13--

5.2 ICMP flooding attack 14--

5.3 Packet injection attack 17--

5.4 Software In The Loop (SITL) Simulator 19--

Ⅵ. CONCLUSIONS 21--

REFERENCES 22--

SUMMARY (Korean) 26
URI
http://dgist.dcollection.net/common/orgView/200000005425
http://hdl.handle.net/20.500.11750/6036
DOI
10.22677/thesis.200000005425
Degree
Master
Department
Information and Communication Engineering
Publisher
DGIST
Show Full Item Record

공유

qrcode
공유하기

Total Views & Downloads