Communities & Collections
Researchers & Labs
Titles
DGIST
LIBRARY
DGIST R&D
Detail View
Department of Electrical Engineering and Computer Science
Dynamic Systems and Control Laboratory
1. Journal Articles
Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles
Kwon, Young-Min
;
Yu, Jaemin
;
Cho, Byeong-Moon
;
Eun, Yongsoon
;
Park, Kyung-Joon
Department of Electrical Engineering and Computer Science
Dynamic Systems and Control Laboratory
1. Journal Articles
Department of Electrical Engineering and Computer Science
CSI(Cyber-Physical Systems Integration) Lab
1. Journal Articles
Citations
WEB OF SCIENCE
Citations
SCOPUS
Metadata Downloads
XML
Excel
Title
Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles
DGIST Authors
Kwon, Young-Min
;
Yu, Jaemin
;
Cho, Byeong-Moon
;
Eun, Yongsoon
;
Park, Kyung-Joon
Issued Date
2018-08
Citation
Kwon, Young-Min. (2018-08). Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles. doi: 10.1109/ACCESS.2018.2863237
Type
Article
Article Type
Article
Author Keywords
UAV
;
UAS
;
drones
;
MAVLink
;
network attack
;
DoS
;
flooding attack
;
packet injection
Keywords
SECURITY
;
INTERNET
ISSN
2169-3536
Abstract
Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission. © 2018 IEEE.
URI
http://hdl.handle.net/20.500.11750/9227
DOI
10.1109/ACCESS.2018.2863237
Publisher
Institute of Electrical and Electronics Engineers Inc.
Show Full Item Record
File Downloads
2-s2.0-85051018551.pdf
공유
공유하기
Related Researcher
Eun, Yongsoon
은용순
Department of Electrical Engineering and Computer Science
read more
Total Views & Downloads