Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Kwon, Young-Min -
dc.contributor.author Yu, Jaemin -
dc.contributor.author Cho, Byeong-Moon -
dc.contributor.author Eun, Yongsoon -
dc.contributor.author Park, Kyung-Joon -
dc.date.accessioned 2018-08-29T05:51:48Z -
dc.date.available 2018-08-29T05:51:48Z -
dc.date.created 2018-08-22 -
dc.date.issued 2018-08 -
dc.identifier.citation IEEE Access, v.6, pp.43203 - 43212 -
dc.identifier.issn 2169-3536 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/9227 -
dc.description.abstract Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission. © 2018 IEEE. -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers Inc. -
dc.title Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles -
dc.type Article -
dc.identifier.doi 10.1109/ACCESS.2018.2863237 -
dc.identifier.wosid 000443935400001 -
dc.identifier.scopusid 2-s2.0-85051018551 -
dc.type.local Article(Overseas) -
dc.type.rims ART -
dc.description.journalClass 1 -
dc.citation.publicationname IEEE Access -
dc.contributor.nonIdAuthor Kwon, Young-Min -
dc.contributor.nonIdAuthor Yu, Jaemin -
dc.contributor.nonIdAuthor Cho, Byeong-Moon -
dc.identifier.citationVolume 6 -
dc.identifier.citationStartPage 43203 -
dc.identifier.citationEndPage 43212 -
dc.identifier.citationTitle IEEE Access -
dc.type.journalArticle Article -
dc.description.isOpenAccess Y -
dc.subject.keywordAuthor UAV -
dc.subject.keywordAuthor UAS -
dc.subject.keywordAuthor drones -
dc.subject.keywordAuthor MAVLink -
dc.subject.keywordAuthor network attack -
dc.subject.keywordAuthor DoS -
dc.subject.keywordAuthor flooding attack -
dc.subject.keywordAuthor packet injection -
dc.subject.keywordPlus SECURITY -
dc.subject.keywordPlus INTERNET -
dc.contributor.affiliatedAuthor Kwon, Young-Min -
dc.contributor.affiliatedAuthor Yu, Jaemin -
dc.contributor.affiliatedAuthor Cho, Byeong-Moon -
dc.contributor.affiliatedAuthor Eun, Yongsoon -
dc.contributor.affiliatedAuthor Park, Kyung-Joon -

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE