Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles

Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground con...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2018-01, Vol.6, p.43203-43212
Hauptverfasser: Kwon, Young-Min, Yu, Jaemin, Cho, Byeong-Moon, Eun, Yongsoon, Park, Kyung-Joon
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 43212
container_issue
container_start_page 43203
container_title IEEE access
container_volume 6
creator Kwon, Young-Min
Yu, Jaemin
Cho, Byeong-Moon
Eun, Yongsoon
Park, Kyung-Joon
description Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission.
doi_str_mv 10.1109/ACCESS.2018.2863237
format Article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2455922777</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8425627</ieee_id><doaj_id>oai_doaj_org_article_04fb575315cd46f9a5c0c194c0b2ca01</doaj_id><sourcerecordid>2455922777</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-f444bb2ee6ec74b4a14d6dccb3d32cb1582cb0e61a542657ad6a3f67380447f83</originalsourceid><addsrcrecordid>eNpNUU1vwjAMraZNGmL8Ai6Rdi7Ld9pjhdiGxLRJDC47RGmasEBpWFIO_PuVFaH5YFtPfs-WX5KMEZwgBPOnYjqdLZcTDFE2wRknmIibZIARz1PCCL_9198noxi3sIusg5gYJF-z_cEFp1UNikbVp-gi8Ba8FeuFa3bgI_jWa1-D9bFuTFClq117AtYHULSt0jvXbMCq2aumMRUoTHCd0Np8O12b-JDcWVVHM7rUYbJ6nn1OX9PF-8t8WixSTWHWppZSWpbYGG60oCVViFa80rokFcG6RCzrMjQcKUYxZ0JVXBHLBckgpcJmZJjMe93Kq608BLdX4SS9cvIP8GEjVWjPJ0lIbckEI4jpinKbK6ahRjnVsMRaQdRpPfZah-B_jia2cuuPoftMlJgylmMshOimSD-lg48xGHvdiqA8myJ7U-TZFHkxpWONe5YzxlwZGcWMY0F-ATpAiAg</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455922777</pqid></control><display><type>article</type><title>Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Kwon, Young-Min ; Yu, Jaemin ; Cho, Byeong-Moon ; Eun, Yongsoon ; Park, Kyung-Joon</creator><creatorcontrib>Kwon, Young-Min ; Yu, Jaemin ; Cho, Byeong-Moon ; Eun, Yongsoon ; Park, Kyung-Joon</creatorcontrib><description>Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2863237</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cryptography ; DoS ; Drone aircraft ; Drone vehicles ; Drones ; Eavesdropping ; Empirical analysis ; flooding attack ; Ground stations ; MAVLink ; network attack ; packet injection ; Payloads ; Protocol ; Protocols ; Sensors ; UAS ; UAV ; Unmanned aerial vehicles ; Vehicles</subject><ispartof>IEEE access, 2018-01, Vol.6, p.43203-43212</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-f444bb2ee6ec74b4a14d6dccb3d32cb1582cb0e61a542657ad6a3f67380447f83</citedby><cites>FETCH-LOGICAL-c408t-f444bb2ee6ec74b4a14d6dccb3d32cb1582cb0e61a542657ad6a3f67380447f83</cites><orcidid>0000-0002-1495-2163 ; 0000-0003-4807-6461</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8425627$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,27610,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Kwon, Young-Min</creatorcontrib><creatorcontrib>Yu, Jaemin</creatorcontrib><creatorcontrib>Cho, Byeong-Moon</creatorcontrib><creatorcontrib>Eun, Yongsoon</creatorcontrib><creatorcontrib>Park, Kyung-Joon</creatorcontrib><title>Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles</title><title>IEEE access</title><addtitle>Access</addtitle><description>Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission.</description><subject>Cryptography</subject><subject>DoS</subject><subject>Drone aircraft</subject><subject>Drone vehicles</subject><subject>Drones</subject><subject>Eavesdropping</subject><subject>Empirical analysis</subject><subject>flooding attack</subject><subject>Ground stations</subject><subject>MAVLink</subject><subject>network attack</subject><subject>packet injection</subject><subject>Payloads</subject><subject>Protocol</subject><subject>Protocols</subject><subject>Sensors</subject><subject>UAS</subject><subject>UAV</subject><subject>Unmanned aerial vehicles</subject><subject>Vehicles</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1vwjAMraZNGmL8Ai6Rdi7Ld9pjhdiGxLRJDC47RGmasEBpWFIO_PuVFaH5YFtPfs-WX5KMEZwgBPOnYjqdLZcTDFE2wRknmIibZIARz1PCCL_9198noxi3sIusg5gYJF-z_cEFp1UNikbVp-gi8Ba8FeuFa3bgI_jWa1-D9bFuTFClq117AtYHULSt0jvXbMCq2aumMRUoTHCd0Np8O12b-JDcWVVHM7rUYbJ6nn1OX9PF-8t8WixSTWHWppZSWpbYGG60oCVViFa80rokFcG6RCzrMjQcKUYxZ0JVXBHLBckgpcJmZJjMe93Kq608BLdX4SS9cvIP8GEjVWjPJ0lIbckEI4jpinKbK6ahRjnVsMRaQdRpPfZah-B_jia2cuuPoftMlJgylmMshOimSD-lg48xGHvdiqA8myJ7U-TZFHkxpWONe5YzxlwZGcWMY0F-ATpAiAg</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Kwon, Young-Min</creator><creator>Yu, Jaemin</creator><creator>Cho, Byeong-Moon</creator><creator>Eun, Yongsoon</creator><creator>Park, Kyung-Joon</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-1495-2163</orcidid><orcidid>https://orcid.org/0000-0003-4807-6461</orcidid></search><sort><creationdate>20180101</creationdate><title>Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles</title><author>Kwon, Young-Min ; Yu, Jaemin ; Cho, Byeong-Moon ; Eun, Yongsoon ; Park, Kyung-Joon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-f444bb2ee6ec74b4a14d6dccb3d32cb1582cb0e61a542657ad6a3f67380447f83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Cryptography</topic><topic>DoS</topic><topic>Drone aircraft</topic><topic>Drone vehicles</topic><topic>Drones</topic><topic>Eavesdropping</topic><topic>Empirical analysis</topic><topic>flooding attack</topic><topic>Ground stations</topic><topic>MAVLink</topic><topic>network attack</topic><topic>packet injection</topic><topic>Payloads</topic><topic>Protocol</topic><topic>Protocols</topic><topic>Sensors</topic><topic>UAS</topic><topic>UAV</topic><topic>Unmanned aerial vehicles</topic><topic>Vehicles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kwon, Young-Min</creatorcontrib><creatorcontrib>Yu, Jaemin</creatorcontrib><creatorcontrib>Cho, Byeong-Moon</creatorcontrib><creatorcontrib>Eun, Yongsoon</creatorcontrib><creatorcontrib>Park, Kyung-Joon</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kwon, Young-Min</au><au>Yu, Jaemin</au><au>Cho, Byeong-Moon</au><au>Eun, Yongsoon</au><au>Park, Kyung-Joon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><spage>43203</spage><epage>43212</epage><pages>43203-43212</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2863237</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-1495-2163</orcidid><orcidid>https://orcid.org/0000-0003-4807-6461</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2018-01, Vol.6, p.43203-43212
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2455922777
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Cryptography
DoS
Drone aircraft
Drone vehicles
Drones
Eavesdropping
Empirical analysis
flooding attack
Ground stations
MAVLink
network attack
packet injection
Payloads
Protocol
Protocols
Sensors
UAS
UAV
Unmanned aerial vehicles
Vehicles
title Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T18%3A17%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Empirical%20Analysis%20of%20MAVLink%20Protocol%20Vulnerability%20for%20Attacking%20Unmanned%20Aerial%20Vehicles&rft.jtitle=IEEE%20access&rft.au=Kwon,%20Young-Min&rft.date=2018-01-01&rft.volume=6&rft.spage=43203&rft.epage=43212&rft.pages=43203-43212&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2863237&rft_dat=%3Cproquest_doaj_%3E2455922777%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455922777&rft_id=info:pmid/&rft_ieee_id=8425627&rft_doaj_id=oai_doaj_org_article_04fb575315cd46f9a5c0c194c0b2ca01&rfr_iscdi=true