Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles
Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground con...
Gespeichert in:
Veröffentlicht in: | IEEE access 2018-01, Vol.6, p.43203-43212 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 43212 |
---|---|
container_issue | |
container_start_page | 43203 |
container_title | IEEE access |
container_volume | 6 |
creator | Kwon, Young-Min Yu, Jaemin Cho, Byeong-Moon Eun, Yongsoon Park, Kyung-Joon |
description | Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission. |
doi_str_mv | 10.1109/ACCESS.2018.2863237 |
format | Article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2455922777</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8425627</ieee_id><doaj_id>oai_doaj_org_article_04fb575315cd46f9a5c0c194c0b2ca01</doaj_id><sourcerecordid>2455922777</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-f444bb2ee6ec74b4a14d6dccb3d32cb1582cb0e61a542657ad6a3f67380447f83</originalsourceid><addsrcrecordid>eNpNUU1vwjAMraZNGmL8Ai6Rdi7Ld9pjhdiGxLRJDC47RGmasEBpWFIO_PuVFaH5YFtPfs-WX5KMEZwgBPOnYjqdLZcTDFE2wRknmIibZIARz1PCCL_9198noxi3sIusg5gYJF-z_cEFp1UNikbVp-gi8Ba8FeuFa3bgI_jWa1-D9bFuTFClq117AtYHULSt0jvXbMCq2aumMRUoTHCd0Np8O12b-JDcWVVHM7rUYbJ6nn1OX9PF-8t8WixSTWHWppZSWpbYGG60oCVViFa80rokFcG6RCzrMjQcKUYxZ0JVXBHLBckgpcJmZJjMe93Kq608BLdX4SS9cvIP8GEjVWjPJ0lIbckEI4jpinKbK6ahRjnVsMRaQdRpPfZah-B_jia2cuuPoftMlJgylmMshOimSD-lg48xGHvdiqA8myJ7U-TZFHkxpWONe5YzxlwZGcWMY0F-ATpAiAg</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455922777</pqid></control><display><type>article</type><title>Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Kwon, Young-Min ; Yu, Jaemin ; Cho, Byeong-Moon ; Eun, Yongsoon ; Park, Kyung-Joon</creator><creatorcontrib>Kwon, Young-Min ; Yu, Jaemin ; Cho, Byeong-Moon ; Eun, Yongsoon ; Park, Kyung-Joon</creatorcontrib><description>Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2863237</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cryptography ; DoS ; Drone aircraft ; Drone vehicles ; Drones ; Eavesdropping ; Empirical analysis ; flooding attack ; Ground stations ; MAVLink ; network attack ; packet injection ; Payloads ; Protocol ; Protocols ; Sensors ; UAS ; UAV ; Unmanned aerial vehicles ; Vehicles</subject><ispartof>IEEE access, 2018-01, Vol.6, p.43203-43212</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-f444bb2ee6ec74b4a14d6dccb3d32cb1582cb0e61a542657ad6a3f67380447f83</citedby><cites>FETCH-LOGICAL-c408t-f444bb2ee6ec74b4a14d6dccb3d32cb1582cb0e61a542657ad6a3f67380447f83</cites><orcidid>0000-0002-1495-2163 ; 0000-0003-4807-6461</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8425627$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,27610,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Kwon, Young-Min</creatorcontrib><creatorcontrib>Yu, Jaemin</creatorcontrib><creatorcontrib>Cho, Byeong-Moon</creatorcontrib><creatorcontrib>Eun, Yongsoon</creatorcontrib><creatorcontrib>Park, Kyung-Joon</creatorcontrib><title>Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles</title><title>IEEE access</title><addtitle>Access</addtitle><description>Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission.</description><subject>Cryptography</subject><subject>DoS</subject><subject>Drone aircraft</subject><subject>Drone vehicles</subject><subject>Drones</subject><subject>Eavesdropping</subject><subject>Empirical analysis</subject><subject>flooding attack</subject><subject>Ground stations</subject><subject>MAVLink</subject><subject>network attack</subject><subject>packet injection</subject><subject>Payloads</subject><subject>Protocol</subject><subject>Protocols</subject><subject>Sensors</subject><subject>UAS</subject><subject>UAV</subject><subject>Unmanned aerial vehicles</subject><subject>Vehicles</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1vwjAMraZNGmL8Ai6Rdi7Ld9pjhdiGxLRJDC47RGmasEBpWFIO_PuVFaH5YFtPfs-WX5KMEZwgBPOnYjqdLZcTDFE2wRknmIibZIARz1PCCL_9198noxi3sIusg5gYJF-z_cEFp1UNikbVp-gi8Ba8FeuFa3bgI_jWa1-D9bFuTFClq117AtYHULSt0jvXbMCq2aumMRUoTHCd0Np8O12b-JDcWVVHM7rUYbJ6nn1OX9PF-8t8WixSTWHWppZSWpbYGG60oCVViFa80rokFcG6RCzrMjQcKUYxZ0JVXBHLBckgpcJmZJjMe93Kq608BLdX4SS9cvIP8GEjVWjPJ0lIbckEI4jpinKbK6ahRjnVsMRaQdRpPfZah-B_jia2cuuPoftMlJgylmMshOimSD-lg48xGHvdiqA8myJ7U-TZFHkxpWONe5YzxlwZGcWMY0F-ATpAiAg</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Kwon, Young-Min</creator><creator>Yu, Jaemin</creator><creator>Cho, Byeong-Moon</creator><creator>Eun, Yongsoon</creator><creator>Park, Kyung-Joon</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-1495-2163</orcidid><orcidid>https://orcid.org/0000-0003-4807-6461</orcidid></search><sort><creationdate>20180101</creationdate><title>Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles</title><author>Kwon, Young-Min ; Yu, Jaemin ; Cho, Byeong-Moon ; Eun, Yongsoon ; Park, Kyung-Joon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-f444bb2ee6ec74b4a14d6dccb3d32cb1582cb0e61a542657ad6a3f67380447f83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Cryptography</topic><topic>DoS</topic><topic>Drone aircraft</topic><topic>Drone vehicles</topic><topic>Drones</topic><topic>Eavesdropping</topic><topic>Empirical analysis</topic><topic>flooding attack</topic><topic>Ground stations</topic><topic>MAVLink</topic><topic>network attack</topic><topic>packet injection</topic><topic>Payloads</topic><topic>Protocol</topic><topic>Protocols</topic><topic>Sensors</topic><topic>UAS</topic><topic>UAV</topic><topic>Unmanned aerial vehicles</topic><topic>Vehicles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kwon, Young-Min</creatorcontrib><creatorcontrib>Yu, Jaemin</creatorcontrib><creatorcontrib>Cho, Byeong-Moon</creatorcontrib><creatorcontrib>Eun, Yongsoon</creatorcontrib><creatorcontrib>Park, Kyung-Joon</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kwon, Young-Min</au><au>Yu, Jaemin</au><au>Cho, Byeong-Moon</au><au>Eun, Yongsoon</au><au>Park, Kyung-Joon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><spage>43203</spage><epage>43212</epage><pages>43203-43212</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications. In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes. UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area. It is thus of critical importance to investigate the vulnerability of the drone system. In this paper, we focus on UAVs controlled by GCS over networks. We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs. Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV. Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2863237</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-1495-2163</orcidid><orcidid>https://orcid.org/0000-0003-4807-6461</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2018-01, Vol.6, p.43203-43212 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_2455922777 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Cryptography DoS Drone aircraft Drone vehicles Drones Eavesdropping Empirical analysis flooding attack Ground stations MAVLink network attack packet injection Payloads Protocol Protocols Sensors UAS UAV Unmanned aerial vehicles Vehicles |
title | Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T18%3A17%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Empirical%20Analysis%20of%20MAVLink%20Protocol%20Vulnerability%20for%20Attacking%20Unmanned%20Aerial%20Vehicles&rft.jtitle=IEEE%20access&rft.au=Kwon,%20Young-Min&rft.date=2018-01-01&rft.volume=6&rft.spage=43203&rft.epage=43212&rft.pages=43203-43212&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2863237&rft_dat=%3Cproquest_doaj_%3E2455922777%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455922777&rft_id=info:pmid/&rft_ieee_id=8425627&rft_doaj_id=oai_doaj_org_article_04fb575315cd46f9a5c0c194c0b2ca01&rfr_iscdi=true |