Security Analysis of FHSS-type Drone Controller
نویسندگان
چکیده
Unmanned Aerial Vehicles (UAVs), or drones, have attracted a considerable amount of attentions due to their utility to civilian as well as military applications. However, the security issues involved in UAV technology have not been extensively discussed in the literature. As a first step toward analyzing these security issues, we investigate security in drone controllers, especially controllers that adopt Frequency Hopping Spread Spectrum (FHSS). In order to affect an FHSS-type controller, an attacker first has to access its physical layer. This is difficult because of the pseudorandomness of the hopping sequence and the rapidly changing channels. However, these difficulties can be relaxed when the attacker acquires the hopping sequence and when the hopping speed of the target system is not significant. In this paper, we propose a general scheme to extract the hopping sequence of FHSS-type controllers using a softwaredefined radio (SDR). We also propose a method to address the issue of the limited bandwidth of the SDR. We implemented our scheme on a Universal Software Radio Peripheral (USRP), successfully extracted the hopping sequence of the target system, and exposed the baseband signal.
منابع مشابه
End-to-end Analysis and Design of a Drone Flight Controller
Timing guarantees are crucial to cyber-physical applications that must bound the end-to-end delay between sensing, processing and actuation. For example, in a flight controller for a multirotor drone, the data from a gyro or inertial sensor must be gathered and processed to determine the attitude of the aircraft. Sensor data fusion is followed by control decisions that adjust the flight of a dr...
متن کاملAn effective defensive node against jamming attacks in sensor networks
Jamming is defined as the act of intentionally directing electromagnetic energy towards a communication system to disrupt or prevent signal transmission. In the context of wireless sensor networks (WSNs), jamming is the type of attack which interferes with the radio frequencies used by sensor nodes and may be viewed as a special case of denial of service (DoS) attacks. Herein, we outline the po...
متن کاملAnalysis of FHSS-CDMA with QAM-64 over AWGN and Fading Channels
Assistant Professor, Dept. of ECE, JNNCE, Shivamogga, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract – CDMA is a type of channel access method in which users using the same channel will use the same frequency band and also can access the channel at the same time. Using CDMA, mo...
متن کاملSecurity Improvement by using Dual Coded FHSS (DC-FHSS)
In this paper a technique is offered for improving the security of data transmission. In today’s technical world the prime objective of wireless communication is to make the transmission not only clear, noise free and time efficient but also to make it well secure from unauthorized interceptors. Frequency hopping is a technique used for this purpose in which the random sequence is used to add w...
متن کاملDynamic Target Tracking and Obstacle Avoidance using a Drone
This paper focuses on tracking dynamic targets using a low cost, commercially available drone. The approach presented utilizes a computationally simple potential field controller expanded to operate not only on relative positions, but also relative velocities. A brief background on potential field methods is given, and the design and implementation of the proposed controller is presented. Exper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015