2018
DOI: 10.1109/access.2018.2863237
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 88 publications
(38 citation statements)
references
References 11 publications
0
38
0
Order By: Relevance
“…Other practical challenges to deployment of aerial cellular 5G networks include the restrictive capacity of current battery technologies which limit flight times [20] and the potential for security attacks against the UAVs [21], [22]. While the new work in this manuscript does not specifically address these issues directly, the problems of limited battery capacity of the drone was noted during testing (three heavy-duty battery power packs were consumed during the testing) and the matter of drone security must be noted as a genuine threat against service delivery.…”
Section: Introductionmentioning
confidence: 99%
“…Other practical challenges to deployment of aerial cellular 5G networks include the restrictive capacity of current battery technologies which limit flight times [20] and the potential for security attacks against the UAVs [21], [22]. While the new work in this manuscript does not specifically address these issues directly, the problems of limited battery capacity of the drone was noted during testing (three heavy-duty battery power packs were consumed during the testing) and the matter of drone security must be noted as a genuine threat against service delivery.…”
Section: Introductionmentioning
confidence: 99%
“…For the secure communication using WiFi, it can be protected via unique passwords. The analysis of the vulnerabilities of micro-air-vehicle communication (MAVLink) protocol was included in [93]. In the MAVLink protocol, two specific issues can arise.…”
Section: Wifi Insecurity and Jamming Attackmentioning
confidence: 99%
“…(1) An adversary can manipulate the configuration parameters of an RV by either overriding them before a flight or changing them after the drone takes off (similar to [41]). (2) An adversary can replay or spoof user commands sent to the RV by exploiting known vulnerabilities in the RV's communication protocol [43], [58]. (3) An adversary can manipulate the environmental conditions (or wait until suitable conditions are met) before conducting their attack (similar to [23], [41]).…”
Section: Motivating Examplementioning
confidence: 99%