2022
DOI: 10.17762/ijcnis.v11i1.3969
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs

Abstract: One of the biggest challenges for the use of Unmanned Aerial Vehicles (UAVs) in large-scale real-world applications is security.  However, most of research projects related to robotics does not discuss security issues, moving on directly to studying classical problems (i.e., perception, control, planning). This paper evaluates the effects of availability issues (Denial of Service attacks) in two commonly used commercially available UAVs (AR.Drone 2.0 and 3DR SOLO). Denial of Service (DoS) attacks are made whil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…d) DoS attack: Denial of Service (DoS) attacks may allow malicious users to incapacitate a UAV system. In this scenario, the attacker can flood the target UAV's network with numerous requests, overloading its resources and disrupting its availability [105]. The impact of such attacks on UAVs may vary from significant network delays and reduced video streaming quality for the user to total service loss.…”
Section: B Cyber Attacksmentioning
confidence: 99%
“…d) DoS attack: Denial of Service (DoS) attacks may allow malicious users to incapacitate a UAV system. In this scenario, the attacker can flood the target UAV's network with numerous requests, overloading its resources and disrupting its availability [105]. The impact of such attacks on UAVs may vary from significant network delays and reduced video streaming quality for the user to total service loss.…”
Section: B Cyber Attacksmentioning
confidence: 99%
“…DOS attacks have been found to influence the performance of the UAV negatively. Including a decrease in sensor functionality, drops in telemetry feedback, and reduced response to remote control commands (Vasconcelos et al, 2019). If the data link is unencrypted, a malicious actor could take control and perform different control commands (Hooper et al, 2016).…”
Section: Design Environmental and Legislative Constraintsmentioning
confidence: 99%
“…In Denial of Service (DoS) [89] attack, the intruder tries in different ways to consume the network resources to block out legitimate users in the network. For instance, flooding the traffic to consume bandwidth or CPU time is an example.…”
Section: Benchmark Datasetmentioning
confidence: 99%