Skip to content

Latest commit

 

History

History
136 lines (98 loc) · 4.57 KB

about-drone-research.md

File metadata and controls

136 lines (98 loc) · 4.57 KB

Background and Objectives of Research

Table of Contents


1. Research Background

A Study on the Methodology of Finding Vulnerabilities to Reduce the Damage of Drone Security Accidents

1.1. Drone Components

1.1.1. Hardware

Basic Configuration

- Drone Board: Fixhawk is widely used for large/special purpose drones, so Fixhawk 4 boards are used for research.
- Electronic speed control: Electronic speed control is used to control motor speed.
- Motor/Propeller: Motor has a fixed rotation direction and is divided according to the presence or absence of a brush.
- Battery: The output of the motor is determined by the number of cells.
- Charger: The motor does not work without a battery.

Additional Configuration for Flight

- GPS & Compass: Provide location information.
- Transmitter, Receiver: Generally, 2.4GHz band are used.
- Telemetry: The location and state of the drone are provided to a PC on the ground, using a 915 MHz or 433 MHz wireless channel.
- Frame: Fixing the boards and sensors.

1.1.2. Software

- Operating System(OS)
  - Managing the drone's system hardware and applications.
- Ground Control Station(GCS)
  - Controlling drones on the ground.
  - e.g.) QGroundControl, Misson Planner, etc.
- Micro Air Vehicke Link(MAVLink)
  -  Protocol for Communicating with small unmanned vehicle.

1.2. Possible damage

  • Deodorization
  • Eavesdropping and Filming
  • Construction: Casualty
  • Agriculture: Crop or Economic Damage
  • Military: Crime, Terrorism, etc.

2. Scope of Research

It targets both open and closed sources used in drones.

Hardware has selected devices that are compatible with the software.

2.1. Hardware

  • Sensors for Instrumentation
  • RC Communications

2.2. Software

  • Flight controller software(PX4, Ardupilot)
  • OS(Nuttx)
  • GCS(QGroundControl, Mission Planner)

3. Research Objectives

We aimed to explore new vulnerabilities and verify existing threat scenarios to improve the security of drone platforms.

Existing threat scenarios have verified vulnerabilities by attempting attacks on hardware such as major sensors and modules.

  • The method was classified as Non-Compromised because it could attack from outside without specific conditions.

The new vulnerability search verifies the vulnerability by attempting an attack with the drone/GCS in control.

  • When attacking drones, it is assumed that the GCS is in control.
  • When attacking the GCS, it is assumed that the drone is in control.

3.1. Non-Compromised

When an attack is possible from outside without any set conditions.

img_01

3.2. Compromised

When the drone's network is accessible.

img_02

2.3. Expected performance

  • Making a hacking scenario.
  • Report on vulnerabilities, issue CVE.
  • Extracting Guideline.
  • contribution to a paper.

Table of Contents

Introduction

  1. Research background and goal
  2. Previous studies

Methodology

  1. UAV software
    1. Flight controller software
    2. MAVROS
  2. Ground Control System software
    1. Introduction
    2. Analyze Environment
    3. Vulneralility Analysis Methodology
  3. Hardware
    1. GPS Module
    2. PX4 Optical Flow
    3. PX4 Telemetry Radio
    4. Wifi Module

Result

  1. Project results