Abstract

Usage of Unmanned Aerial Vehicles (UAVs) in civil application domains such as real-time monitoring, wireless internet, remote sensing, delivery of foods, security, and surveillance, and industrial infrastructure inspection has grown rapidly in recent times. The proliferation of UAVs in commercial and civilian use has increased the importance of security in these applications. In this paper, we are exploring the security threats associated with a civilian UAV use case. We are addressing the use case of UAVs providing internet to users and exploring the attack surface of UAV internet scenarios specifically focused on user-level security. We list specific threats associated with UAV internet scenarios and compiles various attack vectors to present a comprehensive attack surface analysis. This research work has identified 4 attack cases for the initial study. 1) Malicious UAV trying to exploit a user through the service. 2) Adversary targeting the legitimate UAV and users connected to the service. 3) User is targeted through malicious entity or a program in the user's device, and 4) External entity or a hacker attacking the user through a UAV communication channel. We are exploring the attack surfaces of the UAV internet use case extending the 4 cases mentioned above.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call