Abstract

The federal aviation administration has estimated that by the year 2020, the United States will have over 30,000 drones. Nowadays, drones, also known as unmanned aerial vehicles (UAVs), are ubiquitous and have numerous uses beyond military applications. This is because UAVs can be used in hazardous missions, since they exclude the risk factors involved in manned vehicles. Despite their benefits, UAVs are prone to attacks as they are equipped with numerous on-board sensors to gather data and this exposes them to various vulnerabilities. More precisely, in the absence of manual control, an attacker can gain access to sensitive sensory data and feed fraudulent information to the UAV. As a result, it can be reprogrammed to an undesirable effect and this can cause irreversible damage. This paper provides a general overview of current hacking methods, and defense and trust strategies to overcome cyber attacks on UAVs. To further highlight the importance of the requirement of developing new methods to avoid any intrusion, a hacking procedure is implemented on a commercially available UAV and its severe results are demonstrated. It is shown that the hacker can make irreparable damage and take complete control over the UAV by compromising the communication link between the operator and UAV and uses Robot Operating System-based tools to alter the flight path.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.