Proceedings 2020 Workshop on Decentralized IoT Systems and Security 2020
DOI: 10.14722/diss.2020.23010
|View full text |Cite
|
Sign up to set email alerts
|

Defending Against Consumer Drone Privacy Attacks: A Blueprint for a Counter Autonomous Drone Tool

Abstract: Drone technology has become ubiquitous, touching almost every aspect of our society. Thus, it is no wonder that malicious actors have now expanded their selfish and criminal pursuits by using drone technology. Currently, these actors commit terrorist acts internationally and domestically, they commit corporate espionage or transport drugs or contraband, and they even violate the privacy of their own neighbors. These are just a few of the many misguided uses of rogue drones. Many researchers in government, corp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
1
0
Order By: Relevance
“…Researchers Watkins et al proposed a blueprint [14] which offers a design for a novel autonomous counter drone tool based on the weaponization of "hard-to-patch" vulnerabilities. The paper highlights the problem of privacy violation due to drones and presents a counter-drone tool which breaks the drone's autonomy code.…”
Section: Contributions and Related Work 21 Counter-drone Systemsmentioning
confidence: 99%
“…Researchers Watkins et al proposed a blueprint [14] which offers a design for a novel autonomous counter drone tool based on the weaponization of "hard-to-patch" vulnerabilities. The paper highlights the problem of privacy violation due to drones and presents a counter-drone tool which breaks the drone's autonomy code.…”
Section: Contributions and Related Work 21 Counter-drone Systemsmentioning
confidence: 99%
“…It has been demonstrated that the platform is capable of detecting drones, determining their coordinates, and neutralizing them using a "hunter" drone in order to accomplish the intended tasks. Also, Watkins et al (2020) illustrated how to design a powerful counter autonomous drone tool that can be used against a single drone or a group of drones by using hard-to-patches vulnerabilities. Authors claim that this counter autonomous drone tool fills a critical need for mitigation of risks due to privacy violations such as recording video by drones.…”
Section: Ii22 Counter a Drone In A 2d Spacementioning
confidence: 99%