2009
DOI: 10.3846/1648-7788.2009.13.116-121
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Uav Radio Communication System

Abstract: This paper presents analyzed questions of the safety of the information transferred by the radio connection link of the Polish UAV project “Aircraft for monitoring” SAMONIT. This safety is especially important for the design and use of unmanned aerial vehicles (UAV). This paper also presents the structure of the SAMONIT communication system, security threats to the radio connection system, and possible measures to ensure secure information. Santrauka Straipsnyje nagrinejami Lenkijos bepiločiu orlaiviu proj… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
3

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 1 publication
0
11
0
3
Order By: Relevance
“…• Susceptible to Spoofing: several weak points are present which are related to architecture and control of UAVs and drones which may result in spoofing of information shared by the drone. Spoofing can be of several types [50,51,52,53] . GPS spoofing is the easiest way to capture information and do modifications to it.…”
Section: Drones Current Intimidations and Susceptibilitiesmentioning
confidence: 99%
“…• Susceptible to Spoofing: several weak points are present which are related to architecture and control of UAVs and drones which may result in spoofing of information shared by the drone. Spoofing can be of several types [50,51,52,53] . GPS spoofing is the easiest way to capture information and do modifications to it.…”
Section: Drones Current Intimidations and Susceptibilitiesmentioning
confidence: 99%
“…Уязвимость к спуфингу: анализ конфигурации БПЛА мультироторного типа и контроллеров полета выявил много недостатков. Они связаны с телеметрическими каналами потоковой передачи данных через последовательные порты, особенно из-за отсутствия шифрования [20,21]. Проведенные нами эксперименты показали, что с помощью подмены GPS информация может быть легко захвачена, изменена или подменена.…”
Section: бпла -спутник (D2sunclassified
“…The approach aims at transmission optimization among source, destination, and relays. Security analysis of UAV communications, the safety of the information transferred via radio connection links of "Aircraft for monitoring" SAMONIT is presented in [24]. The analysis concludes that security equipment for transferring data is inadequate and external adversary can always interfere with the communication.…”
Section: Literature Reviewmentioning
confidence: 99%