[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Marty, 2014 - Google Patents

Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft

Marty, 2014

View PDF
Document ID
4423865521005745402
Author
Marty J
Publication year

External Links

Snippet

The MAVLink protocol is an open source, point-to-point networking protocol used to carry telemetry and to command and control many small unmanned aircraft. This research presents three exploits that compromise confidentiality, integrity, and availability …
Continue reading at scholar.afit.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Marty Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft
Koubâa et al. Micro air vehicle link (mavlink) in a nutshell: A survey
Chamola et al. A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques
Mekdad et al. A survey on security and privacy issues of UAVs
He et al. Communication security of unmanned aerial vehicles
Arteaga et al. Analysis of the GPS spoofing vulnerability in the drone 3DR solo
Khan et al. A secure communication protocol for unmanned aerial vehicles
Altawy et al. Security, privacy, and safety aspects of civilian drones: A survey
Ly et al. Cybersecurity in unmanned aerial vehicles (UAVs)
Vasconcelos et al. The impact of DoS attacks on the AR. Drone 2.0
Samland et al. AR. Drone: security threat analysis and exemplary attack to track persons
Vasconcelos et al. Evaluation of dos attacks on commercial wi-fi-based uavs
Bunse et al. Security analysis of drone communication protocols
Samanth et al. Security in internet of drones: A comprehensive review
Leccadito et al. A survey on securing UAS cyber physical systems
Shashok Analysis of vulnerabilities in modern unmanned aircraft systems
Chaari et al. Vulnerabilities assessment for unmanned aerial vehicles communication systems
Bergin Cyber-attack and defense simulation framework
Dahlman et al. A game of drones: Cyber security in UAVs
Putranto et al. Design and implementation of secure transmission on internet of drones
Salamh et al. Unmanned aerial vehicle kill chain: purple teaming tactics
Turtiainen et al. Gdl90fuzz: Fuzzing-gdl-90 data interface specification within aviation software and avionics devices–a cybersecurity pentesting perspective
Niyonsaba et al. A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions
Lundberg et al. On the security of mobile cockpit information systems
Walatkiewicz et al. A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence