Marty, 2014 - Google Patents
Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraftMarty, 2014
View PDF- Document ID
- 4423865521005745402
- Author
- Marty J
- Publication year
External Links
Snippet
The MAVLink protocol is an open source, point-to-point networking protocol used to carry telemetry and to command and control many small unmanned aircraft. This research presents three exploits that compromise confidentiality, integrity, and availability …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Marty | Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft | |
Koubâa et al. | Micro air vehicle link (mavlink) in a nutshell: A survey | |
Chamola et al. | A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques | |
Mekdad et al. | A survey on security and privacy issues of UAVs | |
He et al. | Communication security of unmanned aerial vehicles | |
Arteaga et al. | Analysis of the GPS spoofing vulnerability in the drone 3DR solo | |
Khan et al. | A secure communication protocol for unmanned aerial vehicles | |
Altawy et al. | Security, privacy, and safety aspects of civilian drones: A survey | |
Ly et al. | Cybersecurity in unmanned aerial vehicles (UAVs) | |
Vasconcelos et al. | The impact of DoS attacks on the AR. Drone 2.0 | |
Samland et al. | AR. Drone: security threat analysis and exemplary attack to track persons | |
Vasconcelos et al. | Evaluation of dos attacks on commercial wi-fi-based uavs | |
Bunse et al. | Security analysis of drone communication protocols | |
Samanth et al. | Security in internet of drones: A comprehensive review | |
Leccadito et al. | A survey on securing UAS cyber physical systems | |
Shashok | Analysis of vulnerabilities in modern unmanned aircraft systems | |
Chaari et al. | Vulnerabilities assessment for unmanned aerial vehicles communication systems | |
Bergin | Cyber-attack and defense simulation framework | |
Dahlman et al. | A game of drones: Cyber security in UAVs | |
Putranto et al. | Design and implementation of secure transmission on internet of drones | |
Salamh et al. | Unmanned aerial vehicle kill chain: purple teaming tactics | |
Turtiainen et al. | Gdl90fuzz: Fuzzing-gdl-90 data interface specification within aviation software and avionics devices–a cybersecurity pentesting perspective | |
Niyonsaba et al. | A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions | |
Lundberg et al. | On the security of mobile cockpit information systems | |
Walatkiewicz et al. | A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence |