ABSTRACT
With the popularity of commodity drones in a wide variety of applications, significant security issues have been raised. One of the major problems is that a legal drone may be illegally hijacked by GPS spoofing attacks. Though some GPS anti-spoofing techniques have been proposed, no effective technique has been implemented in commodity drones yet due to practical limitations. Motivated by the ubiquitous WiFi signals around us, we propose WiDrone, a WiFi fingerprint location cross-check based anti-hijacking system on commodity drones in this poster. WiDrone still relies on GPS for navigation but it will authenticate the destination by comparing current WiFi fingerprint (CWF) with the destination WiFi fingerprint (DWF) when the drone receives a landing order. Furthermore, we propose a WiFi fingerprint authentication algorithm to decide whether CWF matches DWF. We have designed and implemented the prototype of WiDrone on DJI Matrice 100 to ascertain the practicability of proposed system.
- Researchers successfully spoof an 80-million yacht at sea, 2013. https://news.utexas.edu/2013/07/29/ut-austin-researchers-successfully-spoof-an-80-million-yacht-at-sea.Google Scholar
- Amazon prime air, 2016. https://www.amazon.com/b?node=8037720011.Google Scholar
- Jd.com drone delivery program, 2016. http://fortune.com/2016/11/14/jd-china-drone-delivery-singles-day/.Google Scholar
- Huang, L., and Yang, Q. Low cost gps simulator: Gps spoofing by sdr. DEFCON (2015).Google Scholar
- Schmidt, D., Radke, K., Camtepe, S., Foo, E., and Ren, M. A survey and analysis of the gnss spoofing threat and countermeasures. ACM Computing Surveys (CSUR) 48, 4 (2016), 64. Google ScholarDigital Library
- Tippenhauer, N. O., Pöpper, C., Rasmussen, K. B., and Capkun, S. On the requirements for successful gps spoofing attacks. In Proc. of CCS (2011), ACM, pp. 75--86. Google ScholarDigital Library
- Tippenhauer, N. O., Rasmussen, K. B., Pöpper, C., and Capkun, S. Attacks on public wlan-based positioning systems. In Proc. of MobiSys (2009), ACM, pp. 29--40. Google ScholarDigital Library
- Wang, K., Chen, S., and Pan, A. Time and position spoofing with open source projects. Black Hat Europe 148 (2015).Google Scholar
- Xiao, F., Zhou, M., Liye, Y., Yang, J., and Wang, Q. Poster: Enabling secure location authentication in drone. https://youtu.be/T1mA9tRDVz0.Google Scholar
- Yang, Z., Wu, C., and Liu, Y. Locating in fingerprint space: wireless indoor localization with little human intervention. In Proc. of MobiCom (2012), ACM, pp. 269--280. Google ScholarDigital Library
Index Terms
- Poster: Enabling Secure Location Authentication in Drone
Recommendations
Poster: A Multi-Drone Platform for Empowering Drones' Teamwork
MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and NetworkingThe rapid development of UAV technology has opened up numerous applications. Further, cooperating drones\footnote{In this paper, we refer to all types of UAVs as drones.} possess a great potential in various areas of applications. Yet, there has not ...
Collaborative Bluetooth-based location authentication on smart phones
Third-party location-based services are independent of wireless carriers and receive the user location from mobile devices GPS. A major problem in this context is how to prevent service abuse by malicious users who submit false locations by tampering ...
Demonstration of wireless synchronisation methods in autonomously controlled fleet of drones
This paper describes methods used in synchronising the behaviour of multiple autonomous flight vehicles utilising custom external hardware and firmware injected into current aviation flight systems. To prove the reliability and consistency of an ...
Comments