. 24/7 Space News .
UAV NEWS
Consumer drones: ensuring secure communication protocol between drone and pilot
by Staff Writers
Los Angeles CA (SPX) Mar 31, 2019

file illustration only

Aerial drones have come a long way in a short period of time. In the past 10 years, they have become a routine tool for photographers, landscape gardeners, golf course designers, law enforcement, architects, film-makers, and many other professionals. In many cases, owners rely on their unmanned aerial vehicles (UAVs) to deliver a high-quality service, and by and large, that's what they provide.

However, as some users are finding, UAVs come with their own unique security vulnerabilities. As more people use drones, the risk of hijacks and thefts is rising, especially where video and photographic content is concerned. But few owners appear to know how to secure their vehicles against these attacks.

This blog will look at some of the technical issues surrounding drone security. We'll look at the types of threats posed to UAVs, how they work, and what can be done to counteract them. Hopefully, we'll put your mind at rest and allow you to pilot your vehicle without the stress of cybersecurity risks hanging over your head.

What type of attacks affect drones, and what causes them?
Firstly, many pilots are simply unaware of the many threats associated with their UAVs, leading them to fly them publicly and without any safeguards to ensure they retain total control. So a quick run through of the major risks is absolutely essential.

One way to model these threats is by considering two axes: uplink threats and downlink threats.

1. Uplink threats - When you pilot a UAV, signals are transmitted wirelessly via radio frequencies from your remote control, laptop, or smartphone, and these signals can be intercepted and modulated to suit the needs of anonymous attackers. this is surprisingly easy with many brands of consumer UAV. The firmware they use and the wifi standards required to transmit instructions are rarely encrypted, and firmware tends to be updated infrequently. If the drone relies on GPS signals, attackers can also use a technique known as "GPS spoofing", which mimics the signals transmitted via GPS satellites.

2. Downlink threats - Conversely, hackers could target information sent from drones to targets on the ground. Video footage taken by drones tends to be transmitted in unencrypted radio format, so anyone within range could theoretically intercept, store, and sell a pilot's footage.

How do these drone-jacking threats work in practice?
This might seem fairly abstract right now, but there are plenty of real-world examples of drone hacking in action. For example, in 2016 cybersecurity researcher Jonathan Andersson unveiled a tool (appropriately) called Icarus. Using standard DSMx radio transmissions, the Icarus box proved capable of hijacking drones from many mainstream vendors. Moreover, it could also prevent legitimate owners from regaining control via code injection, allowing for simple drone theft.

Andersson is far from alone. Also in 2016, Samy Kankar demonstrated how easy it was to hijack police drones from as far as one mile away. In Kankar's case, he used standard radio frequencies to reprogram the software on target vehicles, making them think that he was the legitimate pilot. This gave him total control over the flight plan of law enforcement UAVs.

He took the concept even further, developing a tool called Skyjack, which could be attached to a UAV. After scanning the nearby area for drones with vulnerable MAC addresses, Skyjack can take control, and potentially summon up "swarms" of UAVs controlled by a single hacker with a Raspberry Pi. It's a terrifying prospect, but one that is facilitated by the weak security employed by most contemporary UAV manufacturers.

Why footage taken by drones is particularly vulnerable
Should you worry about drone jacking if your business relies on taking aerial video footage? Probably. For one thing, camera drones are one of the juiciest targets for cybercriminals around. They know that companies using these vehicles tend to install high-quality cameras and accessories, in order to capture the best possible footage. So camera drones are a prime target - if only due to their resale value.

But the data captured by camera drones could be even more attractive. Security experts have shown that it's relatively simple to steal the login credentials of pilots, providing total awareness of flight paths, footage, and any other data. This can be sold on to third parties, used in corporate espionage, or just exploited for personal use.

When unedited footage leaks, it can be a huge reputational risk for the company that captured it, as well as a loss of valuable proprietary data. So it makes sense to secure your footage as much as possible, but how can you do so?

How to protect footage taken with your UAV
Until drone manufacturers come up with 100% secure firmware and transmission procedures, using UAVs will never be completely secure. However, there are some steps pilots can take to minimise the risk of theft or drone jacking.

Firstly, secure file storage is essential. Many remote UAV operators choose to store footage with Cloud-based providers, and that makes a lot of sense. But it can lead to security risks as well, so choose secure providers with 2-factor authentication and full encryption.

It's also a good idea to encrypt anything that your UAV transmits to and from your receiver (usually a standard laptop). This is where Virtual Private Networks play an important role. VPNs encrypt everything that leaves your laptop while anonymising your digital footprint. This means that if you are sending footage to Cloud storage providers, or using unsecured wifi while piloting your UAV, it's very tough to extract footage once it arrives on your computer.

VPNs vary widely though, so choose a supplier you can rely on. This guide to the best free VPNs should point you in the right direction.

Updating the firmware on your UAV is also extremely important. Developers don't always make this as simple as it should be, so if needed, be sure to enquire with the support staff to check for recent patches.

It's also absolutely vital to keep your controller and receiver free of malware. Malware is a major vector for the theft of UAV login credentials and data extraction, so fine-tune your anti-malware tools and never click on links in unsolicited emails.

Finally, it's worth investing in up to date drones that come equipped with anti-drone jacking technology. Operating systems used in consumer drones have come a long way in the last few years, making break-ins a lot harder. So don't assume that cheap UAVs represent a real-world saving. The lack of security measures can cost you dearly further down the line.

Treat drones like smartphones or work computers
Many pilots still regard aerial drones as a form of accessory (or even a toy). As a result, UAVs can be sidelined in corporate security planning or used unwisely by ordinary consumers. This has to change.

As we've seen, drones are highly vulnerable to a variety of attacks. Hackers can take control of flight systems, lock out pilots, or steal data - often without users knowing about it. This makes it essential to guard your UAV via VPNs, anti-malware tools, and regular firmware updates.

Above all, it means becoming security-conscious when your drone takes to the sky. You never know who is waiting to take control.


Related Links
UAV News - Suppliers and Technology


Thanks for being there;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Monthly Supporter
$5+ Billed Monthly


paypal only
SpaceDaily Contributor
$5 Billed Once


credit card or paypal


UAV NEWS
Russian Cosmonauts to Experiment With Propeller-Driven Drone on ISS - Roscosmos
Moscow (Sputnik) Mar 27, 2019
Russian cosmonauts will carry out an experiment on controlling a drone driven by a propeller on board the International Space Station, Alexander Bloshenko, a science advisor to the Roscosmos's chief, told Sputnik on Wednesday. "The experiment has been introduced into the program", Bloshenko said. During experiments with the propeller-driven drone, it is first planned to work out the design of its body and propulsion system. Based on results received, a second drone will be developed, designed to w ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

UAV NEWS
NASA defends scrapping all-women spacewalk

The Voyage to Interstellar Space

NASA Astronauts Complete 215th Spacewalk at Station

Tests Prove Out Orion Safety Systems From Liftoff to Splashdown

UAV NEWS
China completes compatibility test on core parts of rocket engine

Arianespace Flight VS22: A fifth launch for the operator SES and its O3b constellation

More efficient satellite launch platform on the horizon

Sunrise and Phase Four partner for Next-gen electric propulsion

UAV NEWS
Results of BIOMEX, the Biology and Mars Experiment on the ISS

New evidence of deep groundwater on Mars

NASA's Mars Helicopter Completes Flight Tests

Mars calling

UAV NEWS
Super-powerful Long March 9 said to begin missions around 2030

China preparing for space station missions

China's lunar rover studies stones on moon's far side

China improves Long March-6 rocket for growing commercial launches

UAV NEWS
Inmarsat agrees to $3.4 bn takeover from consortium

OneWeb starts to mass-produce satellites in Florida

UAE announces pan-Arab body for space programme

Lockheed Martin develops world-first LTE-Over-Satellite System

UAV NEWS
Traveling-wave tubes: The unsung heroes of space exploration

Indian satellite destruction creates debris field of 'space junk'

Elementary mathematics brings Star Trek's Holodeck closer to reality

Vector's GalacticSky GSky-1 satellite ready for launch later this year

UAV NEWS
Astronomers Discover Two New Planets Using Artificial Intelligence

In Hunt for Life, Astronomers Identify Most Promising Stars

Exoplanet satellite ready

Exoplanet Under the Looking Glass

UAV NEWS
Jupiter's unknown journey revealed

A Prehistoric Mystery in the Kuiper Belt

Ultima Thule in 3D

SwRI-led New Horizons research indicates small Kuiper Belt objects are surprisingly rare









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.