Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security vulnerability analysis of Wi-Fi connection hijacking on the linux-based robot operating system for drone systems

Full metadata record
DC Field Value Language
dc.contributor.authorKang, Jinyeong-
dc.contributor.authorJoe, Inwhee-
dc.date.accessioned2022-07-10T09:41:39Z-
dc.date.available2022-07-10T09:41:39Z-
dc.date.created2021-05-13-
dc.date.issued2019-02-
dc.identifier.issn1865-0929-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/148338-
dc.description.abstractIn this paper we describe the security vulnerabilities of the Erle-Copter quadcopters. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which make it a target for harmful attacks. In addition, the video stream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we perform a security threat analysis on this particular family of drones. We set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We show how the drone can be hacked in order to hijack the Erle-Copter. Our aim is to sensitize the end-user of Erle-Copters by describing the security vulnerabilities and to show how the Erle-Copter can be secured from unauthorized access. We provide instructions to secure the drones Wi-Fi connection and its operation with the official smartphone app or third party PC software.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Verlag-
dc.titleSecurity vulnerability analysis of Wi-Fi connection hijacking on the linux-based robot operating system for drone systems-
dc.typeArticle-
dc.contributor.affiliatedAuthorJoe, Inwhee-
dc.identifier.doi10.1007/978-981-13-5907-1_49-
dc.identifier.scopusid2-s2.0-85062287067-
dc.identifier.bibliographicCitationCommunications in Computer and Information Science, v.931, pp.473 - 482-
dc.relation.isPartOfCommunications in Computer and Information Science-
dc.citation.titleCommunications in Computer and Information Science-
dc.citation.volume931-
dc.citation.startPage473-
dc.citation.endPage482-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusApplication programs-
dc.subject.keywordPlusDistributed computer systems-
dc.subject.keywordPlusLinux-
dc.subject.keywordPlusOpen source software-
dc.subject.keywordPlusSecurity of data-
dc.subject.keywordPlusWireless local area networks (WLAN)-
dc.subject.keywordPlusAcquisition costs-
dc.subject.keywordPlusConfidential information-
dc.subject.keywordPlusRobot operating system-
dc.subject.keywordPlusSecurity threats-
dc.subject.keywordPlusSecurity vulnerabilities-
dc.subject.keywordPlusSecurity vulnerability analysis-
dc.subject.keywordPlusUnauthorized access-
dc.subject.keywordPlusWi-Fi connections-
dc.subject.keywordPlusDrones-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-981-13-5907-1_49-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Joe, Inwhee photo

Joe, Inwhee
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE