Security vulnerability analysis of Wi-Fi connection hijacking on the linux-based robot operating system for drone systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Jinyeong | - |
dc.contributor.author | Joe, Inwhee | - |
dc.date.accessioned | 2022-07-10T09:41:39Z | - |
dc.date.available | 2022-07-10T09:41:39Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2019-02 | - |
dc.identifier.issn | 1865-0929 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/148338 | - |
dc.description.abstract | In this paper we describe the security vulnerabilities of the Erle-Copter quadcopters. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which make it a target for harmful attacks. In addition, the video stream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we perform a security threat analysis on this particular family of drones. We set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We show how the drone can be hacked in order to hijack the Erle-Copter. Our aim is to sensitize the end-user of Erle-Copters by describing the security vulnerabilities and to show how the Erle-Copter can be secured from unauthorized access. We provide instructions to secure the drones Wi-Fi connection and its operation with the official smartphone app or third party PC software. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.title | Security vulnerability analysis of Wi-Fi connection hijacking on the linux-based robot operating system for drone systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Joe, Inwhee | - |
dc.identifier.doi | 10.1007/978-981-13-5907-1_49 | - |
dc.identifier.scopusid | 2-s2.0-85062287067 | - |
dc.identifier.bibliographicCitation | Communications in Computer and Information Science, v.931, pp.473 - 482 | - |
dc.relation.isPartOf | Communications in Computer and Information Science | - |
dc.citation.title | Communications in Computer and Information Science | - |
dc.citation.volume | 931 | - |
dc.citation.startPage | 473 | - |
dc.citation.endPage | 482 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Application programs | - |
dc.subject.keywordPlus | Distributed computer systems | - |
dc.subject.keywordPlus | Linux | - |
dc.subject.keywordPlus | Open source software | - |
dc.subject.keywordPlus | Security of data | - |
dc.subject.keywordPlus | Wireless local area networks (WLAN) | - |
dc.subject.keywordPlus | Acquisition costs | - |
dc.subject.keywordPlus | Confidential information | - |
dc.subject.keywordPlus | Robot operating system | - |
dc.subject.keywordPlus | Security threats | - |
dc.subject.keywordPlus | Security vulnerabilities | - |
dc.subject.keywordPlus | Security vulnerability analysis | - |
dc.subject.keywordPlus | Unauthorized access | - |
dc.subject.keywordPlus | Wi-Fi connections | - |
dc.subject.keywordPlus | Drones | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-981-13-5907-1_49 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.