用户名: 密码: 验证码:
无人机信息安全研究综述
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A Survey on Cyber Security of Unmanned Aerial Vehicles
  • 作者:何道敬 ; 杜晓 ; 乔银荣 ; 朱耀康 ; 樊强 ; 罗旺
  • 英文作者:HE Dao-Jing;DU Xiao;QIAO Yin-Rong;ZHU Yao-Kang;FAN Qiang;LUO Wang;School of Computer Science and Software Engineering,East China Normal University;NARI Group Corporation (State Grid Electric Power Research Institute);
  • 关键词:无人机安全 ; 公共安全 ; 无人机捕获 ; GPS欺骗 ; 无线电劫持
  • 英文关键词:unmanned aerial vehicle security;;public safety;;unmanned aerial vehicle capture;;GPS spoofing;;radio hijacking
  • 中文刊名:JSJX
  • 英文刊名:Chinese Journal of Computers
  • 机构:华东师范大学计算机科学与软件工程学院;南瑞集团公司(国网电力科学研究院);
  • 出版日期:2017-08-13 12:28
  • 出版单位:计算机学报
  • 年:2019
  • 期:v.42;No.437
  • 基金:国家重点研发计划课题(2017YFB0802805,2017YFB0801701,2017YFB0802302);; 国家自然科学基金项目(U1636216,51477056,61601129);; 国网公司科技项目;; 上海市青年科技启明星计划(15QA1401700);; 上海市科委技术标准专项项目(16DZ0503000)资助~~
  • 语种:中文;
  • 页:JSJX201905010
  • 页数:19
  • CN:05
  • ISSN:11-1826/TP
  • 分类号:150-168
摘要
随着科技的进步和制造成本的不断降低,无人机已经从军用领域开始走进工业生产和人们的日常生活.如今,无人机已经广泛应用于影视拍摄、农业监测、电力巡检、个人航拍、气象监测、森林火灾探测、交通控制、货物运输及应急救援等领域.然而,无人机在给我们的生产生活带来各种便利的同时,其所面临的安全问题也逐渐暴露出来.该文首先介绍了当前无人机的发展现状,然后介绍了无人机的组成结构和应用,之后分别从保密性、完整性和可用性方面系统地阐述了当前无人机所面临的信息安全威胁.接着,该文着重从传感器、通信、软件和网络四个方面对无人机所面临的安全威胁、现有安全防护措施以及国内外的研究现状进行了详细的阐述和分析.其中,结合当前国内外最新的研究成果和我们实验室的研究和实验,重点对针对无人机的卫星导航信号的欺骗攻击和针对无人机通讯安全的攻击及其应对措施进行了阐述和分析.最后,对无人机的安全和管理的未来研究方向进行了展望.
        With the rapid advancements of technology and the decreasing of the manufacturing cost,unmanned aerial vehicles(UAVs),also commonly known as drones,are spreading from military areas to industrial production and people's daily lives,during the past few decades.Nowadays,UAVs are now more easily accessible to the public and thus numerous new applications in civilian and commercial domains have emerged,with typical examples including film shooting,agricultural inspection,electrical inspection,personal photography,weather monitoring,forest fire detection,traffic control,cargo transport,emergency search and rescue.However,while a UAV gives people all kinds of conveniences,the cyber security problem of the UAV is gradually exposed.That is,cyber security is critically important for the success of the UAVs.In this article,we first give a state-of-the-art overview of UAV development,introduces the composition structure and various applications of the UAVs,and discuss the cyber security threats faced by the UAVs from the aspects of confidentiality,integrity and availability.In particular,this paper presents the cyber security threats,existing security protection measures,and the current research progress at home and abroad on the UAVs from the four aspects(i.e.,sensor node,communication link,software and network)in details.Here we consider the sensor security of the UAVs as an example.Firstly,multiple sensor devices such as gyroscopes,accelerometers,magnetometers and barometers are often used in the design of the UAVs in order to achieve various functions.The erroneous data collected by a sensor node may make the UAV to make a wrong decision,which affects the flight safety of the UAV and even lead to its crash.The traditional sensor security research generally focuses on the security of data transmission in the sensor networks,but often ignores the security threat analysis and protection of the sensor node itself.In addition,due to technical or cost constraints,commercial sensors in a UAV are usually unable to distinguish normal and abnormal information.We have summarized and analyzed the current situation of the research on the sensors used in the UAVs.At present,there are two kinds of cyber security attacks for the UAVs,which are ultrasonic jamming on gyroscope and GPS deception.we have developed a low-cost record-and-replay system based on a software defined radio device.Also,this article reports the experimental results of some cyber security attacks and defense mechanisms on the UAVs.Especially,global positioning system(GPS)spoofing attack and defense on the UAVs are described in details.Moreover,our proposed UAV control system and its experimental results are described.This system does not need any physical contact or other electronic intrusion of the UAV system,and this method is applicable to most of the UAV models based on satellite navigation signal for navigation.The system can avoid the weaknesses of other UAV control methods such as resulting in UAV falling out of control and causing secondary disasters.Finally,the future research directions of the UAV security and management are discussed.Work in this direction is still in its early stages,and thus we hope this paper will stimulate further interest from researchers and engineers.
引文
[1]Zhang Tian-Hang,Bai Jin-Ping.Development and trend of unmanned rotorcraft.Artificial Intelligence and Robotics Research,2013,2:16-23(in Chinese)(张天航,白金平.旋翼式无人机的发展和趋势.人工智能与机器人研究,2013,2:16-23)
    [2]Goraj Z.UAV platform designed in WUT for border surveillance//Proceedings of the American Institute of Aeronautics and Astronautics(AIAA).Rohnert Park,USA,2007:1-18
    [3]Kopeikin A,Ponda S,Johnson K,How J.Multi-UAVnetwork control through dynamic task allocation:Ensuring data-rate and bit-error-rate support//Proceedings of the IEEE GLOBECOM Workshop on Wireless Networking for Unmanned Autonomous Vehicles.Anaheim,USA,2012:1579-1584
    [4]Honkavaara E,Saari H,Kaivosoja J,et al.Processing and assessment of spectrometric,stereoscopic imagery collected using a lightweight UAV spectral camera for precision agriculture.Remote Sensing,2013,5(10):5006-5039
    [5]Grenzd9rffer G,Engel A,Teichert B.The photogrammetric potential of low-cost UAVs in forestry and agriculture//Proceedings of the International Archives of the Photogrammetry,Remote Sensing and Spatial Information Sciences.Beijing,China,2008,37(B1):1207-1213
    [6]Caris M,Stanko S,Sommer R,Wahlen A.SAPape-Synthetic aperture radar for all weather penetrating UAV application//Proceedings of the 14th International Radar Symposium(IRS).Dresden,Germany,2013:41-46
    [7]Li Zong-Nan,Chen Zhong-Xin,Wang Li-Min,et al.Area extraction of maize lodging based on remote sensing by small unmanned aerial vehicle.Transactions of the Chinese Society of Agricultural Engineering,2014,30(19):207-213(in Chinese)(李宗南,陈仲新,王利民等.基于小型无人机遥感的玉米倒伏面积提取.农业工程学报,2014,30(19):207-213)
    [8]Araar O,Aouf N,Dietz J L.Power pylon detection and monocular depth estimation from inspection UAVs.Industrial Robot:An International Journal,2015,42(3):200-213
    [9]Li Chao,Ke Zun-Jie,Chen Jiao.Application of quadrotor UAV in emergence surveying and mapping security in Yunnan.Surveying and Mapping of Geology and Mineral Resources,2015,31(3):31-33(in Chinese)(李超,柯尊杰,陈姣.四旋翼无人机在云南应急测绘保障中的应用.地矿测绘,2015,31(3):31-33)
    [10]Javaid A Y,Sun W,Devabhaktuni V K,Alam M.Cyber security threat analysis and modeling of an unmanned aerial vehicle system//Proceedings of the IEEE Conference on Technologies for Homeland Security(HST).Waltham,USA,2012:585-590
    [11]Wang W,Sun Y,Li H,Han Z.Cross-layer attack and defense in cognitive radio networks//Proceedings of the IEEEGlobe Communication Conference(GLOBECOM)2010.Miami,USA,2010:1-6
    [12]Alves-Foss J.Multi-protocol attacks and the public key infrastructure//Proceedings of the 21st National Information Systems Security Conference.Arlington,USA,1998:566-576
    [13]Carle G,Dressler F,Kemmerer R A,et al.Network attack detection and defense//Proceedings of the Manifesto of the Dagstuhl Dagstuhl Perspective Workshop.Dagstuhl,Germany,2008:15-25
    [14]Barbeau M.WiMax802.16threat analysis//Proceedings of the International Symposium on QoS and Security for Wireless and Mobile Networks(Q2SWinet).Montreal Quebec,Canada,2005:8-15
    [15]Tao Feng,Timmermans H J P.Transportation mode recognition using GPS and accelerometer data.Transportation Research Part C,2013,37(3):118-130
    [16]He D J,Chen C,Chan S,et al.ReTrust:Attack-resistant and lightweight trust management for medical sensor networks.IEEE Transactions on Information Technology in Biomedicine,2012,16(4):623-632
    [17]Carman D W,Kruus P S,Matt B J.Constraints and approaches for distributed sensor network security.NAI Labs Technical Report No.00-010,Network Associates Inc.,New York,USA,2002
    [18]Shoukry Y,Martin P,Yona Y,et al.PyCRA:Physical challenge-response authentication for active sensors under spoofing attacks//Proceedings of the 22nd ACM SIGSACConference on Computer and Communications Security.Denver,USA,2015:1004-1015
    [19]Barbour N,Schmidt G.Inertial sensor technology trends.IEEE Sensors Journal,2011,1(4):332-339
    [20]Jose K A,Suh W D,Xavier P B,Varadan V K.Surface acoustic wave MEMS gyroscope.Wave Motion,2002,36(4):367-381
    [21]Castro S T,Dean R N,Roth G,et al.Influence of acoustic noise on the dynamic performance of MEMS gyroscopes//Proceedings of the International Mechanical Engineering Congress and Exposition.Washington,USA,2007:1825-1831
    [22]Dean R N,Floers G T,Hodel A S,et al.On the degradation of MEMS gyroscope performance in the presence of high power acoustic noise//Proceedings of the IEEE International Symposium on Industrial Electronics.Vigo,Spain,2007:1435-1440
    [23]Dean R N,Castro S T,Flowers G T.A characterization of the performance of a MEMS gyroscope in acoustically harsh environments.IEEE Transactions on Industrial Electronics,2011,58(7):2591-2596
    [24]Son Y,Shin H,Kim D,et al.Rocking drones with intentional sound noise on gyroscopic sensors//Proceedings of the24th USENIX Security Symposium.Washington,USA,2015:881-896
    [25]Roth G.Simulation of the Effects of Acoustic Noise on MEMS Gyroscopes[M.S.dissertation].Auburn University,Alabama,USA,2009
    [26]Soobramaney P.Mitigation of the Effects of High Levels of High-Frequency Noise on MEMS Gyroscopes[Ph.D.dissertation].Auburn University,Alabama,USA,2013
    [27]Adams S G,Bertsch F M,Shaw K.Capacitance based tunable micromechanical resonators//Proceedings of the 8th International Conference on Solid-State Sensors and Actuators,and Euro Sensors IX.Stockholm,Sweden,1995:25-29
    [28]Jeong C,Seok S,Lee B,et al.A study on resonant frequency and Q factor tunings for MEMS vibratory gyroscopes.Journal of Micromechanics and Micro Engineering,2004,14(11):1530-1536
    [29]Kaplan E,Hegarty C.Understanding GPS:Principles and Applications.2nd Edition.London:Artech House,2006
    [30]Wendel J,Meister O,Schlaile C,Trommer G F.An integrated GPS/MEMS-IMU navigation system for an autonomous helicopter.Aerospace Science and Technology,2006,10(6):527-533
    [31]Gong Zhen-Chun.Study and Application of GPS for Micro Unmanned Aerial Vehicle[Ph.D.dissertation].Zhejiang University,Hangzhou,2005(in Chinese)(龚真春.GPS在微型无人机导航定位中的研究与应用[博士学位论文].浙江大学,杭州,2005)
    [32]Huang L,Yang Q.GPS spoofing:Low-cost GPS simulator//Proceedings of the DEF CON Communications 23.Las Vegas,USA,2015
    [33]Jafarnia-Jahromi A,Broumandan A,Nielsen J,Lachapelle G.GPS vulnerability to spoofing threats and a review of antispoofing techniques.International Journal of Navigation and Observation,2012,2012(127072):1-16
    [34]Kerns A J,Shepard D P,Bhatti A J,Humphreys T.Unmanned aircraft capture and control via GPS spoofing.Journal of Field Robotics,2014,31(4):617-636
    [35]Faughnan M S,Hourican B J,MacDonald G C,et al.Risk analysis of unmanned aerial vehicle hijacking and methods of its detection//Proceedings of the IEEE Systems and Information Engineering Design Symposium(SIEDS).Charlottesville,USA,2013:145-150
    [36]Akos D M.Who’s afraid of the spoofer?GPS/GNSS spoofing detection via automatic gain control(AGC).Navigation,2012,59(4):281-290
    [37]Bastide F,Akos D,Macabiau C,Roturier B.Automatic gain control(AGC)as an interference assessment tool//Proceedings of the 16th International Technical Meeting of the Satellite Division of the Institute of Navigation(ION GPS/GNSS2003).Portland,USA,2011:2042-2053
    [38]Warner J S,Johnston R G.GPS spoofing countermeasures.Homeland Security Journal,2003,25(2):19-27
    [39]Jahromi-Jafarnia A,Broumandan A,Nielsen J,et al.GPSspoofer countermeasure effectiveness based on signal strength,noise power,and C/N0 measurements.International Journal of Satellite Communications and Networking,2012,30(4):181-191
    [40]Psiaki M L,Humphreys T E,Stauffer B.Attackers can spoof navigation signals without our knowledge.Here’s how to fight back GPS lies.IEEE Spectrum,2016,53(6):26-53
    [41]Cheng Xu-Wei,Tang Xia-Qing,Guo Li-Bin,Wu Meng.Research on GNSS receiver spoofing detection technology//Proceedings of the 6th China Satellite Navigation Conference.Xi’an,China,2015(in Chinese)(程旭维,汤霞清,郭理彬,武萌.GNSS接收机抗干扰和欺骗检测技术研究//第6届中国卫星导航学术年会.西安,中国,2015)
    [42]Swaszek P,Pratz S,Arocho B,et al.GNSS spoof detection using shipboard IMU measurements//Proceedings of the27th International Technical Meeting of the Satellite Division of the Institute of Navigation(ION GNSS+).Tampa,USA,2014:745-758
    [43]Li Si-Hai,Liu Yang,Zhang Hui-Suo,Zhang Xiao-Dong.Inertial measurements aided GNSS spoofing detection technique.Journal of Chinese Inertial Technology,2013,21(3):336-353(in Chinese)(李四海,刘洋,张会锁,张晓冬.惯性信息辅助的卫星导航欺骗检测技术.中国惯性技术学报组合导航技术,2013,21(3):336-353)
    [44]Lee J H,Kwon K C,An D S,Shim D S.GPS spoofing detection using accelerometers and performance analysis with probability of detection.International Journal of Control,Automation and Systems,2015,13(4):951-959
    [45]Daneshmand S,Jafarnia-Jahromi A,Broumandan A,Lachapelle G.A low-complexity GPS anti-spoofing method using a multi-antenna array//Proceedings of the 25th International Technical Meeting of the Satellite Division of the Institute of Navigation(ION GNSS 2012).Nashville,USA,2012:1233-1243
    [46]Wesson K,Rothlisberger M,Humphreys T.Practical cryptographic civil GPS signal authentication.NAVIGATIONJournal of the Institute of Navigation,2012,59(3):177
    [47]Humphreys T E,Ledvina B M.Assessing the spoofing threat:Development of a portable GPS civilian spoofer//Proceedings of the 21st International Technical Meeting of the Satellite Division of the Institute of Navigation(IONGNSS 2008).Savannah,USA,2008:2314-2325
    [48]Hartmann K,Steup C.The vulnerability of UAVs to cyber attacks-An approach to the risk assessment//Proceedings of the Cyber Conflict(CyCon)2013 5th International Conference.Tallinn,Estonia,2013:1-23
    [49]Mansfield K,Eveleigh T,Holzer T,Sarkani S.Unmanned aerial vehicle smart device ground control station cyber security threat model//Proceedings of the IEEE International Conference on the Technologies for Homeland Security(HST).Waltham,USA,2013:722-728
    [50]Won J,Seo S H,Bertino E.A secure communication protocol for drones and smart objects//Proceedings of the 10th ACMSymposium on Information,Computer and Communications Security.New York,USA,2015:249-260
    [51]Kim A,Wampler B,Goppert J,et al.Cyber-attack vulnerabilities analysis for unmanned aerial vehicles//Proceedings of the American Institute of Aeronautics and Astronautics.Reston,USA,2012:1-30
    [52]Krozel J,Andrisani D.Independent ADS-B verification and validation//Proceedings of the AIAA Aviation Technology Integration and Operations Conference Proceedings.Arlington,Virginia,2005:1-11
    [53]Yuan Suo-Zhong.Research and development of digital UAVflight control system.Computer Measurement and Control,2003,11(1):64-65(in Chinese)(袁锁中.数字式无人机飞行控制系统研制.计算机测量与控制,2003,11(1):64-65)
    [54]Miller J,Minear P,Niessner A,et al.Intelligent unmanned air vehicle flight systems.Journal of Aerospace Computing,Information,and Communication,2007,4(5):816-835
    [55]Hess R,Torrez J.The deep impact flight software architecture//Proceedings of the IEEE Aerospace Conference.Big Sky,USA,2006:1-9
    [56]Zhou Zhi-Jiu,Yan Jian-Guo.DSP of the UAV flight control system software based on modular design.Computer Measurement&Control,2009,17(1):221-223(in Chinese)(周志久,闫建国.基于DSP的无人机飞控系统软件模块化设计.计算机测量与控制,2009,17(1):221-223)
    [57]Wang Quan,Zhang Xue-Hong,Zhou Min-Gang,Huang Hui.UAV flight control software testing method of computing technology aviation.Aeronautical Computer Technique,2008,38(2):78-81(in Chinese)(王泉,张学宏,周敏刚,黄晖.无人机飞控软件测试方法研究.航空计算技术,2008,38(2):78-81)
    [58]Yang Liu-Qing,Xiao Qian-Gui,Liu Jiu-Fu.UAV flight control software anti-jamming design.Micro Computer Application,2007,23(9):1-2(in Chinese)(杨柳庆,肖前贵,刘久富.无人机飞控软件抗干扰设计.微型电脑应用,2007,23(9):1-2)
    [59]Fang Xin-Xin.Malware Implementation and Detection on Android[M.S.dissertation].Nanjing University of Posts and Telecommunications,Nanjing,2013(in Chinese)(房鑫鑫.Android恶意软件实现及检测研究[硕士学位论文].南京邮电大学,南京,2013)
    [60]Zuo Ling.Design and implementation of malware detection system based on Android.University of Electronic Science and Technology of China,Chengdu,2012(in Chinese)(左玲.基于Android恶意软件检测系统的设计与实现[硕士学位论文].电子科技大学,成都,2012)
    [61]Yan Yong.A detection method for Android malware based on dynamic monitor.Information Security and Communications Privacy,2014,(10):104-108(in Chinese)(严勇.基于动态监控的Android恶意软件检测方法.信息安全与通信保密,2014,(10):104-108)
    [62]Han Yang.Design and Implementation of the Android Application Security Evaluation Tool[M.S.dissertation].Beijing Jiaotong University,Beijing,China,2012(in Chinese)(韩扬.Android应用软件安全评测工具的设计与实现[硕士学位论文].北京交通大学,北京,2012)
    [63]Schmidt A D.Static analysis of executables for collaborative malware detection on Android//Proceedings of the 9th IEEEInternational Conference on Communications.Dresden,Germany,2009:1-5
    [64]Shabtai A.Malware detection on mobile devices//Proceedings of the 11th International Conference on Mobile Data Management.Kansas City,USA,2010:289-290
    [65]Liu Wei,Feng Bing-Wen,Weng Jian.A review of the research on safety of small UAV.Journal of Network and Information Security,2016,2(3):39-45(in Chinese)(刘炜,冯丙文,翁健.小型无人机安全研究综述.网络与信息安全学报,2016,2(3):39-45)
    [66]Wang Wei-Jiang,Zheng Feng,Guo Le-Jiang.Study of network architecture of UAV tactic networking.Journal of Air Force Radar Academy,2011,25(4):287-295(in Chinese)(王卫疆,郑锋,郭乐江.无人机战术组网的网络体系结构研究.空军雷达学院报.2011,25(4):287-295)
    [67]Javaid A Y,Sun W,Devabhaktuni V K,Alam M.Cyber security threat analysis and modeling of an unmanned aerial vehicle system//Proceedings of the IEEE Conference on Technologies for Homeland Security(HST).Waltham,USA,2012:585-590
    [68]Akyildiz I F,Kasimoglu I H.Wireless sensor and actor networks:Research challenges.Ad Hoc Networks,2004,2(4):351-367
    [69]Rappaport T S.Wireless communications:Past events and a future perspective.IEEE Communication Magazine,2002,40(5):148-161
    [70]Loong K M,Leng G.Sensors and communications range relations for UAV operations//Proceedings of the New Challenges in Aerospace and Technology Maintenance Conference.Singapore,2006:1-7
    [71]Deng H M,Li W,Agrawal D P.Routing security in wireless ad hoc networks.IEEE Communications Magazine,2002,40(10):70-75
    [72]Agrawal D P,Zeng Q A.Introduction to Wireless and Mobile Systems.Boston,USA:Brooks/Cole Publishing,2002
    [73]Zhou Li-Dong,Zygmunt J H.Securing ad hoc networks.IEEE Network,1999,13(6):24-30
    [74]Yang H.Security in mobile ad hoc networks:Challenges and solutions.IEEE Wireless Communications,2004,11(1):38-47
    [75]Reyes H,Gellerman N,Kaabouch N.A cognitive radio system for improving the reliability and security of UAS/UAV networks//Proceedings of the 2015IEEE Aerospace Conference.Big Sky,USA,2015:1-9
    [76]Maxa J A,Mahmoud M S B,Larrieu N.Secure routing protocol design for UAV ad hoc networks//Proceedings of the Digital Avionics Systems Conference(DASC)2015IEEE/AIAA 34th IEEE.Prague,Czech Republic,2015:4A5:1-4A5:15
    [77]Sedjelmaci H,Senouci S M,Ansari N.Intrusion detection and ejection framework against lethal attacks in UAV-aided networks:A Bayesian game-theoretic methodology.IEEETransactions on Intelligent Transportation Systems,2016,PP(99):1-11
    [78]Zapata M,Asokan N.Securing ad hoc routing protocols//Proceedings of the 1st ACM Workshop on Wireless Security(WiSE’02).New York,USA,2002:1-10
    [79]Sanzgiri K,Dahill B,Levine B N,et al.A secure protocol for ad hoc networks//Proceedings of the 10th IEEE International Conference on Network Protocols(ICNP’02).Paris,France,2002,2(1):78-87
    [80]Hu Y,Perrig A,Johnson D.Ariadne:A secure on-demand routing protocol for ad hoc networks.Wireless Networks,2005,11(1-2):21-38
    [81]Liu T,Sun Y,Liu Y,et al.Abnormal traffic-indexed state estimation:A cyber-physical fusion approach for Smart Grid attack detection.Future Generation Computer Systems,2015,49(48):94-103
    (1)http://www.iresearch.com.cn/report/2588.html
    (1)https://security.tencent.com/index.php/blog/msg/103
    (2)http://www.aircrack-ng.org/
    (3)Crook J.Infamous Hacker Creates SkyJack To Hunt,Hack,And Control Other Drones?Internet:http://techcrunch.com/2013/12/04/infamoushacker-creates-skyjackto-hunt-hack-and-control-other-drones/
    (1)How to remotely hijack drones?Secret the first UAV back door http://www.freebuf.com/news/57690.html
    (2)Watch Black Hat Asia black hat Asia Summit:UAV and fly away http://www.freebuf.com/news/100625.html
    (3)The security challenges facing the human computer-who moved my drones?http://www.360doc.cn/article/633076_168061138.html
    (4)NoFlyZone to help you set up a no fly zone over your house.http://techcrunch.cn/2015/02/23/noflyzone-lets-you-establish-a-no-fly-zone-over-your-property/

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700