Exploring Jamming and Hijacking Attacks for Micro Aerial Drones (2403.03858v1)
Abstract: Recent advancements in drone technology have shown that commercial off-the-shelf Micro Aerial Drones are more effective than large-sized drones for performing flight missions in narrow environments, such as swarming, indoor navigation, and inspection of hazardous locations. Due to their deployments in many civilian and military applications, safe and reliable communication of these drones throughout the mission is critical. The Crazyflie ecosystem is one of the most popular Micro Aerial Drones and has the potential to be deployed worldwide. In this paper, we empirically investigate two interference attacks against the Crazy Real Time Protocol (CRTP) implemented within the Crazyflie drones. In particular, we explore the feasibility of experimenting two attack vectors that can disrupt an ongoing flight mission: the jamming attack, and the hijacking attack. Our experimental results demonstrate the effectiveness of such attacks in both autonomous and non-autonomous flight modes on a Crazyflie 2.1 drone. Finally, we suggest potential shielding strategies that guarantee a safe and secure flight mission. To the best of our knowledge, this is the first work investigating jamming and hijacking attacks against Micro Aerial Drones, both in autonomous and non-autonomous modes.
- T. J. Mueller, “On the birth of micro air vehicles,” International Journal of Micro Air Vehicles, vol. 1, no. 1, pp. 1–12, 2009.
- B. Boroujerdian, H. Genc, S. Krishnan, B. P. Duisterhof, B. Plancher, K. Mansoorshahi, M. Almeida, W. Cui, A. Faust, and V. J. Reddi, “The role of compute in autonomous micro aerial vehicles: Optimizing for mission time and energy efficiency,” ACM Transactions on Computer Systems (TOCS), vol. 39, no. 1-4, pp. 1–44, 2022.
- V. Kumar and N. Michael, “Opportunities and challenges with autonomous micro aerial vehicles,” in Robotics Research: The 15th International Symposium ISRR. Springer, 2017, pp. 41–58.
- W. Giernacki, M. Skwierczyński, W. Witwicki, P. Wroński, and P. Kozierski, “Crazyflie 2.0 quadrotor as a platform for research and education in robotics and control engineering,” in 2017 22nd International Conference on Methods and Models in Automation and Robotics (MMAR). IEEE, 2017, pp. 37–42.
- Y. Mekdad, A. Aris, L. Babun, A. El Fergougui, M. Conti, R. Lazzeretti, and A. S. Uluagac, “A survey on security and privacy issues of uavs,” Computer Networks, p. 109626, 2023.
- H. Pirayesh and H. Zeng, “Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 767–809, 2022.
- “Crazyradio Power Amplifier,” (Online; Accessed 2 April 2022). [Online]. Available: https://www.bitcraze.io/products/crazyradio-pa
- “Python library to communicate with Crazyflie,” (Online; Accessed 2 April 2022). [Online]. Available: https://github.com/bitcraze/crazyflie-lib-python
- “HackRF One - Software Defined Radio,” (Online; Accessed 2 April 2022). [Online]. Available: https://greatscottgadgets.com/hackrf/one/
- H. Sathaye, D. Schepers, A. Ranganathan, and G. Noubir, “Wireless attacks on aircraft instrument landing systems,” in 28th USENIX Security Symposium (USENIX Security 19), 2019, pp. 357–372.
- G. Choudhary, V. Sharma, I. You, K. Yim, R. Chen, and J.-H. Cho, “Intrusion detection systems for networked unmanned aerial vehicles: A survey,” in 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, 2018, pp. 560–565.
- Z. Feng, N. Guan, M. Lv, W. Liu, Q. Deng, X. Liu, and W. Yi, “An efficient UAV hijacking detection method using onboard inertial measurement unit,” ACM Transactions on Embedded Computing Systems (TECS), vol. 17, no. 6, pp. 1–19, 2018.
- B. Nassi, R. Bitton, R. Masuoka, A. Shabtai, and Y. Elovici, “Sok: Security and privacy in the age of commercial drones,” in 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021, pp. 1434–1451.
- J. Valente and A. A. Cardenas, “Understanding security threats in consumer drones through the lens of the discovery quadcopter family,” in Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017, pp. 31–36.
- Y. Mekdad, A. Aris, A. Acar, M. Conti, R. Lazzeretti, A. E. Fergougui, and S. Uluagac, “A comprehensive security and performance assessment of uav authentication schemes,” Security and Privacy, p. e338, 2023.
- H. Oz, A. Aris, A. Acar, G. S. Tuncay, L. Babun, and S. Uluagac, “{{\{{RøB}}\}}: Ransomware over modern web browsers,” in 32nd USENIX Security Symposium (USENIX Security 23), 2023, pp. 7073–7090.
- V. Chamola, P. Kotesh, A. Agarwal, N. Gupta, M. Guizani et al., “A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques,” Ad hoc networks, vol. 111, p. 102324, 2021.
- D. Cayir, A. Acar, R. Lazzeretti, M. Angelini, M. Conti, and S. Uluagac, “Augmenting security and privacy in the virtual realm: An analysis of extended reality devices,” IEEE Security & Privacy, 2023.