DocumentCode :
624826
Title :
The vulnerability of UAVs to cyber attacks - An approach to the risk assessment
Author :
Hartmann, Klaus ; Steup, Christoph
Author_Institution :
Inst. of Electron., Signal Process. & Commun., Otto-von-Guericke-Univ., Magdeburg, Germany
fYear :
2013
fDate :
4-7 June 2013
Firstpage :
1
Lastpage :
23
Abstract :
By 2012 the U.S. military had increased its investment in research and production of unmanned aerial vehicles (UAVs) from $2.3 billion in 2008 to $4.2 billion [1]. Currently UAVs are used for a wide range of missions such as border surveillance, reconnaissance, transportation and armed attacks. UAVs are presumed to provide their services at any time, be reliable, automated and autonomous. Based on these presumptions, governmental and military leaders expect UAVs to improve national security through surveillance or combat missions. To fulfill their missions, UAVs need to collect and process data. Therefore, UAVs may store a wide range of information from troop movements to environmental data and strategic operations. The amount and kind of information enclosed make UAVs an extremely interesting target for espionage and endangers UAVs of theft, manipulation and attacks. Events such as the loss of an RQ-170 Sentinel to Iranian military forces on 4th December 2011 [2] or the “keylogging” virus that infected an U.S. UAV fleet at Creech Air Force Base in Nevada in September 2011 [3] show that the efforts of the past to identify risks and harden UAVs are insufficient. Due to the increasing governmental and military reliance on UAVs to protect national security, the necessity of a methodical and reliable analysis of the technical vulnerabilities becomes apparent. We investigated recent attacks and developed a scheme for the risk assessment of UAVs based on the provided services and communication infrastructures. We provide a first approach to an UAV specific risk assessment and take into account the factors exposure, communication systems, storage media, sensor systems and fault handling mechanisms. We used this approach to assess the risk of some currently used UAVs: The “MQ-9 Reaper” and the “AR Drone”. A risk analysis of the “RQ-170 Sentinel” is discussed.
Keywords :
autonomous aerial vehicles; military vehicles; national security; risk management; Creech air force base; Iranian military forces; RQ-170 Sentinel; US UAV fleet; US military; cyber attacks; environmental data; keylogging virus; national security; risk assessment; strategic operations; technical vulnerabilities; troop movements; unmanned aerial vehicles; Aerospace electronics; Military aircraft; National security; Reliability; Risk management; Weapons; Cyber attack; Risk assessment; Security analysis; UAV;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Conflict (CyCon), 2013 5th International Conference on
Conference_Location :
Tallinn
ISSN :
2325-5366
Print_ISBN :
978-1-4799-0450-1
Type :
conf
Filename :
6568373
Link To Document :
بازگشت