Spoofing attack of drone

Nowadays, the increasing application of drones makes our lives more and more convenient. Various tasks such as: surveillance, emergency rescue, aerial photography, etc. can be accomplished by drones now. In China, some express companies have begun to use drones to do the deliveries. There are two ma...

Full description

Saved in:
Bibliographic Details
Main Author: Zhang, Renyu
Other Authors: Seow Chee Kiat
Format: Theses and Dissertations
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/76329
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-76329
record_format dspace
spelling sg-ntu-dr.10356-763292023-07-04T16:37:22Z Spoofing attack of drone Zhang, Renyu Seow Chee Kiat School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering Nowadays, the increasing application of drones makes our lives more and more convenient. Various tasks such as: surveillance, emergency rescue, aerial photography, etc. can be accomplished by drones now. In China, some express companies have begun to use drones to do the deliveries. There are two main ways to navigate a drone. The first way is to control drones through a remote controller. As a person is needed, sometimes, it is not a very profitable way. The other way is setting the destination for drones, and it will get to the destination automatically with the help of positioning services. This way can reduce the labor cost as the drones travel automatically. In preset, most positioning services is provided by global navigation satellite systems (GNSS). The global positioning system (GPS) is the most widely used GNSS. But it is known that civilian GPS signals are vulnerable to many kinds of attacks. In all of these attacks, the GPS spoofing is the most threatening one. The spoofing attack can mislead the victim into thinking it is in a position which is different from its real position. As the application demand of drones is increasing, the drones are likely to be victims of the spoofing attack. The 5th generation wireless systems, abbreviated 5G, is believed to be able to provide high quality and low delay positioning services with its features like ultra-dense networks, MIMO technology, device to device communications, etc. The observed time difference of arrival (OTDOA) positioning, which has been introduced to long-term evolution network, is a promising way to provide positioning services. In this work, the possibility of the spoofing attack on several drones which are keep in touch with each other and know each other relative positions is studied. The possible spoofed location with different number of spoofing signals is investigated. The feasibility study of spoofing attack on an OTDOA navigated drone and the simulation of it are included. Finally, some countermeasures against these attacks are proposed. Master of Science (Communications Engineering) 2018-12-19T00:39:17Z 2018-12-19T00:39:17Z 2018 Thesis http://hdl.handle.net/10356/76329 en 92 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Zhang, Renyu
Spoofing attack of drone
description Nowadays, the increasing application of drones makes our lives more and more convenient. Various tasks such as: surveillance, emergency rescue, aerial photography, etc. can be accomplished by drones now. In China, some express companies have begun to use drones to do the deliveries. There are two main ways to navigate a drone. The first way is to control drones through a remote controller. As a person is needed, sometimes, it is not a very profitable way. The other way is setting the destination for drones, and it will get to the destination automatically with the help of positioning services. This way can reduce the labor cost as the drones travel automatically. In preset, most positioning services is provided by global navigation satellite systems (GNSS). The global positioning system (GPS) is the most widely used GNSS. But it is known that civilian GPS signals are vulnerable to many kinds of attacks. In all of these attacks, the GPS spoofing is the most threatening one. The spoofing attack can mislead the victim into thinking it is in a position which is different from its real position. As the application demand of drones is increasing, the drones are likely to be victims of the spoofing attack. The 5th generation wireless systems, abbreviated 5G, is believed to be able to provide high quality and low delay positioning services with its features like ultra-dense networks, MIMO technology, device to device communications, etc. The observed time difference of arrival (OTDOA) positioning, which has been introduced to long-term evolution network, is a promising way to provide positioning services. In this work, the possibility of the spoofing attack on several drones which are keep in touch with each other and know each other relative positions is studied. The possible spoofed location with different number of spoofing signals is investigated. The feasibility study of spoofing attack on an OTDOA navigated drone and the simulation of it are included. Finally, some countermeasures against these attacks are proposed.
author2 Seow Chee Kiat
author_facet Seow Chee Kiat
Zhang, Renyu
format Theses and Dissertations
author Zhang, Renyu
author_sort Zhang, Renyu
title Spoofing attack of drone
title_short Spoofing attack of drone
title_full Spoofing attack of drone
title_fullStr Spoofing attack of drone
title_full_unstemmed Spoofing attack of drone
title_sort spoofing attack of drone
publishDate 2018
url http://hdl.handle.net/10356/76329
_version_ 1772826565806129152