-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New CS proposal: Drone Security #1412
Comments
I think this is a fantastic idea for a cheatsheet. Let's do it. You are welcome to issue a new PR and if you need help with the directory structure of similar let me know! |
Thanks, I will take a look and let you know if I need any help.
…On Mon, May 27, 2024 at 2:15 AM Jim Manico ***@***.***> wrote:
I think this is a fantastic idea for a cheatsheet. Let's do it. You are
welcome to issue a new PR and if you need help with the directory structure
of similar let me know!
—
Reply to this email directly, view it on GitHub
<#1412 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAFAXT475LODJXFJA6A3JHTZELFOPAVCNFSM6AAAAABIIABCHSVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCMZSG4YTOMBXG4>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
--
Thanks
Godfrey Nolan
***@***.***
(248) 286 1227
http://twitter.com/riisllc
|
@godfreynolan Hey are you still working on this? |
Sorry fell off my radar for a bit. Plan is to get this completed by the end
of month before Commercial UAV.
…On Wed, Aug 7, 2024 at 4:28 PM Shlomo Zalman Heigh ***@***.***> wrote:
@godfreynolan <https://github.com/godfreynolan> Hey are you still working
on this?
—
Reply to this email directly, view it on GitHub
<#1412 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAFAXT35S276QJFIP5B55PTZQJ7NBAVCNFSM6AAAAABIIABCHSVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDENZUGI4TAOBTGE>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
--
Thanks
Godfrey Nolan
***@***.***
(248) 286 1227
http://twitter.com/riisllc
|
I have learnt of a novel approach to solving the issue of sensor hijacking especially in case of drone hordes where such a thing will be extremely risky. Its called Dynamic Watermarking for autonomous vehicles, attaching the paper herein. I think its a pretty cool approach and can be added to drone security protocols. |
I would love to author a drone security cheat sheet. Would you like to help or get it started? |
Yeah sure! I will look into a some details mentioned by @godfreynolan as well and post a draft here soon! |
I am thinking of something like this. Lemme know what you think @jmanico. Drone Security Cheat SheetIntroductionDrone security is crucial due to their widespread adoption in industries such as military, construction, and community services. With the increasing use of drone swarms, even minor security lapses can lead to significant risks. This cheat sheet provides an overview of vulnerable endpoints in drone systems and strategies to mitigate security threats. Drone System ComponentsA typical drone architecture consists of three main components:
The communication between the drone and the GCS is vulnerable to interception and attacks. This will be made evident in the future sections as well. It is important to understand that peripherals attached to drone may be vulnerable too! To explain this, we have made a list of vulnerable endpoints below. Vulnerable Endpoints & Security Risks1. Communication Security
2. Authentication & Access ControlMost drone controllers use 2 sets of computers,
Thus, it becomes very important to maintain their security as well. The possible risks in this case are:
3. Physical SecurityIf you're done is ever captured or lost, you should ensure that its not physically possible to steal data from it. This may happen under the following conditions:
4. Sensor SecurityWith drones implementing control logic depending on how close they are to other drones or aerial vehicles, manipulating sensor data is extremely disastrous! Yes, attackers can manipulate drone sensors (GPS, cameras, altimeters) to feed incorrect data. Think of this more like how struxnet changed the temperatures of the Uranium holdings in Iran. To prevent this, there is new research being developed involving watermarked signals whose entropy can be used to determine if the sensor values are correct of not. Read more about this method here. 5. Logging & Monitoring
To prevent this, ensure that your credentials are strong! Additionally you may choose to implement SecOps softwares like DefectDojo for continous monitoring of your systems. Secure Communication ProtocolsBelow are some protocols used by drone systems to communicate. This can be either between each other (if in a horde) or with the ground stations. We have mentioned what can go wrong with each protocol and also provided recommendations.
By implementing these security measures, drone operators can significantly reduce the risks of cyberattacks and unauthorized access to UAV communication systems. SummaryThe following table summaries the different attack vectors for a drone system. There are multiple GitHub repos that help with drone attack simulations and actual exploits. Be sure to check them out too for a deeper understanding of drone security. References
|
This is remarkable. I'd like some other folks to review it carefully first but wow! |
Let me know how if there's anything I can do to help. Dropped the ball on
this.
…On Thu, Feb 6, 2025 at 10:53 AM Jim Manico ***@***.***> wrote:
This is remarkable. I'd like some other folks to review it carefully first
but wow!
—
Reply to this email directly, view it on GitHub
<#1412 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAFAXT3JHL46BDHOCVPODQT2OOAOLAVCNFSM6AAAAABWSUHWL2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDMNBQGIYTKMZVGU>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
--
Thanks
Godfrey Nolan
***@***.***
(248) 286 1227
http://twitter.com/riisllc
|
Please give it a careful review!!! |
I ran link checker (lychee) and one link to sciencedirect.com works because I have institutional access but others might not. Should I drop that link? |
Yes please drop it |
Alright, done. Have updated index.md too. Will wait for people to review it. |
What is the proposed Cheat Sheet about?
This drone security Cheat Sheet aims to ensure the safe and secure operation of unmanned aerial vehicles (UAVs) in various mobile, web and cloud applications.
What security issues are commonly encountered related to this area?
Insecure Communication Links, data transmitted can be intercepted
Weak Authentication Mechanisms, default or weak passwords can allow unauthorized access
Firmware Vulnerabilities, unencrypted firmware and vulnerable bootloaders can lead to unauthorized modifications
Insufficient Physical Security, need to secure physical access to USB ports and other interfaces to prevent data theft or tampering
Insecure Supply Chain, compromised components from suppliers can introduce hidden vulnerabilities
Unsecured Third Party Components, third-party software libraries and components can compromise drone security
Inadequate Logging and Monitoring, insufficient monitoring of drone operations can delay the detection of security breaches or operational anomalies
Insecure Data Storage, sensitive data stored on drones can be accessed if not encrypted
Spoofing and Replay Attacks, GPS or ADS-B data spoofing or command replay attacks could mislead or take control of the drone
RF Interference and Jamming, drones can be disrupted or controlled through intentional RF interference or jamming
Sensor Vulnerabilities, cameras, GPS and other sensors can be exploited to feed incorrect data to the drone systems.
Cloud Storage and Data Management Vulnerabilities, inadequate security controls for drone data stored in the cloud (e.g., videos, logs, images) can lead to unauthorized access and data breaches
End of Life Decommissioning Risks, inadequately secured decommissioning processes can leave residual data accessible, or hardware could be reused maliciously
Interoperability and Integration Issues, integrating various systems and technologies without a cohesive security strategy can introduce vulnerabilities, e.g. web servers on cameras
Third Party Services and API Security, external APIs used by drones or GCS might be insecure, providing a pathway for attacks
User Error and Misconfiguration, incorrect configuration of drone systems by users can expose them to risks of unauthorized access or malfunction
What is the objective of the Cheat Sheet?
To provide developers working on mobile apps, websites, cloud systems and firmware for drones to understand the wide ranging risks.
What other resources exist in this area?
https://dronewolf.darkwolf.io/intro
https://github.com/nicholasaleks/Damn-Vulnerable-Drone
https://github.com/dhondta/dronesploit
https://github.com/jezzab/DUMLdore
The text was updated successfully, but these errors were encountered: