Paper
23 January 2012 AR.Drone: security threat analysis and exemplary attack to track persons
Fred Samland, Jana Fruth, Mario Hildebrandt, Tobias Hoppe, Jana Dittmann
Author Affiliations +
Proceedings Volume 8301, Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques; 83010G (2012) https://doi.org/10.1117/12.902990
Event: IS&T/SPIE Electronic Imaging, 2012, Burlingame, California, United States
Abstract
In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Fred Samland, Jana Fruth, Mario Hildebrandt, Tobias Hoppe, and Jana Dittmann "AR.Drone: security threat analysis and exemplary attack to track persons", Proc. SPIE 8301, Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, 83010G (23 January 2012); https://doi.org/10.1117/12.902990
Lens.org Logo
CITATIONS
Cited by 31 scholarly publications and 1 patent.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Video

Computer security

Network security

Control systems

Embedded systems

Cameras

Back to Top