Table 4: Comparison of MAVLink security solutions.
Implementation complexity
- (*) requires coupling digital interception with physical observation and reverse kinematics.
ACKNOWLEDGEMENTS
The authors thank the anonymous reviewers,
Professor Van de Pol and Redsocks Security
researchers for their valuable comments.
REFERENCES
UAV Expert News (2016), “Drone Wars has a new front on
Retailers”, November, available at:
http://www.uavexpertnews.com/drone-wars-has-a-
new-front-on-retailers-amazon-prime-air-drone-
unveiled/ (accessed 19 December 2016).
Rodday, N., de Oliveira Schmidt, R. and Pras, A. (2016).
Exploring Security Vulnerabilities of Unmanned Aerial
Vehicles.
Meier, L., Camacho, J., Godbolt, B. and Goppert, J. (2011.).
“MAVLINK Common Message Set”, MAVLINK
Common Message set specifications, available at:
https://pixhawk.ethz.ch/mavlink
Google Groups - Toward Secure MAVLink. (2013),
available at:
https://groups.google.com/d/topic/mavlink/u0UK_-
wRVSI (accessed April 10, 2016).
Meier, L., Gho, G., Karapanos, N., & S. (2013, August).
SMAVLink Request for Comments, available at:
https://docs.google.com/document/d/1upZ_KnEgK3H
k1j0DfSHl9AdKFMoSqkAQVeK8LsngvEU/edit#
Tridgell, A., Meier, L. (2015). MAVLink 2.0 packet
signing proposal, available at: https://docs.google.
com/document/d/1ETle6qQRcaNWAmpG2wz0oOpF
KSF_bcTmYMQvtTGI8ns/edit#heading=h.r1r08t7lr2
pc (accessed 7 April 2016).
Pike, L. (2013), “Keynote talk I: Building a high-assurance
unpiloted air vehicle”, paper presented at Eleventh
IEEE/ACM International Conference on Formal
Methods and Models for Codesign (MEMOCODE),
October, pp. 33-34.
Evans, D., Nguyen-Tuong, A., & Knight, J. (2011),
Effectiveness of moving target defenses, Springer New
York Columns on Moving Target Defense, pp. 29-48.
Larsen, P., Homescu, A., Brunthaler, S., & Franz, M,
(2014), SoK: Automated software diversity, 2014 IEEE
Symposium on Security and Privacy (SP), May, pp.
276-291.
Deligne, E. (2012), ARDrone corruption, Journal in
Computer Virology, Vol. 8 No.1, pp. 15-27.
Kamkar, S. (2013), SkyJack, available at: https://github.
com/samyk/skyjack. (accessed 7 April 2016).
Marty, J. A. (2013), Vulnerability analysis of the mavlink
protocol for command and control of unmanned aircraft
(No. AFIT-ENG-14-M-50), Air force institute of
technology wright-patterson afb oh graduate school of
engineering and management.
Layer, M. P. (2013), Part 15.4: Low-Rate Wireless Personal
Area Networks (LR-WPANs).
Pike, L., Hickey, P., Bielman, J., Elliott, T., DuBuisson, T.,
Launchbury, K. (2013.), Secure MAVLink
(SMAVLink), available at:
http://smaccmpilot.org/software/commsec-
overview.html (accessed April 10, 2016).
Anderson, R., & Kuhn, M. (1996), “Tamper resistance-a
cautionary note”, in Proceedings of the second Usenix
workshop on electronic commerce, November, Vol. 2,
pp. 1-11.
Spears, R., and R. Melgares. (2011), "ZigBee security: find,
fix, finish.", presentation presented at ShmooCon,
Washington, D.C.
Sasi, R. (2015, January), Maldrone the first backdoor for
drones, Fb1h2s aka Rahul Sasi’s Blog.
Fourty, N., Van Den Bossche, A., & Val, T. (2012), “An
advanced study of energy consumption in an IEEE
802.15. 4 based network: Everything but the truth on
802.15. 4 node lifetime”, Computer Communications,
Vol. 35 No.14, pp. 1759-1767.
Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K.
(2003, August), “Analyzing the energy consumption of
security protocols”, in Proceedings of the 2003 ACM
international symposium on Low power electronics and
design, pp. 30-35.
Barrantes, E. G., Ackley, D. H., Forrest, S., & Stefanović,
D. (2005), “Randomized instruction set emulation”,
Transactions on Information and System Security
(TISSEC), ACM, Vol. 8 No. 1, pp. 3-40.
Diversity: A Poor Man’s Solution to Drone Takeover
33