Question

In: Computer Science

The Question: Drones use the internet protocols for theircommunications. That is, the drone is a wireless...

The Question:

Drones use the internet protocols for theircommunications. That is, the drone is a wireless access point. The drone controller (usually a smartphone) connects to that access point and they communicate using the UDP protocol. This communication includes:
• the commands from the controller to the drone,
• status information (height, battery level, etc.) from the drone back to the controller, and
• the video signal from the drone back to the controller.
Please answer the following questions briefly (and in your own words):
1. If the wireless connection is not encrypted, could the connection be eavesdropped?
2. What would it mean to DoS or DDoS the drone? How might you do this?
3. What are some things you could do with a man-in-the-middle attack on the drone?.

Solutions

Expert Solution

Question 1)
Answer:

Yes, in case, the wireless communication is unencrypted, the attackers, hackers, or bad actors could eavesdrop using another device. The hacker might logically place the intruder device between the drone and the controller such as a smartphone, eavesdropping on the connection. The signals sent between the drone and the controller can be interrupted and eavesdropped in between and analyzed. In one of the possible attack scenarios, the attacker can use the control ports on the controller interrupting the operation from the user using the smartphone app as the controller and eavesdrop on the video stream sent from the drone to the controller, or make changes in the configuration and save and submit the newly changed configurations here. Thus, it is possible to eavesdrop on the video stream of the drone breaching the Wi-Fi connection, in case, the Wi-Fi network is unencrypted from the start.

Question 2)
Answer:

Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) the drone means an attacker makes an attempt, making it impossible to deliver a service. The drone's availability will be compromised. Whereas in a DoS attack, the malicious requests or data is sent by only one system. In a DDoS attack, on the other hand, the malicious requests or data are sent from multiple systems. DoS attacks are the reasons for network availability issues that influence critical Unmanned Aerial Vehicles (UAVs) applications, for example, video streaming functionality. DoS could cause either a logic attack or a resource attack. DoS logic attack exploits existing software vulnerabilities and weaknesses causing remote devices such as drones to crash or simply significantly degrade the drone's performance. DoS resource attacks overwhelm or flood the innocent or the victim's computer, smartphone, and other related devices, and network resources, sending constant streams of spurious packets.

Question 3)
Answer:

Some things that could be done with a Man-In-The-Middle (MITM) attack carried out on the drone:
* The attacker can carry out a MITM attack sending the malicious command with a sequence number always higher than the one sent from the legitimate user.
* A simple and physical MITM attack, in layman terms, such as an attacker physically possessing the drone without any authorization can make changes to the drone's hardware, component, or the entire device, or he/she can cause damage, break it, to the drone, simply steal it, etc.
* The attacker can easily get the drone off track and hijack it through MITM. The attacker can infiltrate the user's Wi-Fi network with even a very little computational power fooling and derailing the drone commanding falsified information.
* The attacker can crash the drone.
* He/she can manipulate the drone's behavior so it lands in a hostile location.


Related Solutions

Use the Internet to research information on four different EAP protocols that are supported in WPA2...
Use the Internet to research information on four different EAP protocols that are supported in WPA2 Enterprise. Write a brief description of each and indicate the relative strength of its security. Write a two page paper on your research. # No Plagiarism Please
Joe's Drones is attempting to minimize total inventory cost and maximize profits this year. Each drone...
Joe's Drones is attempting to minimize total inventory cost and maximize profits this year. Each drone costs Joe $100 to buy and he sells them for $150 each. Joe’s mom helps with the purchasing and ordering and he pays her $100 for every order she places. Joe leases warehouse space from a friend where he can store his inventory and he pays $2.50 per month for each board that he has to store to use this space. Drones are a...
Describe communication protocols and specify at least 3 of the modern protocols in use
Describe communication protocols and specify at least 3 of the modern protocols in use
What are the two transport protocols offered by the Internet and what are their main characteristics?
What are the two transport protocols offered by the Internet and what are their main characteristics?
Internet Marketing: Whats internet Marketing? Discuss an existing company that use internet marketing? how it use...
Internet Marketing: Whats internet Marketing? Discuss an existing company that use internet marketing? how it use Internet marketing to promote one of its products? which product and why? what are the benefit of internet marketing ? Support Information: As in any new industry or concept, the Internet has its share of confusing buzzwords and jargon. A website produced by Matisse Enzer, presents a comprehensive glossary of Internet terms. http://www.matisse.net/files/glossary.html Many traditional elements of marketing easily translate into Internet marketing such...
Evaluate the commercial use of drones with regard to the perceived characteristics of innovations: relative advantage,...
Evaluate the commercial use of drones with regard to the perceived characteristics of innovations: relative advantage, complexity, compatibility, risk, trialability, observability. In other words, what is the relative advantage of drones? Are they complex to use and understand? Etc. What do you think the future of drones looks like – what kinds of companies/organizations will be using them? For what purposes?​ This is not a graded assignment.
Evaluate the commercial use of drones with regard to the perceived characteristics of innovations: relative advantage,...
Evaluate the commercial use of drones with regard to the perceived characteristics of innovations: relative advantage, complexity, compatibility, risk, trialability, observability. In other words, what is the relative advantage of drones? Are they complex to use and understand? Etc.
You are designing a new food delivery service that will use drones to get the product...
You are designing a new food delivery service that will use drones to get the product to customers faster. Think about who your target market would be? If drones are delivering the product you may have some limitations as to who you can deliver to so make sure you don't say that everyone is your target market. Pick a specific demographic group, using 3 demographics to identify them, and talk about how you would market to them. Will you reach...
(45) Drones are among technologies that some companies are beginning to explore for possible use in...
(45) Drones are among technologies that some companies are beginning to explore for possible use in the supply chain. Explain clearly its potential impacts on supply chains. What are some major obstacles for full scale use of drones? (46) Do you think that Radio Frequency Identification (RFID) systems are superior to Bar Codes? Clearly explain your answer. For which of the 5 components of the SCOR framework are RFID’s most useful? Please explain your answer.
what is your opinion on this? Should companies use wireless technology for their networks? The use...
what is your opinion on this? Should companies use wireless technology for their networks? The use of wireless technology would be useful as it can promote cost-efficient measures as wireless networks are less expensive due to fewer cables being used and it’s extremely flexible because workers can still do work while away from the office. However, there’s more of a risk of being exposed to attacks, and speeds may be significantly slower than a wired network. What limits should be...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT