Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles using the Gazebo Simulator

被引:3
|
作者
Pekaric, Irdin [1 ]
Arnold, David [1 ]
Felderer, Michael [1 ]
机构
[1] Univ Innsbruck, Innsbruck, Austria
基金
奥地利科学基金会;
关键词
sensor spoofing; Gazebo simulator; quadcopters; security attacks; MAVLINK;
D O I
10.1109/QRS-C57518.2022.00016
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Conducting safety simulations in various simulators, such as the Gazebo simulator, became a very popular means of testing vehicles against potential safety risks (i.e. crashes). However, this was not the case with security testing. Performing security testing in a simulator is very difficult because security attacks are performed on a different abstraction level. In addition, the attacks themselves are becoming more sophisticated, which directly contributes to the difficulty of executing them in a simulator. In this paper, we attempt to tackle the aforementioned gap by investigating possible attacks that can be simulated, and then performing their simulations. The presented approach shows that attacks targeting the LiDAR and GPS components of unmanned aerial vehicles can be simulated. This is achieved by exploiting vulnerabilities of the ROS and MAVLink protocol and injecting malicious processes into an application. As a result, messages with arbitrary values can be spoofed to the corresponding topics, which allows attackers to update relevant parameters and cause a potential crash of a vehicle. This was tested in multiple scenarios, thereby proving that it is indeed possible to simulate certain attack types, such as spoofing and jamming.
引用
收藏
页码:44 / 53
页数:10
相关论文
共 50 条
  • [41] Simulation system for autonomous landing of unmanned aerial vehicles
    Chen, L
    Chen, ZJ
    SYSTEM SIMULATION AND SCIENTIFIC COMPUTING, VOLS 1 AND 2, PROCEEDINGS, 2005, : 499 - 503
  • [42] Analysis of design strategies for unmanned aerial vehicles using co-simulation
    Barros, Jose de Sousa
    Oliveira Freitas, Thyago
    Nigam, Vivek
    V. Brito, Alisson
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2017, 21 (3-4) : 157 - 172
  • [43] MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles
    Habibi, Javid
    Gupta, Aditi
    Carlson, Stephen
    Panicker, Ajay
    Bertino, Elisa
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, : 642 - 652
  • [44] How to Detect Cyber-attacks in Unmanned Aerial Vehicles Network?
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Messous, Mohamed-Ayoub
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [45] Fast Reactive Mechanism for Desired Trajectory Attacks on Unmanned Aerial Vehicles
    Gu, Yapei
    Guo, Kexin
    Zhao, Chenlong
    Yu, Xiang
    Guo, Lei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (08) : 8976 - 8984
  • [46] Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems
    Hadi, Hassan Jalil
    Cao, Yue
    Proceedings - 2022 International Conference on Frontiers of Information Technology, FIT 2022, 2022, : 213 - 218
  • [47] Analysis of design strategies for unmanned aerial vehicles using co-simulation
    José de Sousa Barros
    Thyago Oliveira Freitas
    Vivek Nigam
    Alisson V. Brito
    Design Automation for Embedded Systems, 2017, 21 : 157 - 172
  • [48] Search using a swarm of unmanned aerial vehicles
    Sulak, Viktor
    Kotuliak, Ivan
    Cicak, Pavel
    2017 15TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2017), 2017, : 463 - 468
  • [49] RF sensor solutions for small, lightweight unmanned aerial vehicles
    Innocenti, R
    Radar Sensor Technology 1X, 2005, 5788 : 155 - 163
  • [50] Combined Sensor of Angular Parameters for Small Unmanned Aerial Vehicles
    Filyashkin, M. K.
    2014 IEEE 3RD INTERNATIONAL CONFERENCE ON METHODS AND SYSTEMS OF NAVIGATION AND MOTION CONTROL (MSNMC), 2014, : 53 - 58