Browse > Article

무인이동체 드론의 취약점분석 및 대응기술 연구 동향  

Kim, Myoungsu (순천향대학교 정보보호학과)
You, Ilsun (순천향대학교 정보보호학과)
Yim, Kangbin (순천향대학교 정보보호학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 경상북도, "4차 산업혁명 기반 드론 산업 국내 외 동향연구 보고서", November 2019.
2 Arteaga, S. P., Hernandez, L. A. M., Perez, G. S., Orozco, A. L. S., and Villalba, L. J. G., "Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo.", IEEE Access 7 (2019): 51782-51789.   DOI
3 Dey, V., Pudi, V., Chattopadhyay, A., and Elovici, Y., "Security vulnerabilities of unmanned aerial vehicles and countermeasures: An experimental study.", 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID). IEEE, pp. 398-403, 2018.
4 Son, Y., Noh, J., Choi, J., and Kim, Y., "Gyrosfinger: Fingerprinting drones for location tracking based on the outputs of mems gyroscopes." ACM Transactions on Privacy and Security (TOPS) 21.2 (2018): 1-25.
5 Son, Y., Shin, H., Kim, D., Park, Y., Noh, J., Choi, K., ... and Kim, Y., "Rocking drones with intentional sound noise on gyroscopic sensors.", In 24th {USENIX} Security Symposium ({USENIX} Security 15), pp. 881-896., 2015,
6 Westerlund, O., and Asif, R., "Drone Hacking with Raspberry-Pi 3 and WiFi Pineapple: Security and Privacy Threats for the Internet-of-Things.", 2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS). IEEE, pp. 1-10., February 2019.
7 Kim, D., and Kim, H. K., "Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications.", arXiv preprint arXiv:1909.02786., 2019.
8 Nunez, J., Tran, V., and Katangur, A., "Protecting the Unmanned Aerial Vehicle from Cyberattacks.", In Proceedings of the International Conference on Security and Management (SAM), The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). pp. 154-157., 2019.
9 Kwon, Y. M., Yu, J., Cho, B. M., Eun, Y., and Park, K. J., "Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles.", IEEE Access, 6, 43203-43212., 2018.   DOI
10 Vasconcelos, G., Carrijo, G., Miani, R., Souza, J., and Guizilini, V., "The impact of DoS attacks on the AR. Drone 2.0.", In 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS/SBR) IEEE., pp. 127-132., October 2016.
11 Bonilla, C. A. T., Parra, O. J. S., and Forero, J. H. D., "Common security attacks on drones.", International Journal of Applied Engineering Research, 13(7), 4982-4988., 2018.
12 Domin, K., Symeonidis, I., and Marin, E. "Security analysis of the drone communication protocol: Fuzzing the MAVLink protocol.", 2016.
13 Rodday, N. M., Schmidt, R. D. O., and Pras, A. "Exploring security vulnerabilities of unmanned aerial vehicles." NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium,, IEEE, pp. 993-994, April 2016.
14 He, D., Qiao, Y., Chan, S., and Guizani, N., "Flight security and safety of drones in airborne fog computing systems." IEEE Communications Magazine, 56(5), 66-71., 2018.   DOI
15 Gudla, C., Rana, M. S., & Sung, A. H., "Defense Techniques Against Cyber Attacks on Unmanned Aerial Vehicles." Proceedings of the International Conference on Embedded Systems, Cyber-physical Systems, and Applications (ESCS)., The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), p. 110-116., 2018.
16 Chen, J., Feng, Z., Wen, J. Y., Liu, B., and Sha, L., "A container-based dos attack-resilient control framework for real-time UAV systems." In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), IEEE, pp. 1222-1227, March, 2019.
17 Cho, S. M., Hong, E., and Seo, S. H., "Random Number Generator Using Sensors for Drone.", IEEE Access, 8, 30343-30354., 2020.   DOI