• Title/Summary/Keyword: 공격용 드론

Search Result 13, Processing Time 0.01 seconds

The Development of Artificial Intelligence-Enabled Combat Swarm Drones in the Future Intelligent Battlefield (지능화 전장에서 인공지능 기반 공격용 군집드론 운용 방안)

  • Hee Chae;Kyung Suk Lee;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.65-71
    • /
    • 2023
  • The importance of combat drones has been highlighted through the recent outbreak of the Russia-Ukraine war. The combat drones play a significant role as a a game changer that alters the conventional wisdom of traditional warfare. Many pundits expect the role of combat swarm drones would be more crucial in the future warfare. In this regard, this paper aims to analyze the development of artificial intelligence-enabled combat swarm drones. To transform the human-operated swarm drones into fully autonomous weaponry system our suggestions are as follows. Developments of (1) AI algorithms for optimized swarm drone operations, (2) decentralized command and control system, (3) inter-drones' mission analysis and allocation technology, (4) enhanced drone communication security and (5) set up of ethical guideline for the autonomous system. Specifically, we suggest the development of AI algorithms for drone collision avoidance and moving target attacks. Also, in order to adjust rapidly changing military environment, decentralized command and control system and mission analysis allocation technology are necessary. Lastly, cutting-edging secure communication technology and concrete ethical guidelines are essential for future AI-enabled combat swarm drones.

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

A Study of Security Evaluation Criteria for Reconnaissance Drone (정찰 드론 보안성 평가 기준에 대한 연구)

  • Gu, Do-hyung;Kim, Seung-joo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.591-605
    • /
    • 2022
  • As drones are widely used, attack attempts using drone vulnerabilities are increasing, and drone security is growing in importance. This paper derives security requirements for reconnaissance drone delivered to government office through threat modeling. Threats are analyzed by the data flow of the drone and collecting possible vulnerabilities. Attack tree is built by analyzed threats. The security requirements were derived from the attack tree and compared with the security requirements suggested by national organizations. Utilizing the security requirements derived from this paper will help in the development and evaluation of secure drones.

Science Technology - 드론, 날다 지치면 휴식 취한다

  • Kim, Hyeong-Ja
    • TTA Journal
    • /
    • s.166
    • /
    • pp.72-73
    • /
    • 2016
  • 지금은 드론(drone) 시대다. 무선전파로 유도해 비행과 조종이 가능한 무인 비행체 드론은 원래 '낮게 웅웅거림'을 뜻하는 말이다. 벌이 날아다니며 '웅웅'거리는 소리에 칙안에 붙여진 이름. 처음엔 군사용으로 탄생했지만, 이제는 고공영상 사진촬영과 배달, 기상정보 수집, 농약 살포 등 다양한 분야에서 활용되고 있다. 단 하나의 흠이라면 비행 중 휴식을 취할 수 없다는 것. 춤추듯 날아다니는 연약한 나비도 힘들면 식물의 잎에 앉아 쉬고, 여름철 왕성하게 활동하는 모기도 벽에 붙어 쉬면서 먹잇감 공격을 엿보는데, 드론은 공중에 잠시 멈출 때에도 날갯짓을 계속해야 한다. 이러한 드론의 휴식을 위해 과학자들이 다양한 '쉬어가기' 기술을 내놓고 있다.

  • PDF

A study on security threats to drones using open source and military drone attack scenarios using telemetry hijacking (오픈소스 활용 드론에 대한 보안 위협과 Telemetry Hijacking을 이용한 군용 드론 공격 시나리오 연구)

  • Lee, Woojin;Seo, Kyungdeok;Chae, Byeongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.103-112
    • /
    • 2020
  • Recently, the interest in hobby/leisure drones is increasing in the private sector, and the military also uses drones in various countries such as North Korea, the United States, and Iran for military purposes such as reconnaissance and destruction. A variety of drone related research is underway, such as establishing and operating drone units within the Korean military. Inparticular, recently, as the size of drone flight control source code increases and the number of functions increases, drone developers are getting accustomed to using open sources and using them without checking for separate security vulnerabilities. However, since these open sources are actually accessible to attackers, they are inevitably exposed to various vulnerabilities. In this paper, we propose an attack scenario for military drones using open sources in connection with these vulnerabilities using Telemetry Hijacking techniques.

A Study on Overseas Battle Cases Using Combat Drone (공격 드론을 활용한 해외 전투사례 연구)

  • Sang-Hyuk Park;Sung-Kwon Kim;Seung-Pil Namgung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.403-407
    • /
    • 2023
  • This study started with the background that future South Korean military organizations should develop a complex system linking unmanned systems by analyzing and considering cases using "drone," which has recently become an essential means of war. In 2014 and 2022, South Korea is facing serious security threats from North Korean drones that have recently invaded South Korea's airspace in a row. If a North Korean drone was loaded with explosives and poisonous gas and invaded our airspace, the damage would be more serious. Furthermore, what the Azerbaijan-Armenian War of 2020 and the ongoing Ukraine-Russia war have in common is that battles using "combat drones" are underway. Watching this shift in the domestic and overseas war paradigm, drones have become essential for military operations. In the context of a "ceasefire" and the military environment on the Korean Peninsula, South Korea should actively develop "Combat drones" that take into account precise strikes and portability against targets linked to military drones.

A Basic Study on the Selection of Required Operational Capability for Attack Drones of Army TIGER Units Using AHP Technique (AHP 기법을 이용한 Army TIGER 부대 공격용 드론의 작전요구성능 선정에 관한 기초 연구)

  • Jinho Lee;Seongjin Kwon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.2
    • /
    • pp.197-204
    • /
    • 2023
  • The importance of each warfighting function for Army TIGER unit attack drones is measured using the AHP technique. As a result, the importance of attack drones is high in the order of maneuver, firepower, intelligence, command/control, protection, and operation sustainment, but the importance of maneuver, firepower, and intelligence are almost similar. In addition, it is analyzed that attack drones capable of carrying out day and night missions by being equipped with an EO/IR sensor and being commanded/controlled in conjunction with the C4I system to eliminate threats with small bombs or aircraft collisions is needed. Finally, based on the results of this study, a virtual battle scenario for attack drones is proposed.

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF