• Title/Summary/Keyword: Security Drone

Search Result 136, Processing Time 0.026 seconds

A General Acoustic Drone Detection Using Noise Reduction Preprocessing (환경 소음 제거를 통한 범용적인 드론 음향 탐지 구현)

  • Kang, Hae Young;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.881-890
    • /
    • 2022
  • As individual and group users actively use drones, the risks (Intrusion, Information leakage, and Sircraft crashes and so on) in no-fly zones are also increasing. Therefore, it is necessary to build a system that can detect drones intruding into the no-fly zone. General acoustic drone detection researches do not derive location-independent performance by directly learning drone sound including environmental noise in a deep learning model to overcome environmental noise. In this paper, we propose a drone detection system that collects sounds including environmental noise, and detects drones by removing noise from target sound. After removing environmental noise from the collected sound, the proposed system predicts the drone sound using Mel spectrogram and CNN deep learning. As a result, It is confirmed that the drone detection performance, which was weak due to unstudied environmental noises, can be improved by more than 7%.

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.

Data access control of KP-ABE scheme for secure communication in drone environment

  • Hwang, Yong-Woon;Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.53-60
    • /
    • 2022
  • Recently, as the amount of data collected by drones has rapidly increased, it is necessary to support cloud computing technology that can securely and efficiently store and process data. However, various security threats such as stealing, leaking, or tampering with data communicated by drones can occur due to attackers. Therefore, there is a need for security technology to provide secure communication of data collected from drones. Among various security technologies, the KP-ABE scheme, which is attribute-based encryption, is a security technology that satisfies two characteristics: data encryption and user access control. This paper researched the KP-ABE scheme and proposed a secure data access control scheme to the drone environment. This proposed scheme provides confidentiality and integrity of data communicated in a drone environment and secure access control and availability. In addition, it provides a fast ciphertext search and constant size ciphertext among the requirements to be provided in the KP-ABE scheme.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

Deregulation Necessity for the Invigoration of Drone Utilization in the Geospatial Information Field

  • Heo, Joonghyeok;Park, Joonkyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.4
    • /
    • pp.351-357
    • /
    • 2022
  • In this study, a direction for deregulation that can increase the use of drones in the field of spatial information is presented. Regulations and administrative procedures for drone operation showed similar procedures in Japan, the United States, and Korea, such as reporting flight equipment, driver's license, and prohibition of flying within a specific flight zone. In the United States, policies to encourage the use of commercial drones have been implemented, and Japan has slightly tightened regulations on drone operation to protect the Olympics and important national facilities. As a result of the study, in the area where drone operation is restricted for geospatial data construction, Korea was setting the largest area, and GIS analysis showed that Korea's drone flight restricted area was more than 19.4% of the country's land area. In order to increase the utilization of drones in the construction and utilization of spatial information in the future, it is necessary to reset the drone flight restriction zone and reduce the area of the drone flight restriction zone. In addition, it was found that Korea is the only country that has formal and specific regulations on geospatial information security management. In order to increase the construction of geospatial information using drones, it is necessary to ease GSD (Ground Sample Distance)regulations.

Efficient Scheduling Algorithm for drone power charging

  • Tajrian, Mehedi;Kim, Jai-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.60-61
    • /
    • 2019
  • Drones are opening new horizon as a major Internet-of-Things (IoT) player which is a network of objects. Drone needs to charge itself during providing services from the charging stations. If there are lots of drones and one charging station, then it is a critical situation to decide which drone should get charged first and make order of priorities for drones to get charged sequentially. In this paper, we propose an efficient scheduling algorithm for drone power charging (ESADPC), in which charging station would have a scheduler to decide which drone can get charged earlier among many other drones. Simulation results have showed that our algorithm reduces the deadline miss ration and turnaround time.

Interoperable Attribute-based Access Control Framework for Heterogeneous IoT Platforms (이기종 사물인터넷 플랫폼 간의 상호운용 가능한 속성기반 접근제어 프레임워크)

  • Kang, Giluk;Koo, Jahoon;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.219-221
    • /
    • 2022
  • 현재 사물인터넷 플랫폼이 활발히 개발됨에 따라, 이를 기반으로 사용자에게 많은 서비스가 제공되고 있다. 그러나 플랫폼들이 독자적으로 개발되고 있어 상호운용이 보장되지 못하고 있는 상황이다. 특히, 플랫폼마다 리소스를 표현하는 방식이 서로 불일치하여 리소스가 공유되더라도 이기종 플랫폼의 사용자는 리소스를 사용할 수 없는 문제가 있다. 더욱이 각각의 플랫폼들이 다양한 접근제어 모델을 사용함에 따라, 이기종 플랫폼의 사용자가 리소스 접근을 요청하더라도 인증/인가를 수행할 수 없는 상황이다. 결과적으로, 이러한 상호운용성 문제는 사물인터넷의 주요 목적인 초연결성을 달성하는 데 한계를 가져오고 있다. 이에, 본 논문에서는 이기종 사물인터넷 플랫폼 간의 상호운용이 가능한 속성기반 접근제어 프레임워크를 제안하고자 한다. 본 프레임워크는 MDR(Metadata Registry)를 기반으로 속성기반 접근제어를 위한 속성 불일치 문제를 해결하고 허가형 블록체인을 이용하여 속성기반 접근제어를 사용하지 않는 플랫폼이라도 접근제어에 대한 상호운용을 달성할 수 있도록 한다.

Drone Flight Record Forensic System through DUML Packet Analysis (DUML 패킷 분석을 통한 드론 비행기록 포렌식 시스템)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.103-114
    • /
    • 2024
  • In a situation where drone-related crimes continue to rise, research in drone forensics becomes crucial for preventing and responding to incidents involving drones. Conducting forensic analysis on flight record files stored internally is essential for investigating illegal activities. However, analyzing flight record files generated through the exclusive DUML protocol requires a deep understanding of the protocol's structure and characteristics. Additionally, a forensic analysis tool capable of handling cryptographic payloads and analyzing various drone models is imperative. Therefore, this study presents the methods and characteristics of flight record files generated by drones. It also explains the structure of the flight record file and the features of the DUML packet. Ultimately, we conduct forensic analysis based on the presented structure of the DUML packet and propose an extension forensic analysis system that operates more universally than existing tools, performing expanded syntactic analysis.

Vulnerability Analysis and Demonstration of FTP and Telnet Access in Drone Environment: Based on Product A (드론 환경에서의 FTP 및 텔넷 접속 취약점 분석 및 실증: A 드론을 대상으로)

  • Gyeongseok Oh;Jaehyuk Lee;Kyungroul Lee;Wonbin Jeong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.197-198
    • /
    • 2023
  • 드론 기술이 발전함에 따라, 최근에는 재난 구조 및 교통 관측, 과학 연구와 같은 분야에서 드론이 활용됨으로써, 사회적 및 산업적 발전에 일조하는 실정이다. 그러나 드론의 사용률이 증가하는 상황에서, 다양한 취약점을 내포한 드론으로 인하여, 심각한 보안위협이 발생하는 문제점이 존재한다. 이에 따라, 드론에서 발생하는 보안위협에 대응하기 위한 연구가 요구되며, 본 논문은 대응방안을 도출하기 위한 목적으로, 드론에서 발생 가능한 신규 취약점을 분석하고 실증한다. 본 논문에서 발굴한 신규 취약점은 A 드론을 대상으로, 기존의 다중 접속 취약점을 악용한 FTP 및 TELNET 접속 취약점이며, FTP 접속으로 암호화된 파일에 접근이 가능하고 TELNET 접속으로 루트 권한의 셸을 실행하는 신규 취약점을 발굴하였다.

  • PDF

Vulnerability Analysis and Demonstration of a GPS Spoofing Attack in Drone Environment: Based on Product G (드론 환경에서의 GPS 스푸핑 취약점 분석 및 실증: G 제품을 대상으로)

  • Sejun Hong;Suwan Ko;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.215-216
    • /
    • 2023
  • 군사 목적으로 사용되던 드론이 일반 사용자를 위한 범용 드론으로 활용 분야가 확장됨에 따라, 국방 및 운송, 물류, 농업과 같은 다양한 분야에서 활용되는 실정이며, 이와 관련된 산업의 발전에 기여하고 있다. 그러나 급격한 발전으로 인하여, 드론의 안전성은 고려하지 못한 한계점이 존재하였고, 이는 드론에서의 다양한 보안위협으로 나타났다. 본 논문에서는 4차 산업 혁명 시대의 핵심 기술인 드론의 안전성을 향상시키기 위한 목적으로, 드론의 신규 취약점을 발굴하고 실증하였다. 실험을 위하여, 최근 출시된 G 제품을 대상으로, 드론에서 발생 가능한 다양한 취약점 중 하나인 GPS 스푸핑 공격을 시도하였으며, 실험 결과, GPS 좌표를 변조함으로써, 비행이 가능한 구역에서 비행 금지 구역으로 인식하도록 좌표를 조작하였으며, 비행 금지 구역으로 인식한 드론은 준비된 동작에 따라, 강제로 착륙시키거나 다른 장소로 이동시키는 것이 가능하다. 본 논문의 결과는 드론의 안전성을 향상시키기 위한 참고 자료로 활용될 것으로 사료된다.

  • PDF