Loading [MathJax]/extensions/MathMenu.js
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System | IEEE Conference Publication | IEEE Xplore

Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System


Abstract:

The goal of this work was to identify and try to solve some of the vulnerabilities present in the AR Drone 2.0 by Parrot. The approach was to identify how the system work...Show More

Abstract:

The goal of this work was to identify and try to solve some of the vulnerabilities present in the AR Drone 2.0 by Parrot. The approach was to identify how the system worked, find and analyze vulnerabilities and flaws in the system as a whole and in the software, and find solutions to those problems. Analyzing the results of some tests showed that the system has an open WiFi network and the communication between the controller and the drone are unencrypted. Analyzing the Linux operating system that the drone uses, we see that "Pairing Mode" is the only way the system protects itself from unauthorized control. This is a feature that can be easily bypassed. Port scans reveal that the system has all the ports for its services open and exposed. This makes it susceptible to attacks like DoS and takeover. This research also focuses on some of the software vulnerabilities, such as Busybox that the drone runs. Lastly, this paper discuses some of the possible methods that can be used to secure the drone. These methods include securing the messages via SSH Tunnel, closing unused ports, and re-implementing the software used by the drone and the controller.
Date of Conference: 07-09 January 2019
Date Added to IEEE Xplore: 14 March 2019
ISBN Information:
Conference Location: Las Vegas, NV, USA

Contact IEEE to Subscribe

References

References is not available for this document.