Implementation of GPS Attacks on DJI Phantom 3 Standard Drone as a Security Vulnerability Test | IEEE Conference Publication | IEEE Xplore

Implementation of GPS Attacks on DJI Phantom 3 Standard Drone as a Security Vulnerability Test


Abstract:

An attack on a drone is a technique used to stop or obstruct the drone's working system. These attacks can also be used to determine security vulnerabilities to drones. T...Show More

Abstract:

An attack on a drone is a technique used to stop or obstruct the drone's working system. These attacks can also be used to determine security vulnerabilities to drones. The DJI Phantom 3 Standard is a wifi-based quadcopter. In this study, navigation attacks in the form of GPS jamming and GPS spoofing were carried out on the DJI Phantom 3 Standard drone. The goal of this GPS attack in this study is to determine and analyze the extent of vulnerability in the DJI Phantom 3 Standard commercial drone GPS. The GPS jamming attack uses jamming signals with the GNU Radio Companion (GRC) app. For GPS spoofing attacks using GPS-SDR-SIM tools to create fake GPS signals for drones. The GPS attack in this study uses the BladeRF X40 Software Defined Radio (SDR) device as the main device. The results of this study indicate that GPS jamming and GPS spoofing attacks can disrupt the GPS signal and even make the drone lose control.
Date of Conference: 13-14 October 2020
Date Added to IEEE Xplore: 14 April 2021
ISBN Information:
Conference Location: Yogyakarta, Indonesia

Contact IEEE to Subscribe

References

References is not available for this document.