DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식

As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus...

Full description

Saved in:
Bibliographic Details
Published in항공우주시스템공학회지 Vol. 17; no. 4; pp. 133 - 143
Main Authors 서승오(Seungoh Seo), 이용구(Yonggu Lee), 이세훈(Sehoon Lee), 오승렬(Seongyeol Oh), 손준영(Junyoung Son)
Format Journal Article
LanguageKorean
Published 항공우주시스템공학회 2023
Subjects
Online AccessGet full text
ISSN1976-6300
2508-7150

Cover

Abstract As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems. ICT의 발전으로 드론(이하, 무인기(Unmanned Aerial Vehicle, UAV)와 동일)이 대중화됨에 따라, 농업, 건축업 등 다양한 분야에서 드론이 유용하게 사용되고 있다. 그러나, 악의적인 공격자는 고도화된 드론을 통해 국가주요기반시설에 위협을 가할 수 있다. 이에, 불법드론의 위협에 대응하기 위해 안티드론 시스템이 개발되어왔다. 특히, 드론이 브로드캐스트하는 원격 식별 데이터(Remote-ID, R-ID) 데이터를 기반으로 불법드론을 탐지·식별하는 R-ID 기반 UAV 탐지·식별 시스템이 개발되어 세계적으로 많이 사용되고 있다. 하지만, 이러한 R-ID 기반 UAV 탐지·식별 시스템은 무선 브로드캐스트 특성으로 인해 보안에 매우 취약하다. 본 논문에서는 R-ID 기반 UAV 탐지·식별 시스템의 대표적인 예인 DJI 사(社) Aeroscope를 대상으로 보안 취약성을 분석하여, 재전송 공격(Replay Attack) 기반 무력화 방식을 제안하였다. 제안된 무력화 방식은 소프트웨어 프로그램으로 구현되어, 실제 테스트 환경에서 4가지 유형의 공격에 대해 검증되었다. 우리는 검증 결과를 통해 제안한 무력화 방식이 R-ID 기반 UAV 탐지·식별 시스템에 실효적인 무력화 방식임을 입증하였다.
AbstractList As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems. ICT의 발전으로 드론(이하, 무인기(Unmanned Aerial Vehicle, UAV)와 동일)이 대중화됨에 따라, 농업, 건축업 등 다양한 분야에서 드론이 유용하게 사용되고 있다. 그러나, 악의적인 공격자는 고도화된 드론을 통해 국가주요기반시설에 위협을 가할 수 있다. 이에, 불법드론의 위협에 대응하기 위해 안티드론 시스템이 개발되어왔다. 특히, 드론이 브로드캐스트하는 원격 식별 데이터(Remote-ID, R-ID) 데이터를 기반으로 불법드론을 탐지·식별하는 R-ID 기반 UAV 탐지·식별 시스템이 개발되어 세계적으로 많이 사용되고 있다. 하지만, 이러한 R-ID 기반 UAV 탐지·식별 시스템은 무선 브로드캐스트 특성으로 인해 보안에 매우 취약하다. 본 논문에서는 R-ID 기반 UAV 탐지·식별 시스템의 대표적인 예인 DJI 사(社) Aeroscope를 대상으로 보안 취약성을 분석하여, 재전송 공격(Replay Attack) 기반 무력화 방식을 제안하였다. 제안된 무력화 방식은 소프트웨어 프로그램으로 구현되어, 실제 테스트 환경에서 4가지 유형의 공격에 대해 검증되었다. 우리는 검증 결과를 통해 제안한 무력화 방식이 R-ID 기반 UAV 탐지·식별 시스템에 실효적인 무력화 방식임을 입증하였다.
Author 서승오(Seungoh Seo)
오승렬(Seongyeol Oh)
이세훈(Sehoon Lee)
손준영(Junyoung Son)
이용구(Yonggu Lee)
Author_xml – sequence: 1
  fullname: 서승오(Seungoh Seo)
– sequence: 2
  fullname: 이용구(Yonggu Lee)
– sequence: 3
  fullname: 이세훈(Sehoon Lee)
– sequence: 4
  fullname: 오승렬(Seongyeol Oh)
– sequence: 5
  fullname: 손준영(Junyoung Son)
BookMark eNpFjE1LAkEch4cwyMzvMJeOC7P_edmdo6iVJhn0cl12nBUWbQu3Dt0MtUN26NChwMKgCMGDZFHnPo47foeEgk6_5_A8v1WUio6jYAmlgRPXcmxOUihtS0dYghKygrJxHCrCmENdAEij3UK5hA9yh3jeuTGv7e9P039Ipl1s-gNz9TzvDXBy3TadC2wex2bYNZdPeDb9mL2N8OxrkkzucDJ-T4Yv8_tbnExGi3gNLdf9Zhxk_zaD9jaK-_ktq1LdLOVzFashCLOor4BowTQToKRUoBXhgQK3RhS1iZBM0kDyms0VUOZqrYC7gtaAaVV3Nc2g9d_XRhifhl6k46ZXzm1XgQAFzh0gDoAj_r3orBUeBTr0vZMF-K1zb6daKNo2t7mUjP4A_UtsTQ
ContentType Journal Article
DBID DBRKI
TDB
JDI
DEWEY 629.1
DatabaseName DBPIA - 디비피아
Nurimedia DBPIA Journals
KoreaScience
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
DocumentTitle_FL Replay Attack based Neutralization Method for DJI UAV Detection/Identification Systems
EISSN 2508-7150
EndPage 143
ExternalDocumentID JAKO202325572072276
NODE11515994
GroupedDBID .UV
DBRKI
TDB
JDI
ID FETCH-LOGICAL-k604-3ab20d64d462b99b2db05eb28c0b31069493e95c15b2348ddb25863c24dbf8d3
ISSN 1976-6300
IngestDate Fri Dec 22 11:59:30 EST 2023
Thu Feb 06 13:27:30 EST 2025
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Issue 4
Keywords Detection(탐지)
Replay-Attack(재전송 공격)
Identification(식별)
UAV(무인기)
Neutralization(무력화)
Anti-Drone(안티드론)
Language Korean
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-k604-3ab20d64d462b99b2db05eb28c0b31069493e95c15b2348ddb25863c24dbf8d3
Notes KISTI1.1003/JNL.JAKO202325572072276
OpenAccessLink http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO202325572072276&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
PageCount 11
ParticipantIDs kisti_ndsl_JAKO202325572072276
nurimedia_primary_NODE11515994
PublicationCentury 2000
PublicationDate 2023
PublicationDateYYYYMMDD 2023-01-01
PublicationDate_xml – year: 2023
  text: 2023
PublicationDecade 2020
PublicationTitle 항공우주시스템공학회지
PublicationTitleAlternate Journal of aerospace system engineering
PublicationYear 2023
Publisher 항공우주시스템공학회
Publisher_xml – name: 항공우주시스템공학회
SSID ssib044738222
ssib026777164
ssib029071394
ssib053377584
Score 1.8321556
Snippet As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields...
SourceID kisti
nurimedia
SourceType Open Access Repository
Publisher
StartPage 133
Title DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식
URI https://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE11515994
http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO202325572072276&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2508-7150
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044738222
  issn: 1976-6300
  databaseCode: M~E
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR09b9QwNCpdgAGBAPFZZcBTFJQ4dmyPTi6oFLVFaovKdDpf0ha1uiC4G2BARS0MlIGBAaSCigRClTpUFAQzM7-kl_4Hnp37yFDxJbFEvpf3_WL7PZ_jWNaVrEkDGmSe21AN4hKeUZcL1nAXeBpQ0VBCpXodcnIqHJ8jE_N0fuTIj8qupU5bXW0-PPS9kn-JKsAgrvot2b-I7IApAKAN8YUrRBiufxTj2sR1Z07eclBSQzxAwkNJjCTTuxdijCKmf_IIiRpKIhQFiBOnD4pNQyJJDDEFiKOxeKyp9T1A9w26SJA06NIDDuZeiKS-JzXTiJoGRlKUII4izwj0kOCGKZBHxDQ8JKkWKAQSxOlhSTFQtJorGzyKZK0iCLSRhj1oA5D4F-ZUqAwfEKkbUpvYd1P_cTPUZMgmMhoJrvlhPpPBiJgvwbiaVxZODEbNGGa00lZILQ6sxfx23lpc7Dhmn9PhJCAPXKVVAq9zI2Yph754CInRY6hZ6cfYkICYB1m-4kwv9Yl6Szjl-9Wmu_0_R1amNEg4XX2wWjnjGxjkvdxlfnnk72AeZJX-TiqTml8eVdLLj3wSDHOHwY7Oqela4pvkWOjDeSHt1d9RmXyU9Ad3HDJWrc2x0Osjw8mAEBboZLX_G8oQBrVsuSukZwEUkLqqunPcOtrq6K9fwBBayQZnT1onemWcLcs-ecoaWc5PWzehP9rQH-2DtRfFx9XvX4uNN929dbvY2CyevT94sml3n68Wa4_t4u1OsbVePH1n7-992f-0be9_2-3uvrK7O5-7Wx8OXr-0u7vbQHzGmrmWzMbjbu-LJe5yqP9hbCjspSFJSYiVEAqnYEemMG96CsqoUBARZII2fapwQHiaKkx5GDQxSZUeHM9ao628lZ2zbJUCB86aGSOEhAspV4qEgmGPpZwpf-G8NWY8UW-l91fqE_LGtH6uMKUaBWMWAsLARfW75cE19WqQLvwO4aJ1TPMslxsvWaPte53sMiTgbTVmAvsTcbmqMg
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DJI+UAV+%ED%83%90%EC%A7%80%C2%B7%EC%8B%9D%EB%B3%84+%EC%8B%9C%EC%8A%A4%ED%85%9C+%EB%8C%80%EC%83%81+%EC%9E%AC%EC%A0%84%EC%86%A1+%EA%B3%B5%EA%B2%A9+%EA%B8%B0%EB%B0%98+%EB%AC%B4%EB%A0%A5%ED%99%94+%EB%B0%A9%EC%8B%9D&rft.jtitle=%ED%95%AD%EA%B3%B5%EC%9A%B0%EC%A3%BC%EC%8B%9C%EC%8A%A4%ED%85%9C%EA%B3%B5%ED%95%99%ED%9A%8C%EC%A7%80&rft.au=%EC%84%9C%EC%8A%B9%EC%98%A4%28Seungoh+Seo%29&rft.au=%EC%9D%B4%EC%9A%A9%EA%B5%AC%28Yonggu+Lee%29&rft.au=%EC%9D%B4%EC%84%B8%ED%9B%88%28Sehoon+Lee%29&rft.au=%EC%98%A4%EC%8A%B9%EB%A0%AC%28Seongyeol+Oh%29&rft.date=2023&rft.pub=%ED%95%AD%EA%B3%B5%EC%9A%B0%EC%A3%BC%EC%8B%9C%EC%8A%A4%ED%85%9C%EA%B3%B5%ED%95%99%ED%9A%8C&rft.issn=1976-6300&rft.eissn=2508-7150&rft.volume=17&rft.issue=4&rft.spage=133&rft.epage=143&rft.externalDocID=NODE11515994
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1976-6300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1976-6300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1976-6300&client=summon