CN109379128A - A kind of UAV Communication system safety analysis method - Google Patents
A kind of UAV Communication system safety analysis method Download PDFInfo
- Publication number
- CN109379128A CN109379128A CN201811345473.XA CN201811345473A CN109379128A CN 109379128 A CN109379128 A CN 109379128A CN 201811345473 A CN201811345473 A CN 201811345473A CN 109379128 A CN109379128 A CN 109379128A
- Authority
- CN
- China
- Prior art keywords
- uav
- unmanned plane
- communication
- communication system
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/18502—Airborne stations
- H04B7/18506—Communications with or from aircraft, i.e. aeronautical mobile service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of UAV Communication system safety analysis methods, wherein includes: step 1: acquisition UAV Flight Control command information and unmanned plane during flying status information;Step 2: analysis unmanned aerial vehicle (UAV) control command information, whether detection communication instruction is encrypted, if going to step 4 without encryption, if so, executing step 3;Step 3: Encryption Algorithm in analysis communication protocol, trial crack encryption information, if can crack, obtain cleartext information in control instruction, go to step 4, if can not crack, go to step 5;Step 4: analysis unmanned aerial vehicle (UAV) control information format and content forge control data bag by source of UAV Flight Control instruction format, test verification and recognition capability of the UAV Communication system to packet spoof;Step 5: making a variation to each parameter of unmanned plane protocol data packet, structural anomaly communication data packet sample sends and parsed by unmanned plane, and test communication protocol whether there is security breaches.
Description
Technical field
The invention belongs to unmanned battle technical fields, and in particular to UAV Communication system safety analysis method.
Background technique
The world today has greatly pushed the modern societies such as economy, military affairs, science and technology by the information technology of representative of computer
The change in each field.As high-new wireless communication technique is grown rapidly, unmanned smart machine has become various fields of recent life not
Alternative main tool, various unmanned plane companies emerge in large numbers like the mushrooms after rain, and various unmanned planes continuously emerge.So
And unmanned plane it is caused the problem of it is also increasingly serious.Unmanned plane flies paddle, kinetic energy bring impacts and gives mankind's bring security threat
It is enough to make one injured, meanwhile, unmanned plane is also that public security and anti-terrorism bring difficulty.Only 2017, the domestic airport Duo Jia just had occurred
A lot of black winged events of " pernicious " unmanned plane, multiple UAVs invade obstacle free airspace protection zone, interfere the event of flight operational safety,
Air transportation flight safety social public security is seriously affected.
January 15, one section of doubtful aircraft flight shot with unmanned plane is produced, through the airport public security of Zhejiang Department of Public Security of Shanxi Province
Office's investigation confirmation, this unmanned plane have swarmed into Hangzhou Xiaoshan airport obstacle free airspace protection zone, and flying height is obviously in aircraft takeoffs and landings
Within height area, the normal flight of aircraft is disturbed, flight safety is affected.
There is unmanned plane interference in afternoon May 1, the Kunming International airport Chang Shui, and 35 frame flights is caused to be forced to make preparation for dropping.Early in the present
Years -3 days on the 2nd 2 months, Kunming airport continuously found that 4 unmanned planes influence flight safety events, wherein most serious together, nobody
Machine flies from only 50-70 meters of aerial passenger plane, constitutes great threat to flight safety.
05 divides when 14 days 14 April, and in Chengdu Shuangliu International Airport western strip airport headroom protection zone, discovery unmanned plane is living
It is dynamic, cause 3 frame flight of Chengdu overhead to detour, Chengdu Shuangliu International Airport ground flight waits 5 minutes.Hereafter until 30 days, again
9 " black to fly " events successively occur.
April 20, a frame unmanned plane flew into obstacle free airspace protection zone at night more than 5 points, appeared in front of landing flight i.e.,
Apart from only 600 meters or so of runway.Then, the airport Lu Kou stops landing immediately, and emergency cut-off half an hour, 14 flights are by shadow
It rings.
May 10 14:10, Zhuhai airport interfered by unknown flight signal, and the multiple flights in Zhuhai airport can not normally drop
It falls, other alternate airports such as Haikou, Guangzhou, Jieyang of making preparation for dropping after spiraling.
Evening May 12, Chongqing airport are interfered by unmanned plane, and multiple flights is caused to be affected.
Other countries of world problems faced is also extremely severe.2018, the German black winged event of unmanned plane frequently occurred, and cut
Only August part has occurred up to a hundred, more than 2017 summations.
The creation of unmanned plane and development bring no small convenience to people's production and living really, but due to it is some wantonly
The winged hand acted recklessly or the personnel sabotaged disorderly fly unmanned plane, and social public security is caused new challenge occur.Countries in the world
Also stringent regulation has been made to the use of unmanned plane.In order to effectively supervise unmanned plane, it is obviously inadequate to rely solely on laws and regulations,
Also need the solid support of technical aspect.Anti- unmanned air vehicle technique becomes direction and the emphasis of research, for the dry of unmanned plane target
Disturbing technological means mainly includes Strike, laser gun, signal interference, signal deception, sound wave interference, radio control and life
Object attack etc..It the methods of traditional countermove such as guided missile, electromagnetic interference, cannon, biological attack low efficiency and costs dearly, from
Efficiency and cost angle consider do not have the meaning used on a large scale.
Summary of the invention
The purpose of the present invention is to provide a kind of UAV Communication system safety analysis methods, above-mentioned existing for solving
The problem of technology.
A kind of UAV Communication system safety analysis method of the present invention, a kind of UAV Communication system safety analysis side
Method, wherein include: step 1: acquisition UAV Flight Control command information and unmanned plane during flying status information;Step 2: point
Unmanned aerial vehicle (UAV) control command information is analysed, whether detection communication instruction is encrypted, if going to step 4 without encryption, if so, executing step
3;Step 3: Encryption Algorithm in analysis communication protocol, trial crack encryption information, if can crack, obtain in control instruction
Cleartext information goes to step 4, if can not crack, goes to step 5;Step 4: analysis unmanned aerial vehicle (UAV) control information format and content, with nobody
Machine flight control instruction format is that control data bag is forged in source, tests verification and knowledge of the UAV Communication system to packet spoof
Other ability;Step 5: making a variation to each parameter of unmanned plane protocol data packet, structural anomaly communication data packet sample is sent
And parsed by unmanned plane, test communication protocol whether there is security breaches.
One embodiment of UAV Communication system safety analysis method according to the present invention, wherein step 1 includes acquisition
Uplink control signal and acquisition unmanned plane down link data.
One embodiment of UAV Communication system safety analysis method according to the present invention, wherein in step 3, for
UAV Communication, which is used, uses agreement in ZigBee, is cracked for the encryption information of ZigBee, restores original instruction content,
If obtaining presumptive instruction, 4 are gone to step, it is no to then follow the steps 5.
One embodiment of UAV Communication system safety analysis method according to the present invention, wherein step 4 includes: step
Rapid 4.1: the communication for having encryption being analyzed, analysis Encryption Algorithm is attempted, is decrypted;Step 4.2: analysis unmanned plane during flying
Moving model is established in track;Step 4.3: unmanned aerial vehicle (UAV) control instruction is associated mapping with sporting flying feature;Step 4.4:
Data are controlled according to the unmanned aerial vehicle (UAV) control instruction format structural anomaly that analysis parsing obtains, are sent out by communication module to unmanned plane
It send, tests verification and recognition capability of the unmanned plane to packet spoof.
One embodiment of UAV Communication system safety analysis method according to the present invention, wherein unmanned plane is communicated
Each parameter of protocol data packet makes a variation, structural anomaly communication data packet sample, sends and is parsed by unmanned plane, and test is logical
Believe that agreement whether there is security breaches.
One embodiment of UAV Communication system safety analysis method according to the present invention, wherein in step 4.1, with
ZigBee standard transmits ZigBee data and order by data frame, and each layer is packaged by next layer, is successively packaged, most
Destination node is sent to by physical layer afterwards.
The present invention is right on the basis of with studying unmanned plane machine communication protocol between communication pattern and unmanned plane clustered node
UAV Communication agreement carries out formalization analysis, security breaches present in agreement is analyzed, to UAV Communication protocol data packet
In parameter carry out sample variation construction, test unmanned plane is to the processing capacity of abnormal data packet.
Detailed description of the invention
Fig. 1 show a kind of flow chart of UAV Communication system safety analysis method of the present invention;
Fig. 2 is ZigBee data frame format figure.
Specific embodiment
To keep the purpose of the present invention, content and advantage clearer, with reference to the accompanying drawings and examples, to of the invention
Specific embodiment is described in further detail.
Fig. 1 show a kind of flow chart of UAV Communication system safety analysis method of the present invention, as shown in Figure 1, tool
Body the following steps are included:
Step 1: acquisition UAV Flight Control command information and unmanned plane during flying status information;
Including acquisition uplink control signal and acquisition unmanned plane during flying status data;
Step 2: analysis unmanned aerial vehicle (UAV) control command information, whether detection communication instruction is encrypted, if going to step without encryption
4, if so, going to step 3;
Unmanned aerial vehicle (UAV) control command information is analyzed, whether detection communication instruction is encrypted, comprising: analysis uplink control signal
Format and content, and judge whether to encrypt;
The communication protocol that UAV Communication may be used has the unmanned plane cluster of ZigBee, MAVlink etc., especially networking
Zigbee protocol may be used, supports multiple network node communication, Zigbee protocol can use 128 AES in the secure mode
Encryption Algorithm.When ZigBee uses non-security mode, communication data packets are not encrypted, can directly acquire network configuration
Information, topology, node address etc. can be obtained distribution key by the data packet of crawl, led to when ZigBee uses safe mode
Encryption is crossed to crack module and cracked;
Step 3: Encryption Algorithm in analysis communication protocol, trial crack encryption information, if can crack, obtain control
Cleartext information in instruction, goes to step 4, if can not crack, goes to step 5;
Step 3 specifically includes: analyzing the communication for having encryption, cracks module by encryption and be decrypted;
Still by taking Zigbee protocol as an example, the MAC layer of ZigBee uses the anticollision mechanism of CSMA/CA, the number of each transmission
Next data can be just sent according to the confirmation feedback that packet will obtain recipient, otherwise sender can retransmit data.And
ZigBee provides the data packet integrity checking function based on cyclic redundancy check (CRC), using 128 AES encryptions
Algorithm protects data.Trial cracks Encryption Algorithm, cracks reduction original instruction content, if obtaining presumptive instruction, turns
Step 4;
Step 4: analysis unmanned aerial vehicle (UAV) control information format and content are forged as source using UAV Flight Control instruction format and are controlled
Data packet processed tests verification and recognition capability of the UAV Communication system to packet spoof.
It specifically includes: step 4.1: the communication for having encryption being analyzed, analysis Encryption Algorithm is attempted, is decrypted;
By taking Zigbee protocol as an example, ZigBee standard is respectively physical layer (PHY), MAC layer from top to bottom
(MAC), transport layer (TL), network layer (NWK), application layer (APL) etc., and define security service and mechanism is provided.Standard bottom
Media Access Layer and physical layer defined by IEEE802.15.4 standard, ZigBee standard define only network layer, application layer with
And safe floor, and use a part of the MAC layer and physical layer of ready-made IEEE802.15.4 as ZigBee-network agreement;
ZigBee data and order are transmitted by data frame, and each layer is packaged by next layer, are successively packaged, finally
Destination node is sent to by physical layer;
Fig. 2 is ZigBee data frame format figure, as shown in Fig. 2, ZigBee data and order are passed by data frame
It passs, each layer is packaged by next layer, is successively packaged, is finally sent to destination node by physical layer;
Step 4.2: moving model is established in analysis unmanned plane during flying track;
Step 4.3: unmanned aerial vehicle (UAV) control instruction is associated mapping with sporting flying feature;
Step 4.4: controlling data according to the unmanned aerial vehicle (UAV) control instruction format structural anomaly that analysis parsing obtains, pass through communication
Module is sent to unmanned plane, tests verification and recognition capability of the unmanned plane to packet spoof;
Step 5: it makes a variation to each parameter of unmanned plane protocol data packet, structural anomaly communication data packet sample, hair
It send and is parsed by unmanned plane, test communication protocol whether there is security breaches.
Step 5 carries out formalization analysis to UAV Communication agreement, security breaches present in agreement is analyzed, to unmanned plane
Parameter in communication protocol data packet carries out sample variation construction, processing capacity of the test unmanned plane to abnormal data packet.
By the analysis to UAV Communication system, the tender spots of UAV Communication agreement is found, for black winged unmanned plane
The interference of level for implementation can effectively expel the unmanned plane on airport.
The present invention is right on the basis of with studying unmanned plane machine communication protocol between communication pattern and unmanned plane clustered node
UAV Communication agreement carries out formalization analysis, security breaches present in agreement is analyzed, to UAV Communication protocol data packet
In parameter carry out sample variation construction, test unmanned plane is to the processing capacity of abnormal data packet.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the technical principles of the invention, several improvement and deformations can also be made, these improvement and deformations
Also it should be regarded as protection scope of the present invention.
Claims (6)
1. a kind of UAV Communication system safety analysis method characterized by comprising
Step 1: acquisition UAV Flight Control command information and unmanned plane during flying status information;
Step 2: analysis unmanned aerial vehicle (UAV) control command information, whether detection communication instruction is encrypted, if going to step 4 without encryption, if
Have, executes step 3;
Step 3: Encryption Algorithm in analysis communication protocol, trial crack encryption information, if can crack, obtain control instruction
Middle cleartext information, goes to step 4, if can not crack, goes to step 5;
Step 4: analysis unmanned aerial vehicle (UAV) control information format and content forge control number by source of UAV Flight Control instruction format
According to packet, verification and recognition capability of the UAV Communication system to packet spoof are tested;
Step 5: making a variation to each parameter of unmanned plane protocol data packet, structural anomaly communication data packet sample is sent simultaneously
It is parsed by unmanned plane, test communication protocol whether there is security breaches.
2. UAV Communication system safety analysis method as described in claim 1, which is characterized in that step 1 includes acquisition
Uplink control signal and acquisition unmanned plane down link data.
3. UAV Communication system safety analysis method as described in claim 1, which is characterized in that in step 3, for nothing
Man-machine communication, which is used, uses agreement in ZigBee, is cracked for the encryption information of ZigBee, restores original instruction content, if
It obtains presumptive instruction, goes to step 4, it is no to then follow the steps 5.
4. UAV Communication system safety analysis method as described in claim 1, which is characterized in that step 4 includes:
Step 4.1: the communication for having encryption being analyzed, analysis Encryption Algorithm is attempted, is decrypted;
Step 4.2: moving model is established in analysis unmanned plane during flying track;
Step 4.3: unmanned aerial vehicle (UAV) control instruction is associated mapping with sporting flying feature;
Step 4.4: controlling data according to the unmanned aerial vehicle (UAV) control instruction format structural anomaly that analysis parsing obtains, pass through communication module
It is sent to unmanned plane, tests verification and recognition capability of the unmanned plane to packet spoof.
5. UAV Communication system safety analysis method as described in claim 1, which is characterized in that communicate and assist to unmanned plane
View each parameter of data packet makes a variation, and structural anomaly communication data packet sample sends and parsed by unmanned plane, test communication
Agreement whether there is security breaches.
6. UAV Communication system safety analysis method as claimed in claim 4, which is characterized in that in step 4.1, with
ZigBee standard transmits ZigBee data and order by data frame, and each layer is packaged by next layer, is successively packaged, most
Destination node is sent to by physical layer afterwards.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811345473.XA CN109379128A (en) | 2018-11-13 | 2018-11-13 | A kind of UAV Communication system safety analysis method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811345473.XA CN109379128A (en) | 2018-11-13 | 2018-11-13 | A kind of UAV Communication system safety analysis method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109379128A true CN109379128A (en) | 2019-02-22 |
Family
ID=65385016
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811345473.XA Pending CN109379128A (en) | 2018-11-13 | 2018-11-13 | A kind of UAV Communication system safety analysis method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109379128A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110430254A (en) * | 2019-07-31 | 2019-11-08 | 西安爱生无人机技术有限公司 | A kind of unmanned controller analytic signal method, signal processing method and system |
CN117596598A (en) * | 2024-01-19 | 2024-02-23 | 国网冀北电力有限公司 | Unmanned aerial vehicle communication protocol data anomaly detection method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105857637A (en) * | 2016-06-08 | 2016-08-17 | 广东容祺智能科技有限公司 | Unmanned aerial vehicle self-checking system |
KR101687115B1 (en) * | 2015-09-09 | 2016-12-15 | 한국과학기술원 | Encrypted packet transmission of communication system |
CN106788480A (en) * | 2017-03-20 | 2017-05-31 | 上海资誉电子科技有限公司 | The winged control signal testing method and system of unmanned plane |
US20170359360A1 (en) * | 2016-06-14 | 2017-12-14 | Nucleon Ltd. | System and method for gathering botnet cyber intelligence |
CN108023862A (en) * | 2016-11-03 | 2018-05-11 | 上海大学 | A kind of unmanned vehicle group system and control method based on Zigbee remote controls |
CN108737451A (en) * | 2018-07-05 | 2018-11-02 | 北京计算机技术及应用研究所 | A kind of unmanned plane attack method based on communication hijack |
-
2018
- 2018-11-13 CN CN201811345473.XA patent/CN109379128A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101687115B1 (en) * | 2015-09-09 | 2016-12-15 | 한국과학기술원 | Encrypted packet transmission of communication system |
CN105857637A (en) * | 2016-06-08 | 2016-08-17 | 广东容祺智能科技有限公司 | Unmanned aerial vehicle self-checking system |
US20170359360A1 (en) * | 2016-06-14 | 2017-12-14 | Nucleon Ltd. | System and method for gathering botnet cyber intelligence |
CN108023862A (en) * | 2016-11-03 | 2018-05-11 | 上海大学 | A kind of unmanned vehicle group system and control method based on Zigbee remote controls |
CN106788480A (en) * | 2017-03-20 | 2017-05-31 | 上海资誉电子科技有限公司 | The winged control signal testing method and system of unmanned plane |
CN108737451A (en) * | 2018-07-05 | 2018-11-02 | 北京计算机技术及应用研究所 | A kind of unmanned plane attack method based on communication hijack |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110430254A (en) * | 2019-07-31 | 2019-11-08 | 西安爱生无人机技术有限公司 | A kind of unmanned controller analytic signal method, signal processing method and system |
CN117596598A (en) * | 2024-01-19 | 2024-02-23 | 国网冀北电力有限公司 | Unmanned aerial vehicle communication protocol data anomaly detection method |
CN117596598B (en) * | 2024-01-19 | 2024-03-29 | 国网冀北电力有限公司 | Unmanned aerial vehicle communication protocol data anomaly detection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Strohmeier et al. | Realities and challenges of nextgen air traffic management: the case of ADS-B | |
US9646502B1 (en) | Universal unmanned aerial vehicle identification system | |
Krichen et al. | Security challenges for drone communications: Possible threats, attacks and countermeasures | |
EP3249880B1 (en) | Sensor network | |
CN109379128A (en) | A kind of UAV Communication system safety analysis method | |
CN107097810A (en) | A kind of Along Railway foreign body intrusion UAV Intelligent identification and method for early warning and system | |
KR20180043912A (en) | System for cooperative anti-drone and method for cooperation control of anti-drones | |
CN213661639U (en) | Full-frequency-band detection and counter-control automatic management and control system of unmanned aerial vehicle | |
CN110061801B (en) | Abnormal target discrimination system and method in aviation monitoring system | |
CN108737451A (en) | A kind of unmanned plane attack method based on communication hijack | |
CN109282700A (en) | A kind of unmanned plane of cognitive radio is counter to chase orientation method and counter device | |
la Cour-Harbo | The value of step-by-step risk assessment for unmanned aircraft | |
US20210256857A1 (en) | Method and device for generating flight restriction zone, and method and device for controlling flight of unmanned aerial vehicle | |
CN111610538A (en) | Unmanned aerial vehicle navigation decoy system | |
CN107479574A (en) | A kind of unmanned plane management-control method and device based on mobile communication technology | |
US10003973B2 (en) | Aircraft wireless network for fixed aircraft components | |
Mirzaei et al. | Security of ADS-B: Attack scenarios | |
Bogoda et al. | A systems engineering approach to appraise cybersecurity risks of CNS/ATM and avionics systems | |
CN113923653A (en) | Wireless unmanned aerial vehicle inspection and information safety protection system that charges | |
US20180026707A1 (en) | System and method for re-broadcasting ads-b data | |
Dovgal et al. | Security analysis of a swarm of drones resisting attacks by intruders | |
CN109474327B (en) | Civil wide-body passenger plane airborne information system | |
Xie et al. | Cybersecurity trends in low-altitude air traffic management | |
Chen et al. | Vulnerabilities in ADS-B and verification method | |
Perner et al. | Security concept for unoccupied aerial systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190222 |