Powered by OpenAIRE graph
Found an issue? Give us feedback
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Анализ защищённости устройств Ð±ÐµÑÐ¿Ð¸Ð»Ð¾Ñ‚Ð½Ñ‹Ñ Ð»ÐµÑ‚Ð°Ñ‚ÐµÐ»ÑŒÐ½Ñ‹Ñ Ð°Ð¿Ð¿Ð°Ñ€Ð°Ñ‚Ð¾Ð², ÑƒÐ¿Ñ€Ð°Ð²Ð»ÑÐµÐ¼Ñ‹Ñ Ð¿Ð¾ протоколу DSMX

выпускная квалификационная работа бакалавра

Анализ защищённости устройств Ð±ÐµÑÐ¿Ð¸Ð»Ð¾Ñ‚Ð½Ñ‹Ñ Ð»ÐµÑ‚Ð°Ñ‚ÐµÐ»ÑŒÐ½Ñ‹Ñ Ð°Ð¿Ð¿Ð°Ñ€Ð°Ñ‚Ð¾Ð², ÑƒÐ¿Ñ€Ð°Ð²Ð»ÑÐµÐ¼Ñ‹Ñ Ð¿Ð¾ протоколу DSMX

Abstract

Данная работа посвящена анализу безопасности протокола DSMX, используемого для управления беспилотными летательными аппаратами, и разработке приложения-эмулятора, демонстрирующего атаку на этот протокол. Задачи, которые решались в ходе исследования: – исследование современного рынка дронов с целью анализа используемых ими протоколов управления; – определение роли DSMX на этом рынке; – анализ сетевого стека, используемого протоколом DSMX; – изучение структуры и алгоритма работы самого протокола DSMX; – выявление уязвимостей протокола; – разработка сценария атаки на основе известных уязвимостей; – разработка программного обеспечения, эмулирующего отправителя и получатель DSMX пакетов, а также нарушителя; – сравнение полученного эмулятора с реальными устройствами. В ходе работы была представлена наиболее простая и продуктивная атака, разработан её сценарий. Целью данной атаки является перехват управления устройством. Программа-эмулятор была разработана на языке программирования C++17.

This work is devoted to security analysis of the DSMX protocol, which is used to control unmanned aerial vehicles, and to development of emulator application to demonstrate an attack towards this protocol. The following tasks were solved in scope of this work: – modern drone market examination with the aim of defining the protocol used to control the flight; – defining DSMX’s role on this market; – network stack used by DSMX analysis; – protocol’s structure and functionality algorithm investigation; – DSMX’s vulnerabilities detection; – attack scenario development based on known vulnerabilities; – software emulating DSMX message sender and recipient and an adversary development; – emulator and real devices comparison. In scope of this work the simplest and the most efficient attack was presented, its scenario was worked out. The aim of the attack is to hijack the vehicle. Emulating software was developed using C++17 programming language.

Keywords

эмулятор радио-устройств, radio device emulator, протокол DSMX, Spektrum, UAV hijacking, proprietary protocol, client-server application, radio channels, радио-каналы, клиент-серверное приложение, DSMX protocol, CYRF6936, проприетарный протокол, Ð¿ÐµÑ€ÐµÑ Ð²Ð°Ñ‚ управления БПЛА

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Related to Research communities
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!