Share Email Print

Proceedings Paper

Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy
Author(s): Johann-Sebastian Pleban; Ricardo Band; Reiner Creutzburg
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

Paper Details

Date Published: 18 February 2014
PDF: 12 pages
Proc. SPIE 9030, Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, 90300L (18 February 2014); doi: 10.1117/12.2044868
Show Author Affiliations
Johann-Sebastian Pleban, Fachhochschule Brandenburg (Germany)
Ricardo Band, Fachhochschule Brandenburg (Germany)
Reiner Creutzburg, Fachhochschule Brandenburg (Germany)

Published in SPIE Proceedings Vol. 9030:
Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014
Reiner Creutzburg; David Akopian, Editor(s)

© SPIE. Terms of Use
Back to Top