Academia.eduAcademia.edu

Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo

2019, IEEE Access

At present, the boom in unmanned aerial vehicles (UAV) has been increasing in recent years, placing them in an important way in the commercial market. The use of UAV in the daily tasks of industry, commerce or as entertainment for children and adults becomes more recurrent. Each of the UAVs has a specific task, depending on the technologies that are provided, in addition to their basic functions with which they were manufactured. However, in most cases the security of these UAVs is not usually taken into account since some of them are inexpensive and do not have a robust security system that protects the data they send or receive for their operation, that can cause its communication system or the operating system that controls its basic functions of flight, landing, among others, to be compromised. These computer attacks could cause physical or moral harm to people around the same operator of the UAV because they could steal information related to the locations they have visited, or intercept images or videos taken by the UAV. This paper shows the exploitation of GPS vulnerability in the commercial drone of the company 3D Robotics, this vulnerability can cause a malicious user to have control of their autonomy, and carry out illicit activities, such as overflying in spaces not allowed as an airport and private areas. The exploitation of this vulnerability is important to make known that the UAVs should have a more robust security system and also give importance to the security of GPS since the only one that has security is the military GPS. INDEX TERMS UAV, GPS, GPS spoofing, hijack, Maldrone, vulnerabilities. ANA LUCILA SANDOVAL OROZCO was born in Chivolo, Magdalena, Colombia, in 1976. She received the degree in computer science engineering from the Universidad Autónoma del Caribe, Colombia, in 2001, the Specialization Course in computer networks from the Universidad del Norte, Colombia, in 2006, and the M.Sc. degree in research in computer science and the Ph.D. degree in computer science from the Universidad Complutense de Madrid, Spain, in 2009 and 2014, respectively, where she is currently a Postdoctoral Researcher. Her main research interests include coding theory, information security, and its applications. LUIS JAVIER GARCÍA VILLALBA received the degree in telecommunication engineering from the Universidad de Málaga, Spain, in 1993, and the M.Sc. degree in computer networks and the Ph.D. degree in computer science from the

SPECIAL SECTION ON HEALTHCARE INFORMATION TECHNOLOGY FOR THE EXTREME AND REMOTE ENVIRONMENTS Received March 23, 2019, accepted April 12, 2019, date of publication April 15, 2019, date of current version April 29, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2911526 Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo SANDRA PÉREZ ARTEAGA1 , LUIS ALBERTO MARTÍNEZ HERNÁNDEZ1 , GABRIEL SÁNCHEZ PÉREZ1 , ANA LUCILA SANDOVAL OROZCO2 , AND LUIS JAVIER GARCÍA VILLALBA 2 , (Member, IEEE) 1 Instituto Politécnico Nacional, Sección de Estudios de Posgrado e Investigación, Escuela Superior de Ingeniería Mecánica y Eléctrica Unidad Culhuacán, Ciudad de México 04260, México 2 Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), 28040 Madrid, Spain Corresponding author: Luis Javier García Villalba ([email protected]) This work was supported in part by the European Union’s Horizon 2020 Research and Innovation Programme under Grant 700326, in part by the National Science and Technology Council of Mexico (CONACyT), and in part by the Instituto Politécnico Nacional. ABSTRACT At present, the boom in unmanned aerial vehicles (UAV) has been increasing in recent years, placing them in an important way in the commercial market. The use of UAV in the daily tasks of industry, commerce or as entertainment for children and adults becomes more recurrent. Each of the UAVs has a specific task, depending on the technologies that are provided, in addition to their basic functions with which they were manufactured. However, in most cases the security of these UAVs is not usually taken into account since some of them are inexpensive and do not have a robust security system that protects the data they send or receive for their operation, that can cause its communication system or the operating system that controls its basic functions of flight, landing, among others, to be compromised. These computer attacks could cause physical or moral harm to people around the same operator of the UAV because they could steal information related to the locations they have visited, or intercept images or videos taken by the UAV. This paper shows the exploitation of GPS vulnerability in the commercial drone of the company 3D Robotics, this vulnerability can cause a malicious user to have control of their autonomy, and carry out illicit activities, such as overflying in spaces not allowed as an airport and private areas. The exploitation of this vulnerability is important to make known that the UAVs should have a more robust security system and also give importance to the security of GPS since the only one that has security is the military GPS. INDEX TERMS UAV, GPS, GPS spoofing, hijack, Maldrone, vulnerabilities. I. INTRODUCTION The uses to which it can be attributed to unmanned aerial vehicles (UAV) are very diverse in different areas of research, such as military use, civil protection, border surveillance, traffic control, meteorology, control of fires, in agriculture to spread pesticides in crops, locating people among others. However, there are ill-intentioned people who use UAVs to misuse them in violation of the law or the privacy of people. The demand for UAV has been growing since some of them are low cost and accessible to users. This growing popularity is due to the fact that they use common technologies such as WiFi for their communication, GPS for positioning and navigation, putting aside costly technologies, and with this, The associate editor coordinating the review of this manuscript and approving it for publication was Sabah Mohammed. 51782 reducing production costs, as well as the different sizes or shapes making them easier. to transport them. However, when using more common technologies, the risks of vulnerabilities are raised, since there are numerous attacks that affect these technologies such as signal blocking attacks, signal spoofing, etc. Due to the great variety of uses that can be attributed to the UAVs, it has been tried to violate the security of these, causing vulnerabilities that allow the attackers to manipulate them remotely to give them different uses ranging from espionage (taking photographs or video of a person) until they are used in a kamikaze manner (a word used to refer to all kinds of suicide or terrorist attacks), causing physical and/or moral damage to the people who are involved. Some of the companies dedicated to the production of UAV recommend that the default password of the WiFi network be changed to 2169-3536 2019 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. VOLUME 7, 2019 S. P. Arteaga et al.: Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo prevent access to its communication network, but users ignore this, causing security breach. of these. On the other hand, this can be exploited for the exploitation of vulnerabilities, since, if in any case the users do not change the password by default or it is changed by a common word, known attacks towards WiFi technology can be used to try to guess the password such as brute force attacks and access to the network, this is due to the fact that an additional protection mechanism is not added to stop this type of attacks. There are also users who carry out illicit activities such as flying over an unauthorized area or flying over the UAV over too many people without knowing it, since they do not know that there are laws and rules to use a UAV. Some laws vary depending on the type of aircraft used, regardless of the common flight rules. This work shows the exploration of a GPS (GPS Spoofing) vulnerability in the ‘‘Solo’’ UAV of the company 3D Robotics since it is one of the three main UAVs used by users in the market. The exploration of this vulnerability consists of impersonating the original GPS signal by a false one, created with the help of a low-cost USB Software Defined Radio (SDR). The signal emitted by the SDR contains among its frames coordinates of a different place than the one in which the UAN is actually located. Once the coordinates are recognized by the GPS of the UAV, you can take these coordinates as true because it does not have another location system that performs a check of these coordinates which can cause it to fly over an unauthorized area believing that It is in an authorized place. Based on this you can hijack the UAV or have your autonomy. This document also mentions the three most popular UAVs among users, as well as mentioning some of the vulnerabilities that can be exploited in commercial UAVs, such as those attributed to the Parrot UAV. With which it can be demonstrated that these devices are vulnerable and that malicious people can have access to them and alter their functioning. This document is organized as follows: Section II presents the classification of drones, as well as the most popular commercial drones in the market. Section III lists the vulnerabilities that have been exploited in drones. Section IV and V present the attack on the Global Positioning System (GPS) with satisfactory results in the 3D robot Robotics Solo, and Section VI shows the conclusions of this work. II. DRONES The Real Academy of the Spanish Language defines the word drone to an ‘‘unmanned aircraft’’. ‘‘Unmanned’’ clearly refers to the remote management of the same or remotely (remote control). A drone is any aerial vehicle operated remotely. However, the aviation security agencies and official organisms, in the generality of the word drone, prefer to use terms such as Remote Piloted Airplane System (RASP), or Unmanned Aerial Vehicle (UAV) [1]. Based on the above, it can be defined that drones or unmanned aircraft are small flying devices that can be controlled remotely. In 2011, the International Civil Aviation Organization (ICAO) published circular 328 entitled Unmanned VOLUME 7, 2019 Aircraft Systems (UAS) in which it recognizes unmanned aircraft as aircraft [2]. Drones can have more than two hundred applications in the future according to their types. For example, these unmanned aircraft can be used for search and rescue missions, environmental protection, mail and delivery, missions in oceans and other diverse applications. These drones can provide a quick view around the target area without any danger. Drones equipped with infrared cameras can give images in the dark [3]. A. DRONES CLASSIFICATION The drones are equipped with different technologies depending on the specific tasks they perform. They are usually integrated with a wide variety of cameras with suitable characteristics depending on the activity that needs to be done and with different characteristics in size, weight, design, type of motor, etc. Depending on the size of the load up they can carry and its flight range they are classified as [4]: • Micro and mini drones: They weigh between 100 grams and 30 kilograms and fly up to 300 meters of altitude. Known as civil drones that have no military application, with a use of filmography, cartography, play, etc. • Tactical drones: They weigh between 150 and 1,500 Kg, they can fly at an altitude between 3000 and 8000 meters, they are known as Long Resistance Altitude or Medium Altitude Long Endurance (MALE). They are used mainly in military operations, known as combat drones. • Strategic Drones: These are large and heavy devices that can reach up to twelve tons, can fly at a maximum altitude of 20,000 meters, they are known as a High Altitude of Long Resistance or High Altitude Long Endurance (HALE). They are used in military operations. According to their wing system, they are classified as: • Drones with multirotor system: They have several wings in different angles that rotate 360 degrees. They can have a vertical takeoff and landing so it requires less space and the possibility of flying at very low speed. At the same time they are classified depending on their number of propellers in: Trichoptera, Quadcopters, Hexacopters and Octocopters. They are the most popular in the civil and sports field. • Drones with fixed wing system: These are systems like traditional airplanes, with wings in the shape of a cross. Being very efficient drones, they have greater autonomy, greater speed, lower sonic footprint and better tolerance to climatic changes. These drones have been used mostly in military life. Finally, according to the means of civil operation they are classified in [5]: • Manual mode: A radio-control station handles the aircraft during the entire flight. • Assisted mode: Similar to the manual, but the pilot defines flight intentions in his radio-control position and a self-pilot transforms those actions into the aircraft. 51783 S. P. Arteaga et al.: Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo • • Automatic mode: The pilot establishes a ‘‘ flight plan ’’ and the ship flies with a self-pilot. The pilot maintains control at all times. Except in case of emergency due to loss of communication control between the ship and the pilot. Strict autonomous mode: Similar to the automatic where a flight plan is established, but once started, the pilot cannot intervene in the control. 2) DRONE PARROT Parrot is expanding in the market of unmanned aerial vehicles (UAV), with the Parrot AR.Drone, the first quadrocopters piloted via WiFi and also with new solutions to apply the UAV market to professional use. There are different types of Parrot drones like the FPV Disk, Bebop 2 and A.R Drone 2.0. These have different types of cameras to take videos, stabilization on the flight, geographical location, etc [7]. • • • Disco FPV: It has a flight time of 45 minutes, with a range of 80 km/h, designed to fly like an airplane. Bebop 2: It has a flight time of 25 minutes and can reach a maximum speed of 60 km/h in horizontal and 21 km/h in vertical. A.R Drone 2.0: It has an automatic piloting that facilitates the takeoff and landing, and you can perform pirouettes with the AR Free Flight application. It has two versions that are the Parrot AR.Drone 2.0 Elite Edition and the Parrot AR.Drone 2.0 GPS Edition. 3) DRONE 3D ROBOTICS FIGURE 1. Drone company ranking 2016. B. POPULAR DRONES The drones most used by users in 2016 are presented in Figure 1. It shows the ranking of the 20 most important manufacturers of drones and that the first 3 leaders in the market are DJI, Parrot and 3DR Robotics. The Chinese company DJI has positioned itself as the undisputed market leader acquiring a majority position in an iconic brand of cameras and photographic lenses [6]. 1) DRONE DJI On the DJI platforms, your flight and camera stabilization system redefines the positioning and movement of the camera. Capture high-end professional images, using complex technology in the devices and making them easy to use and the products combine advanced technology with dynamic designs. There are different types of DJI drones that are used in different tasks, each one has different characteristics, such as camera types, flight stabilization, return home, etc., among the most used by ordinary users is the Phantom 3 SE and Phantom 4. • Phantom 3 SE: It has a flight autonomy of 25 minutes with a control range of 4 km. • Phantom 4: It has a flight autonomy of 30 minutes with a range of control of 4 km, two sensors of rear vision and infrared detection systems for a total of 5 directions of detection of obstacles and 4 directions of avoidance of obstacles. 51784 3D Robotics created the world class universal flight code, called APM. 3DR uses this code to develop the Pixhawk, to this day the world’s leading autopilot platform. This platform is used by the largest and most successful UAV companies and by research institutes around the world, as for example the National Aeronautics and Space Administration (NASA). In 2015, the 3DR company launched Solo, the first smart drone in the world. Alone, he brought to life the first technologies and professional tools designed specifically to make photography in the drone easy for both beginners and professionals [8]. III. VULNERABILITIES DETECTED IN DRONES Among the vulnerabilities and attacks related to drones most used today, there are attacks on the drone’s communication system and on the operating system that controls its basic functions. With these attacks you can obtain the autonomy of the drone by giving new orders or kidnapping it to obtain private information from the owner. However, most of these attacks are aimed at the drones of the French company Parrot, since they are one of the most popular drones today because of their low price can be acquired by all users. Most drones use the C or C ++ programming language. Drones programmed with these languages, including many civilian and military drones, have vulnerabilities. 3D Robotics is one of the companies that has programmed drones, using these development platforms, which are vulnerable to a cyber-attack. Hackers have begun to develop drones that have the ability to hack other drones. They have also developed Maldrone, a malware specifically designed to hack drones through Internet connections. Maldrone attacks a drone like a malware attacking a computer. VOLUME 7, 2019 S. P. Arteaga et al.: Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo Drones can be attacked by two different vectors: a physical attack vector and a logical attack vector [9]. The physical attack vector occurs when there is physical contact with the aircraft, such as firing an unmanned aircraft with a firearm, crashing it into another unmanned aircraft and capturing it with other physical equipment. In contrast, in the logical attack vector, hackers attack a drone analytically. Drones depend on several technologies to communicate with the operator and determine their flight parameters such as speed, altitude, etc. If these parameters are influenced by an attacker, the drones will react to the attacker’s command. The best example of a logical attack vector is Drone Defender invented by Ohio-based nonprofit research and development firm, Battelle. Drone Defender creates a remote control and interrupts GPS to drones up to 400 meters without any collateral damage. Some of the attacks that have been attributed to drones are mentioned below. A. VULNERABLE PORTS When a port scan is made to the drone, nmap shows two ports that can be used by an attacker. Such ports are 21 (FTP) and 23 (Telnet) among other ports that are related to the operation of the drone [10]. • File Transfer Protocol: An attack on file transfer protocol (FTP) services can be used to inject files or update some firmware. The attacker has access to the drone by connecting it to a USB stick. With this, the attacker has the ability to read, modify and delete files. • Telnet: When an attacker uses telnet he can have full access to the drone system, allowing him to modify critical system files and Shell software script, which uses the Parrot to cause any damage. In a simple case, the attacker can restart the drone in full flight, deactivating the drone’s motors causing its fall to the ground [11]. B. FLOOD The architecture of many of the radiofrequency communications protocols can be exploited to design methods that keep the channel occupied more efficiently than through a conventional jamming. The clearest example of this type of method is called Flooding. This method tries to flood the channel. In the case of WiFi, for example, certain types of packages containing information not relevant to the user can be used, with the intention of interrupting communication on that channel or even causing the access points to collapse. There are two methods for this type of attack [12]. • Denial of Service (DoS) Its purpose is to break in and prevent access to a certain service; generally by overloading the system’s computational resources or the occupation of the available bandwidth so that the user cannot use it. C. ATTACKS ON THE WIRELESS NETWORK OF DRONES One of the drones that have been attributed more vulnerabilities related to the wireless network is the AR drone 2.0 of the VOLUME 7, 2019 company Parrot. The Parrot AR dron 2.0 creates an Access Point so that a user can connect by means of his Smartphone. The access point it creates is named ‘ardron2’ followed by a random number. Once a user connects to the Acces Point device, an application can be run to gain control of this drone. The attack can be carried out using a laptop, a Wifi antenna via USB. AR drone 2.0 is turned on and after a few seconds of flight, the Access point created is visible to all devices. To access the Access Point anonymously, you can use brute force methods to find the Access Point password. However, sometimes, the default password is not modified and it is enough to consult a user manual or Internet to obtain the password. When the password is obtained, Telnet can be used to make a remote connection to the drone. With this you can explore the system and in many cases, modify the basic functions of the drone. This attack can be done using a Rasberry Pi to automate the process through a Script. The attacker will have to perform the following steps to carry out the attack [13]: 1) Login via SSH to the drone using the Raspberry Pi. 2) Change directory to the desktop to execute the scripts in a simple way. 3) Create a file so that the device is automatically linked to the access point of the drone. 4) Create a file to turn off the device when it is in flight. 5) These files should be called from a script that accomplishes this task. D. HIJACK This attack involves the hijacking of a drone in mid-flight. The SkyJack software created by Samy Kamkar seeks to fulfill this action. At present it has been found that the Parrot AR 2.0 is prone to this vulnerability. This attack can be done through a Raspberry Pi which will look for an open Parrot network. Once it is found, the software makes a connection to it by changing the SSID and eliminating the connected users. When it is reconnected, data can be sent via the Raspberry Pi to the hijacked drone. Once the drone is out of reach of the original user nothing can be done to regain control [14]. E. MALDRONE Maldrone is a more generalized software that acts as a back door. It infects the victim drone and waits for a reverse TCP connection of the drone. Once the connection is established, you can interact with the software and with the drone’s controllers/sensors directly. There is a piloting program from the AR drone 2.0 that shows the back door and kills the autopilot and takes control [14] [15]. The Maldrone has the following characteristics: • It is installed silently in a drone. • Interact with device drivers and sensors silently. • Master drone bot controller remotely. • Escape from the owner’s drone to bot master. • it can have remote surveillance. • Maldrone can be spread to other drones. 51785 S. P. Arteaga et al.: Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo IV. ATTACKS ON THE GLOBAL POSITIONING SYSTEM The global positioning system (GPS) has been used in different government sectors and in companies it has been used for most of the applications that make use of positioning in real time. Some of these applications include security services such as police, fire, rescue and ambulance. They are also commonly used in passenger bus companies, in the cargo industry, in vehicles destined for delivery of parcels, in vehicles in agriculture, in private vehicles, and in all those that use GPS for navigation. As well as in the topography, cell phones, robotics, tracking of domestic animals, etc. [16]. A. GPS OPERATION It is a radio positioning system based on multiple satellites in which each GPS satellite transmits data that allows a user to accurately measure the distance from the selected GPS satellites to their antenna and then calculate the position, speed and time parameters with a high degree of accuracy, using known triangulation techniques [17]. This technology gives life to most applications that base their operation on the location, because it is a very precise positioning technology. GPS users have the ability to obtain a 3-D position, velocity and time fix in all types of weather, 24-hours a day. GPS users can locate their position to within ± 18 ft on average or ± 60-90 ft for a worst case 3-D fix [18]. The GPS constellation needed to ensure adequate GPS coverage consists of 21 primary satellites at 10,924 nautical miles (approximately 20,200 km) in altitude. However, the satellite constellation can consist of 24 satellite positions and the 24 active satellites are generally maintained, these 24 positions have been optimized to provide the lowest possible sensitivity to the satellite failure [19]. The constellation of GPS satellites is found in six orbital planes, with four satellites in each plane. The ascending nodes of the orbital planes are equally scattered at 60◦ of distance, and the orbital planes are tilted to 55◦ . The satellites are monitored by five base stations. The main base station is located in Colorado Springs, Colorado, and the other four are located on Ascension Island (Atlantic Ocean), Diego Garcia (Indian Ocean), Kwajalein, and Hawaii (Both in the Pacific Ocean) [20]. B. ATTACKS ON THE GLOBAL POSITIONING SYSTEM The Global Positioning System, better known by its acronym GPS, is a radio-navigation system owned by the United States that provides reliable positioning, navigation and chronometric services, free and uninterrupted to civilian users all over the world. In addition, it is responsible for the emission of an additional signal with encryption so that it can be used for military purposes. The problem of civil GPS is a public code, without any security. Another system failure is the power with which the signal reaches the Earth’s surface, about -160 dBW. GPS signals are susceptible to weaknesses from three sources: unintentional interference, intentional interference and human factors, such as design deficiencies 51786 or insufficient operator training. This facilitates attacks such as [12]: • Signal blocking (jamming): As the name implies, it blocks the GPS signal in its entirety making a receiver and any system that depends on it unusable. • Spoofing Signal: It involves the creation of a false GPS signal directed to the receiver. To carry out the spoofing takes advantage of the inherent vulnerabilities of the GPS system. It must be borne in mind that in many of these vulnerabilities do not affect the military signal, since it has additional security implemented with encryption and cryptographic identification. This attack is the most difficult to detect since there are no methods for it. Currently, the vast majority of GPS receivers do not have defense algorithms against this type of attack. This is because manufacturers do not see it as a potential hazard given its complexity. V. GPS SPOOFING As mentioned previously, GPS technology guides map applications and location services that are used on a daily basis is provided by satellites orbiting the Earth. But it is possible to create a GPS signal from the ground that simulates the original. FIGURE 2. GPS attack. GPS spoofing is the act of producing a falsified version of the GPS signal with the goal of taking control of a target GPS receiver’s position-velocity-time (PVT) solution. This is most effectively accomplished when the spoofer has knowledge of the GPS signal as seen by the target receiver so that the spoofer can produce a matched, falsified version of the signal. In the Figure 2 shows how the GPS Spoofing attack works. In the case of military signals, this type of attack is nearly impossible because the military signal is encrypted and therefore unpredictable to a would-be spoofer. The civil GPS signal, on the other hand, is publiclyknown and readily predictable [21]. In Figure 3 the attack environment is observed what is used to exploit this vulnerability. VOLUME 7, 2019 S. P. Arteaga et al.: Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo Command 2. Command for the transmission of the gps-sdr-sim script. FIGURE 3. GPS attack diagram spoofing. Command 1. Command for the creation of gps-sdr-sim script. FIGURE 5. Transmission of gps-sdr-sim script. FIGURE 4. Creation of the gps-sdr-sim script. In this attack environment there are four phases which are: • Training false GPS coordinates with the help of a laptop. • Coordinates are sent using the BladeRF for transmission. • Subsequently, the drone recognizes the transmitted coordinates as if they were sent by the satellite. • Finally, a Drone Hijack can be performed. For the exploitation of this vulnerability, a laptop with a virtual machine with a Linux operating system was required, in this case, Ubuntu 14.04 and a BladeRF X40 to be able to transmit the false coordinates. For the transmission of these coordinates, the necessary libraries were installed to work with the bladeRF [22]. It should be noted that there are different software versions for the Field Programmable Gate Arrays (FPGA) and firmware that can be installed on the bladeRF. In this case you must have a version of FPGA and specific firmware so that the operation of the bladeRF is correct which in this case the X40 is used, but there is also version x115. Once the bladeRF is recognized in the system, the training of false coordinates is performed by means of the use of scripts dedicated to simulate the parameters that the drone receives when it requests its location via GPS. Subsequently, the file is created with the corresponding coordinates. In this case coordinates are placed belonging to the Mexico City. It should be mentioned that the VOLUME 7, 2019 FIGURE 6. False GPS signal recognized by the drone. coordinates can be anywhere. The creation of the script uses the command 1. The realization of the script with the false coordinates has a training time of 300 seconds as can be shown in Figure 4. Once the script is carried out, the transmission of the coordinates to the drone is continued with the help of the bladeRF, the transmission is carried out with the command 2. The transmission of the script as shown in Figure 5, it has an estimated time of five minutes in which the coordinates 51787 S. P. Arteaga et al.: Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo are sent to the drone and after those minutes the script has to be re-executed as many times as necessary so that the drone picks up the false signal. Once the above is done, it is expected that the drone captures the data transmitted by the bladeRF, it may vary some minutes but the result is satisfactory. In the exploitation of this vulnerability the control captures the false signal that is transmitted by the bladeRF until the GPS signal finds a total of 9 satellites or more as shown in Figure 6, and the drone will be ready to fly and perform its basic functions. A small observation is that at the moment of exploiting the vulnerability the bladeRF must be a short distance from the drone so that the intense of the signal is favorable in the attack. VI. CONCLUSION Due to the great popularity of drones in all areas of research, these are very useful for users who use them as in agriculture or photography. However, the vulnerabilities mentioned in this paper can be easily exploited by the technologies used by companies for the communication and control of the drone. Some of these vulnerabilities are in the wireless network and in GPS. These vulnerabilities can be easily exploited because the security of these aerial devices is not given much importance because some are inexpensive or they are used as a toy. In the research carried out, it can be deduced that the drone with the most known and exploited vulnerabilities satisfactorily are those created by the French company Parrot. This is due to the great popularity of these drones among people and the low cost they have. Vulnerabilities to be exploited can have the autonomy of the drone and thus be able to perform actions that may even harm third parties both physically and morally or simply hijack the air vehicle. However, it was possible to perform a GPS Spoofing successfully in the 3D Rootics Solo drone, in which it can be shown that the control captured the false GPS signal as authentic, allowing it to control the aircraft without any type of anomaly. The exploitation of this vulnerability in a satisfactory manner is due to the fact that the power of the GPS signal when arriving at the devices is low and all this is due to the geographical distance and position in which the GPS satellites are located and these do not have an encryption. compared to the GPS service dedicated for military use. By making a signal closer to the target, the power of the false signal is higher when executing the GPS Spoofing. This makes the attack possible and effective, allowing illintentioned people to hijack the drone and send it to another place or make it fly over an unauthorized place. From the above it can be concluded that, although drones can be very useful for people and companies that use them in their daily activities. They can also be a starting point for an attacker to seek to violate the privacy of people by obtaining confidential data or physically damaging them if it is used in a kamikase mode. 51788 REFERENCES [1] E. Drone. (2018). Eldrone. [Online]. Available: http://eldrone.es/que-esun-drone/ [2] P. Rojas and J. Duvan, ‘‘Drones en las Geociencias. Guía de Implementación en la Cartografía,’’ Facultad de Ciencias Agropecuarias, Univ. de Cundinamarca, Fusagasugá, Colombia, 2017. [3] M. Hassanalian and A. Abdelkefi, ‘‘Classifications, applications, and design challenges of drones: A review,’’ Progr. Aerosp. Sci., vol. 91, pp. 99–131, May 2017. [4] Ó. Cantos, ‘‘Drones y su aplicación en materia de seguridad y salud en el trabajo,’’ Facultad de Medicina, Univ. Miguel Hernandez, Alicante, España, 2015. [5] M. Mulas, Aplicación de los Drones en mHEALTH: Una Realidad sin Normativa Legal. Madrid, España: Universidad CEU San Pablo, 2016. [6] Waldraff. Los drones, la Tecnologia más Sobrevalorada del CES. Accessed: Feb. 15, 2019. [Online]. Available: http://techcetera.co/losdrones-la-tecnologia-mas-sobrevalorada-del-ces/ [7] The Future of Possible. [Online]. Available: https://3dr.com/about/ [8] 3D Robotics. About 3DR, Learn About 3DR and the People who Made it Possible. [Online]. Available: http://www.dji.com/company [9] M. Manimaran, ‘‘Cybersecurity in drones,’’ M.S. thesis, Utica College, Utica, NY, USA, 2016. [10] E. Deligne, ‘‘ARDrone corruption,’’ J. Comput. Virol., vol. 8, nos. 1–2, pp. 15–27, 2012. Accessed: Jan. 12, 2018. doi: 10.1107/ s11416-011-0158-4. [11] J.-S. Pleban, R. Band, and R. Creutzburg, ‘‘Hacking and securing the AR.Drone 2.0 quadcopter: Investigations for improving the security of a toy,’’ Proc. SPIE, vol. 9030, Feb. 2014, Art. no. 90300L. [12] X. W. Casanovas, ‘‘Análisis de vulnerabilidades en sistemas de drones,’’ M.S. thesis, Polytech. Univ. Catalonia, Barcelona, Spain, 2016. [13] B. Chapman. Build a WiFi Drone Disabler with Raspberry Pi. Accessed: Feb. 12, 2018. [Online]. Available: https://makezine.com/ projects/build-wi-fi-drone-disabler-with-raspberry-pi/ [14] F. Trujano, B. Chan, G. Beams, and R. Rivera, ‘‘Security analysis of DJI phantom 3 standard,’’ Massachusetts Inst. Technol., Cambridge, MA, USA, 2016. [15] S. Kamkar. Maldrone the First Backdoor for Drones. Accessed: Feb. 17, 2019. [Online]. Available: http://garage4hackers. com/entry.php?b=3105 [16] U. S. Department of Defense. (2018). Global Positioning System (GPS) 2008. [Online]. Available: https://www.gps.gov/congress/reports/ 2008/biennial-gps-report.pdf [17] A. K. Brown and M. A. Sturza, ‘‘Vehicle tracking system employing global positioning system (GPS) satellite,’’ U.S. Patent 5 225 842, Jun. 7, 1993. [18] US Air Force. Schriever Air Force Base. Accessed: Sep. 17, 2018. [Online]. Available: https://www.schriever.af.mil/GPS/ [19] C. G. B. Green, P. D. Massatt, and N. W. Rhodus, ‘‘The GPS 21 primary satellite constellation,’’ Navigation, vol. 36, no. 1, pp. 9–24, 1989. [20] G. Xu and Y. Xu, GPS: Theory, Algorithms and Applications. Springer, 2016, pp. 2–4. [21] D. P. Shepard, J. A. Bhatti, T. E. Humphreys, and A. A. Fansler, ‘‘Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks,’’ in Proc. ION GNSS, Nashville, TN, USA, Sep. 2012, pp. 3591–3605. [22] W. C. Kang and S. P. Aimin, ‘‘Time and position spoong with open source projects,’’ in Proc. Black Hat Eur., vol. 148, 2015, pp. 1–8. SANDRA PÉREZ ARTEAGA received the degree in computer engineering in 2015 and the M.Eng. degree in security engineering and information technology from the Instituto Politécnico Nacional, Mexico, in 2018. In 2017, she completed a research stay with the Group Analysis, Security and Systems (GASS), Universidad Complutense de Madrid, for six months. In 2018, she participated with a team in the Hackdef 2018 classification round of the 6th Information Security Congress organized by the Instituto Politécnico Nacional through the Sección de Estudios de Posgrado e Investigación of the Escuela Superior de Ingeniería Mecánica y Eléctrica, being in second place. Her main research interests include information security and security in unmanned aerial vehicle technologies in their different applications. VOLUME 7, 2019 S. P. Arteaga et al.: Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo LUIS ALBERTO MARTÍNEZ HERNÁNDEZ received the degree in computer engineering and the M.Eng. degree in security and information technology from the Instituto Politécnico Nacional, Mexico, in 2015 and 2018, respectively. He made a research stay with Group Analysis, Security and Systems (GASS), Universidad Complutense de Madrid, in 2017. He also did courses on network security with the Escuela Complutense de Verano and the Escuela Complutense Latinoamericana. In 2018, he participated with a team in the Hackdef 2018 classification round of the 6th Information Security Congress organized by the Instituto Politécnico Nacional through the Sección de Estudios de Posgrado e Investigación of the Escuela Superior de Ingeniería Mecánica y Eléctrica, being in second place. His main research interests include information security, mobile network technologies, and their applications. GABRIEL SÁNCHEZ PÉREZ received the degree in computer engineering from the Instituto Politécnico Nacional, Mexico, where he is currently pursuing the Ph.D. degree in communications and electronics. He did a research stay at the University of Electro-Communications (UEC), Tokyo, Japan, in 2001. He was a Postdoctoral Researcher with the Instituto Nacional de Astrofísica, Optica y Electronica, Mexico, from 2008 to 2009. His research interests include biometric security, and the development of information security strategies applied to governmental and private entities. VOLUME 7, 2019 ANA LUCILA SANDOVAL OROZCO was born in Chivolo, Magdalena, Colombia, in 1976. She received the degree in computer science engineering from the Universidad Autónoma del Caribe, Colombia, in 2001, the Specialization Course in computer networks from the Universidad del Norte, Colombia, in 2006, and the M.Sc. degree in research in computer science and the Ph.D. degree in computer science from the Universidad Complutense de Madrid, Spain, in 2009 and 2014, respectively, where she is currently a Postdoctoral Researcher. Her main research interests include coding theory, information security, and its applications. LUIS JAVIER GARCÍA VILLALBA received the degree in telecommunication engineering from the Universidad de Málaga, Spain, in 1993, and the M.Sc. degree in computer networks and the Ph.D. degree in computer science from the Universidad Politécnica de Madrid, Spain, in 1996 and 1999. He was a Visiting Scholar at Computer Security and Industrial Cryptography (COSIC), Department of Electrical Engineering, Faculty of Engineering, Katholieke Universiteit Leuven, Belgium, in 2000 and a Visiting Scientist at IBM Research Division, IBM Almaden Research Center, San Jose, CA, USA, in 2001 and 2002. He is currently an Associate Professor with the Department of Software Engineering and Artificial Intelligence, Universidad Complutense de Madrid (UCM) and the Head of the Group of Analysis, Security and Systems (GASS), School of Computer Science, UCM. His professional experience includes research projects with Hitachi, IBM, Nokia, and Safelayer Secure Communications. 51789