Abstract
Drones are becoming increasingly popular for hobbyists and recreational use. But with this surge in popularity comes increased risk to privacy as the technology makes it easy to spy on people in otherwise-private environments, such as an individual’s home. An attacker can fly a drone over fences and walls to observe the inside of a house, without having physical access. Existing drone detection systems require specialist hardware and expensive deployment efforts, making them inaccessible to the general public.
In this work, we present a drone detection system that requires minimal prior configuration and uses inexpensive commercial off-the-shelf hardware to detect drones that are carrying out privacy invasion attacks. We use a model of the attack structure to derive statistical metrics for movement and proximity that are then applied to received communications between a drone and its controller. We test our system in real-world experiments with two popular consumer drone models mounting privacy invasion attacks using a range of flight patterns. We are able both to detect the presence of a drone and to identify which phase of the privacy attack was in progress while being resistant to false positives from other mobile transmitters. For line-of-sight approaches using our kurtosis-based method, we are able to detect all drones at a distance of 6 m, with the majority of approaches detected at 25 m or farther from the target window without suffering false positives for stationary or mobile non-drone transmitters.
- Guard From Above. 2016. Intercepting Hostile Drones. Retrieved from http://guardfromabove.com/.Google Scholar
- Federal Aviation Administration. 2018. FAA Drone Registry Tops One Million. Retrieved from https://www.transportation.gov/briefing-room/faa-drone-registry-tops-one- million.Google Scholar
- Civil Aviation Authority. 2016. The Air Navigation Order 2016 And Regulations (CAP393). Retrieved from http://publicapps.caa.co.uk/docs/33/CAP20393_AUG2016.pdf.Google Scholar
- BBC. 2015. Japan Radioactive Drone: Tokyo Police Arrest Man. Retrieved from https://www.bbc.co.uk/news/world-asia-32465624.Google Scholar
- BBC. 2018. Gang who Flew Drones Carrying Drugs into Prisons Jailed. Retrieved from https://www.bbc.co.uk/news/uk-england-45980560.Google Scholar
- Minas Benyamin and Geoffrey H. Goldman. 2014. Acoustic Detection and Tracking of A Class I UAS with A Small Tetrahedral Microphone Array. Technical Report. Army Research Lab.Google Scholar
- Gabriel C. Birch and Bryana L. Woo. 2017. Counter Unmanned Aerial Systems Testing: Evaluation of VIS SWIR MWIR and LWIR Passive Imagers. Technical report, SANDIA REPORT SAND2017-0921.Google Scholar
- Simon Birnbach, Richard Baker, and Ivan Martinovic. 2017. Wi-Fly?: Detecting Privacy invasion attacks by consumer drones. In Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS’17).Google Scholar
Cross Ref
- Sanjay K. Boddhu, Matt McCartney, Oliver Ceccopieri, and Robert L. Williams. 2013. A collaborative smartphone sensing platform for detecting and tracking hostile drones. In SPIE Defense, Security, and Sensing. International Society for Optics and Photonics.Google Scholar
- Joël Busset, Florian Perrodin, Peter Wellig, Beat Ott, Kurt Heutschi, Torben Rühl, and Thomas Nussbaumer. 2015. Detection and tracking of drones using advanced acoustic cameras. In SPIE Security+ Defence. International Society for Optics and Photonics.Google Scholar
- Ellen E. Case, Anne M. Zelnio, and Brian D. Rigling. 2008. Low-cost acoustic array for small UAV detection and tracking. In Proceedings of the IEEE National Aerospace and Electronics Conference. IEEE.Google Scholar
- Philip Church, Christopher Grebe, Justin Matheson, and Brett Owens. 2018. Aerial and surface security applications using lidar. In Laser Radar Technology and Applications XXIII, Vol. 10636. International Society for Optics and Photonics, 1063604.Google Scholar
Cross Ref
- T. Eshel. 2013. Mobile radar optimized to detect UAVs, precision guided weapons. Technical report, Defense Update.Google Scholar
- User “GWA88” et al.2018. Gatwick Airport Drone Incident. Retrieved from https://en.wikipedia.org/wiki/Gatwick_Airport_drone_incident.Google Scholar
- Vijay Garg. 2010. Wireless Communications & Networking. Morgan Kaufmann.Google Scholar
- Sait Murat Giray. 2013. Anatomy of unmanned aerial vehicle hijacking with signal spoofing. In Proceedings of the 6th International Conference on Recent Advances in Space Technologies (RAST’13). IEEE, 795–800.Google Scholar
Cross Ref
- Teal Group. 2019. Global drone market estimated to reach $14 billion over next decade: study. Retrieved from https://uk.reuters.com/article/us-usa-security-drones/global-drone-market -estimated-to-reach-14-billion-over-next-decade-study-idUKKCN1UC2MU.Google Scholar
- Fraunhofer Institute. 2019. Detection of Small Drones with Millimeter-Wave Radar. Retrieved from https://www.fhr.fraunhofer.de/en/businessunits/security/Detection-of-smal l-drones-with-millimeter-wave-radar.html.Google Scholar
- BI Intelligence. 2017. Drone Market Shows Positive Outlook with Strong Industry Growth and Trends. Retrieved from https://www.businessinsider.com/drone-industry-analysis-market-trends-gro wth-forecasts-2017-7.Google Scholar
- Samy Kamkar. 2013. SkyJack. Retrieved from http://samy.pl/skyjack/.Google Scholar
- P. Molchanov, K. Egiazarian, J. Astola, R. I. A. Harmanny, and J. J. M. de Wit. 2013. Classification of small UAVs and birds by micro-Doppler signatures. In Proceedings of the European Radar Conference. 172–175.Google Scholar
- Nitis Mukhopadhyay. 2000. Probability and Statistical Inference. CRC Press.Google Scholar
- Kavitha Muthukrishnan, Berend Jan van der Zwaag, and Paul Havinga. 2009. Inferring motion and location using WLAN RSSI. In Mobile Entity Localization and Tracking in GPS-less Environnments. Springer, 163–182.Google Scholar
- Ben Nassi, Raz Ben-Netanel, Adi Shamir, and Yuval Elovici. 2019. Drones’ Cryptanalysis-Smashing Cryptography with a Flicker. In Proceedings of the IEEE Symposium on Security and Privacy (SP’19). 833–850.Google Scholar
- B. Nassi, R. Bitton, R. Masuoka, A. Shabtai, and Y. Elovici. 2021. SoK: Security and privacy in the age of commercial drones. In Proceedings of the IEEE Symposium on Security and Privacy (SP’21). IEEE Computer Society, Los Alamitos, CA, 73–90. https://doi.org/10.1109/SP40001.2021.00005Google Scholar
Cross Ref
- Phuc Nguyen, Hoang Truong, Mahesh Ravindranathan, Anh Nguyen, Richard Han, and Tam Vu. 2017. Matthan: Drone presence detection by identifying physical signatures in the drone’s RF communication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. 211–224.Google Scholar
Digital Library
- Matthew Peacock and Michael N. Johnstone. 2013. Towards detection and control of civilian unmanned aerial vehicles. In Proceedings of the 14th Australian Information Warfare Conference. 9–15. https://doi.org/10.4225/75/57a847dfbefb5Google Scholar
- Skylogic Research. 2018. DJI Market Share: Here’s Exactly how Rapidly it has Grown in Just a Few Years. Retrieved from http://thedronegirl.com/2018/09/18/dji-market-share/.Google Scholar
- Artem Rozantsev, Vincent Lepetit, and Pascal Fua. 2015. Flying objects detection from a single moving camera. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’15). IEEE.Google Scholar
Cross Ref
- Stephan Sand, Armin Dammann, and Christian Mensing. 2014. Positioning in Wireless Communications Systems. John Wiley & Sons.Google Scholar
- Linzi Sheldon. 2014. Woman Terrified by Drone Outside her Window. KIRO 7. Retrieved from http://www.kiro7.com/news/woman-terrified-drone-outside-her-window/817212 61.Google Scholar
- Daniel P. Shepard, Jahshan A. Bhatti, Todd E. Humphreys, and Aaron A. Fansler. 2012. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In Proceedings of the ION GNSS Meeting, Vol. 3.Google Scholar
- X. Shi, C. Yang, W. Xie, C. Liang, Z. Shi, and J. Chen. 2018. Anti-Drone System with Multiple Surveillance Technologies: Architecture, Implementation, and Challenges. IEEE Commun. Mag. 56, 4 (2018), 68–74. https://doi.org/10.1109/MCOM.2018.1700430Google Scholar
Cross Ref
- Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of the 24th USENIX Security Symposium (USENIX Security’15). 881–896.Google Scholar
Digital Library
- Der Spiegel. 2013. Merkel Buzzed by Mini-Drone at Campaign Event. Retrieved from https://www.spiegel.de/international/germany/merkel-campaign-event-visite d-by-mini-drone-a-922495.html.Google Scholar
- Michigan Tech. 2016. Robotic Falconry. Retrieved from http://me.sites.mtu.edu/rastgaar/home/news/.Google Scholar
- Financial Times. 2019. China’s DJI Targets Agriculture as Consumer Drone Sales Slow. Retrieved from https://www.ft.com/content/afa5e042-4c50-11e9-bbc9-6917dce3dc62.Google Scholar
- Juan R. Vasquez, Kyle M. Tarplee, Ellen E. Case, Anne M. Zelnio, and Brian D. Rigling. 2008. Multisensor 3D tracking for counter small unmanned air vehicles (CSUAV). In Proceedings of the SPIE Defense and Security Symposium. International Society for Optics and Photonics.Google Scholar
- WDRB. 2015. Hillview Man Arrested for Shooting Down Drone; Cites Right to Privacy. Retrieved from http://www.wdrb.com/story/29650818/hillview-man-arrested-for-shooting-dow n-drone-cites-right-to-privacy.Google Scholar
- Zhuoling Xiao, Hongkai Wen, Andrew Markham, Niki Trigoni, Phil Blunsom, and Jeff Frolik. 2013. Identification and mitigation of non-line-of-sight conditions using received signal strength. In Proceedings of the IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’13). IEEE, 667–674.Google Scholar
Cross Ref
Index Terms
#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones
Recommendations
Drones and Privacy
Drones, also referred to as UAV's Unmanned Aerial Vehicle, are an aircraft without a human pilot. Drones have been used by various military organisations for over a decade, but in recent years drones a have been emerging more and more in commercial and ...
U-Space and UTM Deployment as an Opportunity for More Complex UAV Operations Including UAV Medical Transport
AbstractUnmanned Aerial Vehicles (UAVs) or Unmanned Aircraft Systems (UASs) commonly called drones are relatively new entrants to the airspace. The regulatory agencies, numerous States and entities are involved in creation of the safe integration with ...
Automated execution of a pest bird deterrence system using a programmable unmanned aerial vehicle (UAV)
Highlights- Efforts towards automating bird deterrence using UAV and ground camera systems.
AbstractCrop damage caused by pest birds is a big problem around the world. As many studies have shown, existing bird control methods have not met growers' expectations regarding efficacy, reliability, and cost. Researchers are investigating ...






Comments