skip to main content
research-article

#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones

Published:30 September 2021Publication History
Skip Abstract Section

Abstract

Drones are becoming increasingly popular for hobbyists and recreational use. But with this surge in popularity comes increased risk to privacy as the technology makes it easy to spy on people in otherwise-private environments, such as an individual’s home. An attacker can fly a drone over fences and walls to observe the inside of a house, without having physical access. Existing drone detection systems require specialist hardware and expensive deployment efforts, making them inaccessible to the general public.

In this work, we present a drone detection system that requires minimal prior configuration and uses inexpensive commercial off-the-shelf hardware to detect drones that are carrying out privacy invasion attacks. We use a model of the attack structure to derive statistical metrics for movement and proximity that are then applied to received communications between a drone and its controller. We test our system in real-world experiments with two popular consumer drone models mounting privacy invasion attacks using a range of flight patterns. We are able both to detect the presence of a drone and to identify which phase of the privacy attack was in progress while being resistant to false positives from other mobile transmitters. For line-of-sight approaches using our kurtosis-based method, we are able to detect all drones at a distance of 6 m, with the majority of approaches detected at 25 m or farther from the target window without suffering false positives for stationary or mobile non-drone transmitters.

References

  1. Guard From Above. 2016. Intercepting Hostile Drones. Retrieved from http://guardfromabove.com/.Google ScholarGoogle Scholar
  2. Federal Aviation Administration. 2018. FAA Drone Registry Tops One Million. Retrieved from https://www.transportation.gov/briefing-room/faa-drone-registry-tops-one- million.Google ScholarGoogle Scholar
  3. Civil Aviation Authority. 2016. The Air Navigation Order 2016 And Regulations (CAP393). Retrieved from http://publicapps.caa.co.uk/docs/33/CAP20393_AUG2016.pdf.Google ScholarGoogle Scholar
  4. BBC. 2015. Japan Radioactive Drone: Tokyo Police Arrest Man. Retrieved from https://www.bbc.co.uk/news/world-asia-32465624.Google ScholarGoogle Scholar
  5. BBC. 2018. Gang who Flew Drones Carrying Drugs into Prisons Jailed. Retrieved from https://www.bbc.co.uk/news/uk-england-45980560.Google ScholarGoogle Scholar
  6. Minas Benyamin and Geoffrey H. Goldman. 2014. Acoustic Detection and Tracking of A Class I UAS with A Small Tetrahedral Microphone Array. Technical Report. Army Research Lab.Google ScholarGoogle Scholar
  7. Gabriel C. Birch and Bryana L. Woo. 2017. Counter Unmanned Aerial Systems Testing: Evaluation of VIS SWIR MWIR and LWIR Passive Imagers. Technical report, SANDIA REPORT SAND2017-0921.Google ScholarGoogle Scholar
  8. Simon Birnbach, Richard Baker, and Ivan Martinovic. 2017. Wi-Fly?: Detecting Privacy invasion attacks by consumer drones. In Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS’17).Google ScholarGoogle ScholarCross RefCross Ref
  9. Sanjay K. Boddhu, Matt McCartney, Oliver Ceccopieri, and Robert L. Williams. 2013. A collaborative smartphone sensing platform for detecting and tracking hostile drones. In SPIE Defense, Security, and Sensing. International Society for Optics and Photonics.Google ScholarGoogle Scholar
  10. Joël Busset, Florian Perrodin, Peter Wellig, Beat Ott, Kurt Heutschi, Torben Rühl, and Thomas Nussbaumer. 2015. Detection and tracking of drones using advanced acoustic cameras. In SPIE Security+ Defence. International Society for Optics and Photonics.Google ScholarGoogle Scholar
  11. Ellen E. Case, Anne M. Zelnio, and Brian D. Rigling. 2008. Low-cost acoustic array for small UAV detection and tracking. In Proceedings of the IEEE National Aerospace and Electronics Conference. IEEE.Google ScholarGoogle Scholar
  12. Philip Church, Christopher Grebe, Justin Matheson, and Brett Owens. 2018. Aerial and surface security applications using lidar. In Laser Radar Technology and Applications XXIII, Vol. 10636. International Society for Optics and Photonics, 1063604.Google ScholarGoogle ScholarCross RefCross Ref
  13. T. Eshel. 2013. Mobile radar optimized to detect UAVs, precision guided weapons. Technical report, Defense Update.Google ScholarGoogle Scholar
  14. User “GWA88” et al.2018. Gatwick Airport Drone Incident. Retrieved from https://en.wikipedia.org/wiki/Gatwick_Airport_drone_incident.Google ScholarGoogle Scholar
  15. Vijay Garg. 2010. Wireless Communications & Networking. Morgan Kaufmann.Google ScholarGoogle Scholar
  16. Sait Murat Giray. 2013. Anatomy of unmanned aerial vehicle hijacking with signal spoofing. In Proceedings of the 6th International Conference on Recent Advances in Space Technologies (RAST’13). IEEE, 795–800.Google ScholarGoogle ScholarCross RefCross Ref
  17. Teal Group. 2019. Global drone market estimated to reach $14 billion over next decade: study. Retrieved from https://uk.reuters.com/article/us-usa-security-drones/global-drone-market -estimated-to-reach-14-billion-over-next-decade-study-idUKKCN1UC2MU.Google ScholarGoogle Scholar
  18. Fraunhofer Institute. 2019. Detection of Small Drones with Millimeter-Wave Radar. Retrieved from https://www.fhr.fraunhofer.de/en/businessunits/security/Detection-of-smal l-drones-with-millimeter-wave-radar.html.Google ScholarGoogle Scholar
  19. BI Intelligence. 2017. Drone Market Shows Positive Outlook with Strong Industry Growth and Trends. Retrieved from https://www.businessinsider.com/drone-industry-analysis-market-trends-gro wth-forecasts-2017-7.Google ScholarGoogle Scholar
  20. Samy Kamkar. 2013. SkyJack. Retrieved from http://samy.pl/skyjack/.Google ScholarGoogle Scholar
  21. P. Molchanov, K. Egiazarian, J. Astola, R. I. A. Harmanny, and J. J. M. de Wit. 2013. Classification of small UAVs and birds by micro-Doppler signatures. In Proceedings of the European Radar Conference. 172–175.Google ScholarGoogle Scholar
  22. Nitis Mukhopadhyay. 2000. Probability and Statistical Inference. CRC Press.Google ScholarGoogle Scholar
  23. Kavitha Muthukrishnan, Berend Jan van der Zwaag, and Paul Havinga. 2009. Inferring motion and location using WLAN RSSI. In Mobile Entity Localization and Tracking in GPS-less Environnments. Springer, 163–182.Google ScholarGoogle Scholar
  24. Ben Nassi, Raz Ben-Netanel, Adi Shamir, and Yuval Elovici. 2019. Drones’ Cryptanalysis-Smashing Cryptography with a Flicker. In Proceedings of the IEEE Symposium on Security and Privacy (SP’19). 833–850.Google ScholarGoogle Scholar
  25. B. Nassi, R. Bitton, R. Masuoka, A. Shabtai, and Y. Elovici. 2021. SoK: Security and privacy in the age of commercial drones. In Proceedings of the IEEE Symposium on Security and Privacy (SP’21). IEEE Computer Society, Los Alamitos, CA, 73–90. https://doi.org/10.1109/SP40001.2021.00005Google ScholarGoogle ScholarCross RefCross Ref
  26. Phuc Nguyen, Hoang Truong, Mahesh Ravindranathan, Anh Nguyen, Richard Han, and Tam Vu. 2017. Matthan: Drone presence detection by identifying physical signatures in the drone’s RF communication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. 211–224.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Matthew Peacock and Michael N. Johnstone. 2013. Towards detection and control of civilian unmanned aerial vehicles. In Proceedings of the 14th Australian Information Warfare Conference. 9–15. https://doi.org/10.4225/75/57a847dfbefb5Google ScholarGoogle Scholar
  28. Skylogic Research. 2018. DJI Market Share: Here’s Exactly how Rapidly it has Grown in Just a Few Years. Retrieved from http://thedronegirl.com/2018/09/18/dji-market-share/.Google ScholarGoogle Scholar
  29. Artem Rozantsev, Vincent Lepetit, and Pascal Fua. 2015. Flying objects detection from a single moving camera. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’15). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  30. Stephan Sand, Armin Dammann, and Christian Mensing. 2014. Positioning in Wireless Communications Systems. John Wiley & Sons.Google ScholarGoogle Scholar
  31. Linzi Sheldon. 2014. Woman Terrified by Drone Outside her Window. KIRO 7. Retrieved from http://www.kiro7.com/news/woman-terrified-drone-outside-her-window/817212 61.Google ScholarGoogle Scholar
  32. Daniel P. Shepard, Jahshan A. Bhatti, Todd E. Humphreys, and Aaron A. Fansler. 2012. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In Proceedings of the ION GNSS Meeting, Vol. 3.Google ScholarGoogle Scholar
  33. X. Shi, C. Yang, W. Xie, C. Liang, Z. Shi, and J. Chen. 2018. Anti-Drone System with Multiple Surveillance Technologies: Architecture, Implementation, and Challenges. IEEE Commun. Mag. 56, 4 (2018), 68–74. https://doi.org/10.1109/MCOM.2018.1700430Google ScholarGoogle ScholarCross RefCross Ref
  34. Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of the 24th USENIX Security Symposium (USENIX Security’15). 881–896.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Der Spiegel. 2013. Merkel Buzzed by Mini-Drone at Campaign Event. Retrieved from https://www.spiegel.de/international/germany/merkel-campaign-event-visite d-by-mini-drone-a-922495.html.Google ScholarGoogle Scholar
  36. Michigan Tech. 2016. Robotic Falconry. Retrieved from http://me.sites.mtu.edu/rastgaar/home/news/.Google ScholarGoogle Scholar
  37. Financial Times. 2019. China’s DJI Targets Agriculture as Consumer Drone Sales Slow. Retrieved from https://www.ft.com/content/afa5e042-4c50-11e9-bbc9-6917dce3dc62.Google ScholarGoogle Scholar
  38. Juan R. Vasquez, Kyle M. Tarplee, Ellen E. Case, Anne M. Zelnio, and Brian D. Rigling. 2008. Multisensor 3D tracking for counter small unmanned air vehicles (CSUAV). In Proceedings of the SPIE Defense and Security Symposium. International Society for Optics and Photonics.Google ScholarGoogle Scholar
  39. WDRB. 2015. Hillview Man Arrested for Shooting Down Drone; Cites Right to Privacy. Retrieved from http://www.wdrb.com/story/29650818/hillview-man-arrested-for-shooting-dow n-drone-cites-right-to-privacy.Google ScholarGoogle Scholar
  40. Zhuoling Xiao, Hongkai Wen, Andrew Markham, Niki Trigoni, Phil Blunsom, and Jeff Frolik. 2013. Identification and mitigation of non-line-of-sight conditions using received signal strength. In Proceedings of the IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’13). IEEE, 667–674.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. #PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Privacy and Security
        ACM Transactions on Privacy and Security  Volume 24, Issue 4
        November 2021
        295 pages
        ISSN:2471-2566
        EISSN:2471-2574
        DOI:10.1145/3476876
        Issue’s Table of Contents

        Copyright © 2021 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 September 2021
        • Accepted: 1 July 2021
        • Revised: 1 April 2021
        • Received: 1 April 2020
        Published in tops Volume 24, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed
      • Article Metrics

        • Downloads (Last 12 months)89
        • Downloads (Last 6 weeks)9

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!