Access the full text.
Sign up today, get DeepDyve free for 14 days.
Ben Nassi, Raz Ben-Netanel, A. Shamir, Y. Elovici (2019)
Drones' Cryptanalysis - Smashing Cryptography with a Flicker2019 IEEE Symposium on Security and Privacy (SP)
Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici (2019)
Drones’ Cryptanalysis-Smashing Cryptography with a FlickerProceedings of the IEEE Symposium on Security and Privacy (SP’19)
Birch Carlisle, Bryana Woo (2017)
Counter Unmanned Aerial Systems Testing: Evaluation of VIS SWIR MWIR and LWIR passive imagers.
Matt Peacock, Michael Johnstone (2013)
Towards detection and control of civilian unmanned aerial vehicles
(2016)
The Air Navigation Order 2016 And Regulations (CAP393)
P. Molchanov, K. Egiazarian, J. Astola, R. Harmanny, J. Wit (2013)
Classification of small UAVs and birds by micro-Doppler signatures2013 European Radar Conference
(2016)
Intercepting Hostile Drones
Artem Rozantsev, Vincent Lepetit, Pascal Fua (2015)
Flying objects detection from a single moving cameraProceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’15). IEEE.
Artem Rozantsev, V. Lepetit, P. Fua (2014)
Flying objects detection from a single moving camera2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
Zhuoling Xiao, Hongkai Wen, A. Markham, A. Trigoni, Phil Blunsom, J. Frolik (2013)
Identification and mitigation of non-line-of-sight conditions using received signal strength2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
(2019)
Global drone market estimated to reach $14 billion over next decade: study
(2015)
Hillview Man Arrested for Shooting Down Drone; Cites Right to Privacy
S. Sand, A. Dammann, C. Mensing (2014)
Positioning in Wireless Communications Systems
Sait Giray (2013)
Anatomy of unmanned aerial vehicle hijacking with signal spoofing2013 6th International Conference on Recent Advances in Space Technologies (RAST)
(2019)
Detection of Small Drones with Millimeter-Wave Radar
M. Kendall (1956)
Probability and Statistical InferenceNature, 177
(2013)
Mobile radar optimized to detect UAVs, precision guided weapons
(2013)
Merkel Buzzed by Mini-Drone at Campaign Event
(2016)
Robotic Falconry
(2018)
Gatwick Airport Drone Incident
(2013)
SkyJack
S. Birnbach, Richard Baker, I. Martinovic (2017)
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
(2015)
Japan Radioactive Drone: Tokyo Police Arrest Man
Joël Busset, Florian Perrodin, P. Wellig, B. Ott, K. Heutschi, Torben Rühl, T. Nussbaumer (2015)
Detection and tracking of drones using advanced acoustic cameras, 9647
(2018)
FAA Drone Registry Tops One Million
P. Molchanov, K. Egiazarian, J. Astola, R. I. A. Harmanny, J. J. M. de Wit (2013)
Classification of small UAVs and birds by micro-Doppler signaturesProceedings of the European Radar Conference
M. Benyamin, G. Goldman (2014)
Acoustic Detection and Tracking of a Class I UAS with a Small Tetrahedral Microphone Array
E. Case, A. Zelnio, B. Rigling (2008)
Low-Cost Acoustic Array for Small UAV Detection and Tracking2008 IEEE National Aerospace and Electronics Conference
Phuc Nguyen, Hoang Truong, M. Ravindranathan, Anh Nguyen, Richard Han, Tam Vu (2017)
Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone's RF CommunicationProceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services
Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim (2015)
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
Daniel Shepard, J. Bhatti, T. Humphreys, Aaron Fansler (2012)
Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks
Kavitha Muthukrishnan, B. Zwaag, P. Havinga (2009)
Inferring Motion and Location Using WLAN RSSI
S. Boddhu, M. McCartney, Oliver Ceccopieri, Robert Williams (2013)
A collaborative smartphone sensing platform for detecting and tracking hostile drones, 8742
(2019)
China's DJI Targets Agriculture as Consumer Drone Sales Slow
P. Church, C. Grebe, Justin Matheson, B. Owens (2018)
Aerial and surface security applications using lidar, 10636
V. Garg (2007)
Wireless Communications & Networking
J. Vasquez, Kyle Tarplee, E. Case, A. Zelnio, B. Rigling (2008)
Multisensor 3D tracking for counter small unmanned air vehicles (CSUAV), 6971
(2018)
Gang who Flew Drones Carrying Drugs into Prisons Jailed
Ellen E. Case, Anne M. Zelnio, Brian D. Rigling (2008)
Low-cost acoustic array for small UAV detection and trackingProceedings of the IEEE National Aerospace and Electronics Conference. IEEE.
(2018)
DJI Market Share: Here's Exactly how Rapidly it has Grown in Just a Few Years
(2014)
Woman Terrified by Drone Outside her Window
Ben Nassi, Ron Bitton, R. Masuoka, A. Shabtai, Y. Elovici (2021)
SoK: Security and Privacy in the Age of Commercial Drones2021 IEEE Symposium on Security and Privacy (SP)
(2017)
Drone Market Shows Positive Outlook with Strong Industry Growth and Trends
Anti - Drone SystemwithMultiple Surveillance Technologies : Architecture , Implementation , andChallenges
Drones are becoming increasingly popular for hobbyists and recreational use. But with this surge in popularity comes increased risk to privacy as the technology makes it easy to spy on people in otherwise-private environments, such as an individual’s home. An attacker can fly a drone over fences and walls to observe the inside of a house, without having physical access. Existing drone detection systems require specialist hardware and expensive deployment efforts, making them inaccessible to the general public. In this work, we present a drone detection system that requires minimal prior configuration and uses inexpensive commercial off-the-shelf hardware to detect drones that are carrying out privacy invasion attacks. We use a model of the attack structure to derive statistical metrics for movement and proximity that are then applied to received communications between a drone and its controller. We test our system in real-world experiments with two popular consumer drone models mounting privacy invasion attacks using a range of flight patterns. We are able both to detect the presence of a drone and to identify which phase of the privacy attack was in progress while being resistant to false positives from other mobile transmitters. For line-of-sight approaches using our kurtosis-based method, we are able to detect all drones at a distance of 6 m, with the majority of approaches detected at 25 m or farther from the target window without suffering false positives for stationary or mobile non-drone transmitters.
ACM Transactions on Privacy and Security (TOPS) – Association for Computing Machinery
Published: Sep 30, 2021
Keywords: Uav
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.