Nav: Home

Johns Hopkins team makes hobby drones crash to expose design flaws

June 08, 2016

Sales of drones -- small flying machines equipped with cameras--are soaring. But new research by a Johns Hopkins computer security team has raised concerns about how easily hackers could cause these robotic devices to ignore their human controllers and land or, more drastically, crash.

Five graduate students and their professor discovered three different ways to send rogue commands from a computer laptop to interfere with an airborne hobby drone's normal operation and land it or send it plummeting.

The finding is important because drones, also called unmanned aerial vehicles, have become so popular that they are, pardon the expression, flying off the shelves. A recent article in Fortune, referring to the 12-month period ending in April, trumpeted that Drone Sales Have Tripled in the Last Year. And the devices are not cheap. The article stated that the average cost of a drone was more than $550, though prices vary widely depending on the sophistication of the device. A recent Federal Aviation Administration report predicted that 2.5 million hobby-type and commercial drones would be sold in 2016.

Hobby drones are flown largely for recreation and aerial photography or videography. But more advanced commercial drones can handle more demanding tasks. Farmers have begun using drones with specialized cameras to survey their fields and help determine when and where water and fertilizer should be applied. Advanced commercial drones can also help in search and rescue missions located in challenging terrain. Some businesses, such as Amazon, are exploring the use of drones to deliver merchandise to their customers.

But in their haste to satisfy consumer demands, drone makers may have left a few digital doors unlocked. "You see it with a lot of new technology," said. Lanier A. Watkins, who supervised the recent drone research at Johns Hopkins' Homewood campus. "Security is often an afterthought. The value of our work is in showing that the technology in these drones is highly vulnerable to hackers."

Watkins is a senior cyber security research scientist in the university's Whiting School of Engineering, Department of Computer Science. He also holds appointments with the Johns Hopkins Applied Physics Laboratory and the Johns Hopkins Information Security Institute.

During the past school year, Watkins' master's degree students were required to apply what they'd learned about information security by completing a capstone project. Watkins suggested they do wireless network penetration testing on a popular hobby drone and develop "exploits" from the vulnerabilities found to disrupt the process that enables a drone's operator on the ground to manage its flight.

An "exploit," explained Michael Hooper, one of the student researchers, "is a piece of software typically directed at a computer program or device to take advantage of a programming error or flaw in that device."

In the team's first successful exploit, the students bombarded a drone with about 1,000 wireless connection requests in rapid succession, each asking for control of the airborne device. This digital deluge overloaded the aircraft's central processing unit, causing it to shut down. That sent the drone into what the team referred to as "an uncontrolled landing."

In the second successful hack, the team sent the drone an exceptionally large data packet, exceeding the capacity of a buffer in the aircraft's flight application. Again, this caused the drone to crash.

For the third exploit, the researchers repeatedly sent a fake digital packet from their laptop to the drone's controller, telling it that the packet's sender was the drone itself. Eventually, the researchers said, the drone's controller started to "believe" that the packet sender was indeed the aircraft itself. It severed its own contact with the drone, which eventually led to the drone making an emergency landing.

"We found three points that were actually vulnerable, and they were vulnerable in a way that we could actually build exploits for," Watkins said. "We demonstrated here that not only could someone remotely force the drone to land, but they could also remotely crash it in their yard and just take it."

In accordance with university policy, the researchers described their drone exploit findings in a Vulnerability Disclosure Package and sent it early this year to the maker of the drone that was tested. By the end of May, the company had not responded to the findings. More recently, the researchers have begun testing higher-priced drone models to see if these devices are similarly vulnerable to hacking.

Watkins said he hopes the studies serve as a wake-up call so that future drones for recreation, aerial photography, package deliveries and other commercial and public safety tasks will leave the factories with enhanced security features already on board, instead of relying on later "bug fix" updates, when it may be too late.
-end-
The other four Johns Hopkins grad students who participated in this research with Watkins were Yifan Tian, Runzuan Zhou, Bin Cao and Wlajimir Alexis.

Color photos available; contact Phil Sneiderman.

CONTACT:

Phil Sneiderman
Office: 443-997-9907 / Cell: 410-499-7460
prs@jhu.edu On Twitter @filroy

Video:

Media reel

Johns Hopkins University

Related Research Articles:

More Research News and Research Current Events

Trending Science News

Current Coronavirus (COVID-19) News

Top Science Podcasts

We have hand picked the top science podcasts of 2020.
Now Playing: TED Radio Hour

Making Amends
What makes a true apology? What does it mean to make amends for past mistakes? This hour, TED speakers explore how repairing the wrongs of the past is the first step toward healing for the future. Guests include historian and preservationist Brent Leggs, law professor Martha Minow, librarian Dawn Wacek, and playwright V (formerly Eve Ensler).
Now Playing: Science for the People

#566 Is Your Gut Leaking?
This week we're busting the human gut wide open with Dr. Alessio Fasano from the Center for Celiac Research and Treatment at Massachusetts General Hospital. Join host Anika Hazra for our discussion separating fact from fiction on the controversial topic of leaky gut syndrome. We cover everything from what causes a leaky gut to interpreting the results of a gut microbiome test! Related links: Center for Celiac Research and Treatment website and their YouTube channel
Now Playing: Radiolab

The Flag and the Fury
How do you actually make change in the world? For 126 years, Mississippi has had the Confederate battle flag on their state flag, and they were the last state in the nation where that emblem remained "officially" flying.  A few days ago, that flag came down. A few days before that, it coming down would have seemed impossible. We dive into the story behind this de-flagging: a journey involving a clash of histories, designs, families, and even cheerleading. This show is a collaboration with OSM Audio. Kiese Laymon's memoir Heavy is here. And the Hospitality Flag webpage is here.