Dull, Dirty, Dangerous!

It's a bird, It's a plane...

Toys

Cost: 1.5K - 5K INR

Flight time: ~5min

Payload: None

Usage: Recreational

Tools

Cost: In Lakhs

Flight time: ~20-30min

Payload: A lot of tools (~5Kg)

Usage:

Photography

Surveying

Mapping

Search and Rescue

Logistics

Data gathering

Serious Business

Cost: In Crores

Flight time: 8+ hrs

Payload: Tonnes

Usage:

Surveillance

Weapon Delivery

Security Challenges

Regulations

  • India: Ministry of Civil Aviation
  • A long route for foreigners.
  • Registration: UIN (Unique Identification Number)
  • Not Beyond Visual Range
  • No Fly Zones
  • No Permission, No TakeOff
  • All these for >250gm, >50feet
  • ...
  • Are these enforced though? How?

Weather

  • Vulnerable to Turbulence, Rain, Snow, Fog etc.
  • Uncertainty at local levels in weather.
  • Flight aviation reports are tuned to planes.

Energy Limitation

  • Lightweight LiPo batteries
  • Can add more power, but that will add more weight
  • Which will need more power and so on...
  • + the cost

Communication

  • Mostly Unsecure
  • Drone-to-Drone: No standardization
  • Drone-to-Ground: Bluetooth, Wi-Fi 802.11, Most communication is Public
  • Drone-to-Satellite: GPS
    • Prone to Jamming and Spoofing
    • e.g Against ISIL in Mosul

Flight Planning

  • Basic algorithms for routing
  • Mostly controlled in Visual range
  • Collision avoidance algo in 3D

Challenges from Malicious Users

  • Physical Threats
    • Assassination attempts (Venezuela, 2018)
    • Targetted attacks on Infrastructure
    • Smuggling
    • Civil Aviation issues
    • Swarms
    • ...

Challenges from Malicious Users

  • Logical Threats
    • WiFI Luring Malware
    • Hacking Other Drones
    • Logging into insecure device applications (DEFCON'18)
    • ...
šŸ¤

Title Text

  • Bullet One
  • Bullet Two
  • Bullet Three

How though?

Gaps

  • Unauth access
  • Social Engineering

Safeguards

  • End-to-end Encryption
  • Device auth
  • Physical Security
  • Better Regulations

Authorisation

Gaps

  • Malware
  • Port Scans

Safeguards

  • Stronger Password Policy
  • Malware Detection Techniques

Drone

Gaps

  • Eavesdropping
  • Man-In-the-Middle
  • Jamming
  • ARP Poisoning
  • MAC Spoofing

Safeguards

  • Encryption
  • Hashing
  • Firewalls
  • Access Control Updates

Communication

Detection Techniques

  • Audio-based
  • Visuals
  • Motion Detection
  • Thermal
  • RF-based detection

Post Detection?

The way Ahead

  • Improving Regulations
  • Secure and Trusted Drone Hardware
  • Trusted Communication Channels
  • Improvements in Detection
  • Improvements in Evasion
  • Drone-to-Drone Communications
  • Swarm Organization Algorithms

ThankĀ  You

deck

By Nikhilesh Singh

deck

  • 45