Implementation of GPS Attacks on DJI Phantom 3 Standard Drone as a Security Vulnerability Test

Jabang Aru Saputro,Mohamad Syahral,Esa Egistian Hartadi
DOI: https://doi.org/10.1109/ICITAMEE50454.2020.9398386
2020-10-13
Abstract:An attack on a drone is a technique used to stop or obstruct the drone's working system. These attacks can also be used to determine security vulnerabilities to drones. The DJI Phantom 3 Standard is a wifi-based quadcopter. In this study, navigation attacks in the form of GPS jamming and GPS spoofing were carried out on the DJI Phantom 3 Standard drone. The goal of this GPS attack in this study is to determine and analyze the extent of vulnerability in the DJI Phantom 3 Standard commercial drone GPS. The GPS jamming attack uses jamming signals with the GNU Radio Companion (GRC) app. For GPS spoofing attacks using GPS-SDR-SIM tools to create fake GPS signals for drones. The GPS attack in this study uses the BladeRF X40 Software Defined Radio (SDR) device as the main device. The results of this study indicate that GPS jamming and GPS spoofing attacks can disrupt the GPS signal and even make the drone lose control.
Engineering,Computer Science
What problem does this paper attempt to address?