Hijack a UAV? It's Not Easy to Do, as Demonstrated on China's Nationwide TV Network

At the 3.15 Gala hosted by China's nationwide TV network CCTV this year, white hat hackers demonstrated how they could utilize vulnerabilities to remotely hijack an unmanned aerial vehicle (UAV), sparking a debate among consumers about and focusing their attention on the security of smart devices.

SHENZHEN, China, March 18, 2016 /PRNewswire/ -- At the 3.15 Gala hosted by China's nationwide TV network CCTV this year, white hat hackers demonstrated how they could utilize vulnerabilities to remotely hijack an unmanned aerial vehicle (UAV), sparking a debate among consumers about and focusing their attention on the security of smart devices. According to media reports, contestants had already demonstrated how they could break into the communications system of a UAV and successfully manipulate its flight at the GeekPwn competition on October 24, 2015.


The manufacturer of the UAV quickly responded that they had resolved the potential security vulnerability through firmware upgrades several months ago. There are always two sides to a story, even in the world of UAVs, the fastest growing market for smart devices in the past two years. How can we better prevent the potential security risks associated with UAVs?

The most common way is to provide timely updates to the system firmware or to install the latest security patch to deal with any possible vulnerability. FLYPRO, a company specializing in smart sports UAVs, provides a new way of thinking.

Flight safety is always among the most basic and important considerations for UAVs. FLYPRO's latest smart sports UAV XEagle comes equipped with several innovative intelligent security protection technologies. Frequency hopping is a core technology which initiates a round of random hopping across a range of frequencies via a special encoding mode through hundreds of combinations within the 902-928 MHz band, making it difficult to detect the signal and hijack the XEagle. In order to hijack an XEagle UAV, hackers have to first crack the data transmission module. However, both the data transmission module and the transmission process are encrypted, and the transmission speed is customized, the combination of which goes a long way in preventing unauthorized access, allowing for safer flights and maximizing the safety and security of the user's property.

If two control terminals on the same frequency attempt to gain control the XEagle, the UAV immediately initiates random frequency hopping in simultaneity with the control terminal that matches, preventing the other, unauthorized, terminal from controlling the vehicle.

With the rapid development of the UAV industry, the increasing popularity of the vehicles among consumers and the availability of new encryption techniques, UAV manufacturers have significantly enhanced their security technologies, making it quite difficult to hijack a UAV.

http://www.flypro.com

Featured Product

ST Robotics - R17HS-6, the 6-axis version of the high speed R17 variant

ST Robotics - R17HS-6, the 6-axis version of the high speed R17 variant

The 6-axis version of the R17HS high speed variant of the R17 robot is now available. As is our policy the 6th axis is an optional bolt-on module. At the same time we have made it even faster and new software eliminates shake and greatly improves repeatability as this video shows. Please see https://www.youtube.com/watch?v=3wG0MeiJ-yE. The video would seem to imply a repeatability of 0.01mm but we are sticking with 0.2mm in the spec. The motor specialist was able to tune the motors from the other side of the pond. My first reaction when we put power on and entered the first commands was to jump back in amazement (and maybe an expletive). Tip speed is now 3m/s; that's 3 times as fast as its nearest competitor yet costs half the price. I love it when a plan comes together.