cybersecurity and drones 2015

14
01/12/2015 1 Copyright © 2015 DRONEMATRIX Ronny Kenens ronny.k@dronematrix. eu CYBERSECURITY & DRONES November 4, 2015 Copyright © 2015 DRONEMATRIX Topics Drones … what’s in the name ? Different type of Drones Where are Drones used today ? Challenges in the Drone world What about Cybersecurity Closing statements

Upload: motiv

Post on 14-Apr-2017

199 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Cybersecurity and drones 2015

01/12/2015

1

Copyright © 2015 DRONEMATRIX

Ronny Kenens

[email protected]

CYBERSECURITY & DRONES

November 4, 2015

Copyright © 2015 DRONEMATRIX

Topics

• Drones … what’s in the name ?

• Different type of Drones

• Where are Drones used today ?

• Challenges in the Drone world

• What about Cybersecurity

• Closing statements

Page 2: Cybersecurity and drones 2015

01/12/2015

2

Copyright © 2015 DRONEMATRIX

Copyright © 2015 DRONEMATRIX

”Drones mischaracterize what these things are,

they not dumb, not unmanned, they remotely piloted

aircrafts.”

General Norton Schwartz Chief of Staff of the U.S. Air Force

Augustus 10, 2012

Page 3: Cybersecurity and drones 2015

01/12/2015

3

Copyright © 2015 DRONEMATRIX

What’s in the name ?

• Drone

• Unmanned Aerial Vehicle � UAV

• Uninhabited Aerial Vehicle � UAV

• Unmanned Aerial System � UAS

• Remotely Piloted Vehicle � RPV

• Remotely Piloted Aircraft � RPA

• Remotely Piloted Aircraft System � RPAS

• Remotely Operated Air Vehicles � ROAV

• Micro Aerial Vehicle � MAV

• Drone / UAV

Copyright © 2015 DRONEMATRIX

Different type of UAVs

Scope UAVs related to mass

Page 4: Cybersecurity and drones 2015

01/12/2015

4

Copyright © 2015 DRONEMATRIX

Public Perception = Overall confusion

� Not true

� Not true

� Not true

� Not true

� Not true

� Not true

� Not true

� Not true

Drone are bad

Drones are only used in the army

Drones are always unmanned

Drones are dangerous

Drones are uncontrolled projectiles

Drones are not safe

Drones are useless for citizens

Drones are useless for business

Bottom-line:

• Use DRONES the way they have to be USED

• Technology maturity opens a lot of opportunities

• Drone market is in take-off mode and growing steadily

Copyright © 2015 DRONEMATRIX

‘Computers do things more precisely and

faster than humans … ‘

… but we need humans to

deal with uncertainty. “

"People are running around,

relying on intuition, and

accidents happen.

I want to make that go more

smoothly.“

Prof. Mary (Missy) Cummings - 1e female US Navy F18 fighter jet pilot, landing on aircraft carriers (1988-1999)

- Professor Aeronautics & Astronautics at MIT Univ. USA

Page 5: Cybersecurity and drones 2015

01/12/2015

5

Copyright © 2015 DRONEMATRIX

Drone Playing fields

SoftwareGround controlAircraft Avionics Payloads

Copyright © 2015 DRONEMATRIX

DRONE Flight Safety IS KEY !

• Sense & Avoid

– On-board Collision Avoidance / CAS

– Collaborative Collision Avoidance / ITS

• Dual Operator Control

• Propeller protection

• Drone Parachute

Page 6: Cybersecurity and drones 2015

01/12/2015

6

Copyright © 2015 DRONEMATRIX

Aerial Photography Pipe/Power line Surveillance

Real-estate Mapping Border Surveillance

Transport Crowd Control

Suspect Tracking Mail/Fright Transport

Traffic Monitoring Agricultural Applications

Disaster Response/Relief Movie Productions

Damage Assessment Sporting Event Coverage

Infrastructure Monitoring Mining detection

Fertilizer Management Fishery Control

Overview where Drones are used today ?

Copyright © 2015 DRONEMATRIX

Drones - Industrial

Oil and gas off-shore inspections

• Scandinavia, Middle East, Asia, US, ….

Page 7: Cybersecurity and drones 2015

01/12/2015

7

Copyright © 2015 DRONEMATRIX

“Insect mapping” and extermination (multi-spectral and thermal imaging)

Drones – Agriculture

“Weed Mapping” in maize Fields (via color–infrared composition imaging)

Copyright © 2015 DRONEMATRIX

Drones – Medical

Ambulance Drone Delivers Defibrillator

Alec Mormot

graduate industrial design

TU Delft University

Page 8: Cybersecurity and drones 2015

01/12/2015

8

Copyright © 2015 DRONEMATRIX

Drones – LogisticsDelivery

Inspection & control

Copyright © 2015 DRONEMATRIX

Drones – Security

• Human controlled drone

• Tethered drone

• Autonomous drones in docking station

Page 9: Cybersecurity and drones 2015

01/12/2015

9

Copyright © 2015 DRONEMATRIX

Challenges in the Drone world• Public Acceptance / Safety

• Standards/Certifications

– Drone certification

– Pilot Training

– Flight planning platform

• Technology:

– Battery life time

– Sense & avoid

• Legal

– Integration in existing aviation

– Data privacy

• Liability and Insurance

– Koen De Vos / European Commission: European Electronic ID

– Matthijs van Miltenburg / EP - D66 : European Chipregistration

• Cyber security

– Hijacking

• Spoofing

• Jamming

Copyright © 2015 DRONEMATRIX

Hijacking: Jamming & Spoofing

• Influence:• pilot control signals

• GPS signals

Noise False

signals

Page 10: Cybersecurity and drones 2015

01/12/2015

10

Copyright © 2015 DRONEMATRIX

Protect drone against Hackers

• System-Aware Secure Sentinel to protect Military drones

• When the system detects “illogical drone behaviors” actions are initiated:

• automated recovery process activated

• alert to operators

Copyright © 2015 DRONEMATRIX

Drone Interceptor

• 2014: 12 French nuclear plants were buzzed by drones

• 2014: drone crashed on the White House

• 2015: drone carrying radioactive sand landed on roof of Japanese prime minister’s office

in Tokyo

• 2015: drones spotted hovering near the Eiffel tower

• 2015: drone tried to fly (full of drugs + screwdriver + mobile phone) into a British prison

Page 11: Cybersecurity and drones 2015

01/12/2015

11

Copyright © 2015 DRONEMATRIX

Anti-UAV Defence System (AUDS)

• AUDS can detect, track, classify potentially malicious UAVs (up to 8km)

• Combination of 3 systems:

– electronic-scanning radar target detection

– electro-optic tracking and classification

– directional RF disrupt/inhibit capabilities

EO Tracker &

RF Disruptor

Air Security Radar

Copyright © 2015 DRONEMATRIX

Anti-UAV beam gun

• Small, portable, accurate, rapid-to-use UAV counter-weapon

• Uses radio beam to jam the drone control systems and stop it

• Weapon is a “non-kinetic solution” (=without firing a bullet)

Page 12: Cybersecurity and drones 2015

01/12/2015

12

Copyright © 2015 DRONEMATRIX

Drone Geofencing

• NO-FLY ZONES• Drone manufacturers install safeguards in

the drone’ software to keep the drone away from:

• airports Civ./Mil.

• airliners

• emergency response crews

• Large bridges

• ….

Integrated Airspace

Copyright © 2015 DRONEMATRIX

Privacy / Data Privacy

• Make image / store image

• Legal framework for specific activities:

– Ex. Security companies

Page 13: Cybersecurity and drones 2015

01/12/2015

13

Copyright © 2015 DRONEMATRIX

Closing Statements

• Drones are here to stay !

• Countries with more relaxed UAV laws will leverage the drone economy

• Need for a European legal framework

• Fastest growing sectors:

– agricultural, security & surveillance, transport & logistics

• Technology can accelerate drone acceptance and market development

– Battery - Increase flight autonomy

– Sense & avoid

• Safety, security and solid contingency plans are a must.

– Sense & avoid

– Unique ELECTRONIC ID for each drone

• Effective DRONE CYBERSECURITY requires a real system-engineering approach,

not just IT

Copyright © 2015 DRONEMATRIX

But as Peter Drucker said :

“The best way to predict the future is to create it.”

Copyright © 2015 - A N S E C U R - RiskMatrix Resultants Group

Ronny Kenens [email protected]

Page 14: Cybersecurity and drones 2015

01/12/2015

14

Copyright © 2015 DRONEMATRIX

European Drone Convention 2016

Drones for Security Services

• Organised by:

– EUKA : Europea UAV Drones Knowladge Area

– CoESS : Conferation of European Security Services

• Date : June 2016

• Place: Brussels or Strasbourg