Gareth--
You received this message because you are subscribed to the Google Groups "drones-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to drones-discus...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
Gareth--
You received this message because you are subscribed to the Google Groups "drones-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to drones-discus...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
--
You received this message because you are subscribed to a topic in the Google Groups "drones-discuss" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/drones-discuss/3xPmB3O2lPA/unsubscribe?hl=en.
To unsubscribe from this group and all its topics, send an email to drones-discus...@googlegroups.com.
James Goppert has started to look into characterizing attacks on GPS, and the combined attitude / position EKF has an in-built metric to report (and it does report) supposedly wrong looking GPS readings. Combine that with fusing it with PX4FLOW measurements and you're extremely close to being able to reject such attacks, at least as long its not dark you should be able to roughly RTL and land or land on the current location, even if GPS and radio are both completely jammed.
James' filter is here:
https://github.com/px4/firmware/tree/master/src/modules/att_pos_estimator_ekf
I'd be very interested to see this being picked up.
-Lorenz
------------------------------------------------------
Lorenz Meier
Institute for Visual Computing
ETH Zurich
http://www.inf.ethz.ch/personal/lomeier/
On May 23, 2013, at 4:20 PM, Gareth Owen <> wrote:
Curt, Anish
Curt: Very good points - particularly about GPS spoofing which is very hard to protect against - that I hadn't considered! At present, it's fairly easy to steal someone's drone from the sky with < $50 of [legal] equipment. A secure mavlink+rclink would raise the bar.
Anish: I was under the impression TEA was fairly weak by today's standards. It has a small implementation, but AES can be small depending on your choices with lookup tables (albeit nowhere near as small). As MAVLINK is packetised, I'm not sure a stream cipher is necessary, and if we did use a stream cipher we'd have to worry about synchronization and authentication (+ bit flipping attacks). I'm not sure any authenticated modes of operation for stream ciphers have been standardised - and if we were to do this properly I think we should stick with a standardised authenticated mode.
Lorenz: Seems like you're well ahead of these discussions with something. So yes, I'd be interested in participating with what you've already started.
Best
Gareth
On 23 May 2013 15:01, Anish Mohammed <anish.m...@gmail.com<mailto:anish.m...@gmail.com>> wrote:
Hi Gareth,
I should admit I too have some interests, I am a RHUL alumni ;) with stints in three different crypto/security groups. It was discussed during 3dr radio protocol was looked into. Memory and computational constrains implied, a suggestion of somthing like TEA . At the last moment my understanding was there want enough of apetite to look into it, given the constrains.
Unrelated note block ciphers generally are heavier than stream, and this is a good use case for stream cipher.
regards
Anish
On Thu, May 23, 2013 at 2:37 PM, Gareth Owen <dr.g...@gmail.com<mailto:dr.g.owen@gmail.com>> wrote:
Dear all
With the increasing popularity of the ardupilot project and increasing usage for commercial applications - I think we should start thinking about authenticating and protecting communication over the 3dr radios. At present, it is trivially easy to steal someone else's quadcopter or cause it to crash (I know the RC link is vulnerable too but we could think about that too).
Last year I showed how to take control of a weaponised bomb disposal robot (no names) due to a poor cryptography implementation - they'd used AES so badly that you didn't even need to know it was encrypted.
My expertise is in Cryptography - does anyone else on the list have expertise in this area and interested in coming up with some draft designs for a secure mavlink (probably using authenticated encryption like CCM<http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf> with AES)? We'd need to do some performance and CPU load experiments on the PX4. I don't think the APM2.5 has enough CPU for a cryptoed link - but the PX4 may do. So it's very much a feature that would be 6-12 months down the line, if not more.
It might also be worth knowing more about the 3dr radios and what processing power they have.
Best
Gareth
--
You received this message because you are subscribed to the Google Groups "drones-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to drones-discus...@googlegroups.com<mailto:drones-discuss%2Bunsubscribe@googlegroups.com>.
For more options, visit https://groups.google.com/groups/opt_out.
--
Anish Mohammed
http://uk.linkedin.com/in/anishmohammed
@anishmohammed
--
You received this message because you are subscribed to a topic in the Google Groups "drones-discuss" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/drones-discuss/3xPmB3O2lPA/unsubscribe?hl=en.
To unsubscribe from this group and all its topics, send an email to drones-discus...@googlegroups.com<mailto:drones-discuss%2Bunsubscribe@googlegroups.com>.
For more options, visit https://groups.google.com/groups/opt_out.
--
You received this message because you are subscribed to the Google Groups "drones-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to drones-discus...@googlegroups.com<mailto:drones-discuss+unsubscribe@googlegroups.com>.

We are focused on non-commercial ("recreational") projects by amateurs, although pros are always welcome too. Reasons to make your own UAV range from a fun technical challenge, student contests, aerial photography and mapping (what we call "GeoCrawling"), and scientific sensing. We are primarily interested in civilian, not military, UAV uses here.
- No discussion of military or weaponized applications of UAVs. This site is just about amateur and civilian use.
> The only two cons are:
> - You need packet sequence numbers to prevent replays (I expect you do this already for error handling).
> - You need a it.
few extra bytes in the packet for the tag (a signed cryptographic checksum).
>
> any secure protocol will require these two in any case.
The current radio ito firmware is protocol aware. It injects RSSI data, which is very usefull. It also manages the framing cleverly to minimize the impact of dropped packets, which improves performance when noise is high and/or signal is low (I.e. long range).
--
Dear allWith the increasing popularity of the ardupilot project and increasing usage for commercial applications - I think we should start thinking about authenticating and protecting communication over the 3dr radios. At present, it is trivially easy to steal someone else's quadcopter or cause it to crash (I know the RC link is vulnerable too but we could think about that too).Last year I showed how to take control of a weaponised bomb disposal robot (no names) due to a poor cryptography implementation - they'd used AES so badly that you didn't even need to know it was encrypted.
My expertise is in Cryptography - does anyone else on the list have expertise in this area and interested in coming up with some draft designs for a secure mavlink (probably using authenticated encryption like CCM with AES)? We'd need to do some performance and CPU load experiments on the PX4. I don't think the APM2.5 has enough CPU for a cryptoed link - but the PX4 may do. So it's very much a feature that would be 6-12 months down the line, if not more.
I'm in agreement here. Doing it right is easy (on the px4) - a few days work. It's also implement and forget.
Adding it to the apm is probably not practical although I suspect none of us know this for sure - OCB mode is twice as fast as CCM but has patent issues for anyone wishing to commercialise the software (IANAL). My guesstimate is a 1-2ms overhead per packet with OCB.
Gareth
You received this message because you are subscribed to a topic in the Google Groups "drones-discuss" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/drones-discuss/3xPmB3O2lPA/unsubscribe?hl=en.
To unsubscribe from this group and all its topics, send an email to drones-discus...@googlegroups.com.