LISA16 – UAVs, IoT, and Cybersecurity

LISA16 – UAVs, IoT, and Cybersecurity

David Kovar

Smaller Unmanned Aerial Techniques (sUAS) aka “drones” are all the rage—$500 UAVs are utilised in experienced racing leagues and main organizations are developing $100,000 UAVs to deliver packages and World-wide-web connectivity. UAVs are gradually functioning their way into pretty much each individual professional sector by using operations, profits, producing, or design and style.

sUAS—emphasis on the last “S”—are intricate devices. The aerial system by itself normally consists of a radio link, an autopilot, a images sub-system, a GPS, and several other sensors. Just about every a person of these parts represents a cybersecurity risk unto alone and also when element of the much larger technique. Add in the floor handle stations, the radio controller, and the video clip downlink technique and you have a incredibly elaborate computing setting operating a selection of professional, closed source, open source, and house brew software program.

And sure, there is now malware precisely targeting drones.

Through this presentation, we will walk by way of a typical operational workflow for a UAV, all of the elements of a agent method, and by means of a attainable hazard evaluation design for UAVs. Even if you are not working with UAVs, you really should contemplate that UAVs are an instance of “the Internet of Things”—a selection of sensors and computing products linked to every other and to the cloud intended to acquire, distribute, and assess info in a semi- or thoroughly-autonomous method.

See the total LISA16 Method at https://www.usenix.org/meeting/lisa16/convention-plan

(Visited 5 times, 1 visits today)

You Might Be Interested In

LEAVE YOUR COMMENT

Your email address will not be published.