본문 바로가기
대메뉴 바로가기
KAIST
Newsletter Vol.25
Receive KAIST news by email!
View
Subscribe
Close
Type your e-mail address here.
Subscribe
Close
KAIST
NEWS
유틸열기
홈페이지 통합검색
-
검색
KOREAN
메뉴 열기
cryptography
by recently order
by view order
Anti-drone Technology for Anti-Terrorism Applications
(from top right clockwise: Professor Yongdae Kim, PhD Candidates Yujin Kwon, Juhwan Noh, Hocheol Shin, and Dohyun Kim) KAIST researchers have developed anti-drone technology that can hijack other drones by spoofing its location using fake GPS signals. This technology can safely guide a drone to a desired location without any sudden change in direction in emergency situations, and thus respond effectively to dangerous drones such as those intending to carry out acts of terrorism. Advancements in the drone industry have led to the wider use of drones in our daily lives in areas of reconnaissance, searching and rescuing, disaster prevention and response, and delivery services. At the same time, there has also been a growing concern about privacy, safety, and security issues regarding drones, especially those arising from intrusion into private property and secure facilities. Therefore, the anti-drone industry is rapidly expanding to detect and respond to this possible drone invasion. The current anti-drone systems used in airports and other key locations utilize electronic jamming signals, high-power lasers, or nets to neutralize drones. For example, drones trespassing on airports are often countered with simple jamming signals that can prevent the drones from moving and changing position, but this may result in a prolonged delay in flight departures and arrivals at the airports. Drones used for terrorist attacks – armed with explosives or weapons – must also be neutralized a safe distance from the public and vital infrastructure to minimize any damage. Due to this need for a new anti-drone technology to counter these threats, a KAIST research team led by Professor Yongdae Kim from the School of Electrical Engineering has developed technology that securely thwarts drones by tricking them with fake GPS signals. Fake GPS signals have been used in previous studies to cause confusion inside the drone regarding its location, making the drone drift from its position or path. However, such attack tactics cannot be applied in GPS safety mode. GPS safety mode is an emergency mode that ensures drone safety when the signal is cut or location accuracy is low due to a fake GPS signals. This mode differs between models and manufacturers. Professor Kim’s team analyzed the GPS safety mode of different drone models made from major drone manufacturers such as DJI and Parrot, made classification systems, and designed a drone abduction technique that covers almost all the types of drone GPS safety modes, and is universally applicable to any drone that uses GPS regardless of model or manufacturer. The research team applied their new technique to four different drones and have proven that the drones can be safely hijacked and guided to the direction of intentional abduction within a small margin of error. Professor Kim said, “Conventional consumer drones equipped with GPS safety mode seem to be safe from fake GPS signals, however, most of these drones are able to be detoured since they detect GPS errors in a rudimentary manner.” He continued, “This technology can contribute particularly to reducing damage to airports and the airline industry caused by illegal drone flights.” The research team is planning to commercialize the developed technology by applying it to existing anti-drone solutions through technology transfer.” This research, featured in the ACM Transactions on Privacy and Security (TOPS) on April 9, was supported by the Defense Acquisition Program Administration (DAPA) and the Agency for Defense Development (ADD). Image 1. Experimental environment in which a fake GPS signal was produced from a PC and injected into the drone signal using directional antennae Publication: Juhwan Noh, Yujin Kwon, Yunmok Son, Hocheol Shin, Dohyun Kim, Jaeyeong Choi, and Yongdae Kim. 2019. Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing. ACM Transactions on Privacy and Security. New York, NY, USA, Vol. 22, No. 2, Article 12, 26 pages. https://doi.org/10.1145/3309735 Profile: Prof. Yongdae Kim, MS, PhD yongdaek@kaist.ac.kr https://www.syssec.kr/ Professor School of Electrical Engineering Korea Advanced Institute of Science and Technology (KAIST) http://kaist.ac.kr Daejeon 34141, Korea Profile: Juhwan Noh, PhD Candidate juhwan@kaist.ac.kr PhD Candidate System Security (SysSec) Lab School of Electrical Engineering Korea Advanced Institute of Science and Technology (KAIST) http://kaist.ac.kr Daejeon 34141, Korea (END)
2019.06.25
View 42278
KAIST Shows Strong Performance in Crypto Contest Korea 2018
(Awardees at the ceremony for Crypto Contest Korea 2018) A paper titled “Indifferentiability of Truncated Random Permutations” by PhD candidate Wonseok Choi and MS candidate Byeonghak Lee (under Professor Jooyoung Lee) from the KAIST Graduate School of Information Security (GSIS) won first place in Crypto Contest Korea 2018. Byeonghak Lee became a repeat winner since his paper titled “Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model” also received an award at Crypto Contest Korea 2017. The contest, hosted by the Korea Cryptography Forum, the Korea Institute of Information Security & Cryptology, and the National Security Research Institute and sponsored by the National Intelligence Service, was held for promoting cryptography in Korea. The total prize money is fifty million won with ten million won going to the first place winners. The contest was divided into three divisions: paper, problem solving, and idea. Among the three divisions, first place came from the paper division only. Besides first place, KAIST students showed outstanding performance in the contest. PhD candidate Seongkwang Kim received participation prize while he also received special prizes with MS candidate Yeongmin Lee. The hacking club GoN (under Professor Sang Kil Cha), comprised of undergraduate students from the GSIS was awarded the grand prize in the division of problem solving. The award ceremony was held during the Future Crypto Workshop 2018 on November 15. The awards ceremony for Crypto Expert Korea 2018 were also held there, and PhD candidate Ji-Eun Lee from the School of Computing and Byeonghak Lee received awards, the grand prize and runner-up prize respectively.
2018.11.27
View 6665
Professor Kwangjo Kim Named as Fellow of IACR
Professor Kwangjo Kim of the Graduate School of Information Security has been selected as a fellow of the International Association for Cryptologic Research (IACR). The IACR has honored outstanding scholars who have achieved academic excellence in cryptologic research since 2004. He is the first Korean scholar to receive an IACR fellowship. The IACR, established in 1981, is responsible for organizing international cryptologic conferences every year including the three major cryptologic academic conferences Eurocrypt, Crypto, and Asiacript. The IACR also sponsors workshop series such as the Theory of Cryptography Conference (TCC), the Workshop on Fast Software Encryption (FSE), the Public Key Cryptography Workshop (PKC), and Cryptographic Hardware and Embedded Systems (CHES). Professor Kim, an internationally acclaimed scholar in the fields of cryptology and information security theory and its applications, was recognized for his outstanding academic achievements and leadership. He has made significant contributions to cryptology in Korea by hosting Asiacript in 1996 and 2001 as well as CHES in 2014. During his 34 years of academic activities, he has published more than 80 SCI journal papers and garnered more than 20,000 citations. Professor Kim served on the board of the directors of the IACR from 2000 to 2004 and was the chairperson of the Asiacript Steering Committee from 2005 to 2008. He is on the editorial board of the online journal Cryptography. Professor Kim said, “I am so humbled and honored to be named as a fellow of such a prestigious academic association. I will continue to strive to assist highly educated information security personnel with further research in cryptology.”
2017.03.16
View 6994
<<
첫번째페이지
<
이전 페이지
1
>
다음 페이지
>>
마지막 페이지 1