Network vulnerability analysis of the Player command and control protocol
by John T. Hagen; Barry E. Mullins
International Journal of Security and Networks (IJSN), Vol. 9, No. 3, 2014

Abstract: This paper demonstrates command and control protocols for remotely-piloted vehicles can be susceptible to cyber attacks and provides recommendations to mitigate these attacks while minimising impact to resource-constrained platforms. The Player project is an open-source effort providing a control interface specification and software framework for abstracting robot hardware. This research presents five exploits that compromise vulnerabilities in Player's command and control protocol. This work also demonstrates that Internet Protocol Security (IPsec) is capable of mitigating the vulnerabilities discovered in Player's command and control protocol. A cost function is defined to synthesise exploit success, CPU utilisation, and network load into a single scalar metric that can be used to compare the different IPsec protocols. Results show that in a scenario when exploits are likely, IPsec AH+ESP is the preferred defense protocol because of its relatively low CPU and network overhead and ability to defeat the exploits implemented in this research.

Online publication date: Mon, 10-Nov-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com