Press Releases

Cyber researchers accurately locate malicious drone users

July 7, 2020

Posted by: Anasia D'mello

Researchers at Israel’s Ben-Gurion University of the Negev (BGU) have learned how to pinpoint the location of a drone operator who may be operating maliciously or harmfully near airports or protected airspace. They do so by analysing the flight path of the drone.

Drones or unmanned aerial systems (UAVs) can pose significant security risks due to their agility, accessibility and low cost. As a result, there is a growing need to develop methods for detection, location and mitigation of malicious and other harmful aircraft operation.

This is described in a paper led by senior lecturer and drone expert Dr. Gera Weiss from BGU’s Department of Computer Science. It was presented at the Fourth International Symposium on Cyber Security, Cryptography and Machine Learning (CSCML 2020) on July 3rd.

“Currently, drone operators are located using RF techniques and require sensors around the flight area which can then be triangulated,” says lead researcher Eliyahu Mashhadi, a BGU computer science student. “This is challenging due to the amount of other WiFi, Bluetooth and IoT (Internet of Things) signals in the air that obstruct drone signals.”

The researchers trained a deep neural network to predict the location of drone operators, using only the path of the drones, which does not require additional sensors. “Our system can now identify patterns in the drone’s route when the drone is in motion, and use it to locate the drone operator,” Mashhadi says.

When tested in simulated drone paths, the model was able to predict the operator location with 78% accuracy. The next step in the project will be to repeat this experiment with data captured from real drones.

“Now that we know we can identify the drone operator location, it would be interesting to explore what additional data can be extracted from this information,” says Dr. Yossi Oren, a senior lecturer in BGU’s Department of Software and Information Systems Engineering and head of the Implementation Security and Side-Channel Attacks Lab, who also contributed to the research. “Possible insights would include the technical experience level and even precise identity of the drone operator.”

Comment on this article below or via Twitter @IoTGN