Behind the Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol is a report from Derry Pratama, Jaegeun Moon, Agus Mahardika, Ari Laksmono, Dongwook Yun, Iqbal Muhammad, Byeonguk Jeong, Janghyun Ji, and Howon Kim.
This research paper investigates the Enhanced Wi-Fi protocol, focusing on its control command reverse-engineering analysis and a subsequent demonstration of a hijacking attack. Vulnerabilities in the Enhanced Wi-Fi control commands were identified, making them susceptible to hijacking attacks. The study reveals that even readily available and cost-effective commercial off-the-shelf Wi-Fi routers can be utilized for such attacks. A proof-of-concept remote hijacking attack was successfully conducted on a DJI Mini SE drone, highlighting the urgency of implementing robust security measures to protect unmanned aerial vehicles from potential hijacking threats. The study emphasizes the need for further exploration and advancement in civilian drone security, especially considering their military applications.
Publication Date– September 2023
Behind the Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol contains the following major sections:
- Introduction
- Preliminaries
- Security
- Reverse Engineering
- Hijacking Evaluation
- Discussion
- Conclusion
There are no noted distribution restrictions for this document.
C-UAS Hub does not own this content and provides a link for users at the bottom of the page to access the document in its original location. This allows the author(s) to track important metrics related to their work. All credit goes to its rightful owner.
Authors- Derry Pratama, Jaegeun Moon, Agus Mahardika, Ari Laksmono, Dongwook Yun, Iqbal Muhammad, Byeonguk Jeong, Janghyun Ji, and Howon Kim.
See Also-
FBI and CISA Cybersecurity Guidance: Chinese-Manufactured UAS
DJI Updates Its Drone GEO System in UK and the EU
Security Vulnerabilities Found in DJI Drones
Post Image- DJI Mini SE (Image Credit: DJI)