Spoofing Drone Locations by Manipulating Remote ID Protocols and Communications

Recognizing the importance of drone RID technologies for the future of aviation, Nozomi Networks Labs conducted research on their vulnerabilities and risks.

This white paper details the results of our research, which resulted in attack scenarios illustrating how an attacker could forge the presence of drones, inject fake drone trajectories and disrupt RID functionalities on RID protocols. The purpose of this research and of these attack scenarios is to highlight the type of risks involved in the use of these technologies as currently designed.

View Resource

Speakers

Spoofing Drone Locations by Manipulating Remote ID Protocols and Communications
White Papers

Spoofing Drone Locations by Manipulating Remote ID Protocols and Communications

May 3, 2024

Recognizing the importance of drone RID technologies for the future of aviation, Nozomi Networks Labs conducted research on their vulnerabilities and risks.

This white paper details the results of our research, which resulted in attack scenarios illustrating how an attacker could forge the presence of drones, inject fake drone trajectories and disrupt RID functionalities on RID protocols. The purpose of this research and of these attack scenarios is to highlight the type of risks involved in the use of these technologies as currently designed.

Recognizing the importance of drone RID technologies for the future of aviation, Nozomi Networks Labs conducted research on their vulnerabilities and risks.

This white paper details the results of our research, which resulted in attack scenarios illustrating how an attacker could forge the presence of drones, inject fake drone trajectories and disrupt RID functionalities on RID protocols. The purpose of this research and of these attack scenarios is to highlight the type of risks involved in the use of these technologies as currently designed.

SPEAKERS

Recognizing the importance of drone RID technologies for the future of aviation, Nozomi Networks Labs conducted research on their vulnerabilities and risks.

This white paper details the results of our research, which resulted in attack scenarios illustrating how an attacker could forge the presence of drones, inject fake drone trajectories and disrupt RID functionalities on RID protocols. The purpose of this research and of these attack scenarios is to highlight the type of risks involved in the use of these technologies as currently designed.

IN PARTNERSHIP WITH
No items found.
SPEAKERS

Spoofing Drone Locations by Manipulating Remote ID Protocols and Communications

Recognizing the importance of drone RID technologies for the future of aviation, Nozomi Networks Labs conducted research on their vulnerabilities and risks.

This white paper details the results of our research, which resulted in attack scenarios illustrating how an attacker could forge the presence of drones, inject fake drone trajectories and disrupt RID functionalities on RID protocols. The purpose of this research and of these attack scenarios is to highlight the type of risks involved in the use of these technologies as currently designed.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.