You are on page 1of 4

SPECIFIC DRONES FOR THE ENVIRONMENT: CRITICAL POINTS ABOUT HIS

TECHNICAL RISKS-ETHICAL AND SOLUTIONS FROM THE HACKING-


ETHICAL

ABSTRACT question: Which technological advances can offer the


world for the treatment of the problematic ecological
The confidence put in the drones like agents of change and present from does almost 40 years? In this point goes in in
fixers of specific problems has touched the common places discussion the importance of the universities and his
related with the sustainability, protection and development developments, the feasibility to form an environmental
of the environment; the universities, engaged with the education of the hand with the increasing training and
responsibility purchased about forming and give back to innovation in the Technologies of the Information and
the society agents of able change to answer to the most Communication (TIC) [3] , by these reasons, the
emergent dynamics, in the majority of cases supported by governments (prioritising this type of proposals of work)
institutions and/or able corporations to standardize and and the university institutions (with the consciousness that
apply the prototypes and studies made by the groups of the environment is a subject still with too potential to work
investigation in this branch, have revolutionised the field and develop) focus his efforts and hopes in these two
of application of these unmanned aerial vehicles, which elements: Drones specific for the environment.
with his early immersion captivated his overcrowding in Although the proposals launched until these days [4]
other specific fields, but what so ready find these (splitting from does almost 5 years) have launched results
mechanisms to face the technological crime? They are few that, although they reaffirm the importance to follow
the reliabilities guaranteed for these devices focused for opting by these devices like agents of change, still have to
the environment. consider like results very immature, since they do not carry
By means of the present article expose implications of neither a decade facing up to the different inclemencias of
technical type, political and ethical of these drones the peak regarding the TIC, and is in this point where
specific and the advantages that can provide the hacking- arises the interrogante What so ready finds a dron specific
ethical to solve and form proposals with these vehicles of the environment to bear technological attacks? [5]
with a solider security. The testimonies of hacking to these UAV have happened
unobserved for the commonplace of the environment (as
Key words Drones, environment, universities, they are not considered like threat because of the big
technological crime, hacking-ethical, security contrast of technical requests that present in front of the
ones of the military industry) but in spite of this the badly
intentions follow valid, the cases of unauthorised
1. INTRODUCTION manipulations rondan from the pure leisure and
entertainment until the improvement of a group of illicit
The immersion in the world of the drones in reality does activities [6]
not constitute a revolutionary invention, neither considers
like the cusp of a never before thought idea, these aerial
vehicles no tripulados (UAV) as they have observed in full Table 1. Total of deaths reported by attacks of drones of
21st century constitute the splice that it has ocasionado the the CIA in conflicts of Pakistan
technological advance and that no longer only prioritises
the investigations for the development of the industry of
the war (that in reality it launched like solution to his
problems these aerial mechanisms) but it has moved to
diagrams much more interesting and fruitful, an example
of this is the repercussion that can conceive the innovative
field of the university institutions around the world, which
focus his efforts and investigations in proposals of work
and development that can be applied in the real life and
that really are to disposal of the needs of the social context
in which they move . The Engineers, designers and
mathematicians are reliable preachers of the utility that has
these vehicles (from a general perspective) and the
capacities that have the same when they perfect and
customise [1]. 2. THE METHODOLOGY OF THE HACKING
ETHICAL
The commitment assumed does a pair of decades by the
different governments along the world regarding the
concientizacin of the deterioration of the environment [2] The Hacking Ethical constitutes the attainment of the
has been focus of priorizacin regarding the following application of specific knowledges in computing and

1
security for the early detection of errors, doors of access no
controlled and other potentially sensitive agents to turn
into malware [7].
The proofs of vulnerability are prediseadas according to
the technical specifications that possess the systems to
invade, taking into account this, and the evident need that
these devices are handled by protocols related with the
remote connections (WIFI and Bluetooth) is unavoidable to
conceive the possibility that if there is a door of access, of
this type, is easier to consider a remote manipulation.

Fig 2. Illustration of the basic operative diagram of a


dron (in this case by means of a GPS that it is
redireccionado road satelital)
Fig 1. Illustration of an intrusion to an UAV that is
operated by road WIFI (Router emisor of wireless
signal)

The attacks have modernizado with the step of the time, as


we can deduce it immediately after observing the image of
the Fig 1. , and recognised marks that support and build
these UAV have seen involved [8] .Considering that the
purpose of the drones destined to the security and the
support in the environment will collect obligatoriamente
samplings and monitory that necessarily require a solid
database, presents the following information (and with
this manifests again the worry by the robustness and
reliability that exist in the managing programs of
databases) Fig 3. Diagram of the process of camouflage and attack
of a master computer to generate intrusions in a device
Table 2. Main categories that constitute the Victim.
vulnerability in computing

3. TRAINING IN HACKING ETHICAL

The vulnerabilities do not discriminate sector any in the


actuality, is important to recognise that when it possesses
information of any type, and that by different reasons
classifies like confidential or personal, is leaving an
available road for the consideration of potential enemies
[9] , the current training in this branch to university level
is precarious taking into account the following factors:

-Experience in cases very specific


-Lacking of educational able to handle the wide spectrum
of the hacking
-Teams little adapted to face these dangers

2
Taking into account the importance that loan the
companies and the current developments to the attacks of
UAV corrupt [10], is necessary to spread a suitable
pedagogy to the niel that can face the university youngsters
and emprendedores so that they can be more realistic on
the dimensionalidad that purchases the handle of the
responsible technology.

Fig 5. Crozono, a dron instrumented with tools of


intrusion WLAN programmed in a RaspBerry PI that
implements a framework based in AirCrakNG and
other tools of intrusion WLAN.

The possibilities to implement drones interceptores like


agents of protection and detection of future threats in the
zones of operating capacity is a conceivable and possible
event to make, taking into account the specifications that
determine the time of flight of a dron, would suffice only
with calculating and coordinate patrullajes aerial
coordinated with the sectors of observation

Fig 4. Consolidation of a challenge of innovation that


contemplates the implementation of aerial devices,
university initiative
Table 3. Specifications of a dron supervisory
Splitting of the initiatives like the presented in the Fig 4.
To continuation treat the possible able solutions to
complement and do more robust this type of initiatives.

4. TOOLS OF JOIN UP To BLINDAJE OF SECURITY

Taking into account that these devices house visual


information (captures, photographies, follow-ups by video)
and that to his time depend on a wireless agent (WIFI,
Bluetooth) can consider the massive implementation of
tools opensource (open source, no privativo in his majority)
is important to consider the utility of the implementation of
frameworks based in tools of Intrusion like AirCrakNG;
this type of software, able to be purchased gratuitamente 5. CONCLUSIONS
and be adapted by means of computers of plate reduced
(RaspBerry PI) to monitor and testear the drones destined The conceptions that have about the advances in
to these activities of scan. technological and environmental matter are due to his time
guarantee the transparency of the processes and the
reliability to bear ( and be adaptable) the different novelties

3
that arise regarding the interception of data, since all
information is objective main of plagiarism, manipulation
and unauthorised treatment, giving asi step to results no
wished.

6. REFERENCES

[1] THE VIEWER The era of the robots in the Colombian


universities http://www.elespectador.com/tecnologia/era-de-
los-robots-universidades-colombianas-articulo-559529

[2] THE WORLD BANK An integral approach on the


environmental sustainability
http://www.bancomundial.org/odm/medio-ambiente.html

[3] MINTIC Impact of TIC in environment


http://www.mintic.gov.co/portal/604/w3-propertyvalue-
655.html

[4] DRONAIR The experts predict an expansion of the drones


in the agriculture http://www.dronair.es/los-expertos-
predicen-una-expansion-de-los-uavs-en-la-agricultura

[5] BBC Plough the drones the next target for hackers?
http://www.bbc.com/future/story/20140206-can-drones-be-
hacked

[6] RIGHT OF THE NETWORK The drones border of U.S.


hackeados by the cartels of the drug
https://derechodelared.com/2016/01/05/los-drones-
fronterizos-de-eeuu-hackeados-por-los-carteles-de-la-droga/

[7] INTERNET GLOSSARY Hacking ethical


http://www.internetglosario.com/1131/hackingetico.html

[8] PABLO CHURCHES 3 Attacks via Bluetooth (and why


would have to perocuparte)
https://www.pabloyglesias.com/mundohacker-bluetooth/

[9] HIPERTEXTUAL Develop a malware to steal drones


http://hipertextual.com/2015/01/desarrollan-un-malware-
para-controlar-y-robar-drones

[10] MLARRACUENTE would owe the universities and


educational institutions teach on Hacking?
https://mlarracuente.wordpress.com/2014/04/24/25-
deberian-las-universidades-e-instituciones-educativas-
ensenar-sobre-hacking/

[11] SPAMLOCO Drones that make automatic attacks on the


networks Wifi https://www.spamloco.net/2016/04/drones-
que-realizan-ataques-automaticos-sobre-las-redes-wifi.html

You might also like