{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:56:42Z","timestamp":1768348602378,"version":"3.49.0"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T00:00:00Z","timestamp":1517788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute for Information 8 Communications Technology Promotion"},{"name":"Development of Information Leakage Prevention and ID Management for Secure Drone Services"},{"name":"Korean government","award":["B0717-16-011"],"award-info":[{"award-number":["B0717-16-011"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2018,5,31]]},"abstract":"<jats:p>Drones are widely used for various purposes such as delivery, aerial photography, and surveillance. Considering the increasing drone-related services, tracking the locations of drones can cause security threats such as escaping from drone surveillance, disturbing drone-related services, and capturing drones. For wirelessly monitoring the status of drones, telemetry is used, and this status information contains various data such as latitude and longitude, calibrated sensor outputs, and sensor offsets. Because most of the telemetry implementation supports neither authentication nor encryption, an attacker can obtain the status information of the drones by using an appropriate wireless communication device such as software-defined radio. While the attacker knows the locations of the drones from the status information, this information is not sufficient for tracking drones because the status information does not include any identity information that can bind the identity of the drone with its location.<\/jats:p>\n          <jats:p>&lt;?tight?&gt;In this article, we propose a fingerprinting method for drones in motion for the binding of the identity of the drone with its location. Our fingerprinting method is based on the sensor outputs included in the status information, i.e., the offsets of micro-electro mechanical systems (MEMS) gyroscope, an essential sensor for maintaining the attitude of drones. We found that the offsets of MEMS gyroscopes are different from each other because of manufacturing mismatches, and the offsets of five drones obtained through their telemetry are distinguishable and constant during their flights. To evaluate the performance of our fingerprinting method on a larger scale, we collected the offsets from 70 stand-alone MEMS gyroscopes to generate fingerprints. Our experimental results show that, when using the offsets of three and two axes calculated from 128 samples of the raw outputs per axis as fingerprints, the F-scores of the proposed method reach 98.78% and 94.47%, respectively. The offsets collected after a month are also fingerprinted with F-scores of 96.58% and 78.45% under the same condition, respectively. The proposed fingerprinting method is effective, robust, and persistent. Additionally, unless the MEMS gyroscope is not replaced, our fingerprinting method can be used for drone tracking even when the target drones are flying.<\/jats:p>","DOI":"10.1145\/3177751","type":"journal-article","created":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T18:13:28Z","timestamp":1517940808000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["GyrosFinger"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0650-7633","authenticated-orcid":false,"given":"Yunmok","family":"Son","sequence":"first","affiliation":[{"name":"KAIST, Republic of Korea"}]},{"given":"Juhwan","family":"Noh","sequence":"additional","affiliation":[{"name":"KAIST, Republic of Korea"}]},{"given":"Jaeyeong","family":"Choi","sequence":"additional","affiliation":[{"name":"KAIST, Republic of Korea"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,2,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"3DR Solo\u2014The Smart Drone. 2015. Retrieved from https:\/\/3dr.com\/solo-drone.  3DR Solo\u2014The Smart Drone. 2015. Retrieved from https:\/\/3dr.com\/solo-drone."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741894"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"e_1_2_1_4_1","volume-title":"Mobile device identification via sensor fingerprinting. arXiv:1408.1416","author":"Bojinov Hristo","year":"2014","unstructured":"Hristo Bojinov , Yan Michalevsky , Gabi Nakibly , and Dan Boneh . 2014. Mobile device identification via sensor fingerprinting. arXiv:1408.1416 ( 2014 ). Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv:1408.1416 (2014)."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 6th USENIX Conference on Hot Topics in Security (HotSec\u201911)","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen . 2011 . TouchLogger: Inferring keystrokes on touch screen from smartphone motion . In Proceedings of the 6th USENIX Conference on Hot Topics in Security (HotSec\u201911) . Liang Cai and Hao Chen. 2011. TouchLogger: Inferring keystrokes on touch screen from smartphone motion. In Proceedings of the 6th USENIX Conference on Hot Topics in Security (HotSec\u201911)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_16"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03964-0_14"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23390"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"e_1_2_1_11_1","unstructured":"Kevin Finisterre. 2015. Shelling out on 3DR Solo. Retrieved from http:\/\/www.digitalmunition.com\/ShellingOutOnSolo_nopass.pdf.  Kevin Finisterre. 2015. Shelling out on 3DR Solo. Retrieved from http:\/\/www.digitalmunition.com\/ShellingOutOnSolo_nopass.pdf."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 13rd Annual Network and Distributed System Security Symposium (NDSS\u201906)","author":"Gerdes Ryan M.","year":"2006","unstructured":"Ryan M. Gerdes , Thomas E. Daniels , Mani Mina , and Steve Russell . 2006 . Device identification via analog signal fingerprinting: A matched filter approach . In Proceedings of the 13rd Annual Network and Distributed System Security Symposium (NDSS\u201906) . Ryan M. Gerdes, Thomas E. Daniels, Mani Mina, and Steve Russell. 2006. Device identification via analog signal fingerprinting: A matched filter approach. In Proceedings of the 13rd Annual Network and Distributed System Security Symposium (NDSS\u201906)."},{"key":"e_1_2_1_13_1","unstructured":"Github. 2010. ArduPilot Project. https:\/\/github.com\/ArduPilot\/ardupilot.  Github. 2010. ArduPilot Project. https:\/\/github.com\/ArduPilot\/ardupilot."},{"key":"e_1_2_1_14_1","unstructured":"Github. 2011. PX4 Firmware for ArduPilot. https:\/\/github.com\/ArduPilot\/PX4Firmware.  Github. 2011. PX4 Firmware for ArduPilot. https:\/\/github.com\/ArduPilot\/PX4Firmware."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the IEEE International Conference on Communication Systems and Networks.","author":"Han Jun","year":"2012","unstructured":"Jun Han , Emmanuel Owusu , Le T. Nguyen , Adrian Perrig , and Joy Zhang . 2012 . Accomplice: Location inference using accelerometers on smartphones . In Proceedings of the IEEE International Conference on Communication Systems and Networks. Jun Han, Emmanuel Owusu, Le T. Nguyen, Adrian Perrig, and Joy Zhang. 2012. Accomplice: Location inference using accelerometers on smartphones. In Proceedings of the IEEE International Conference on Communication Systems and Networks."},{"key":"e_1_2_1_16_1","unstructured":"Craig Hillman and Cheryl Tulkoff. 2009. Manufacturing and reliability challenges with QFN. SMTA DC Chapter (2009).  Craig Hillman and Cheryl Tulkoff. 2009. Manufacturing and reliability challenges with QFN. SMTA DC Chapter (2009)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821650.2821665"},{"key":"e_1_2_1_18_1","unstructured":"iFixit. 2010. An example of MEMS gyroscope structure. Retrieved from https:\/\/www.ifixit.com\/Teardown\/iPhone+4+Gyroscope+Teardown\/3156.  iFixit. 2010. An example of MEMS gyroscope structure. Retrieved from https:\/\/www.ifixit.com\/Teardown\/iPhone+4+Gyroscope+Teardown\/3156."},{"key":"e_1_2_1_19_1","unstructured":"InvenSense. 2013. InvenSense MPU6000\/6050 datasheet. Retrieved from https:\/\/www.invensense.com\/wp-content\/uploads\/2015\/02\/MPU-6000-Datasheet1.pdf.  InvenSense. 2013. InvenSense MPU6000\/6050 datasheet. Retrieved from https:\/\/www.invensense.com\/wp-content\/uploads\/2015\/02\/MPU-6000-Datasheet1.pdf."},{"key":"e_1_2_1_20_1","unstructured":"InvenSense. 2013. InvenSense MPU9150 datasheet. Retrieved from https:\/\/www.invensense.com\/wp-content\/uploads\/2015\/02\/MPU-9150-Datasheet.pdf.  InvenSense. 2013. InvenSense MPU9150 datasheet. Retrieved from https:\/\/www.invensense.com\/wp-content\/uploads\/2015\/02\/MPU-9150-Datasheet.pdf."},{"key":"e_1_2_1_21_1","unstructured":"InvenSense. 2014. InvenSense MPU6500 datasheet. Retrieved from https:\/\/www.invensense.com\/wp-content\/uploads\/2015\/02\/MPU-6500-Datasheet2.pdf.  InvenSense. 2014. InvenSense MPU6500 datasheet. Retrieved from https:\/\/www.invensense.com\/wp-content\/uploads\/2015\/02\/MPU-6500-Datasheet2.pdf."},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the International Conference on Modeling and Simulation of Microsystems","volume":"1","author":"Iyer Sitaraman","year":"2002","unstructured":"Sitaraman Iyer and Tamal Mukherjee . 2002 . Simulation of manufacturing variations in a Z-axis CMOS-MEMS gyroscope . In Proceedings of the International Conference on Modeling and Simulation of Microsystems , Vol. 1 . Citeseer, 186--189. Sitaraman Iyer and Tamal Mukherjee. 2002. Simulation of manufacturing variations in a Z-axis CMOS-MEMS gyroscope. In Proceedings of the International Conference on Modeling and Simulation of Microsystems, Vol. 1. Citeseer, 186--189."},{"key":"e_1_2_1_23_1","unstructured":"Samy Kamkar. 2013. SkyJack. http:\/\/samy.pl\/skyjack\/.  Samy Kamkar. 2013. SkyJack. http:\/\/samy.pl\/skyjack\/."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the Big Data Computing and Communications: First International Conference (BigCom\u201915)","volume":"9196","author":"Li Xiang-Yang","year":"2015","unstructured":"Xiang-Yang Li and Zhiguang Qin . 2015 . Wireless device authentication using acoustic hardware fingerprints . In Proceedings of the Big Data Computing and Communications: First International Conference (BigCom\u201915) , Taiyuan, China , August 1-3, 2015, Vol. 9196 . Springer, 193. Xiang-Yang Li and Zhiguang Qin. 2015. Wireless device authentication using acoustic hardware fingerprints. In Proceedings of the Big Data Computing and Communications: First International Conference (BigCom\u201915), Taiyuan, China, August 1-3, 2015, Vol. 9196. Springer, 193."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_2_1_27_1","volume-title":"Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft (No. AFIT-ENG-14-M-50). Master\u2019s thesis","author":"Marty Joseph A.","unstructured":"Joseph A. Marty . 2013. Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft (No. AFIT-ENG-14-M-50). Master\u2019s thesis . Air Force Institute of Technology . Joseph A. Marty. 2013. Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft (No. AFIT-ENG-14-M-50). Master\u2019s thesis. Air Force Institute of Technology."},{"key":"e_1_2_1_28_1","unstructured":"mavlink.org 2009. MAVLink: Micro Air Vehicle Communication Protocol. http:\/\/mavlink.org\/messages\/common http:\/\/qgroundcontrol.org\/mavlink\/start and https:\/\/en.wikipedia.org\/wiki\/MAVLink.  mavlink.org 2009. MAVLink: Micro Air Vehicle Communication Protocol. http:\/\/mavlink.org\/messages\/common http:\/\/qgroundcontrol.org\/mavlink\/start and https:\/\/en.wikipedia.org\/wiki\/MAVLink."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JMEMS.2004.839021"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23008"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2015.11.007"},{"key":"e_1_2_1_32_1","volume-title":"23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . 2014 . Gyrophone: Recognizing speech from gyroscope signals . In 23rd USENIX Security Symposium (USENIX Security\u201914) . 1053--1067. Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In 23rd USENIX Security Symposium (USENIX Security\u201914). 1053--1067."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627417"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_2_1_37_1","unstructured":"Pixhwak1. 2010. Pixhwak1 Flight Controller. Retrieved from https:\/\/pixhawk.org\/modules\/pixhawk.  Pixhwak1. 2010. Pixhwak1 Flight Controller. Retrieved from https:\/\/pixhawk.org\/modules\/pixhawk."},{"key":"e_1_2_1_38_1","unstructured":"Pixhwak2. 2016. Pixhwak2 Flight Controller. Retrieved from http:\/\/www.proficnc.com.  Pixhwak2. 2016. Pixhwak2 Flight Controller. Retrieved from http:\/\/www.proficnc.com."},{"key":"e_1_2_1_39_1","unstructured":"QGroundControl. 2010. QGroundControl. Retrieved from http:\/\/qgroundcontrol.com.  QGroundControl. 2010. QGroundControl. Retrieved from http:\/\/qgroundcontrol.com."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513103"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the Society of Photo-Optical Instrumentation Engineers Conference Series.","author":"Samland F.","unstructured":"F. Samland , J. Fruth , M. Hildebrandt , T. Hoppe , and J. Dittmann . 2012. AR.drone: Security threat analysis and exemplary attack to track persons . In Proceedings of the Society of Photo-Optical Instrumentation Engineers Conference Series. F. Samland, J. Fruth, M. Hildebrandt, T. Hoppe, and J. Dittmann. 2012. AR.drone: Security threat analysis and exemplary attack to track persons. In Proceedings of the Society of Photo-Optical Instrumentation Engineers Conference Series."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808414.2808418"},{"key":"e_1_2_1_43_1","unstructured":"Shellntel. 2015. Drone Code Execution. Retrieved from http:\/\/www.shellntel.com\/blog\/2015\/9\/25\/drone-code-execution.  Shellntel. 2015. Drone Code Execution. Retrieved from http:\/\/www.shellntel.com\/blog\/2015\/9\/25\/drone-code-execution."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"e_1_2_1_45_1","unstructured":"IEEE Spectrum. 2017. Electronic license plates for drones. Retrieved from https:\/\/spectrum.ieee.org\/automaton\/robotics\/drones\/electronic-license-plates-for-drones.  IEEE Spectrum. 2017. Electronic license plates for drones. Retrieved from https:\/\/spectrum.ieee.org\/automaton\/robotics\/drones\/electronic-license-plates-for-drones."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"key":"e_1_2_1_47_1","unstructured":"STMicroelectronics. 2010. STMicroelectronics L3G4200D datasheet. Retrieved from http:\/\/www.st.com\/resource\/en\/datasheet\/l3g4200d.pdf.  STMicroelectronics. 2010. STMicroelectronics L3G4200D datasheet. Retrieved from http:\/\/www.st.com\/resource\/en\/datasheet\/l3g4200d.pdf."},{"key":"e_1_2_1_48_1","unstructured":"STMicroelectronics. 2013. STMicroelectronics L3GD20 datasheet. Retrieved from http:\/\/www.st.com\/resource\/en\/datasheet\/l3gd20.pdf.  STMicroelectronics. 2013. STMicroelectronics L3GD20 datasheet. Retrieved from http:\/\/www.st.com\/resource\/en\/datasheet\/l3gd20.pdf."},{"key":"e_1_2_1_49_1","unstructured":"jDrones. 2014. Longrange Telemetry Set (jD-RF900Plus). Retrieved from http:\/\/store.jdrones.com\/jD_RD900Plus_Telemetry_Bundle_p\/rf900set02.htm.  jDrones. 2014. Longrange Telemetry Set (jD-RF900Plus). Retrieved from http:\/\/store.jdrones.com\/jD_RD900Plus_Telemetry_Bundle_p\/rf900set02.htm."},{"key":"e_1_2_1_50_1","unstructured":"NASA UTM. 2015. Google UAS airspace system overview. Retrieved from https:\/\/utm.arc.nasa.gov\/docs\/GoogleUASAirspaceSystemOverview5pager{1}.pdf.  NASA UTM. 2015. Google UAS airspace system overview. Retrieved from https:\/\/utm.arc.nasa.gov\/docs\/GoogleUASAirspaceSystemOverview5pager{1}.pdf."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978295"},{"key":"e_1_2_1_53_1","unstructured":"NASA. 2015. First steps toward drone traffic management. Retrieved from http:\/\/www.nasa.gov\/feature\/ames\/first-steps-toward-drone-traffic-management.  NASA. 2015. First steps toward drone traffic management. Retrieved from http:\/\/www.nasa.gov\/feature\/ames\/first-steps-toward-drone-traffic-management."},{"key":"e_1_2_1_54_1","volume-title":"UTM: Air traffic management for low-altitude drones.","author":"NASA.","year":"2015","unstructured":"NASA. 2015 . UTM: Air traffic management for low-altitude drones. Retrieved from http:\/\/www.nasa.gov\/sites\/default\/files\/atoms\/files\/utm-factsheet-11-05-15.pdf. NASA. 2015. UTM: Air traffic management for low-altitude drones. Retrieved from http:\/\/www.nasa.gov\/sites\/default\/files\/atoms\/files\/utm-factsheet-11-05-15.pdf."},{"key":"e_1_2_1_55_1","unstructured":"sUAS News. 2015. Market share by FAA registration. Retrieved from http:\/\/www.suasnews.com\/2015\/06\/forty-eight-percent-of-commercial-drone-platforms-in-the-usa-made-by-dji\/.  sUAS News. 2015. Market share by FAA registration. Retrieved from http:\/\/www.suasnews.com\/2015\/06\/forty-eight-percent-of-commercial-drone-platforms-in-the-usa-made-by-dji\/."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3177751","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3177751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:51Z","timestamp":1750273551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3177751"}},"subtitle":["Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes"],"short-title":[],"issued":{"date-parts":[[2018,2,5]]},"references-count":57,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,5,31]]}},"alternative-id":["10.1145\/3177751"],"URL":"https:\/\/doi.org\/10.1145\/3177751","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,5]]},"assertion":[{"value":"2017-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}