DefenseDrone
La seguridad en los sistemas de control de drones comerciales es un aspecto crítico debido a la creciente integración de hardware embebido, como las tarjetas Raspberry Pi, en su arquitectura. Este trabajo propone un plan de identificación, análisis y recomendaciones para la mitigación de riesgos aso...
- Autores:
-
Mena Toledo, Soraya Azucena
Nuñez Briñez, Yuly Katherin
Lopez Estepa, Victor Julio
- Tipo de recurso:
- https://purl.org/coar/resource_type/c_7a1f
- Fecha de publicación:
- 2025
- Institución:
- Universidad El Bosque
- Repositorio:
- Repositorio U. El Bosque
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unbosque.edu.co:20.500.12495/14847
- Acceso en línea:
- https://hdl.handle.net/20.500.12495/14847
- Palabra clave:
- Seguridad en IoT
Raspberry Pi
Drones
Ciberseguridad
Mitigación de riesgos
Manual de seguridad
621.3820289
IoT Security
Raspberry Pi
Drones
Cybersecurity
Risk mitigation
Security Manual
- Rights
- License
- Attribution-NonCommercial-ShareAlike 4.0 International
| id |
UNBOSQUE2_1b09d5d895614e84f11a09f8dde88508 |
|---|---|
| oai_identifier_str |
oai:repositorio.unbosque.edu.co:20.500.12495/14847 |
| network_acronym_str |
UNBOSQUE2 |
| network_name_str |
Repositorio U. El Bosque |
| repository_id_str |
|
| dc.title.none.fl_str_mv |
DefenseDrone |
| dc.title.translated.none.fl_str_mv |
DefenseDrone |
| title |
DefenseDrone |
| spellingShingle |
DefenseDrone Seguridad en IoT Raspberry Pi Drones Ciberseguridad Mitigación de riesgos Manual de seguridad 621.3820289 IoT Security Raspberry Pi Drones Cybersecurity Risk mitigation Security Manual |
| title_short |
DefenseDrone |
| title_full |
DefenseDrone |
| title_fullStr |
DefenseDrone |
| title_full_unstemmed |
DefenseDrone |
| title_sort |
DefenseDrone |
| dc.creator.fl_str_mv |
Mena Toledo, Soraya Azucena Nuñez Briñez, Yuly Katherin Lopez Estepa, Victor Julio |
| dc.contributor.advisor.none.fl_str_mv |
Castro Gutierrez, Robert Dario |
| dc.contributor.author.none.fl_str_mv |
Mena Toledo, Soraya Azucena Nuñez Briñez, Yuly Katherin Lopez Estepa, Victor Julio |
| dc.contributor.orcid.none.fl_str_mv |
Mena Toledo, Soraya Azucena [0009-0007-5127-9813] Nuñez Briñez, Yuly Katherin [0009-0000-5721-3793] Lopez Estepa, Victor Julio [0009-0009-8627-4646] |
| dc.subject.none.fl_str_mv |
Seguridad en IoT Raspberry Pi Drones Ciberseguridad Mitigación de riesgos Manual de seguridad |
| topic |
Seguridad en IoT Raspberry Pi Drones Ciberseguridad Mitigación de riesgos Manual de seguridad 621.3820289 IoT Security Raspberry Pi Drones Cybersecurity Risk mitigation Security Manual |
| dc.subject.ddc.none.fl_str_mv |
621.3820289 |
| dc.subject.keywords.none.fl_str_mv |
IoT Security Raspberry Pi Drones Cybersecurity Risk mitigation Security Manual |
| description |
La seguridad en los sistemas de control de drones comerciales es un aspecto crítico debido a la creciente integración de hardware embebido, como las tarjetas Raspberry Pi, en su arquitectura. Este trabajo propone un plan de identificación, análisis y recomendaciones para la mitigación de riesgos asociados al uso de Raspberry Pi como plataforma de procesamiento en drones de alto desempeño. Para ello, se realiza un análisis de las vulnerabilidades críticas presentes en el hardware, el sistema operativo, las comunicaciones y el firmware, así como de los posibles vectores de ataque. A partir de este análisis, se establecen recomendaciones técnicas para su mitigación. Finalmente, se desarrolla una guía de buenas prácticas en seguridad, que abarca aspectos clave como la configuración del sistema operativo en Raspberry Pi, la protección de la red de comunicaciones, la integridad del hardware y el aseguramiento del firmware. El presente documento contribuye al fortalecimiento de la seguridad en entornos de aeronaves no tripuladas, minimizando las amenazas que puedan comprometer la disponibilidad e integridad del sistema. |
| publishDate |
2025 |
| dc.date.accessioned.none.fl_str_mv |
2025-07-01T19:38:56Z |
| dc.date.available.none.fl_str_mv |
2025-07-01T19:38:56Z |
| dc.date.issued.none.fl_str_mv |
2025-06 |
| dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
| dc.type.local.spa.fl_str_mv |
Tesis/Trabajo de grado - Monografía - Especialización |
| dc.type.coar.none.fl_str_mv |
https://purl.org/coar/resource_type/c_7a1f |
| dc.type.driver.none.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
| dc.type.coarversion.none.fl_str_mv |
https://purl.org/coar/version/c_ab4af688f83e57aa |
| format |
https://purl.org/coar/resource_type/c_7a1f |
| dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12495/14847 |
| dc.identifier.instname.spa.fl_str_mv |
instname:Universidad El Bosque |
| dc.identifier.reponame.spa.fl_str_mv |
reponame:Repositorio Institucional Universidad El Bosque |
| dc.identifier.repourl.none.fl_str_mv |
repourl:https://repositorio.unbosque.edu.co |
| url |
https://hdl.handle.net/20.500.12495/14847 |
| identifier_str_mv |
instname:Universidad El Bosque reponame:Repositorio Institucional Universidad El Bosque repourl:https://repositorio.unbosque.edu.co |
| dc.language.iso.fl_str_mv |
spa |
| language |
spa |
| dc.relation.references.none.fl_str_mv |
[1] Imdad Ali Shah, Cybersecurity Issues and Challenges in the Drone Industry. IGI Global, 2024. doi: 10.4018/979-8-3693-0774-8. [2] V. Sihag, G. Choudhary, P. Choudhary, and N. Dragoni, “Cyber4Drone: A Systematic Review of Cyber Security and Forensics. [3] Zapata German and Garcia Rodolfo, “CyberDrone_a_cybersecurity_platform_for_drone_atta,” 2021. [4] J. Sainz-Raso, S. Martin, G. Diaz, and M. Castro, “Security Vulnerabilities in Raspberry Pi-Analysis of the System Weaknesses,” IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47–52, Nov. 2019, doi: 10.1109/MCE.2019.2941347. [5] Y. Renu and V. Sarveshwaran, “A Review of Cyber Security Challenges and Solutions in Unmanned Aerial Vehicles (UAVs),” Inteligencia Artificial, vol. 28, no. 75, pp. 199–219, Jun. 2025, doi: 10.4114/intartif.vol28iss75pp199-219. [6] N. X. Arreaga, G. M. Enriquez, S. Blanc, and R. Estrada, “Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST,” in Procedia Computer Science, Elsevier B.V., 2023, pp. 223–230. doi: 10.1016/j.procs.2023.09.031. [7] S. Benhadhria, M. Mansouri, A. Benkhlifa, I. Gharbi, and N. Jlili, “VAGADRONE: Intelligent and fully automatic drone based on raspberry Pi and android,” Applied Sciences (Switzerland), vol. 11, no. 7, Apr. 2021, doi: 10.3390/app11073153. [8] Cañizarez Juan, “Analisis y replicación de vulnerabilidades en Raspberry Pi3,” Universidad de los Andes, 2022. [9] G. Talmale, S. S. Mane, and G. R. Talmale, “Raspberry Pi Based Security System On IoT Platform,” no. 5, pp. 17–20, 2017, [Online]. Available: http://www.ijritcc.org. [10] R. Pi and J. López García, “PRON: Diseño y construcción de un dron basado en,” Universat Oberta de Catalunya, 2020. [11] A. R. H. Gutiérrez, M. A. T. Duarte, R. G. France, and Reaxión. R. arbitrada de divulgación científica de la U. T. de León., “El uso de drones en ciencias de la tierra.,” Jan. 2017. [12] I. Juan, C. Castelo, I. J. Marcelo, and P. Ramos, “Estudio de viabilidad técnica del Raspberry Pi para su uso en sistemas de visión artificial,” Sep. 30, 2020. Accessed: May 13, 2025. [Online]. Available: https://revista.estudioidea.org/ojs/index.php/mj/article/view/125. [13] A. Amazon, “¿Qué es la ciberseguridad? - Explicación de la ciberseguridad - AWS.” Accessed: May 13, 2025. [Online]. Available: https://aws.amazon.com/es/what-is/cybersecurity/. [14] N. Mansourov and D. Campara, “Knowledge of vulnerabilities as an element of cybersecurity argument,” System Assurance, pp. 147–170, 2011, doi: 10.1016/B978-0-12-381414-2.00006-3. [15] R. Subramaniam, A. J. Sheela, and A. Alwabli, “Enhanced cybersecurity and cyber-attack detection in smart DC micro grids using blockchain technology and SVM technique,” Ain Shams Engineering Journal, vol. 16, no. 7, p. 103400, Jul. 2025, doi: 10.1016/J.ASEJ.2025.103400. [16] S. Furber, Arm system on a chip Architecture. 2000. [17] K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” Feb. 2007, doi: 10.6028/NIST.SP.800-94. [18] Y. M. Kwon, J. Yu, B. M. Cho, Y. Eun, and K. J. Park, “Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles,” IEEE Access, vol. 6, pp. 43203–43212, Aug. 2018, doi: 10.1109/ACCESS.2018.2863237. [19] NIST National Vulnerability Database, “NVD - CVEs and the NVD Process.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/general/cve-process. [20] D. L. Evans and K. H. Brown, “FIPS 197 Federal Information Processing Standards Publication Advanced Encryption Standard (AES)”, doi: 10.6028/NIST.FIPS.197-upd1. [21] A. Maleki, H. H. Nguyen, E. Bedeer, and R. Barton, “A Tutorial on Chirp Spread Spectrum for LoRaWAN: Basics and Key Advances,” 2023. [22] MITRE ATT&CK, “Pre-OS Boot: Bootkit, Sub-technique T1542.003 - Enterprise | MITRE ATT&CK®.” Accessed: May 14, 2025. [Online]. Available: https://attack.mitre.org/techniques/T1542/003/. [23] The U-Boot development community, “The U-Boot Documentation — Das U-Boot unknown version documentation.” Accessed: May 14, 2025. [Online]. Available: https://docs.u-boot.org/en/latest/. [24] E. Marchetti, T. Waheed, and A. Calabro, “Cybersecurity Testing in Drones domain: A Systematic Literature Review,” IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3495994. [25] Del Cairo Hector, Sarmiento Diego, and Mendieta Deyanira, “Fortalecimiento de la seguridad en wifi,” Universidad El Bosque, 2024. [26] Rick. Golden, Raspberry Pi Networking cookbook : connect your Raspberry Pi to the world with this essential collection of recipes for basic administration and common network services. Packt Publishing, 2016. [27] NIST National Vulnerability Database, “NVD - CVE-2020-14001.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-14001. [28] NIST National Vulnerability Database, “NVD - CVE-2019-13173.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2019-13173. [29] NIST National Vulnerability Database, “NVD - cve-2021-3156.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2021-3156. [30] NIST National Vulnerability Database, “NVD - cve-2021-4034.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2021-4034. [31] NIST National Vulnerability Database, “NVD - cve-2018-15473.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2018-15473. [32] NIST National Vulnerability Database, “NVD - cve-2020-15778.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2020-15778. [33] NIST National Vulnerability Database, “NVD - cve-2019-14287.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2019-14287. [34] Mitre ATT&CK, “Boot or Logon Autostart Execution, Technique T1547 - Enterprise | MITRE ATT&CK®.” Accessed: May 14, 2025. [Online]. Available: https://attack.mitre.org/techniques/T1547/. [35] NIST National Vulnerability Database, “NVD - CVE-2020-10281.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10281. [36] NIST National Vulnerability Database, “NVD - CVE-2020-10282.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10282. [37] NIST National Vulnerability Database, “NVD - CVE-2020-10283.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10283. [38] NIST National Vulnerability Database, “NVD - CVE-2020-24572.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-24572. |
| dc.rights.en.fl_str_mv |
Attribution-NonCommercial-ShareAlike 4.0 International |
| dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
| dc.rights.uri.none.fl_str_mv |
http://creativecommons.org/licenses/by-nc-sa/4.0/ |
| dc.rights.local.spa.fl_str_mv |
Acceso abierto |
| dc.rights.accessrights.none.fl_str_mv |
https://purl.org/coar/access_right/c_abf2 |
| rights_invalid_str_mv |
Attribution-NonCommercial-ShareAlike 4.0 International http://creativecommons.org/licenses/by-nc-sa/4.0/ Acceso abierto https://purl.org/coar/access_right/c_abf2 http://purl.org/coar/access_right/c_abf2 |
| dc.format.mimetype.none.fl_str_mv |
application/pdf |
| dc.publisher.program.spa.fl_str_mv |
Especialización en Seguridad de Redes Telemáticas |
| dc.publisher.grantor.spa.fl_str_mv |
Universidad El Bosque |
| dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería |
| institution |
Universidad El Bosque |
| bitstream.url.fl_str_mv |
https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/93de57ff-83b4-4092-ba43-b962038318aa/download https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/b549c296-ba58-4936-96e7-6b3e3dacfba4/download https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/3fcdd53b-af07-4e72-a3de-929d797912c9/download https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/56cca764-9431-4857-8cf6-3027af00fd56/download https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/3975d8fc-6dde-4a47-8c19-2a6faaa4ecb9/download https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/976ac95f-8f94-454a-a0fb-1f9d5f98a055/download https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/923c74fc-3dbd-45e2-9c79-38745629ad90/download |
| bitstream.checksum.fl_str_mv |
a21c6e95ef2f362b14011626ecd54dd8 17cc15b951e7cc6b3728a574117320f9 b23ea4dfdbebef419b8931422b406a38 86ddab6056c12ebc1eef47d3c5df1220 5643bfd9bcf29d560eeec56d584edaa9 aaab78e89afe2a406c6005034b7fca9a 86a1e50fca3ca2f52f66f5766f2c0573 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 MD5 |
| repository.name.fl_str_mv |
Repositorio Institucional Universidad El Bosque |
| repository.mail.fl_str_mv |
bibliotecas@biteca.com |
| _version_ |
1849967284173406208 |
| spelling |
Castro Gutierrez, Robert DarioMena Toledo, Soraya AzucenaNuñez Briñez, Yuly KatherinLopez Estepa, Victor JulioMena Toledo, Soraya Azucena [0009-0007-5127-9813]Nuñez Briñez, Yuly Katherin [0009-0000-5721-3793]Lopez Estepa, Victor Julio [0009-0009-8627-4646]2025-07-01T19:38:56Z2025-07-01T19:38:56Z2025-06https://hdl.handle.net/20.500.12495/14847instname:Universidad El Bosquereponame:Repositorio Institucional Universidad El Bosquerepourl:https://repositorio.unbosque.edu.coLa seguridad en los sistemas de control de drones comerciales es un aspecto crítico debido a la creciente integración de hardware embebido, como las tarjetas Raspberry Pi, en su arquitectura. Este trabajo propone un plan de identificación, análisis y recomendaciones para la mitigación de riesgos asociados al uso de Raspberry Pi como plataforma de procesamiento en drones de alto desempeño. Para ello, se realiza un análisis de las vulnerabilidades críticas presentes en el hardware, el sistema operativo, las comunicaciones y el firmware, así como de los posibles vectores de ataque. A partir de este análisis, se establecen recomendaciones técnicas para su mitigación. Finalmente, se desarrolla una guía de buenas prácticas en seguridad, que abarca aspectos clave como la configuración del sistema operativo en Raspberry Pi, la protección de la red de comunicaciones, la integridad del hardware y el aseguramiento del firmware. El presente documento contribuye al fortalecimiento de la seguridad en entornos de aeronaves no tripuladas, minimizando las amenazas que puedan comprometer la disponibilidad e integridad del sistema.Especialista en Seguridad de Redes TelemáticasEspecializaciónThe security at commercial drone's control systems it's a critical aspect due their growing integration of embedded hardware, in example the Raspberry PI devices, at architectural level. The present document purpose an identification plan over the vulnerabilities, analysis and mitigation of risks associated to the use of Raspberry PI as control platform on high performance drones. to this a deep analysis of the critical vulnerabilities at hardware level is done, as well as Operative System, communications and firmware, as the possible attack vectors. Based on this analysis, some recommendations are highlighted in order to mitigate these risks. Finally, a security best practices guide is developed, covering key aspects such as configuring the operating system on the Raspberry Pi, securing the communications network, ensuring hardware integrity, and securing firmware. This document contributes to strengthening security in unmanned aircraft environments, minimizing threats that could compromise system availability and integrity.application/pdfAttribution-NonCommercial-ShareAlike 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-sa/4.0/Acceso abiertohttps://purl.org/coar/access_right/c_abf2http://purl.org/coar/access_right/c_abf2Seguridad en IoTRaspberry PiDronesCiberseguridadMitigación de riesgosManual de seguridad621.3820289IoT SecurityRaspberry PiDronesCybersecurityRisk mitigationSecurity ManualDefenseDroneDefenseDroneEspecialización en Seguridad de Redes TelemáticasUniversidad El BosqueFacultad de IngenieríaTesis/Trabajo de grado - Monografía - Especializaciónhttps://purl.org/coar/resource_type/c_7a1fhttp://purl.org/coar/resource_type/c_7a1finfo:eu-repo/semantics/bachelorThesishttps://purl.org/coar/version/c_ab4af688f83e57aa[1] Imdad Ali Shah, Cybersecurity Issues and Challenges in the Drone Industry. IGI Global, 2024. doi: 10.4018/979-8-3693-0774-8.[2] V. Sihag, G. Choudhary, P. Choudhary, and N. Dragoni, “Cyber4Drone: A Systematic Review of Cyber Security and Forensics.[3] Zapata German and Garcia Rodolfo, “CyberDrone_a_cybersecurity_platform_for_drone_atta,” 2021.[4] J. Sainz-Raso, S. Martin, G. Diaz, and M. Castro, “Security Vulnerabilities in Raspberry Pi-Analysis of the System Weaknesses,” IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47–52, Nov. 2019, doi: 10.1109/MCE.2019.2941347.[5] Y. Renu and V. Sarveshwaran, “A Review of Cyber Security Challenges and Solutions in Unmanned Aerial Vehicles (UAVs),” Inteligencia Artificial, vol. 28, no. 75, pp. 199–219, Jun. 2025, doi: 10.4114/intartif.vol28iss75pp199-219.[6] N. X. Arreaga, G. M. Enriquez, S. Blanc, and R. Estrada, “Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST,” in Procedia Computer Science, Elsevier B.V., 2023, pp. 223–230. doi: 10.1016/j.procs.2023.09.031.[7] S. Benhadhria, M. Mansouri, A. Benkhlifa, I. Gharbi, and N. Jlili, “VAGADRONE: Intelligent and fully automatic drone based on raspberry Pi and android,” Applied Sciences (Switzerland), vol. 11, no. 7, Apr. 2021, doi: 10.3390/app11073153.[8] Cañizarez Juan, “Analisis y replicación de vulnerabilidades en Raspberry Pi3,” Universidad de los Andes, 2022.[9] G. Talmale, S. S. Mane, and G. R. Talmale, “Raspberry Pi Based Security System On IoT Platform,” no. 5, pp. 17–20, 2017, [Online]. Available: http://www.ijritcc.org.[10] R. Pi and J. López García, “PRON: Diseño y construcción de un dron basado en,” Universat Oberta de Catalunya, 2020.[11] A. R. H. Gutiérrez, M. A. T. Duarte, R. G. France, and Reaxión. R. arbitrada de divulgación científica de la U. T. de León., “El uso de drones en ciencias de la tierra.,” Jan. 2017.[12] I. Juan, C. Castelo, I. J. Marcelo, and P. Ramos, “Estudio de viabilidad técnica del Raspberry Pi para su uso en sistemas de visión artificial,” Sep. 30, 2020. Accessed: May 13, 2025. [Online]. Available: https://revista.estudioidea.org/ojs/index.php/mj/article/view/125.[13] A. Amazon, “¿Qué es la ciberseguridad? - Explicación de la ciberseguridad - AWS.” Accessed: May 13, 2025. [Online]. Available: https://aws.amazon.com/es/what-is/cybersecurity/.[14] N. Mansourov and D. Campara, “Knowledge of vulnerabilities as an element of cybersecurity argument,” System Assurance, pp. 147–170, 2011, doi: 10.1016/B978-0-12-381414-2.00006-3.[15] R. Subramaniam, A. J. Sheela, and A. Alwabli, “Enhanced cybersecurity and cyber-attack detection in smart DC micro grids using blockchain technology and SVM technique,” Ain Shams Engineering Journal, vol. 16, no. 7, p. 103400, Jul. 2025, doi: 10.1016/J.ASEJ.2025.103400.[16] S. Furber, Arm system on a chip Architecture. 2000.[17] K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” Feb. 2007, doi: 10.6028/NIST.SP.800-94.[18] Y. M. Kwon, J. Yu, B. M. Cho, Y. Eun, and K. J. Park, “Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles,” IEEE Access, vol. 6, pp. 43203–43212, Aug. 2018, doi: 10.1109/ACCESS.2018.2863237.[19] NIST National Vulnerability Database, “NVD - CVEs and the NVD Process.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/general/cve-process.[20] D. L. Evans and K. H. Brown, “FIPS 197 Federal Information Processing Standards Publication Advanced Encryption Standard (AES)”, doi: 10.6028/NIST.FIPS.197-upd1.[21] A. Maleki, H. H. Nguyen, E. Bedeer, and R. Barton, “A Tutorial on Chirp Spread Spectrum for LoRaWAN: Basics and Key Advances,” 2023.[22] MITRE ATT&CK, “Pre-OS Boot: Bootkit, Sub-technique T1542.003 - Enterprise | MITRE ATT&CK®.” Accessed: May 14, 2025. [Online]. Available: https://attack.mitre.org/techniques/T1542/003/.[23] The U-Boot development community, “The U-Boot Documentation — Das U-Boot unknown version documentation.” Accessed: May 14, 2025. [Online]. Available: https://docs.u-boot.org/en/latest/.[24] E. Marchetti, T. Waheed, and A. Calabro, “Cybersecurity Testing in Drones domain: A Systematic Literature Review,” IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3495994.[25] Del Cairo Hector, Sarmiento Diego, and Mendieta Deyanira, “Fortalecimiento de la seguridad en wifi,” Universidad El Bosque, 2024.[26] Rick. Golden, Raspberry Pi Networking cookbook : connect your Raspberry Pi to the world with this essential collection of recipes for basic administration and common network services. Packt Publishing, 2016.[27] NIST National Vulnerability Database, “NVD - CVE-2020-14001.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-14001.[28] NIST National Vulnerability Database, “NVD - CVE-2019-13173.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2019-13173.[29] NIST National Vulnerability Database, “NVD - cve-2021-3156.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2021-3156.[30] NIST National Vulnerability Database, “NVD - cve-2021-4034.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2021-4034.[31] NIST National Vulnerability Database, “NVD - cve-2018-15473.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2018-15473.[32] NIST National Vulnerability Database, “NVD - cve-2020-15778.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2020-15778.[33] NIST National Vulnerability Database, “NVD - cve-2019-14287.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/cve-2019-14287.[34] Mitre ATT&CK, “Boot or Logon Autostart Execution, Technique T1547 - Enterprise | MITRE ATT&CK®.” Accessed: May 14, 2025. [Online]. Available: https://attack.mitre.org/techniques/T1547/.[35] NIST National Vulnerability Database, “NVD - CVE-2020-10281.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10281.[36] NIST National Vulnerability Database, “NVD - CVE-2020-10282.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10282.[37] NIST National Vulnerability Database, “NVD - CVE-2020-10283.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-10283.[38] NIST National Vulnerability Database, “NVD - CVE-2020-24572.” Accessed: May 14, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2020-24572.spaORIGINALTrabajo de grado.pdfTrabajo de grado.pdfapplication/pdf9039107https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/93de57ff-83b4-4092-ba43-b962038318aa/downloada21c6e95ef2f362b14011626ecd54dd8MD59trueAnonymousREADLICENSElicense.txtlicense.txttext/plain; charset=utf-82000https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/b549c296-ba58-4936-96e7-6b3e3dacfba4/download17cc15b951e7cc6b3728a574117320f9MD55falseAnonymousREADCarta de autorizacion.pdfapplication/pdf266331https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/3fcdd53b-af07-4e72-a3de-929d797912c9/downloadb23ea4dfdbebef419b8931422b406a38MD511falseBiblioteca - (Publicadores)READAnexo 1 Acta de Sustentacion.pdfapplication/pdf592747https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/56cca764-9431-4857-8cf6-3027af00fd56/download86ddab6056c12ebc1eef47d3c5df1220MD512falseBiblioteca - (Publicadores)READCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-81160https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/3975d8fc-6dde-4a47-8c19-2a6faaa4ecb9/download5643bfd9bcf29d560eeec56d584edaa9MD510falseAnonymousREADTEXTTrabajo de grado.pdf.txtTrabajo de grado.pdf.txtExtracted texttext/plain101388https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/976ac95f-8f94-454a-a0fb-1f9d5f98a055/downloadaaab78e89afe2a406c6005034b7fca9aMD513falseAnonymousREADTHUMBNAILTrabajo de grado.pdf.jpgTrabajo de grado.pdf.jpgGenerated Thumbnailimage/jpeg3045https://pruebas-update-repositorio-unbosque.cloudbiteca.com/bitstreams/923c74fc-3dbd-45e2-9c79-38745629ad90/download86a1e50fca3ca2f52f66f5766f2c0573MD514falseAnonymousREAD20.500.12495/14847oai:pruebas-update-repositorio-unbosque.cloudbiteca.com:20.500.12495/148472025-07-02T10:06:32.237Zhttp://creativecommons.org/licenses/by-nc-sa/4.0/Attribution-NonCommercial-ShareAlike 4.0 Internationalopen.accesshttps://pruebas-update-repositorio-unbosque.cloudbiteca.comRepositorio Institucional Universidad El Bosquebibliotecas@biteca.comTGljZW5jaWEgZGUgRGlzdHJpYnVjacOzbiBObyBFeGNsdXNpdmEKClBhcmEgcXVlIGVsIFJlcG9zaXRvcmlvIGRlIGxhIFVuaXZlcnNpZGFkIEVsIEJvc3F1ZSBhIHB1ZWRhIHJlcHJvZHVjaXIgeSBjb211bmljYXIgcMO6YmxpY2FtZW50ZSBzdSBkb2N1bWVudG8gZXMgbmVjZXNhcmlvIGxhIGFjZXB0YWNpw7NuIGRlIGxvcyBzaWd1aWVudGVzIHTDqXJtaW5vcy4gUG9yIGZhdm9yLCBsZWEgbGFzIHNpZ3VpZW50ZXMgY29uZGljaW9uZXMgZGUgbGljZW5jaWE6CgoxLiBBY2VwdGFuZG8gZXN0YSBsaWNlbmNpYSwgdXN0ZWQgKGVsIGF1dG9yL2VzIG8gZWwgcHJvcGlldGFyaW8vcyBkZSBsb3MgZGVyZWNob3MgZGUgYXV0b3IpIGdhcmFudGl6YSBhIGxhIFVuaXZlcnNpZGFkIEVsIEJvc3F1ZSBlbCBkZXJlY2hvIG5vIGV4Y2x1c2l2byBkZSBhcmNoaXZhciwgcmVwcm9kdWNpciwgY29udmVydGlyIChjb21vIHNlIGRlZmluZSBtw6FzIGFiYWpvKSwgY29tdW5pY2FyIHkvbyBkaXN0cmlidWlyIHN1IGRvY3VtZW50byBtdW5kaWFsbWVudGUgZW4gZm9ybWF0byBlbGVjdHLDs25pY28uCgoyLiBUYW1iacOpbiBlc3TDoSBkZSBhY3VlcmRvIGNvbiBxdWUgbGEgVW5pdmVyc2lkYWQgRWwgQm9zcXVlIHB1ZWRhIGNvbnNlcnZhciBtw6FzIGRlIHVuYSBjb3BpYSBkZSBlc3RlIGRvY3VtZW50byB5LCBzaW4gYWx0ZXJhciBzdSBjb250ZW5pZG8sIGNvbnZlcnRpcmxvIGEgY3VhbHF1aWVyIGZvcm1hdG8gZGUgZmljaGVybywgbWVkaW8gbyBzb3BvcnRlLCBwYXJhIHByb3DDs3NpdG9zIGRlIHNlZ3VyaWRhZCwgcHJlc2VydmFjacOzbiB5IGFjY2Vzby4KCjMuIERlY2xhcmEgcXVlIGVsIGRvY3VtZW50byBlcyB1biB0cmFiYWpvIG9yaWdpbmFsIHN1eW8geS9vIHF1ZSB0aWVuZSBlbCBkZXJlY2hvIHBhcmEgb3RvcmdhciBsb3MgZGVyZWNob3MgY29udGVuaWRvcyBlbiBlc3RhIGxpY2VuY2lhLiBUYW1iacOpbiBkZWNsYXJhIHF1ZSBzdSBkb2N1bWVudG8gbm8gaW5mcmluZ2UsIGVuIHRhbnRvIGVuIGN1YW50byBsZSBzZWEgcG9zaWJsZSBzYWJlciwgbG9zIGRlcmVjaG9zIGRlIGF1dG9yIGRlIG5pbmd1bmEgb3RyYSBwZXJzb25hIG8gZW50aWRhZC4KCjQuIFNpIGVsIGRvY3VtZW50byBjb250aWVuZSBtYXRlcmlhbGVzIGRlIGxvcyBjdWFsZXMgbm8gdGllbmUgbG9zIGRlcmVjaG9zIGRlIGF1dG9yLCBkZWNsYXJhIHF1ZSBoYSBvYnRlbmlkbyBlbCBwZXJtaXNvIHNpbiByZXN0cmljY2nDs24gZGVsIHByb3BpZXRhcmlvIGRlIGxvcyBkZXJlY2hvcyBkZSBhdXRvciBwYXJhIG90b3JnYXIgYSBsYSBVbml2ZXJzaWRhZCBFbCBCb3NxdWUgbG9zIGRlcmVjaG9zIHJlcXVlcmlkb3MgcG9yIGVzdGEgbGljZW5jaWEsIHkgcXVlIGVzZSBtYXRlcmlhbCBjdXlvcyBkZXJlY2hvcyBzb24gZGUgdGVyY2Vyb3MgZXN0w6EgY2xhcmFtZW50ZSBpZGVudGlmaWNhZG8geSByZWNvbm9jaWRvIGVuIGVsIHRleHRvIG8gY29udGVuaWRvIGRlbCBkb2N1bWVudG8gZW50cmVnYWRvLgoKNS4gU2kgZWwgZG9jdW1lbnRvIHNlIGJhc2EgZW4gdW5hIG9icmEgcXVlIGhhIHNpZG8gcGF0cm9jaW5hZGEgbyBhcG95YWRhIHBvciB1bmEgYWdlbmNpYSB1IG9yZ2FuaXphY2nDs24gZGlmZXJlbnRlIGRlIGxhIFVuaXZlcnNpZGFkIEVsIEJvc3F1ZSwgc2UgcHJlc3Vwb25lIHF1ZSBzZSBoYSBjdW1wbGlkbyBjb24gY3VhbHF1aWVyIGRlcmVjaG8gZGUgcmV2aXNpw7NuIHUgb3RyYXMgb2JsaWdhY2lvbmVzIHJlcXVlcmlkYXMgcG9yIGVzdGUgY29udHJhdG8gbyBhY3VlcmRvLgoKNi4gVW5pdmVyc2lkYWQgRWwgQm9zcXVlIGlkZW50aWZpY2Fyw6EgY2xhcmFtZW50ZSBzdS9zIG5vbWJyZS9zIGNvbW8gZWwvbG9zIGF1dG9yL2VzIG8gcHJvcGlldGFyaW8vcyBkZSBsb3MgZGVyZWNob3MgZGVsIGRvY3VtZW50bywgeSBubyBoYXLDoSBuaW5ndW5hIGFsdGVyYWNpw7NuIGRlIHN1IGRvY3VtZW50byBkaWZlcmVudGUgYSBsYXMgcGVybWl0aWRhcyBlbiBlc3RhIGxpY2VuY2lhLgo= |
