FAA Drone Regulations & Privacy Techniques: Part 107, TRUST, and Location Privacy

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Maximum altitude in uncontrolled airspace

400 feet (applies to Class G airspace)

2
New cards

Part 107

Default regulation for commercial drone operations (under 55 lbs)

3
New cards

TRUST certificate

Required for all recreational flyers

4
New cards

Remote ID requirement

Remote ID required as of September 16, 2023

5
New cards

Drone registration requirement

Drones between 0.55 lb and 55 lb must be registered

6
New cards

Visual Line-of-Sight rule

Operator must keep drone within unaided line of sight

7
New cards

Yield to manned aircraft

Drones must always give way to manned aircraft

8
New cards

Temporary Flight Restrictions (TFR)

Temporary restrictions for VIP/security events (e.g., presidential visits)

9
New cards

Philadelphia case (2020)

Consent judgment for FAA violations: over people, night ops without waiver, near emergency ops

10
New cards

Los Angeles wildfire case

Plea deal after interfering with firefighting plane; criminal charges possible

11
New cards

FAA rule importance

Violations can endanger aircraft/emergency ops and lead to criminal penalties

12
New cards

Confidentiality

Only sender and intended receiver can access message contents; prevents unauthorized disclosure

13
New cards

Integrity

Information is not altered except in authorized ways; ensures correctness

14
New cards

Availability

Services are accessible when needed; high-criticality requires high availability

15
New cards

End-point authentication

Verifies identity of communication party (are you really you?)

16
New cards

Nonrepudiation

Prevents parties from denying participation in communication; ensures accountability

17
New cards

Encrypted message altered (T/F)

TRUE — can remain confidential but lose integrity if alteration undetected

18
New cards

Confidentiality assures authorized changes (T/F)

FALSE — that describes integrity

19
New cards

k-anonymity

Privacy technique sending k−1 dummy locations so server cannot distinguish the real one

20
New cards

k-anonymity probability

Probability server identifies real location = 1/k

21
New cards

k-anonymity example

If k=5, probability = 1/5 = 20%

22
New cards

Dummy locations

Fake coordinates sent to confuse the LBS server

23
New cards

Spatial cloaking

Reporting a region containing k users instead of exact coordinates

24
New cards

Location perturbation

Adding noise to reported location to reduce precision

25
New cards

Zone-based reporting

Report a general zone instead of exact coordinates

26
New cards

Passive attacks

Observe or listen (eavesdropping, traffic analysis) without altering resources

27
New cards

Active attacks

Alter system resources or operations (masquerade, replay, modification, DoS)

28
New cards

Masquerade attack

Attacker pretends to be a legitimate entity

29
New cards

Replay attack

Capture and retransmit valid data to produce unauthorized effects

30
New cards

Modification attack

Altering legitimate messages or data in transit

31
New cards

Denial-of-Service (DoS)

Overwhelm or disrupt services to prevent normal use

32
New cards

Sky-of-Things (SoT)

IoT extended with drones, sensors, and distributed devices

33
New cards

Drone network security essentials

Require confidentiality, integrity, and end-point authentication

34
New cards

Drone invasion attack

Use of drones for unauthorized surveillance with sensors/cameras

35
New cards

Weaponized drones

Drones equipped or used as weapons (suicide drones, explosives)

36
New cards

Geofencing

Virtual boundaries preventing drone entry to restricted areas

37
New cards

Physical attacks on drones

Tampering, theft, shooting — generally illegal

38
New cards

GPS jamming

Interference with GPS signals so the drone loses location service

39
New cards

GPS spoofing

Sending fake GPS signals to mislead drone position

40
New cards

SPT (Shortest Path Tracking)

Drone flies directly; efficient and fast detection but predictable

41
New cards

RLT (Random Location Tracking)

Random intermediate destinations in a rectangle; more randomness but frequent server contact

42
New cards

DLT (Dummy Location Tracking)

Generate k dummy locations and fly through a subset; better privacy but higher detection delay

43
New cards

Location privacy metric

Entropy-based anonymity measures uncertainty in identifying the real location

44
New cards

Trajectory privacy metrics

Number of possible paths and convex hull size increase unpredictability

45
New cards

Path vs Trajectory

Path = spatial route; Trajectory = movement between intermediate locations over time

46
New cards

Detection range

Area where a drone can detect a target

47
New cards

Cloaking area

Region where dummy locations are distributed

48
New cards

Convex hull

Smallest polygon containing all dummy locations