View Single Post
  #2   Spotlight this post!  
Unread 08-03-2011, 13:27
TD912 TD912 is offline
Registered User
AKA: Chris Leung
FRC #1989 (Viking Robotics)
Team Role: College Student
 
Join Date: Sep 2009
Rookie Year: 2009
Location: Vernon, NJ
Posts: 156
TD912 has much to be proud ofTD912 has much to be proud ofTD912 has much to be proud ofTD912 has much to be proud ofTD912 has much to be proud ofTD912 has much to be proud ofTD912 has much to be proud ofTD912 has much to be proud ofTD912 has much to be proud ofTD912 has much to be proud of
Re: Possible FLR Hacking?

I only read the first 2 pages of this post, but hacking the system is very unlikely unless someone managed to brute force the WPA2 keys, which is highly unlikely to happen during the limited time on the field. Another possibility is a person swiping the keys if they were written down somewhere easily accessible, which is possible but still very unlikely.

Still, the FMS should only allow data to be transferred between the specific IP addresses allocated to the Robot and the Driver Station. Even if a malicious person did have the WPA2 keys, I would think any additional devices connected to the FMS would be quite easy to detect.

A person would have to know a lot about how the entire communications system works. They would need to have the specific team's WPA2 key, know a way to fool the FMS, override the real Driver Station, intercept and emulate commands, figure out the controls to the specific robot, and pull all of it off within 2 minutes without being detected. Highly unlikely.

In any case, I'm >99% sure it was a field error.
__________________
Zip-ties, hot glue, and duct tape.

2008 New York City Regional Champions - (41/555/1989)
2009 Brunswick Eruption 8 Finalists - (1989/56/1807)
2010 PARC XIII Champions - (25/341/1989)

Over The Bump
Reply With Quote