Numerical Analysis of Cyberattacks on Unmanned Aerial Systems

نویسندگان

  • James Goppert
  • Weiyi Liu
  • Andrew Shull
  • Vincent Sciandra
  • Inseok Hwang
  • Hal Aldridge
چکیده

Unmanned Aerial Systems (UASs) are currently in wide use in many applications, including surveillance, law enforcement, and a variety of military missions. As these systems are unmanned, they cannot be directly monitored, and cyberattacks can jeopardize the mission, the vehicle, and potentially lives and property. Given the potential severity of the consequences of security breaches, it is important to assess the vulnerabilities inherent in cyberphysical systems. This paper presents a method for modeling cyberphysical systems in order to evaluate robustness to cyberattacks. We also establish a metric to quantify attack severity: time till failure. We categorize intents and outcomes for typical attacks and perform numerical simulations to estimate the severity of attack combinations in order to identify critical areas of vulnerability. Our findings can be used to guide strategies for improving the security of UASs and other cyberphysical systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Cyberattacks on Unmanned Aerial Systems

Shull, Andrew M. M.S.E., Purdue University, May 2013. Analysis of Cyberattacks on Unmanned Aerial Systems. Major Professor: Inseok Hwang. With the increasing power and convenience offered by the use of embedded systems in control applications, such systems will undoubtedly continue to be developed and deployed. Recently, however, a focus on data-centric systems and developing networkenabled con...

متن کامل

Human Augmentation of UAV Cyber-Attack Detection

Unmanned aerial vehicles (UAVs) have extensive applications in both civilian and military applications. Nevertheless, the continued development of UAVs has been accompanied by security concerns. UAV navigation systems are potentially vulnerable to malicious attacks that target their Global Positioning System (GPS). Thus, efficient GPS hacking detection with high success rate is paramount. Signi...

متن کامل

Methods for Evaluating the Temperature Structure-Function Parameter Using Unmanned Aerial Systems and Large-Eddy Simulation

Small-scale turbulent fluctuations of temperature are known to affect the propagation of both electromagnetic and acoustic waves. Within the inertial-subrange scale, where the turbulence is locally homogeneous and isotropic, these temperature perturbations can be described, in a statistical sense, using the structure-function parameter for temperature, C2 T . Here we investigate different metho...

متن کامل

Pivotal decomposition for reliability analysis of fault tolerant control systems on unmanned aerial vehicles

In this paper, we describe a framework to efficiently assess the reliability of fault tolerant control systems on low-cost unmanned aerial vehicles. The analysis is developed for a system consisting of a fixed number of actuators. In addition, the system includes a scheme to detect failures in individual actuators and, as a consequence, switch between different control algorithms for automatic ...

متن کامل

Behaviour recognition of ground vehicle using airborne monitoring of unmanned aerial vehicles

This paper proposes a behaviour recognition methodology for ground vehicles moving within road traffic using unmanned aerial vehicles in order to identify suspicious or abnormal behaviour. With the target information acquired by unmanned aerial vehicles and estimated by filtering techniques, ground vehicle behaviour is first classified into representative driving modes, and then a string patter...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012