Analyzing the Viability of UAV Missions Facing Cyber Attacks

被引:1
|
作者
Soikkeli, Jukka [1 ]
Perner, Cora [2 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
[2] Airbus Cybersecur GmbH, Taufkirchen, Germany
基金
欧盟地平线“2020”; 英国工程与自然科学研究理事会;
关键词
UAV; cyber attack; mission viability analysis; Petri net; cyber resilience; cyber security; RESILIENCE;
D O I
10.1109/EuroSPW54576.2021.00018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With advanced video and sensing capabilities, unoccupied aerial vehicles (UAVs) are increasingly being used for numerous applications that involve the collaboration and autonomous operation of teams of UAVs. Yet such vehicles can be affected by cyber attacks, impacting the viability of their missions. We propose a method to conduct mission viability analysis under cyber attacks for missions that employ a team of several UAVs that share a communication network. We apply our method to a case study of a survey mission in a wildfire firefighting scenario. Within this context, we show how our method can help quantify the expected mission performance impact from an attack and determine if the mission can remain viable under various attack situations. Our method can be used both in the planning of the mission and for decision making during mission operation. Our approach to modeling attack progression and impact analysis with Petri nets is also more broadly applicable to other settings involving multiple resources that can be used interchangeably towards the same objective.
引用
收藏
页码:103 / 112
页数:10
相关论文
共 50 条
  • [1] Evaluating the Impact of Cyber Attacks on Missions
    Musman, Scott
    Temin, Aaron
    Tanner, Mike
    Fox, Dick
    Pridemore, Brian
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 446 - 456
  • [2] Computing the Impact of Cyber Attacks on Complex Missions
    Musman, Scott
    Tanner, Mike
    Temin, Aaron
    Elsaesser, Evan
    Loren, Lewis
    2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 46 - 51
  • [3] Honeypot Utilization for Analyzing Cyber Attacks
    Hrad, Otto
    Kemppainen, Simo
    ACM PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE WORKSHOPS (ECSA-W), 2016,
  • [4] A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks
    Al-Sarray, Muthanna
    McCann, Roy A.
    2016 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2016,
  • [5] Analyzing Cyber-Physical Attacks on Smart Grid Systems
    Wadhawan, Yatin
    Neuman, Clifford
    AlMajali, Anas
    2017 WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS (MSCPES), 2017,
  • [6] Analyzing cyber-attacks targeted on the Banks of Pakistan and their Solutions
    Bukht, Tanvir Fatima Naik
    Raza, Muhammad Ahsan
    Awan, Jawad Hussain
    Ahmad, Rizwan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (02): : 31 - 38
  • [7] ANALYZING CYBER-PHYSICAL ATTACKS ON NETWORKED INDUSTRIAL CONTROL SYSTEMS
    Genge, Bela
    Fovino, Igor Nai
    Siaterlis, Christos
    Masera, Marcelo
    CRITICAL INFRASTRUCTURE PROTECTION V, 2011, 367 : 167 - 183
  • [8] IoT Based Optimal UAV Tracking Method Considering Noise and Cyber Attacks
    Rana, M. M.
    Abdelhadi, A.
    PROCEEDINGS OF 2020 IEEE 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2020), 2020, : 53 - 56
  • [9] Analyzing Locally Coordinated Cyber-Physical Attacks for Undetectable Line Outages
    Li, Zhiyi
    Shahidehpour, Mohammad
    Alabdulwahab, Ahmed
    Abusorrah, Abdullah
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (01) : 35 - 47
  • [10] Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems
    Li, Zhiyi
    Shahidehpour, Mohammad
    Alabdulwahab, Ahmed
    Abusorrah, Abdullah
    IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (05) : 2260 - 2272