Analyzing the Viability of UAV Missions Facing Cyber Attacks

被引:1
|
作者
Soikkeli, Jukka [1 ]
Perner, Cora [2 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
[2] Airbus Cybersecur GmbH, Taufkirchen, Germany
基金
欧盟地平线“2020”; 英国工程与自然科学研究理事会;
关键词
UAV; cyber attack; mission viability analysis; Petri net; cyber resilience; cyber security; RESILIENCE;
D O I
10.1109/EuroSPW54576.2021.00018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With advanced video and sensing capabilities, unoccupied aerial vehicles (UAVs) are increasingly being used for numerous applications that involve the collaboration and autonomous operation of teams of UAVs. Yet such vehicles can be affected by cyber attacks, impacting the viability of their missions. We propose a method to conduct mission viability analysis under cyber attacks for missions that employ a team of several UAVs that share a communication network. We apply our method to a case study of a survey mission in a wildfire firefighting scenario. Within this context, we show how our method can help quantify the expected mission performance impact from an attack and determine if the mission can remain viable under various attack situations. Our method can be used both in the planning of the mission and for decision making during mission operation. Our approach to modeling attack progression and impact analysis with Petri nets is also more broadly applicable to other settings involving multiple resources that can be used interchangeably towards the same objective.
引用
收藏
页码:103 / 112
页数:10
相关论文
共 50 条
  • [21] Attributing Cyber Attacks
    Rid, Thomas
    Buchanan, Ben
    JOURNAL OF STRATEGIC STUDIES, 2015, 38 (1-2) : 4 - 37
  • [22] Modeling cyber attacks
    Hansen, E
    Hansen, J
    Rubin, SH
    Richardson, C
    CCCT 2003, VOL6, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: III, 2003, : 57 - 62
  • [23] Countering cyber attacks
    Wagner, Cynthia G.
    FUTURIST, 2007, 41 (03) : 16 - 16
  • [24] Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks
    Mistry N.R.
    Dahiya M.S.
    International Journal of Information Technology, 2019, 11 (3) : 583 - 589
  • [25] Analyzing the impact of cyber-attacks on the performance of digital twin-based industrial organizations
    Mustofa, Ridwan
    Rafiquzzaman, Md.
    Hossain, Niamat Ullah Ibne
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2024, 41
  • [26] Towards a Framework for Analyzing Cyber Attacks Impact against Smart Power Grid on SCADA System
    Akhtar, Tafseer
    Gupta, B. B.
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1087 - 1093
  • [27] Cyber Social Disruption due to Cyber Attacks
    Barbosa, Jorge
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 817 - 826
  • [28] A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Ansari, Nirwan
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (09): : 1594 - 1606
  • [29] A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks
    Vanitha, N.
    Padmavathi, G.
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS: MODELS AND TECHNIQUES FOR INTELLIGENT SYSTEMS AND AUTOMATION, 2018, 844 : 124 - 131
  • [30] Embedded Decision Making for UAV Missions
    Zermani, Sara
    Dezan, Catherine
    Euler, Reinhardt
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 82 - 85