Analyzing the Viability of UAV Missions Facing Cyber Attacks

被引:1
|
作者
Soikkeli, Jukka [1 ]
Perner, Cora [2 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
[2] Airbus Cybersecur GmbH, Taufkirchen, Germany
基金
欧盟地平线“2020”; 英国工程与自然科学研究理事会;
关键词
UAV; cyber attack; mission viability analysis; Petri net; cyber resilience; cyber security; RESILIENCE;
D O I
10.1109/EuroSPW54576.2021.00018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With advanced video and sensing capabilities, unoccupied aerial vehicles (UAVs) are increasingly being used for numerous applications that involve the collaboration and autonomous operation of teams of UAVs. Yet such vehicles can be affected by cyber attacks, impacting the viability of their missions. We propose a method to conduct mission viability analysis under cyber attacks for missions that employ a team of several UAVs that share a communication network. We apply our method to a case study of a survey mission in a wildfire firefighting scenario. Within this context, we show how our method can help quantify the expected mission performance impact from an attack and determine if the mission can remain viable under various attack situations. Our method can be used both in the planning of the mission and for decision making during mission operation. Our approach to modeling attack progression and impact analysis with Petri nets is also more broadly applicable to other settings involving multiple resources that can be used interchangeably towards the same objective.
引用
收藏
页码:103 / 112
页数:10
相关论文
共 50 条
  • [41] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [42] Weaponized AI for cyber attacks
    Yamin, Muhammad Mudassar
    Ullah, Mohib
    Ullah, Habib
    Katt, Basel
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 57
  • [43] Cyber Attacks: The Fog of Identity
    Greiman, V. A.
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 50 - 62
  • [44] Pentagon on lookout for cyber attacks
    Wall, R
    AVIATION WEEK & SPACE TECHNOLOGY, 1999, 150 (16): : 58 - 58
  • [45] Facing Uncertainty in Cyber Insurance Policies
    Meland, Per Hakon
    Tondel, Inger Anne
    Moe, Marie
    Seehusen, Fredrik
    SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 89 - 100
  • [46] Security analysis of attacks on UAV
    Pekarcik, Peter
    Chovancova, Eva
    Havrilla, Martin
    Hasin, Martin
    2023 IEEE 21ST WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, SAMI, 2023, : 57 - 61
  • [47] The Impact of US Cyber Policies on Cyber-Attacks Trend
    Kumar, Sumeet
    Benigni, Matthew
    Carley, Kathleen M.
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 181 - 186
  • [48] Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities
    Awan, Jawad Hussain
    Memon, Shahzad
    Memon, Sheeraz
    Pathan, Kamran Taj
    Arijo, Niaz Hussain
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2018, 37 (02) : 359 - 366
  • [49] Mission-Centricity in Cyber Security: Architecting Cyber Attack Resilient Missions
    Jakobson, Gabriel
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [50] Distributed Fault Detection For UAV Formation Missions
    Kladis, Georgios P.
    Tsourveloudis, Nikos C.
    2020 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS'20), 2020, : 1075 - 1084