Security and Safety Threat Detection Method for Unmanned Aerial System Based on Runtime Verification

被引:0
作者
Yang D. [1 ]
Shi H. [1 ]
Dong W. [1 ]
Liu Z.-L. [1 ]
Zhou G. [1 ]
机构
[1] School of Computer, National University of Defense Technology, Changsha
来源
Ruan Jian Xue Bao/Journal of Software | 2018年 / 29卷 / 05期
基金
中国国家自然科学基金;
关键词
Runtime verification; Security and safety threat detection; Unmanned aerial system;
D O I
10.13328/j.cnki.jos.005508
中图分类号
学科分类号
摘要
The defects of the software and hardware in unmanned aerial system and external malicious attack pose a great threat to the security and safety of UAS. Due to the complex running environment of UAS, many factors are difficult to predict accurately in the development process. Therefore, it is of great significance to adopt an effective runtime security and safety guarantee mechanism. This paper proposes a UAS security and safety threat detection method based on runtime verification. Firstly, after analyzing a variety of security and safety threats that UAS may encounter, the paper defines the threats in discrete-time MTL and presents the corresponding UAS-DL language to describe the security and safety monitoring specification. Then an automatic generation algorithm of security and safety threat monitor is introduced based on the alternating automaton, and security and safety monitoring of multi-UAS is implemented by parameterization method. In order to improve the accuracy of the detection, the method of combining runtime verification with Bayesian network inference is also studied. The experiment is carried out with the actual UAS development simulation platform Ardupilot, and monitors are deployed on the field-programmable gate array (FPGA) hardware independently to avoid excessive usage of UAS computing resources. Experimental results show that the proposed method can effectively detect the security and safety threats of UAS. © Copyright 2018, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1360 / 1378
页数:18
相关论文
共 36 条
[1]  
Schumann J., Moosbrugger P., Rozier K.Y., Monitoring and diagnosis of security threats for unmanned aerial systems, Proc. of the Runtime Verification, pp. 233-249, (2015)
[2]  
Aiello A.M., Berryman J.F., Grohs J.R., Schierman J.D., Run-Time assurance for advanced flight-critical control systems, Proc. of the AIAA Guidance, Nav. and Control Conf., (2010)
[3]  
Basin D., Klaedtke F., Zalinescu E., Algorithms for monitoring real-time properties, Proc. of the Int'l Conf. on Runtime Verification, pp. 260-275, (2011)
[4]  
Divakaran S., D'souza D., Conflict-Tolerant real-time specifications in metric temporal logic, Proc. of the 17th Int'l Symp. on Temporal Representation and Reasoning (TIME), pp. 35-42, (2010)
[5]  
Maler O., Nickovic D., Pnueli A., Checking temporal properties of discrete, timed and continuous behaviors, Proc. of the Pillars of Computer Science, pp. 475-505, (2008)
[6]  
Basin D., Klaedtke F., Muller S., Pfitzmann B., Runtime monitoring of metric first-order temporal properties, Proc. of the LIPIcs-Leibniz Int'l Conf. on Informatics, 2, pp. 49-60, (2008)
[7]  
Backasch R., Hochberger C., Weiss A., Leucker M., Lasslop R., Runtime verification for multicore SoC with high-quality trace data, ACM Trans. on Design Automation of Electronic Systems (TODAES), 18, 2, pp. 18:1-18:26, (2013)
[8]  
Reinbacher T., Rozier K.Y., Schumann J., Temporal-Logic based runtime observer pairs for system health management of real-time systems, Proc. of the Int'l Conf. on Tools and Algorithms for the Construction and Analysis of Systems, pp. 357-372, (2014)
[9]  
Kiczales G., Lamping J., Mendhekar A., Maeda C., Lopes C., Loingtier J., Irwin J., Aspect-Oriented programming, Proc. of the ECOOP'97-Object-Oriented Programming, pp. 220-242, (1997)
[10]  
Kiczales G., Hilsdale E., Hugunin J., Kersten M., Palm J., Griswold W., An overview of AspectJ, Proc. of the European Conf. on Object-Oriented Programming, pp. 327-354, (2001)