Security Challenges of Vehicle Recovery for Urban Air Mobility Contexts

被引:5
作者
Maxa, Jean Aline [1 ]
Blaize, Raphael [1 ]
Longuy, Sebastien [1 ]
机构
[1] APSYS Innovat Team, F-31700 Toulouse, France
来源
2019 IEEE/AIAA 38TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) | 2019年
关键词
UAM aircraft; UAVs; recovery system; intrusion detection system; safety; security; INTRUSION DETECTION SYSTEMS; ATTACKS;
D O I
10.1109/dasc43569.2019.9081808
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Urban air mobility (UAM) is the set of people, processes and systems transporting passengers and goods in autonomous aircraft over metropolitan areas. This implies important safety and efficiency needs, and big deployment challenges. We will focus in this article on malicious threats in this sensitive environment. For example, an attacker might compromise the onboard systems of an unmanned aerial vehicle (UAV), with catastrophic consequences for passengers and people on the ground. It is hence important to design, implement, deploy, maintain and operate appropriate security mechanisms, to detect threats and mitigate or recover from compromises (e.g. safe emergency landing). This contributes to the high safety and performance requirements for passengers, public and infrastructure. Research around the security challenges for these air mobility operations is a recent topic, and many challenges are still to be resolved. We aim to contribute with a survey of possible attacks, an adversary model, and potential security solutions, along with a preliminary study for vehicle recovery.
引用
收藏
页数:9
相关论文
共 25 条
[1]   Detection of Fault Data Injection Attack on UAV Using Adaptive Neural Network [J].
Abbaspour, Alireza ;
Yen, Kang K. ;
Noei, Shirin ;
Sargolzaei, Arman .
COMPLEX ADAPTIVE SYSTEMS, 2016, 95 :193-200
[2]  
Adams M, 2015, TECHNOL INNOV MANAG, P5
[3]  
Antcliff K., 2019, AIAA SCITECH FOR, P528
[4]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[5]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[6]   Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues [J].
Corona, Igino ;
Giacinto, Giorgio ;
Roli, Fabio .
INFORMATION SCIENCES, 2013, 239 :201-225
[7]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[8]  
German B, 2018, 2018 AIAA AER SCI M, P2006, DOI [https://doi.org/10.2514/6.2018-2006, DOI 10.2514/6.2018-2006]
[9]  
Kim Alan., 2012, Infotech@ Aerospace 2012, P2438, DOI DOI 10.2514/6.2012-2438
[10]   Intrusion detection system: A comprehensive review [J].
Liao, Hung-Jen ;
Lin, Chun-Hung Richard ;
Lin, Ying-Chih ;
Tung, Kuang-Yuan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :16-24