Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System

被引:0
作者
Javaid, Ahmad Y. [1 ]
Sun, Weiqing [2 ]
Devabhaktuni, Vijay K. [1 ]
Alam, Mansoor [1 ]
机构
[1] Univ Toledo, Dept EECS, Toledo, OH 43606 USA
[2] Univ Toledo, Dept ET, Toledo, OH 43606 USA
来源
2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY | 2012年
关键词
cyber security; network attacks; unmanned aerial vehicles; threat modeling;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Advances in technology for miniature electronic military equipment and systems have led to the emergence of unmanned aerial vehicles (UAVs) as the new weapons of war and tools used in various other areas. UAVs can easily be controlled from a remote location. They are being used for critical operations, including offensive, reconnaissance, surveillance and other civilian missions. The need to secure these channels in a UAV system is one of the most important aspects of the security of this system because all information critical to the mission is sent through wireless communication channels. It is well understood that loss of control over these systems to adversaries due to lack of security is a potential threat to national security. In this paper various security threats to a UAV system is analyzed and a cyber-security threat model showing possible attack paths has been proposed. This model will help designers and users of the UAV systems to understand the threat profile of the system so as to allow them to address various system vulnerabilities, identify high priority threats, and select mitigation techniques for these threats.
引用
收藏
页码:585 / 590
页数:6
相关论文
共 40 条
[1]  
Alves-Foss Jim, 1998, 21 NAT INF SYST SEC
[2]  
Anjum F., SECURITY WIRELESS AD
[3]  
[Anonymous], 2004, Threat modeling
[4]  
[Anonymous], 2002, Writing Secure Code
[5]  
[Anonymous], 2011, ASS PRESS 1009
[6]  
[Anonymous], 2009, DRONE FLAW KNOWN 199
[7]  
[Anonymous], 2004, AD HOC NETW, DOI DOI 10.1016/J.ADHOC.2004.04.003
[8]  
[Anonymous], ARE SATELLITES VULNE
[9]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[10]  
Arthur C., 2009, Guardian