Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems

被引:9
作者
Desnitsky, Vasily [1 ]
Rudavin, Nikolay [2 ]
Kotenko, Igor [1 ]
机构
[1] Russian Acad Sci, St Petersburg Inst Informat & Automat, 14th Liniya,39, St Petersburg 199178, Russia
[2] ITMO Univ, 49 Kronverkskiy Prospekt, St Petersburg, Russia
来源
INTELLIGENT DISTRIBUTED COMPUTING XIII | 2020年 / 868卷
关键词
Battery depletion attacks; Unmanned aerial vehicle; Modelings;
D O I
10.1007/978-3-030-32258-8_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper comprises issues of modeling and evaluation of battery depletion attacks aimed at unmanned aerial vehicles (UAV, drone) being elements of crisis management systems in emergencies. Being a crucial element of such a system, UAV is exposed to cyberphysical attacks. The purpose of such attacks is to disrupt the process of the normal functioning of the system, violation of the mission objectives and infliction of damage. The analysis of various types of battery depletion attacks on UAV and their key characteristics has been performed. Besides we obtained some experimental results by simulation of some types of battery depletion attacks on a fragment of a prototype of a system by using Parrot AR-Drone.
引用
收藏
页码:323 / 332
页数:10
相关论文
共 19 条
[1]   Ensuring Availability of Wireless Mesh Networks for Crisis Management [J].
Desnitsky, Vasily ;
Kotenko, Igor ;
Rudavin, Nikolay .
INTELLIGENT DISTRIBUTED COMPUTING XII, 2018, 798 :344-353
[2]   Modeling and Analysis of IoT Energy Resource Exhaustion Attacks [J].
Desnitsky, Vasily ;
Kotenko, Igor .
INTELLIGENT DISTRIBUTED COMPUTING XI, 2018, 737 :263-270
[3]  
Desnitsky VA, 2019, IEEE NW RUSS YOUNG, P214, DOI [10.1109/EIConRus.2019.8656795, 10.1109/eiconrus.2019.8656795]
[4]  
[Десницкий Василий Алексеевич Desnitsky Vasily Alekseevich], 2016, [Труды СПИИРАН, Trudy SPIIRAN], P5, DOI 10.15622/sp.48.1
[5]  
Domin K, 2016, Security analysis of the drone communication protocol: Fuzzing the mavlink protocol
[6]   GPS-Dependent Systems: Vulnerabilities to Electromagnetic Attacks [J].
Faria, Lester de Abreu ;
de Melo Silvestre, Caio Augusto ;
Feitosa Correia, Marcelino Aparecido .
JOURNAL OF AEROSPACE TECHNOLOGY AND MANAGEMENT, 2016, 8 (04) :423-430
[7]  
Geethanjali N., 2012, SURVEY ENERGY DEPLET
[8]   An efficient strategy of nonuniform sensor deployment in cyber physical systems [J].
Kim, Yong-hwan ;
Kim, Chan-Myung ;
Han, Youn-Hee ;
Jeong, Young-Sik ;
Park, Doo-Soon .
JOURNAL OF SUPERCOMPUTING, 2013, 66 (01) :70-80
[9]   Energy Neutral Internet of Drones [J].
Long, Teng ;
Ozger, Mustafa ;
Cetinkaya, Oktay ;
Akan, Ozgur B. .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) :22-28
[10]   Denial-of-service attacks on battery-powered mobile computers [J].
Martin, T ;
Hsiao, M ;
Ha, D ;
Krishnaswami, J .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2004, :309-318