Analyzing the Viability of UAV Missions Facing Cyber Attacks

被引:1
|
作者
Soikkeli, Jukka [1 ]
Perner, Cora [2 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
[2] Airbus Cybersecur GmbH, Taufkirchen, Germany
来源
2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021) | 2021年
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”;
关键词
UAV; cyber attack; mission viability analysis; Petri net; cyber resilience; cyber security; RESILIENCE;
D O I
10.1109/EuroSPW54576.2021.00018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With advanced video and sensing capabilities, unoccupied aerial vehicles (UAVs) are increasingly being used for numerous applications that involve the collaboration and autonomous operation of teams of UAVs. Yet such vehicles can be affected by cyber attacks, impacting the viability of their missions. We propose a method to conduct mission viability analysis under cyber attacks for missions that employ a team of several UAVs that share a communication network. We apply our method to a case study of a survey mission in a wildfire firefighting scenario. Within this context, we show how our method can help quantify the expected mission performance impact from an attack and determine if the mission can remain viable under various attack situations. Our method can be used both in the planning of the mission and for decision making during mission operation. Our approach to modeling attack progression and impact analysis with Petri nets is also more broadly applicable to other settings involving multiple resources that can be used interchangeably towards the same objective.
引用
收藏
页码:103 / 112
页数:10
相关论文
共 50 条
  • [21] Analyzing the Impact of False-Accident Cyber Attacks on Traffic Flow Stability in Connected Vehicle Environment
    Jin, Peter J.
    Zhang, Guohui
    Walton, C. Michael
    Jiang, Xiaowen
    Singh, Amit
    2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2013, : 616 - 621
  • [22] Cyber attacks on hospitality sector: stock market reaction
    Arcuri, Maria Cristina
    Gai, Lorenzo
    Ielasi, Federica
    Ventisette, Elisabetta
    JOURNAL OF HOSPITALITY AND TOURISM TECHNOLOGY, 2020, 11 (02) : 277 - 290
  • [23] A Cyber-HIL for Investigating Control Systems in Ship Cyber Physical Systems Under Communication Issues and Cyber Attacks
    Vu, Linh
    Nguyen, Tung-Lam
    Abdelrahman, Mahmoud S.
    Vu, Tuyen
    Mohammed, Osama A.
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2024, 60 (02) : 2142 - 2152
  • [24] Assessment of the Impact of Cyber-Attacks and Security Breaches in Diagnostic Systems on the Healthcare Sector
    Srivastava, Kushal
    Faist, Katja
    Lickert, Benjamin
    Neville, Karen
    McCarthy, Nora
    Fehling-Kaschek, Mirjam
    Stolz, Alexander
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 531 - 536
  • [25] Autonomous Vehicle Cyber-Attacks Classification Framework
    Aref, Yazan
    Ouda, Abdelkader
    2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [26] Social Engineering Based Cyber-Attacks in Kenya
    Obuhuma, James
    Zivuku, Shingai
    2020 IST-AFRICA CONFERENCE (IST-AFRICA), 2020,
  • [27] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [28] Cyber Attacks: The Fog of Identity
    Greiman, V. A.
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 50 - 62
  • [29] The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment
    Hartmann, Kim
    Steup, Christoph
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [30] Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
    Lallie, Harjinder Singh
    Shepherd, Lynsay A.
    Nurse, Jason R. C.
    Erola, Arnau
    Epiphaniou, Gregory
    Maple, Carsten
    Bellekens, Xavier
    COMPUTERS & SECURITY, 2021, 105