Threat modeling of a multi-UAV system

被引:15
作者
Almulhem, Ahmad [1 ]
机构
[1] KFUPM, Comp Engn Dept, Dhahran, Saudi Arabia
关键词
Drone; UAV; Multi-UAV; Internet of Drones; IoD; Threat modeling; Threat tree; Threats;
D O I
10.1016/j.tra.2020.11.004
中图分类号
F [经济];
学科分类号
02 ;
摘要
As Multi-UAV systems are still in early design stages, threat modeling can play a crucial role in attaining the "secure by design" notion in such complex cyber-physical systems (CPS). In this paper, we employ a threat modeling methodology, known as threat trees to analyze and enumerate threats impacting the Internet of Drones (IoD) architecture. The proposed threat tree is meant to provide a holistic perspective of threats impacting an IoD system.
引用
收藏
页码:290 / 295
页数:6
相关论文
共 20 条
[1]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy, Riham ;
Youssef, Amr M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[2]  
Amoroso E. G., 1994, Fundamentals of Computer Security Technology
[3]  
[Anonymous], 2018, J. Ambient. Intell. Humaniz. Comput.
[4]  
[Anonymous], 2011, Computer Security
[5]   Routing Protocols for Unmanned Aerial Vehicle Networks: A Survey [J].
Arafat, Muhammad Yeasir ;
Moh, Sangman .
IEEE ACCESS, 2019, 7 :99694-99720
[6]  
Choudhary G., 2018, INTERNET DRONES IOD
[7]   Tree-Based Attack-Defense Model for Risk Assessment in Multi-UAV Networks [J].
Garg, Sahil ;
Aujla, Gagangeet Singh ;
Kumar, Neeraj ;
Batra, Shalini .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (06) :35-41
[8]   Internet of Drones [J].
Gharibi, Mirmojtaba ;
Boutaba, Raouf ;
Waslander, Steven L. .
IEEE ACCESS, 2016, 4 :1148-1162
[9]  
Hartmann Kim, 2013, VULNERABILITY UAVS C, P23
[10]  
Javaid AY, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P585, DOI 10.1109/THS.2012.6459914