Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection

M. S. Faughnan, B. J. Hourican, G. Macdonald, M. Srivastava, J. Wright, Y. Haimes, E. Andrijcic, Zhenyu Guo, J. White
{"title":"Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection","authors":"M. S. Faughnan, B. J. Hourican, G. Macdonald, M. Srivastava, J. Wright, Y. Haimes, E. Andrijcic, Zhenyu Guo, J. White","doi":"10.1109/SIEDS.2013.6549509","DOIUrl":null,"url":null,"abstract":"The Federal Aviation Administration (FAA) is in the process of integrating Unmanned Aerial Vehicles (UAVs) into the National Airspace System (NAS) through the Next Generation Air Transportation System (NextGen). A critical component of integrating UAVs into the NAS is the timely identification and mitigation of cyber attacks that could overtake control of a UAV, without the UAV operator's knowledge of a security breach. In an effort to address this risk, this paper aims to achieve two objectives: (i) identify risks of cyber attacks on a UAV and (ii) create a methodology through which UAV operators are informed of such a security breach. The results of this study are intended to support the MITRE Corporation's efforts to identify and control risks associated with UAV integration into the NAS. To achieve the first objective the Capstone team utilized established risk assessment methodologies to identify risk scenarios and filter those scenarios into a manageable list. To achieve the second objective the team developed a methodology that measures the UAV velocity through two on-board systems and any significant difference in the two measures indicates a potential security breach. The team designed and performed an experiment using car movement to simulate UAV flight and performed statistical analysis on the results of the experiment. This contributed to a framework for determining a detection threshold for an alarm system to indicate a UAV may have been hijacked. The threshold accounts for a minimum difference between the two calculations of the velocity data and the duration of time in which this difference occurs, which can be calibrated to minimize Type I (false positive) and Type II (false negative) errors. The recommendation to the MITRE Corporation will contribute to the ongoing efforts to securely integrate UAVs into the NAS.","PeriodicalId":145808,"journal":{"name":"2013 IEEE Systems and Information Engineering Design Symposium","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"48","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Systems and Information Engineering Design Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIEDS.2013.6549509","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 48

Abstract

The Federal Aviation Administration (FAA) is in the process of integrating Unmanned Aerial Vehicles (UAVs) into the National Airspace System (NAS) through the Next Generation Air Transportation System (NextGen). A critical component of integrating UAVs into the NAS is the timely identification and mitigation of cyber attacks that could overtake control of a UAV, without the UAV operator's knowledge of a security breach. In an effort to address this risk, this paper aims to achieve two objectives: (i) identify risks of cyber attacks on a UAV and (ii) create a methodology through which UAV operators are informed of such a security breach. The results of this study are intended to support the MITRE Corporation's efforts to identify and control risks associated with UAV integration into the NAS. To achieve the first objective the Capstone team utilized established risk assessment methodologies to identify risk scenarios and filter those scenarios into a manageable list. To achieve the second objective the team developed a methodology that measures the UAV velocity through two on-board systems and any significant difference in the two measures indicates a potential security breach. The team designed and performed an experiment using car movement to simulate UAV flight and performed statistical analysis on the results of the experiment. This contributed to a framework for determining a detection threshold for an alarm system to indicate a UAV may have been hijacked. The threshold accounts for a minimum difference between the two calculations of the velocity data and the duration of time in which this difference occurs, which can be calibrated to minimize Type I (false positive) and Type II (false negative) errors. The recommendation to the MITRE Corporation will contribute to the ongoing efforts to securely integrate UAVs into the NAS.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无人机劫持风险分析及检测方法
美国联邦航空管理局(FAA)正在通过下一代航空运输系统(NextGen)将无人机(uav)集成到国家空域系统(NAS)中。将无人机集成到NAS的一个关键组成部分是及时识别和缓解可能超过无人机控制的网络攻击,而无人机操作员不知道安全漏洞。为了解决这一风险,本文旨在实现两个目标:(i)识别无人机网络攻击的风险;(ii)创建一种方法,通过该方法,无人机操作员可以获知此类安全漏洞。该研究的结果旨在支持MITRE公司识别和控制与无人机集成到NAS相关的风险。为了实现第一个目标,Capstone团队利用已建立的风险评估方法来识别风险场景,并将这些场景过滤成可管理的列表。为了实现第二个目标,该团队开发了一种方法,通过两个机载系统测量无人机速度,两种测量方法的任何显著差异都表明存在潜在的安全漏洞。团队设计并进行了利用汽车运动模拟无人机飞行的实验,并对实验结果进行了统计分析。这有助于确定警报系统检测阈值的框架,以指示无人机可能已被劫持。阈值解释了两次速度数据计算之间的最小差异以及这种差异发生的持续时间,可以对其进行校准,以尽量减少第一类(假阳性)和第二类(假阴性)误差。向MITRE公司提出的建议将有助于将无人机安全地集成到NAS中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design of sense-and-avoid standards for RQ-7B shadow under loss-link Mission effectiveness quantification and assessment of Micro Autonomous Systems and Technologies IED dataset generation: Analysis across theaters Analysis of changes to Tobyhanna Army Depot maintenance cycle Campus shuttle: Design of a college campus parking and transportation system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1