2019
DOI: 10.48550/arxiv.1902.03506
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Game of Drones: Cyber-Physical Security of Time-Critical UAV Applications with Cumulative Prospect Theory Perceptions and Valuations

Abstract: The effective deployment of unmanned aerial vehicle (UAV) systems and services hinges on securing them against cyberphysical attacks that can jeopardize their mission or use them to intrude into secured perimeters. In this paper, a novel mathematical framework is introduced for modeling and analyzing the cyberphysical security of time-critical UAV applications. A general UAV security network interdiction game is formulated to model interactions between a UAV operator and an interdictor, each of which can be be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Thus, the optimal imposed location by the attacker, in this case, is the intersection of circle C and a circle C with a radius of e 2 max + d 2 i (t) with its center at the actual desired destination of the UAV. Circle C can be represented formally as in (13). Note that the two circles will always intersect in two points, however, only one of them will minimize the objective function and, hence, this point will also be a solution for the maximization problem in the first constraint.…”
Section: Uav Traveling Model Under Gps Spoofing Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the optimal imposed location by the attacker, in this case, is the intersection of circle C and a circle C with a radius of e 2 max + d 2 i (t) with its center at the actual desired destination of the UAV. Circle C can be represented formally as in (13). Note that the two circles will always intersect in two points, however, only one of them will minimize the objective function and, hence, this point will also be a solution for the maximization problem in the first constraint.…”
Section: Uav Traveling Model Under Gps Spoofing Attackmentioning
confidence: 99%
“…Examples include cyber attacks such as, false data injection [12] and physical attacks such as targeting the UAVs using firearms or hunting rifles. Cyber-physical attacks, on the other hand, represent a category of sophisticated attacks that aim at causing both cyber and physical damage to the UAV such as GPS spoofing, GPS jamming, hijacking the connection between a UAV and its controller, and thwarting delivery drones [13].…”
Section: Introductionmentioning
confidence: 99%
“…As mentioned earlier, the evader's perspective is discussed by relatively few studies. In particular, Sanjab et al [30,31] study a one-stage zero-sum game, where the evader transports products between two specified nodes in the network and attempts to minimize the expected delivery time. Furthermore, the authors focus on a bounded rationality model, that is, the risk level of a selected path or the merit of a selected attack location can be perceived subjectively by the decision-makers.…”
Section: Introductionmentioning
confidence: 99%
“…However, in our setting the bounded rationality of the evader is addressed by considering strategic decisions in a multi-period deterministic setting. Additionally, in contrast to [30,31] we assume limited information about the network's structure, but not uncertainty in the evader's (or interdictor's) decisions.…”
Section: Introductionmentioning
confidence: 99%