2012 IEEE Conference on Technologies for Homeland Security (HST) 2012
DOI: 10.1109/ths.2012.6459914
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security threat analysis and modeling of an unmanned aerial vehicle system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
107
0
6

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 251 publications
(126 citation statements)
references
References 18 publications
0
107
0
6
Order By: Relevance
“…Similar to our work, they consider both the sensor components and the control units of the CPS, and demonstrate the approach by simulating a deception attack on the navigation system of a UAS. Javaid et al [17] also analyze cybersecurity threats for UAS. They simulate the effects of attacks that usually end in a crash, focusing on identifying different existing attack surfaces and vulnerabilities rather than focusing on runtime detection or post-attack analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to our work, they consider both the sensor components and the control units of the CPS, and demonstrate the approach by simulating a deception attack on the navigation system of a UAS. Javaid et al [17] also analyze cybersecurity threats for UAS. They simulate the effects of attacks that usually end in a crash, focusing on identifying different existing attack surfaces and vulnerabilities rather than focusing on runtime detection or post-attack analysis.…”
Section: Related Workmentioning
confidence: 99%
“…[32] presents a threat model of possible attacks on UAVs to assist designers with risk analysis. Attacks are categorized into Confidentiality, Integrity, or Availability, and then further separated by origin or location of attack.…”
Section: Securitymentioning
confidence: 99%
“…Malware infection of on board computers [113] Hijacked control of locks, brakes and engine Malware detection [113] GPS Spoofing [50,117] Artificial traffic jam caused Signal analysis [51][52][53] Web-based immobilisation hijacked [114] Cars immobilised remotely and simultaneously Web security literature [46] GPS Spoofing [50,117] Unmanned vehicle redirected [117,118] Signal analysis [51][52][53] Gain-scheduling attack [117] Control stability affected [117] No known solutions…”
Section: Manned Vehiclesmentioning
confidence: 99%
“…In addition, they have analysed a gain-scheduling attack affecting the vehicle's controls and stability through sensor spoofing, and a fuzzing attack where the attacker injects random inputs to the vehicle's actuators [117]. In parallel, a less technical high-level analysis of the potential impact of cyber attacks on UAVs has been presented in [118]. It is important to note that a recent congressional report on unmanned aircraft systems has stated that vulnerabilities in the command and control of UAS operations are a primary obstacle to their integration in the national airspace system [119].…”
Section: Unmanned Vehiclesmentioning
confidence: 99%
See 1 more Smart Citation