2022
DOI: 10.3390/s22093147
|View full text |Cite
|
Sign up to set email alerts
|

D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield

Abstract: Currently, in the field of military modernization, tactical networks using advanced unmanned aerial vehicle systems, such as drones, place an emphasis on proactively preventing operational limiting factors produced by cyber-electronic warfare threats and responding to them. This characteristic has recently been highlighted as a key concern in the functioning of modern network-based combat systems in research on combat effect analysis. In this paper, a novel discrete-event-system-specification-based cyber-elect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“… where = area of interest/the mapped area priority level, and = authorization permit/authentication key to operate within such a classified zone. Authenticating a drone’s authorization status in a DTN is an emerging research issue [ 28 , 29 , 30 ].…”
Section: Methodsmentioning
confidence: 99%
“… where = area of interest/the mapped area priority level, and = authorization permit/authentication key to operate within such a classified zone. Authenticating a drone’s authorization status in a DTN is an emerging research issue [ 28 , 29 , 30 ].…”
Section: Methodsmentioning
confidence: 99%
“…The BoT does every task or operation smoothly and properly under the timeline. Also, the BoT devices connect with WiFi, sensors, and Bluetooth network and send information command centre to the base station related mission “information” it's confidential or secret, so cyber security is a most important role in the BoT 6–9 . A detail of how the secure communication system works in the BoT network is shown in Figure 1.…”
Section: Cybersecurity For Botmentioning
confidence: 99%
“…Next, drone threat modeling [45] configured to specify all major assets, attack surfaces, threat vectors, and MTD-based countermeasures within this MF2-DMTD is computed as a PTMDP-based decision tree structure that includes all concepts of action, goal, relationship, and continuous causality based on the attack-defense tree, as shown in Figs. 2 and 3.…”
Section: Formalization Of Decision Treementioning
confidence: 99%