2020
DOI: 10.1007/978-3-030-61725-7_30
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Sensor Processing for Securing Unmanned Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…This injecting environment is equivalent to the attack model in which an attacker knows the UAV's true position described in the gray box attack. This assumption of equivalent is similarly used in [23], [24]. Experiments using real sensors were verified only in the gray box model because white box attacks or black box attacks are almost difficult or inevitably detectable in real environments.…”
Section: B Physical Resultsmentioning
confidence: 99%
“…This injecting environment is equivalent to the attack model in which an attacker knows the UAV's true position described in the gray box attack. This assumption of equivalent is similarly used in [23], [24]. Experiments using real sensors were verified only in the gray box model because white box attacks or black box attacks are almost difficult or inevitably detectable in real environments.…”
Section: B Physical Resultsmentioning
confidence: 99%
“…Physics-based anomaly detection: Physics-based (also called model-based) anomaly detection is an alternative to the data-driven (also called model-free [20]) approaches used in this work [26]. Physics-based anomaly-detection models the physical process with a set of equations and is best suited for systems that closely follow the laws of physics, such as robotic motion [16], [50] or electric power grids [44], [57]. Properly implementing such approaches requires a strong understanding of the physical system, and attributions are less likely to be needed for fault diagnosis.…”
Section: E Alternatives To Attribution For Ics Anomaly Detectionmentioning
confidence: 99%
“…Considering that 50 timesteps are used for the model input, we divide attacks based on if t ∈ [0, 49], t ∈ [50, 99], or t ∈ [100, end]. For most cases, the AvgRank is lowest when t ∈[50, 99]. We categorize each attack by its detection time t relative to the start of the anomaly (considered t = 0), dividing into cases where the detection is early (t ∈ [0, 49]), slightly late t ∈[50, 99], or very late (t ∈ [100, end]).…”
mentioning
confidence: 99%
“…Attacks on a C2 system's input data may include physics-based or transduction attacks on the sensors by injection of erroneous information. 23 Let us consider the Theater Air Control System (TACS) in the United States Air Force (USAF) as a tangible example of a military C2 system; 24 see a simplified representation in Figure 3. 1 There are three types of units shown in light grey, white and dark grey respectively corresponding to USAF, United States Army and Joint Force units.…”
Section: Forecasting With Poisoned Temporal Batch Data Within C2mentioning
confidence: 99%