2015 International Conference on Unmanned Aircraft Systems (ICUAS) 2015
DOI: 10.1109/icuas.2015.7152425
|View full text |Cite
|
Sign up to set email alerts
|

Unmanned Aerial Vehicle security using behavioral profiling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…In the work of [357], the authors present a UAV monitoring system that captures flight data to perform real-time abnormal behavior detection. If an abnormal behavior is detected, the system will raise an alert.…”
Section: Security Challengesmentioning
confidence: 99%
“…In the work of [357], the authors present a UAV monitoring system that captures flight data to perform real-time abnormal behavior detection. If an abnormal behavior is detected, the system will raise an alert.…”
Section: Security Challengesmentioning
confidence: 99%
“…The model's objective is to detect potential vulnerabilities based on drone behavior evaluation. Alternatively, the deployment of onboard and external IDSs to prevent attacks on the security principals of cybersecurity, namely, confidentiality, integrity, and availability, has been presented in [12][13][14]. Prior researchers [12,13] concentrated more on detecting abnormal flight patterns indicating an unauthorized change of flight trajectory such as GPS spoofing, and structural failure, while the work presented in [14] deployed a combination of IDS techniques combining both rule and anomaly-based detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[24], [23], [25] Ranging Manipulation Share incorrect time tags within a vehicular network to disrupt a vehicle's ranging capabilities [39] Sensory channel attack Manipulate the physical environment so as to deceive a vehicle's critical sensors, such as lidar or cameras used by driverless vehicles [4], [54], [46], [55] Adversarial machine learning attack on driverless vehicle…”
Section: Attackmentioning
confidence: 99%
“…has produced promising results in detecting GPS spoofing, denial of service and malicious command injection. The same authors [54] have also argued that instead of looking at flight data in isolation it is preferable to learn to identify the events that correspond to them. For example, aggregating from several data points can help identify the elementary event "sharp left turn", and then detecting "incline" and "turn" can merge into the more complex "spiralling upward" event, and so forth, up to the definition of the UAV's mission.…”
Section: Accepted Manuscriptmentioning
confidence: 99%