R2U2: monitoring and diagnosis of security threats for unmanned aerial systems
dc.contributor.author | Moosbrugger, Patrick | |
dc.contributor.author | Schumann, Johann | |
dc.contributor.author | Rozier, Kristin Yvonne | |
dc.contributor.department | Department of Aerospace Engineering | |
dc.contributor.department | Department of Computer Science | |
dc.contributor.department | Department of Electrical and Computer Engineering | |
dc.date | 2019-08-11T23:01:45.000 | |
dc.date.accessioned | 2020-06-29T22:45:35Z | |
dc.date.available | 2020-06-29T22:45:35Z | |
dc.date.copyright | Sun Jan 01 00:00:00 UTC 2017 | |
dc.date.issued | 2017-08-01 | |
dc.description.abstract | <p>We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, Realizable, Responsive, Unobtrusive Unit for runtime system analysis, now including security threat detection. R2U2 is designed to continuously monitor inputs from on-board components such as the GPS, the ground control station, other sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for Linear and Metric Temporal Logics for property monitoring and Bayesian networks for diagnosis of system health during runtime. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.</p> | |
dc.description.comments | <p>This article is published as Moosbrugger, Patrick, Kristin Y. Rozier, and Johann Schumann. "R2U2: monitoring and diagnosis of security threats for unmanned aerial systems." <em>Formal Methods in System Design</em> 51, no. 1 (2017): 31-61. DOI: <a href="http://dx.doi.org/10.1007/s10703-017-0275-x" target="_blank">10.1007/s10703-017-0275-x</a>. Posted with permission.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/aere_pubs/146/ | |
dc.identifier.articleid | 1147 | |
dc.identifier.contextkey | 14713759 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | aere_pubs/146 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/1992 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/aere_pubs/146/2017_RozierKristin_R2U2MonitoringDiagnosis.pdf|||Fri Jan 14 20:23:17 UTC 2022 | |
dc.source.uri | 10.1007/s10703-017-0275-x | |
dc.subject.disciplines | Multi-Vehicle Systems and Air Traffic Control | |
dc.subject.disciplines | Systems Engineering and Multidisciplinary Design Optimization | |
dc.subject.keywords | Runtime monitoring | |
dc.subject.keywords | Metric temporal logic | |
dc.subject.keywords | Linear temporal logic | |
dc.subject.keywords | Bayesian networks | |
dc.subject.keywords | FPGA | |
dc.subject.keywords | Security | |
dc.subject.keywords | Unmanned aerial systems | |
dc.subject.keywords | GPS spoofing | |
dc.title | R2U2: monitoring and diagnosis of security threats for unmanned aerial systems | |
dc.type | article | |
dc.type.genre | article | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 3c555e5b-8fd1-4c38-98c6-6a2449fab7cf | |
relation.isOrgUnitOfPublication | 047b23ca-7bd7-4194-b084-c4181d33d95d | |
relation.isOrgUnitOfPublication | f7be4eb9-d1d0-4081-859b-b15cee251456 | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 2017_RozierKristin_R2U2MonitoringDiagnosis.pdf
- Size:
- 2 MB
- Format:
- Adobe Portable Document Format
- Description: