메뉴 건너뛰기




Volumn 11, Issue 5, 2014, Pages 337-343

Software/hardware-in-the-loop analysis of cyberattacks on unmanned aerial systems

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE; INFORMATION SYSTEMS;

EID: 84904101943     PISSN: None     EISSN: 23273097     Source Type: Journal    
DOI: 10.2514/1.I010114     Document Type: Conference Paper
Times cited : (19)

References (32)
  • 1
    • 33646537114 scopus 로고    scopus 로고
    • GPS spoofing countermeasures
    • Los Alamos National Lab., Los Alamos, NM
    • Warner, J. S., and Johnston, R. G., "GPS Spoofing Countermeasures," Tech. Rept. LAUR-03-6163, Los Alamos National Lab., Los Alamos, NM, 2003.
    • (2003) Tech. Rept. LAUR-03-6163
    • Warner, J.S.1    Johnston, R.G.2
  • 4
    • 81755165352 scopus 로고    scopus 로고
    • San Francisco, CA, Oct. [retrieved Oct. 2013]
    • Schachtman, N., "Computer Virus Hits U.S. Drone Fleet," Wired, San Francisco, CA, Oct. 2011, http://www.wired.com/dangerroom/2011/10/virus- hitsdrone-fleet [retrieved Oct. 2013].
    • (2011) Computer Virus Hits U.S. Drone Fleet
    • Schachtman, N.1
  • 5
    • 84904121754 scopus 로고    scopus 로고
    • U.S.-China Economic and Security Review Commission, Washington, D.C. [retrieved Oct. 2013]
    • "2011 Report to Congress," U.S.-China Economic and Security Review Commission, Washington, D.C., 2011, http://origin.www.uscc.gov/sites/ default/files/annual-reports/annual-report-full-11.pdf [retrieved Oct. 2013].
    • (2011) 2011 Report to Congress
  • 6
    • 77954171454 scopus 로고    scopus 로고
    • Insurgents hack U.S. Drones
    • New York, Dec. [retrieved Oct. 2013]
    • Gorman, S., Dreazen, Y. J., and Cole, A., "Insurgents Hack U.S. Drones," Wall Street Journal, New York, Dec. 2009, http://online.wsj.com/ article/SB126102247889095011.html [retrieved Oct. 2013].
    • (2009) Wall Street Journal
    • Gorman, S.1    Dreazen, Y.J.2    Cole, A.3
  • 7
    • 84155165352 scopus 로고    scopus 로고
    • Ensuring safety, security, and sustainability of mission-critical cyber- physical systems
    • doi:10.1109/JPROC.2011.2165689
    • Banerjee, A., Venkatasubramanian, K. K., Mukherjee, T., and Gupta, S. K. S., "Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber- Physical Systems," Proceedings of the IEEE, Vol. 100, No. 1, 2011, pp. 283-299. doi:10.1109/JPROC.2011.2165689
    • (2011) Proceedings of the IEEE , vol.100 , Issue.1 , pp. 283-299
    • Banerjee, A.1    Venkatasubramanian, K.K.2    Mukherjee, T.3    Gupta, S.K.S.4
  • 8
    • 78651579602 scopus 로고    scopus 로고
    • A defense-in-depth approach to securing thewireless vehicle infrastructure
    • doi:10.4304/jnw.4.7.552-564
    • Nilsson, D. K., and Larson, U. E., "A Defense-in-Depth Approach to Securing theWireless Vehicle Infrastructure," Journal of Networks, Vol. 4, No. 7, 2009, pp. 552-564. doi:10.4304/jnw.4.7.552-564
    • (2009) Journal of Networks , vol.4 , Issue.7 , pp. 552-564
    • Nilsson, D.K.1    Larson, U.E.2
  • 9
    • 11244293707 scopus 로고    scopus 로고
    • Rapid detection of faults for safety critical aircraft operation
    • 1360, 2004 IEEE Aerospace Conference Proceedings
    • Goebel, K., Eklund, N., and Brunell, B., "Rapid Detection of Faults for Safety Critical Aircraft Operation," Proceedings of the 2004 IEEE Aerospace Conference, Vol. 5, IEEE Publ., Piscataway, NJ, 2004, pp. 3372-3383. (Pubitemid 40057196)
    • (2004) IEEE Aerospace Conference Proceedings , vol.5 , pp. 3372-3383
    • Goebel, K.1    Eklund, N.2    Brunell, B.3
  • 10
    • 77951880498 scopus 로고    scopus 로고
    • A survey of fault detection, isolation, and reconfiguration methods
    • doi:10.1109/TCST.2009.2026285
    • Hwang, I. S., Kim, Y. K., and Seah, C., "A Survey of Fault Detection, Isolation, and Reconfiguration Methods," IEEE Transactions on Control Systems Technology, Vol. 18, No. 3, 2010, pp. 636-653. doi:10.1109/TCST.2009.2026285
    • (2010) IEEE Transactions on Control Systems Technology , vol.18 , Issue.3 , pp. 636-653
    • Hwang, I.S.1    Kim, Y.K.2    Seah, C.3
  • 14
    • 85088338101 scopus 로고    scopus 로고
    • Cyber attack vulnerabilities analysis for unmanned aerial vehicles
    • AIAA Paper 2012-2438, Reston, VA, June
    • Kim, A.,Wampler, B., Goppert, J., Hwang, I., and Aldridge, H., "Cyber AttackVulnerabilities Analysis for Unmanned AerialVehicles," Infotech@Aerospace 2012, AIAA Paper 2012-2438, Reston, VA, June 2012.
    • (2012) Infotech@Aerospace 2012
    • Kim, A.1    Wampler, B.2    Goppert, J.3    Hwang, I.4    Aldridge, H.5
  • 18
    • 85087535913 scopus 로고    scopus 로고
    • Analysis of optimal false data injection attacks in unmanned aerial systems
    • AIAA Paper 2013-4653, Reston, VA, Aug.
    • Shull, A., and Hwang, I., "Analysis of Optimal False Data Injection Attacks in Unmanned Aerial Systems," Infotech@Aerospace 2013, AIAA Paper 2013- 4653, Reston, VA, Aug. 2013.
    • (2013) Infotech@Aerospace 2013
    • Shull, A.1    Hwang, I.2
  • 19
    • 85088345877 scopus 로고    scopus 로고
    • Analytical analysis of cyber attacks on unmanned aerial systems
    • AIAA Paper 2013-5186, Reston, VA, Aug.
    • Kwon, C., and Hwang, I., "Analytical Analysis of Cyber Attacks on Unmanned Aerial Systems," AIAA Guidance, Navigation, and Control (GNC) Conference, AIAA Paper 2013-5186, Reston, VA, Aug. 2013.
    • (2013) AIAA Guidance, Navigation, and Control (GNC) Conference
    • Kwon, C.1    Hwang, I.2
  • 20
    • 84883504054 scopus 로고    scopus 로고
    • Security analysis for cyber-physical systems against stealthy deception attacks
    • IEEE Publ., Piscataway, NJ
    • Kwon, C., Liu,W., and Hwang, I., "Security Analysis for Cyber-Physical Systems Against Stealthy Deception Attacks," Proceedings of the American Control Conference, IEEE Publ., Piscataway, NJ, 2013.
    • (2013) Proceedings of the American Control Conference
    • Kwon, C.1    Liu, W.2    Hwang, I.3
  • 22
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • doi:10.1145/1952982.1952995
    • Liu, Y., Ning, P., and Reiter, M., "False Data Injection Attacks Against State Estimation in Electric Power Grids," ACM Transactions on Information and System Security, Vol. 14, No. 1, 2011, p. 13. doi:10.1145/1952982.1952995
    • (2011) ACM Transactions on Information and System Security , vol.14 , Issue.1 , pp. 13
    • Liu, Y.1    Ning, P.2    Reiter, M.3
  • 23
    • 85086949945 scopus 로고    scopus 로고
    • Cyber security analysis for state estimators in air traffic control systems
    • AIAA Paper 2012-4929, Reston, VA, Aug.
    • Liu,W., Kwon, C., Aljanabi, I., and Hwang, I., "Cyber Security Analysis for State Estimators in Air Traffic Control Systems," AIAA Guidance, Navigation, and Control Conference, AIAA Paper 2012-4929, Reston, VA, Aug. 2012.
    • (2012) AIAA Guidance, Navigation, and Control Conference
    • Liu, W.1    Kwon, C.2    Aljanabi, I.3    Hwang, I.4
  • 31
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • doi:10.1023/A:1024600519144
    • Zhang,Y., Lee,W., and Huang,Y.-A., "Intrusion Detection Techniques for MobileWireless Networks," Wireless Networks,Vol. 9, No. 5, 2003, pp. 545-556. doi:10.1023/A:1024600519144
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.