Unmanned air traffic management system (UTMS) and the eco-system around it can be viewed as a large, complex, loosely-coupled cyber-physical system with flows of digital and analog data, sensors that collect data, and actuators that act upon data. As such, the eco-system has a large cyber-attack surface, which, if penetrated, can cause serious damage and even casualties. We present a comprehensive analysis of the cyberattack surface of the UTMS and UAV traffic eco-system. In this work, we propose an architectural framework for a UTM ecosystem; define a cyber threat; identify the essential assets of the system and their properties that need to be protected. This work was done in the context of managing traffic of UAVs in Singapore’s urban ai...
Unmanned aerial vehicles have rapidly become the air vehicle of choice across many industries in the...
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial and civilian ...
Current air traffic management systems suffer from poor radar coverage and a highly centralized arch...
Unmanned air traffic management system (UTMS) and the eco-system around it can be viewed as a large,...
Unmanned aircraft are quickly gaining credibility as an efficient tool for a wide range of tasks. Wi...
2019Final Report, April 2018- December 2019DeCarlo, JeffreyPDFTech Report19-01019-010DronesEvaluatio...
The purpose of this research was to investigate the cybersecurity controls needed to protect Unmanne...
Autonomous aerial vehicles (AAV) are aircraft systems whose aircrew is replaced by autonomous comput...
Cyber security has emerged as one of the most important issues in the operation of Unmanned Aerial S...
Part 1: Aviation Infrastructure SecurityInternational audienceThe growing market for commercial-off-...
The growing demand for drones in civil applications is usually satisfied with commercial off-the-sh...
International audienceSecurity issues in unmanned aerial vehicle (UAV) networks attract the attentio...
The federal aviation administration has estimated that by the year 2020, the United States will have...
Cyber security has emerged as one of the most important issues in unmanned aerial systems for which ...
We analyse the impact of new wireless technology threat models on cyber power, using the aviation co...
Unmanned aerial vehicles have rapidly become the air vehicle of choice across many industries in the...
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial and civilian ...
Current air traffic management systems suffer from poor radar coverage and a highly centralized arch...
Unmanned air traffic management system (UTMS) and the eco-system around it can be viewed as a large,...
Unmanned aircraft are quickly gaining credibility as an efficient tool for a wide range of tasks. Wi...
2019Final Report, April 2018- December 2019DeCarlo, JeffreyPDFTech Report19-01019-010DronesEvaluatio...
The purpose of this research was to investigate the cybersecurity controls needed to protect Unmanne...
Autonomous aerial vehicles (AAV) are aircraft systems whose aircrew is replaced by autonomous comput...
Cyber security has emerged as one of the most important issues in the operation of Unmanned Aerial S...
Part 1: Aviation Infrastructure SecurityInternational audienceThe growing market for commercial-off-...
The growing demand for drones in civil applications is usually satisfied with commercial off-the-sh...
International audienceSecurity issues in unmanned aerial vehicle (UAV) networks attract the attentio...
The federal aviation administration has estimated that by the year 2020, the United States will have...
Cyber security has emerged as one of the most important issues in unmanned aerial systems for which ...
We analyse the impact of new wireless technology threat models on cyber power, using the aviation co...
Unmanned aerial vehicles have rapidly become the air vehicle of choice across many industries in the...
Unmanned aerial vehicle (UAV) has been increasingly used in a wide range of commercial and civilian ...
Current air traffic management systems suffer from poor radar coverage and a highly centralized arch...