Securing unmanned autonomous systems from cyber threats

Author(s):  
Bharat B Madan ◽  
Manoj Banik ◽  
Doina Bein

Unmanned systems, with and without a human-in-the loop, are being deployed in a range of military and civilian applications spanning air, ground, sea-surface and undersea environments. Large investments, particularly in robotics, electronic miniaturization, sensors, network communication, information technology and artificial intelligence are likely to further accelerate this trend. The operation of unmanned systems, and of applications that use these systems, are heavily dependent on cyber systems that are used to collect, store, process and communicate data, making data a critical resource. At the same time, undesirable elements of our society and adversarial states have also realized the high value of this resource. While enormous efforts have been made to secure data and cyber systems, lack of rigorous threat modeling and risk analysis can lead to more specific, rather than generic, security solutions relevant to the cyber system to be protected. This scenario has created an urgent need to develop a holistic process for protecting data and cyber systems. This paper deals with the development of different pieces of this process. We first identify the security requirements of unmanned autonomous systems, and follow this up with modeling how attacks achieve their objectives. We argue that a large number of threats that can materialize as attacks and the costs of managing these attacks in cost effective ways require ranking threats using cyber threat modeling and cyber risk analysis techniques. The last segment of the paper describes a structured approach to mitigate high-risk threats.

Author(s):  
Patricia McDermott ◽  
Thomas Carolan ◽  
Marc Gacy ◽  
Alia Fisher ◽  
Mark Gronowski

2016 ◽  
Vol 13 (2) ◽  
pp. 450-462 ◽  
Author(s):  
Lu Feng ◽  
Clemens Wiltsche ◽  
Laura Humphrey ◽  
Ufuk Topcu

2021 ◽  
Vol 16 ◽  
Author(s):  
Mounika Chidurala ◽  
Raveendra Reddy J

Background: The present research aimed to develop and optimize extended-release floating tablets of Sacubitril and Valsartan through Quality by Design (QbD) approach. Risk analysis by formulation assessment and process parameters showed that optimizing the levels of the polymer will minimize high risk to meet the target profile. A two (2) level three (3) full factorial experimental design along with midpoints was carefully chosen for optimization and statistical analysis. Based on the literature, the independent and dependent variables were selected. Results: HPMC K100, Carbopol 934P had a positive effect, whereas Ethylcellulose had a negative effect on Floating time, drug release at 2 h, drug release at 12 h and, 50% responses. Drug release kinetics followed the first-order release with Higuchi and Fickian diffusion. Contour and overlay plots were utilized for an assortment of design space and optimized formula. ANOVA results of all the factors exhibited significance at p<0.05. Abdominal X-ray imaging of the optimized tablets on healthy rabbit’s stomach confirmed the floating behavior for more than 12 h. In vivo pharmacokinetic studies in rabbits showed that the optimized formulation exhibited prolonged and extended drug release with improved Cmax, tmax, AUCo-t, and t1/2 of test product when compared to marketed product. IVIVC model was developed by using dissolution data of in vitro and pharmacokinetics data of in-vivo by de-convolution method (Wagner-Nelson method). Conclusion: The Quality by Design implementation in the formulation and optimization abridged the number of trials to produce a cost-effective formula. In vivo studies confirmed that the formula was successfully developed with extended floating time (12 h) and drug release by risk analysis and experimental designs. Level A correlation was observed which confirmed a good correlation between in vitro and in vivo data.


Author(s):  
J. Ernst ◽  
B.J. Dewals ◽  
S. Detrembleur ◽  
P. Archambeau ◽  
S. Erpicum ◽  
...  

The present chapter describes an end-to-end methodology for assessing flood protection strategies, including the whole methodological process from hydrological statistics to detailed 2D hydraulic modelling, damage calculation and flood risk evaluation. This risk-based approach serves as a component of a decision-support system (DSS) developed in Belgium for identifying cost-effective flood management strategies in the context of climate change. The DSS accounts for both hydraulic and socio-economic parameters to quantify the benefits (in terms of avoided risk) and the cost of each strategy. Besides reviewing fundamentals of flood risk assessment, including the inundation model and main concepts related to flood risk, a consistent methodology for micro-scale flood risk analysis is presented in detail, combining complementary sources of GIS information such as high resolution and high accuracy land use database as well as socio-economic datasets. Finally a case study on a main tributary of river Meuse in Belgium is described.


2011 ◽  
pp. 750-776
Author(s):  
Seraphin B. Calo ◽  
Clare-Marie Karat ◽  
John Karat ◽  
Jorge Lobo ◽  
Robert Craven ◽  
...  

The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.


Author(s):  
Ramon Ferrús ◽  
Oriol Sallent ◽  
Cor Verkoelen ◽  
Frank Fransen ◽  
Keld Andersen ◽  
...  

The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery and security against crime. Nevertheless, uncertainty on costs, timescale and functionalities have slowed down the interconnection of national PPDR networks and limited the transnational cooperation of their PPDR forces so far. Currently, the European research project ISITEP is aimed at developing the legal, operational and technical framework to achieve a cost effective solution for PPDR interoperability across European countries. Inter alia, ISITEP project is specifying a new Inter-System-Interface (ISI) for the interconnection of current TETRA and TETRAPOL networks through Internet Protocol (IP) connectivity. This approach turns communications security as a central aspect. In this context, this paper describes the framework and methodology defined to carry out the development of the security requirements for the interconnection of PPDR networks via the new IP ISI and provides a discussion on the undertaken security risk and vulnerability analysis. Furthermore, an overview of the designed security architecture solution for network interconnection is provided.


Sign in / Sign up

Export Citation Format

Share Document