Affiliation:
1. School of Electrical Engineering, Korea University, Seoul 02841, Republic of Korea
2. Agency for Defense Development (ADD), Seoul 05661, Republic of Korea
Abstract
Unmanned aerial vehicles are increasingly being applied to various applications for a variety purposes, such as delivery, communication relay, mapping, and surveillance services. Through these, it is possible to provide flexible and stable network services. Unmanned aerial vehicles perform a wide range of tasks using Internet-of-Things technology, which needs Internet access. These internet connections, however, make it more possible for attackers to execute various security attacks on unmanned aerial vehicles. Therefore, it is crucial to identify the attack behavior of the adversary, which is called “course-of-action”, to preserve security in the unmanned aerial vehicle infrastructure. Based on learned data, the existing course-of-action method has the drawback of not functioning on various networks. As a result, in this paper, we propose a novel heuristic search-based algorithm to apply to various unmanned aerial vehicle infrastructures. The algorithm can build the optimal heuristic functions in various unmanned aerial vehicle network environments to explore the attack course-of-action and design the optimal attack paths to maximize total reward. Applying the proposed algorithm in two unmanned aerial vehicle network scenarios allowed us to confirm that the best attack path is well established.
Funder
Agency for Defense Development
Subject
Artificial Intelligence,Computer Science Applications,Aerospace Engineering,Information Systems,Control and Systems Engineering
Reference41 articles.
1. Auction-based Charging Scheduling with Deep Learning Framework for Multi-Drone Networks;Shin;IEEE Trans. Veh. Technol.,2019
2. A Review of Security Threats of Unmanned Aerial Vehicles and Mitigation Steps;Sathyamoorthy;J. Def. Secur. Technol.,2015
3. Key Defence R&D Fields to Develop the National Defence Industry: Focus on C4ISR in Support of Network Centric Operations and Unmanned Vehicles;Sathyamoorthy;Def. S&T Tech. Bull.,2010
4. Bhattacharjee, D. (2023, February 25). Unmanned Aerial Vehicles and Counter Terrorism Operations. Available online: http://ssrn.com/abstract=2608969.
5. Jung, S., Yun, W.J., Kim, J., and Kim, J.H. (2021, January 13–16). Infrastructure-Assisted Cooperative Multi-UAV Deep Reinforcement Energy Trading Learning for Big-Data Processing. Proceedings of the International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献