Searching for Scalable Networks in Unmanned Aerial Vehicle Infrastructure Using Spatio-Attack Course-of-Action

Author:

Son Seok Bin1ORCID,Kim Dong Hwa2

Affiliation:

1. School of Electrical Engineering, Korea University, Seoul 02841, Republic of Korea

2. Agency for Defense Development (ADD), Seoul 05661, Republic of Korea

Abstract

Unmanned aerial vehicles are increasingly being applied to various applications for a variety purposes, such as delivery, communication relay, mapping, and surveillance services. Through these, it is possible to provide flexible and stable network services. Unmanned aerial vehicles perform a wide range of tasks using Internet-of-Things technology, which needs Internet access. These internet connections, however, make it more possible for attackers to execute various security attacks on unmanned aerial vehicles. Therefore, it is crucial to identify the attack behavior of the adversary, which is called “course-of-action”, to preserve security in the unmanned aerial vehicle infrastructure. Based on learned data, the existing course-of-action method has the drawback of not functioning on various networks. As a result, in this paper, we propose a novel heuristic search-based algorithm to apply to various unmanned aerial vehicle infrastructures. The algorithm can build the optimal heuristic functions in various unmanned aerial vehicle network environments to explore the attack course-of-action and design the optimal attack paths to maximize total reward. Applying the proposed algorithm in two unmanned aerial vehicle network scenarios allowed us to confirm that the best attack path is well established.

Funder

Agency for Defense Development

Publisher

MDPI AG

Subject

Artificial Intelligence,Computer Science Applications,Aerospace Engineering,Information Systems,Control and Systems Engineering

Reference41 articles.

1. Auction-based Charging Scheduling with Deep Learning Framework for Multi-Drone Networks;Shin;IEEE Trans. Veh. Technol.,2019

2. A Review of Security Threats of Unmanned Aerial Vehicles and Mitigation Steps;Sathyamoorthy;J. Def. Secur. Technol.,2015

3. Key Defence R&D Fields to Develop the National Defence Industry: Focus on C4ISR in Support of Network Centric Operations and Unmanned Vehicles;Sathyamoorthy;Def. S&T Tech. Bull.,2010

4. Bhattacharjee, D. (2023, February 25). Unmanned Aerial Vehicles and Counter Terrorism Operations. Available online: http://ssrn.com/abstract=2608969.

5. Jung, S., Yun, W.J., Kim, J., and Kim, J.H. (2021, January 13–16). Infrastructure-Assisted Cooperative Multi-UAV Deep Reinforcement Energy Trading Learning for Big-Data Processing. Proceedings of the International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3