241 research outputs found
Rethinking SEAD: Employment of contemporary Fighter Aircraft Capabilities against an A2/AD-System of Systems of a peer Adversary in Europe
The Russian full scale invasion of Ukraine has demonstrated, how relevant the discussion about a potential NATO article 5 intervention in Europe is. A frequently used term in this context is Anti Access/ Area Denial. While this term is not existent in Russian strategy, the Integrated Air Defense System it encompasses poses a major challenge to NATO’s freedom of movement in case of a conflict. The air power role Suppression of Enemy Air Defenses can provide means to tackle the threat the Russian IADS poses to NATO. This thesis elaborates on NATO’s capabilities to counter the Russian IADS with SEAD capabilities. The topics SEAD and A2/AD are analyses in an extensive literature review. A qualitative small-N study based on subject matter expert interviews is conducted in order to identify, how the way SEAD operations are executed must be adjusted based in the present SEAD capabilities in NAT
Information fusion architectures for security and resource management in cyber physical systems
Data acquisition through sensors is very crucial in determining the operability of the observed physical entity. Cyber Physical Systems (CPSs) are an example of distributed systems where sensors embedded into the physical system are used in sensing and data acquisition. CPSs are a collaboration between the physical and the computational cyber components. The control decisions sent back to the actuators on the physical components from the computational cyber components closes the feedback loop of the CPS. Since, this feedback is solely based on the data collected through the embedded sensors, information acquisition from the data plays an extremely vital role in determining the operational stability of the CPS. Data collection process may be hindered by disturbances such as system faults, noise and security attacks. Hence, simple data acquisition techniques will not suffice as accurate system representation cannot be obtained. Therefore, more powerful methods of inferring information from collected data such as Information Fusion have to be used.
Information fusion is analogous to the cognitive process used by humans to integrate data continuously from their senses to make inferences about their environment. Data from the sensors is combined using techniques drawn from several disciplines such as Adaptive Filtering, Machine Learning and Pattern Recognition. Decisions made from such combination of data form the crux of information fusion and differentiates it from a flat structured data aggregation. In this dissertation, multi-layered information fusion models are used to develop automated decision making architectures to service security and resource management requirements in Cyber Physical Systems --Abstract, page iv
Recommended from our members
Towards secure & robust PNT for automated systems
This dissertation makes four contributions in support of secure and robust position, navigation, and timing (PNT) for automated systems. The first two relate to PNT security while the latter two address robust positioning for automated ground vehicles.
The first contribution is a fundamental theory for provably-secure clock synchronization between two agents in a distributed automated system. All one-way synchronization protocols, such as those based on the Global Positioning System (GPS) and other Global Navigation Satellite Systems (GNSS), are shown to be vulnerable to man-in-the-middle delay attacks. This contribution is the first to identify the necessary and sufficient conditions for provably secure clock synchronization.
The second contribution, also related to PNT security, is a three-year study of the world-wide GPS interference landscape based on data from a dual-frequency GNSS receiver operating continuously on the International Space Station (ISS). This work is the first publicly-reported space-based survey of GNSS interference, and unveils previously-unreported GNSS interference activity.
The third contribution is a novel ground vehicle positioning technique that is robust to GNSS signal blockage, poor lighting conditions, and adverse weather events such as heavy rain and dense fog. The technique relies on sensors that are commonly available on automated vehicles and are insensitive to lighting and inclement weather: automotive radar, low-cost inertial measurement units (IMUs), and GNSS. Remarkably, it is shown that, given a prior radar map, the proposed technique operating on data from off-the-shelf all-weather automotive sensors can maintain sub-50-cm horizontal position accuracy during 60 min of GNSS-denied driving in downtown Austin, TX.
This dissertation’s final contribution is an analysis and demonstration of the feasibility of crowd-sourced digital mapping for automated vehicles. Localization techniques, such as the one described in the previous contribution, rely on such digital maps for accuracy and robustness. A key enabler for large-scale up-to-date maps is enlisting the help of the very consumer vehicles that need the map to build and update it. A method for fusing multi-session vision data into a unified digital map is developed. The asymptotic limit of such a map’s globally-referenced position accuracy is explored for the case in which the mapping agents rely on low-cost GNSS receivers performing standard code-phase-based navigation. Experimental validation along a semi-urban route shows that low-cost consumer vehicles incrementally tighten the accuracy of the jointly-optimized digital map over time enough to support sub-lane-level positioning in a global frame of reference.Electrical and Computer Engineerin
DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)
Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp
Statistical assessment on Non-cooperative Target Recognition using the Neyman-Pearson statistical test
Electromagnetic simulations of a X-target were performed in order to obtain its Radar Cross
Section (RCS) for several positions and frequencies. The software used is the CST MWS©. A 1 : 5
scale model of the proposed aircraft was created in CATIA© V5 R19 and imported directly into
the CST MWS© environment. Simulations on the X-band were made with a variable mesh size
due to a considerable wavelength variation. It is intended to evaluate the Neyman-Pearson (NP)
simple hypothesis test performance by analyzing its Receiver Operating Characteristics (ROCs)
for two different radar detection scenarios - a Radar Absorbent Material (RAM) coated model,
and a Perfect Electric Conductor (PEC) model for recognition purposes.
In parallel the radar range equation is used to estimate the maximum range detection for the
simulated RAM coated cases to compare their shielding effectiveness (SE) and its consequent
impact on recognition. The AN/APG-68(V)9’s airborne radar specifications were used to compute
these ranges and to simulate an airborne hostile interception for a Non-Cooperative Target
Recognition (NCTR) environment. Statistical results showed weak recognition performances
using the Neyman-Pearson (NP) statistical test. Nevertheless, good RCS reductions for most of
the simulated positions were obtained reflecting in a 50:9% maximum range detection gain for
the PAniCo RAM coating, abiding with experimental results taken from the reviewed literature.
The best SE was verified for the PAniCo and CFC-Fe RAMs.Simulações electromagnéticas do alvo foram realizadas de modo a obter a assinatura radar (RCS)
para várias posições e frequĂŞncias. O software utilizado Ă© o CST MWS©. O modelo proposto Ă
escala 1:5 foi modelado em CATIA© V5 R19 e importado diretamente para o ambiente de trabalho
CST MWS©. Foram efectuadas simulações na banda X com uma malha de tamanho variável
devido à considerável variação do comprimento de onda. Pretende-se avaliar estatisticamente
o teste de decisĂŁo simples de Neyman-Pearson (NP), analisando as CaracterĂsticas de Operação
do Receptor (ROCs) para dois cenários de detecção distintos - um modelo revestido com material
absorvente (RAM), e outro sendo um condutor perfeito (PEC) para fins de detecção.
Em paralelo, a equação de alcance para radares foi usada para estimar o alcance máximo de
detecção para ambos os casos de modo a comparar a eficiência de blindagem electromagnética
(SE) entre os diferentes revestimentos. As especificações do radar AN/APG-68(V)9 do F-16 foram
usadas para calcular os alcances para cada material, simulando uma intercepção hostil num
ambiente de reconhecimento de alvos nĂŁo-cooperativos (NCTR). Os resultados mostram performances
de detecção fracas usando o teste de decisão simples de Neyman-Pearson como detector
e uma boa redução de RCS para todas as posições na gama de frequências selecionada. Um ganho
de alcance de detecção máximo 50:9 % foi obtido para o RAM PAniCo, estando de acordo com
os resultados experimentais da bibliografia estudada. Já a melhor SE foi verificada para o RAM
CFC-Fe e PAniCo
Air Force Institute of Technology Research Report 2003
This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, and Engineering Physics
State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia
- …