1,696 research outputs found

    Qualitative and Quantitative Risk Analysis and Safety Assessment of Unmanned Aerial Vehicles Missions Over the Internet

    Get PDF
    In the last few years, unmanned aerial vehicles (UAVs) are making a revolution as an emerging technology with many different applications in the military, civilian, and commercial elds. The advent of autonomous drones has initiated serious challenges, including how to maintain their safe operation during their missions. The safe operation of UAVs remains an open and sensitive issue since any unexpected behavior of the drone or any hazard would lead to potential risks that might be very severe. The motivation behind this work is to propose a methodology for the safety assurance of drones over the Internet (Internet of drones (IoD)). Two approaches will be used in performing the safety analysis: (1) a qualitative safety analysis approach and (2) a quantitative safety analysis approach. The rst approach uses the international safety standards, namely, ISO 12100 and ISO 13849 to assess the safety of drone's missions by focusing on qualitative assessment techniques. The methodology starts with hazard identi cation, risk assessment, risk mitigation, and nally draws the safety recommendations associated with a drone delivery use case. The second approach presents a method for the quantitative safety assessment using Bayesian networks (BN) for probabilistic modeling. BN utilizes the information provided by the rst approach to model the safety risks related to UAVs' ights. An illustrative UAV crash scenario is presented as a case study, followed by scenario analysis, to demonstrate the applicability of the proposed approach. These two analyses, qualitative and quantitative, enable all involved stakeholders to detect, explore, and address the risks of UAV ights, which will help the industry to better manage the safety concerns of UAVs.info:eu-repo/semantics/publishedVersio

    Cyber Risk Assessment and Scoring Model for Small Unmanned Aerial Vehicles

    Get PDF
    The commercial-off-the-shelf small Unmanned Aerial Vehicle (UAV) market is expanding rapidly in response to interest from hobbyists, commercial businesses, and military operators. The core commercial mission set directly relates to many current military requirements and strategies, with a priority on short range, low cost, real time aerial imaging, and limited modular payloads. These small vehicles present small radar cross sections, low heat signatures, and carry a variety of sensors and payloads. As with many new technologies, security seems secondary to the goal of reaching the market as soon as innovation is viable. Research indicates a growth in exploits and vulnerabilities applicable to small UAV systems, from individual UAV guidance and autopilot controls to the mobile ground station devices that may be as simple as a cellphone application controlling several aircraft. Even if developers strive to improve the security of small UAVs, consumers are left without meaningful insight into the hardware and software protections installed when buying these systems. To date, there is no marketed or accredited risk index for small UAVs. Building from similar domains of aircraft operation, information technologies, cyber-physical systems, and cyber insurance, a cyber risk assessment methodology tailored for small UAVs is proposed and presented in this research. Through case studies of popular models and tailored mission-environment scenarios, the assessment is shown to meet the three objectives of ease-of-use, breadth, and readability. By allowing a cyber risk assessment at or before acquisition, organizations and individuals will be able to accurately compare and choose the best aircraft for their mission

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    A systematic literature review on Security of Unmanned Aerial Vehicle Systems

    Full text link
    Unmanned aerial vehicles (UAVs) are becoming more common, and their operational range is expanding tremendously, making the security aspect of the inquiry essential. This study does a thorough assessment of the literature to determine the most common cyberattacks and the effects they have on UAV assaults on civilian targets. The STRIDE assault paradigm, the challenge they present, and the proper tools for the attack are used to categorize the cyber dangers discussed in this paper. Spoofing and denial of service assaults are the most prevalent types of UAV cyberattacks and have the best results. No attack style demands the employment of a hard-to-reach gadget, indicating that the security environment currently necessitates improvements to UAV use in civilian applications.Comment: 10 Pages, 4 Figure

    Risk Management of Unmanned Aerial Vehicles

    Full text link
    This paper presents an efficient risk management model for unmanned aerial vehicles or UAVs. Our proposed risk management establishes a cyclic model with a continuous and iterative structure that is very adaptable to agile methods and all IT-related resources. This model can be used in many applications, but as a case study, we have discussed it for UAVs. The increasing use of UAVs or drones in many fields and the existence of different threats is the main reason to have an efficient risk management method for them. In this paper, we cover risks based on IT-driven assets to decrease the chance of losing any data, failing the equipment or the system, and missing the reputation or credit based on cyclic and iterative flow. Our current risk management model for UAVs or drones is based on qualitative measures and can cover most of IT-based risks

    Unmanned aircraft systems as a new source of disturbance for wildlife: A systematic review.

    Get PDF
    The use of small Unmanned Aircraft Systems (UAS; also known as "drones") for professional and personal-leisure use is increasing enormously. UAS operate at low altitudes (<500 m) and in any terrain, thus they are susceptible to interact with local fauna, generating a new type of anthropogenic disturbance that has not been systematically evaluated. To address this gap, we performed a review of the existent literature about animals' responses to UAS flights and conducted a pooled analysis of the data to determine the probability and intensity of the disturbance, and to identify the factors influencing animals' reactions towards the small aircraft. We found that wildlife reactions depended on both the UAS attributes (flight pattern, engine type and size of aircraft) and the characteristics of animals themselves (type of animal, life-history stage and level of aggregation). Target-oriented flight patterns, larger UAS sizes, and fuel-powered (noisier) engines evoked the strongest reactions in wildlife. Animals during the non-breeding period and in large groups were more likely to show behavioral reactions to UAS, and birds are more prone to react than other taxa. We discuss the implications of these results in the context of wildlife disturbance and suggest guidelines for conservationists, users and manufacturers to minimize the impact of UAS. In addition, we propose that the legal framework needs to be adapted so that appropriate actions can be undertaken when wildlife is negatively affected by these emergent practices

    Survey of Bayesian Networks Applications to Intelligent Autonomous Vehicles

    Full text link
    This article reviews the applications of Bayesian Networks to Intelligent Autonomous Vehicles (IAV) from the decision making point of view, which represents the final step for fully Autonomous Vehicles (currently under discussion). Until now, when it comes making high level decisions for Autonomous Vehicles (AVs), humans have the last word. Based on the works cited in this article and analysis done here, the modules of a general decision making framework and its variables are inferred. Many efforts have been made in the labs showing Bayesian Networks as a promising computer model for decision making. Further research should go into the direction of testing Bayesian Network models in real situations. In addition to the applications, Bayesian Network fundamentals are introduced as elements to consider when developing IAVs with the potential of making high level judgement calls.Comment: 34 pages, 2 figures, 3 table

    Usability of Urban Air Mobility: Quantitative and Qualitative Assessments of Usage in Emergency Situations

    Get PDF
    The purpose of these four studies was to determine participants’ willingness to support the use of urban air mobility (UAM) in response to natural disasters, along with the preferred locations to establish vertiports. Study 1 assessed the willingness to support using a mixed factorial design. The findings demonstrated strong, robust support for the use of UAM when responding to natural disasters. Study 2 worked to create and validate a scale that could assess vertiports\u27 current and proposed locations. The Vertiport Usability Scale was developed and shown to have strong psychometric properties to validly assess vertiport locations through a multi-stage process. Study 3 used the Vertiport Usability Scale to understand the most highly preferred locations for vertiports in three conditions from a multi-stage process: temporary disaster locations, permanent disaster locations, and permanent consumer locations. Study 4 was conducted using qualitative methods to complement the earlier quantitative approaches. Through an initial survey and follow-on interview, three themes emerged related to UAM in response to natural disasters and vertiports: 1) human involvement in UAM operations, 2) scenarios for usage, and 3) setup and deployment of vehicles

    Local Government Policy and Planning for Unmanned Aerial Systems

    Get PDF
    This research identifies key state and local government stakeholders in California for drone policy creation and implementation, and describes their perceptions and understanding of drone policy. The investigation assessed stakeholders’ positions, interests, and influence on issues, with the goal of providing potential policy input to achieve successful drone integration in urban environments and within the national airspace of the United States. The research examined regulatory priorities through the use of a two-tiered Stakeholder Analysis Process. The first tier consisted of a detailed survey sent out to over 450 local agencies and jurisdictions in California. The second tier consisted of an in-person focus group to discuss survey results as well as to gain deeper insights into local policymakers’ current concerns. Results from the two tiers of analysis, as well as recommendations, are provided here
    • …
    corecore