102 research outputs found
Quantum Communication Countermeasures
Quantum communication, particularly quantum key distribution, is poised to
play a pivotal role in our communication system in the near future.
Consequently, it is imperative to not only assess the vulnerability of quantum
communication to eavesdropping (one aspect of quantum hacking), but also to
scrutinise the feasibility of executing a denial-of-service attack,
specifically, stopping quantum communication from working. Focusing primarily
on the free-space quantum channel, the investigation of possible
denial-of-service attacks from a strategic perspective is performed. This
encompasses the analysis of various scenarios, numerical modelling, risk
estimation and attack classification. The out-of-FOV (field of view) attack
emerges as a particularly severe threat across nearly all scenarios. This is
accompanied by proposed counter-countermeasures and recommendations
DRONE DELIVERY OF CBNRECy â DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)
Drone Delivery of CBNRECy â DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) â how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp
Electronic warfare self-protection of battlefield helicopters : a holistic view
The dissertation seeks to increase understanding of electronic warfare (EW) self-protection (EWSP) of battlefield helicopters by taking a holistic (systems) view on EWSP. It also evaluates the methodologies used in the research and their suitability as descriptive tools in communication between various EWSP stakeholders. The interpretation of the term "holistic view" is a central theme to the dissertation.
The research methodology is bottom-up â which is necessary since no previous work exists that could guide the study â and progresses from analysis to synthesis. Initially several methods are evaluated for presenting findings on EWSP, including high-level system simulation such as Forrester system dynamics (FSD). The analysis is conducted by a comprehensive literature review on EW and other areas that are believed to be of importance to the holistic view. Combat scenarios, intelligence, EW support, validation, training, and delays have major influence on the effectiveness of the EWSP suite; while the initial procurement decision on the EWSP suite sets limits to what can be achieved later. The need for a vast support structure for EWSP means that countries with limited intelligence and other resources become dependent on allies for support; that is, the question of EWSP effectiveness becomes political. The synthesis shows that a holistic view on EWSP of battlefield helicopters cannot be bounded in the temporal or hierarchical (organizational) senses. FSD is found to be helpful as a quality assurance tool, but refinements are needed if FSD is to be useful as a general discussion tool. The area of survivability is found to be the best match for the holistic view â for an EWSP suprasystem. A global survivability paradigm is defined as the ultimate holistic view on EWSP.
It is suggested that future research should be top-down and aiming at promoting the global survivability paradigm. The survivability paradigm would give EWSP a natural framework in which its merits can be assessed objectively.reviewe
An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications
We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems
Cyber-Human Systems, Space Technologies, and Threats
CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS/ UUVs / SPACE. Other textbooks in our series are Space Systems Emerging Technologies and Operations; Drone Delivery of CBNRECy â DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USAâs Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USAâs Advanced Air Assets, 1st edition. Our previous seven titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols, et al., 2021) (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018) (Nichols R. K., et al., 2022)https://newprairiepress.org/ebooks/1052/thumbnail.jp
REDESIGNING THE COUNTER UNMANNED SYSTEMS ARCHITECTURE
Includes supplementary material. Please contact [email protected] for access.When the Islamic State used Unmanned Aerial Vehicles (UAV) to target coalition forces in 2014, the use of UAVs rapidly expanded, giving weak states and non-state actors an asymmetric advantage over their technologically superior foes. This asymmetry led the Department of Defense (DOD) and the Department of Homeland Security (DHS) to spend vast sums of money on counter-unmanned aircraft systems (C-UAS). Despite the market density, many C-UAS technologies use expensive, bulky, and high-power-consuming electronic attack methods for ground-to-air interdiction. This thesis outlines the current technology used for C-UAS and proposes a defense-in-depth framework using airborne C-UAS patrols outfitted with cyber-attack capabilities. Using aerial interdiction, this thesis develops a novel C-UAS device called the Detachable Drone Hijackerâa low-size, weight, and power C-UAS device designed to deliver cyber-attacks against commercial UAVs using the IEEE 802.11 wireless communication specification. The experimentation results show that the Detachable Drone Hijacker, which weighs 400 grams, consumes one Watt of power, and costs $250, can interdict adversarial UAVs with no unintended collateral damage. This thesis recommends that the DOD and DHS incorporates aerial interdiction to support its C-UAS defense-in-depth, using technologies similar to the Detachable Drone Hijacker.DASN-OE, Washington DC, 20310Captain, United States Marine CorpsApproved for public release. Distribution is unlimited
Securing Embedded Systems for Unmanned Aerial Vehicles
This project focuses on securing embedded systems for unmanned aerial vehicles (UAV). Over the past two decades UAVs have evolved from a primarily military tool into one that is used in many commercial and civil applications. As the market for these products increases the need to protect transmitted data becomes more important. UAVs are flying missions that contain crucial data and without the right protection they can be vulnerable to malicious attacks. This project focuses on building a UAV platform and working to protect the data transmitted on it. The platform was able to detect red color and wirelessly transmit the coordinates of the color to a remote laptop. Areas that were focused on for security included the image processing and wireless communications modules
Enhanced Quantum Key Distribution Algorithm for Underwater Optical Wireless Sensor Network
The research aims to develop an attack-free underwater optical communication channel at a distance of 50 meters. In this work, we have emphasized the importance of Quantum Key Distribution (QKD) in Naval and many other applications. An in-detail study of the Benette Brassard QKD protocol proposed in 1984 [BB84] is done with its implementation. Then as the next step, we analyzed the drawbacks of BB84 and the necessity of QKD in Underwater Optical Wireless Sensor Networks [UO-WSN]. As a solution, to identified problems, we have proposed the Enhanced BB84 protocol (EBB84) with considerations of its usage in the UO-WSN. The results showed that the EBB84 algorithm is best suitable algorithm for the underwater environment
Integrated helicopter survivability
A high level of survivability is important to protect military personnel and equipment and is
central to UK defence policy. Integrated Survivability is the systems engineering
methodology to achieve optimum survivability at an affordable cost, enabling a mission to
be completed successfully in the face of a hostile environment. âIntegrated Helicopter
Survivabilityâ is an emerging discipline that is applying this systems engineering approach
within the helicopter domain. Philosophically the overall survivability objective is âzero
attritionâ, even though this is unobtainable in practice.
The research question was: âHow can helicopter survivability be assessed in an integrated
way so that the best possible level of survivability can be achieved within the constraints and
how will the associated methods support the acquisition process?â
The research found that principles from safety management could be applied to the
survivability problem, in particular reducing survivability risk to as low as reasonably
practicable (ALARP). A survivability assessment process was developed to support this
approach and was linked into the military helicopter life cycle. This process positioned the
survivability assessment methods and associated input data derivation activities.
The system influence diagram method was effective at defining the problem and capturing
the wider survivability interactions, including those with the defence lines of development
(DLOD). Influence diagrams and Quality Function Deployment (QFD) methods were
effective visual tools to elicit stakeholder requirements and improve communication across
organisational and domain boundaries.
The semi-quantitative nature of the QFD method leads to numbers that are not real. These
results are suitable for helping to prioritise requirements early in the helicopter life cycle, but
they cannot provide the quantifiable estimate of risk needed to demonstrate ALARP. The probabilistic approach implemented within the Integrated Survivability Assessment
Model (ISAM) was developed to provide a quantitative estimate of âriskâ to support the
approach of reducing survivability risks to ALARP. Limitations in available input data for
the rate of encountering threats leads to a probability of survival that is not a real number that
can be used to assess actual loss rates. However, the method does support an assessment
across platform options, provided that the âtest environmentâ remains consistent throughout
the assessment. The survivability assessment process and ISAM have been applied to an
acquisition programme, where they have been tested to support the survivability decision
making and design process.
The survivability âtest environmentâ is an essential element of the survivability assessment
process and is required by integrated survivability tools such as ISAM. This test
environment, comprising of threatening situations that span the complete spectrum of
helicopter operations requires further development. The âtest environmentâ would be used
throughout the helicopter life cycle from selection of design concepts through to test and
evaluation of delivered solutions. It would be updated as part of the through life capability
management (TLCM) process.
A framework of survivability analysis tools requires development that can provide
probabilistic input data into ISAM and allow derivation of confidence limits. This systems
level framework would be capable of informing more detailed survivability design work
later in the life cycle and could be enabled through a MATLABÂź based approach.
Survivability is an emerging system property that influences the whole system capability.
There is a need for holistic capability level analysis tools that quantify survivability along
with other influencing capabilities such as: mobility (payload / range), lethality, situational
awareness, sustainability and other mission capabilities.
It is recommended that an investigation of capability level analysis methods across defence
should be undertaken to ensure a coherent and compliant approach to systems engineering
that adopts best practice from across the domains. Systems dynamics techniques should be
considered for further use by Dstl and the wider MOD, particularly within the survivability
and operational analysis domains. This would improve understanding of the problem space,
promote a more holistic approach and enable a better balance of capability, within which
survivability is one essential element.
There would be value in considering accidental losses within a more comprehensive
âsurvivabilityâ analysis. This approach would enable a better balance to be struck between
safety and survivability risk mitigations and would lead to an improved, more integrated
overall design
Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons
The goal of this work is to implement resilience policies for Autonomous Vehicles under attack, based on the context in which the platoon is located. In a platoon model, we define the leader as the fulcrum entity of the whole model, which acts as a guide for the other entities, defined as followers. To allow the vehicles to communicate with each other and exchange the data necessary to establish an autonomous driving scenario, a system of data transmission from and between the entities is implemented. Considering this transmission as unsafe and attackable from the outside, the implemented policies recognize a possible attack and define various rules so that the targeted subject can recover and continue working in a safe driving scenario. The driving contexts are implemented thanks to the Carla simulator and collect the various nuances and meanings of real driving, allowing us to define realistic attacks and scenarios and to observe and analyze the various responses.
Each context is therefore repeatedly tested and analyzed, both in situations of regular operation and in the presence of various attacks, to ascertain the functioning and accuracy of the rules above. In conclusion, a report on the mentioned tests is indicated, reporting the precision of the rules and their practical functioning, supported by the data collected during the simulations.The goal of this work is to implement resilience policies for Autonomous Vehicles under attack, based on the context in which the platoon is located. In a platoon model, we define the leader as the fulcrum entity of the whole model, which acts as a guide for the other entities, defined as followers. To allow the vehicles to communicate with each other and exchange the data necessary to establish an autonomous driving scenario, a system of data transmission from and between the entities is implemented. Considering this transmission as unsafe and attackable from the outside, the implemented policies recognize a possible attack and define various rules so that the targeted subject can recover and continue working in a safe driving scenario. The driving contexts are implemented thanks to the Carla simulator and collect the various nuances and meanings of real driving, allowing us to define realistic attacks and scenarios and to observe and analyze the various responses.
Each context is therefore repeatedly tested and analyzed, both in situations of regular operation and in the presence of various attacks, to ascertain the functioning and accuracy of the rules above. In conclusion, a report on the mentioned tests is indicated, reporting the precision of the rules and their practical functioning, supported by the data collected during the simulations
- âŠ