102 research outputs found

    Quantum Communication Countermeasures

    Full text link
    Quantum communication, particularly quantum key distribution, is poised to play a pivotal role in our communication system in the near future. Consequently, it is imperative to not only assess the vulnerability of quantum communication to eavesdropping (one aspect of quantum hacking), but also to scrutinise the feasibility of executing a denial-of-service attack, specifically, stopping quantum communication from working. Focusing primarily on the free-space quantum channel, the investigation of possible denial-of-service attacks from a strategic perspective is performed. This encompasses the analysis of various scenarios, numerical modelling, risk estimation and attack classification. The out-of-FOV (field of view) attack emerges as a particularly severe threat across nearly all scenarios. This is accompanied by proposed counter-countermeasures and recommendations

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp

    Electronic warfare self-protection of battlefield helicopters : a holistic view

    Get PDF
    The dissertation seeks to increase understanding of electronic warfare (EW) self-protection (EWSP) of battlefield helicopters by taking a holistic (systems) view on EWSP. It also evaluates the methodologies used in the research and their suitability as descriptive tools in communication between various EWSP stakeholders. The interpretation of the term "holistic view" is a central theme to the dissertation. The research methodology is bottom-up – which is necessary since no previous work exists that could guide the study – and progresses from analysis to synthesis. Initially several methods are evaluated for presenting findings on EWSP, including high-level system simulation such as Forrester system dynamics (FSD). The analysis is conducted by a comprehensive literature review on EW and other areas that are believed to be of importance to the holistic view. Combat scenarios, intelligence, EW support, validation, training, and delays have major influence on the effectiveness of the EWSP suite; while the initial procurement decision on the EWSP suite sets limits to what can be achieved later. The need for a vast support structure for EWSP means that countries with limited intelligence and other resources become dependent on allies for support; that is, the question of EWSP effectiveness becomes political. The synthesis shows that a holistic view on EWSP of battlefield helicopters cannot be bounded in the temporal or hierarchical (organizational) senses. FSD is found to be helpful as a quality assurance tool, but refinements are needed if FSD is to be useful as a general discussion tool. The area of survivability is found to be the best match for the holistic view – for an EWSP suprasystem. A global survivability paradigm is defined as the ultimate holistic view on EWSP. It is suggested that future research should be top-down and aiming at promoting the global survivability paradigm. The survivability paradigm would give EWSP a natural framework in which its merits can be assessed objectively.reviewe

    An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications

    Get PDF
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems

    Cyber-Human Systems, Space Technologies, and Threats

    Get PDF
    CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS/ UUVs / SPACE. Other textbooks in our series are Space Systems Emerging Technologies and Operations; Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA’s Advanced Air Assets, 1st edition. Our previous seven titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols, et al., 2021) (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018) (Nichols R. K., et al., 2022)https://newprairiepress.org/ebooks/1052/thumbnail.jp

    REDESIGNING THE COUNTER UNMANNED SYSTEMS ARCHITECTURE

    Get PDF
    Includes supplementary material. Please contact [email protected] for access.When the Islamic State used Unmanned Aerial Vehicles (UAV) to target coalition forces in 2014, the use of UAVs rapidly expanded, giving weak states and non-state actors an asymmetric advantage over their technologically superior foes. This asymmetry led the Department of Defense (DOD) and the Department of Homeland Security (DHS) to spend vast sums of money on counter-unmanned aircraft systems (C-UAS). Despite the market density, many C-UAS technologies use expensive, bulky, and high-power-consuming electronic attack methods for ground-to-air interdiction. This thesis outlines the current technology used for C-UAS and proposes a defense-in-depth framework using airborne C-UAS patrols outfitted with cyber-attack capabilities. Using aerial interdiction, this thesis develops a novel C-UAS device called the Detachable Drone Hijacker—a low-size, weight, and power C-UAS device designed to deliver cyber-attacks against commercial UAVs using the IEEE 802.11 wireless communication specification. The experimentation results show that the Detachable Drone Hijacker, which weighs 400 grams, consumes one Watt of power, and costs $250, can interdict adversarial UAVs with no unintended collateral damage. This thesis recommends that the DOD and DHS incorporates aerial interdiction to support its C-UAS defense-in-depth, using technologies similar to the Detachable Drone Hijacker.DASN-OE, Washington DC, 20310Captain, United States Marine CorpsApproved for public release. Distribution is unlimited

    Securing Embedded Systems for Unmanned Aerial Vehicles

    Get PDF
    This project focuses on securing embedded systems for unmanned aerial vehicles (UAV). Over the past two decades UAVs have evolved from a primarily military tool into one that is used in many commercial and civil applications. As the market for these products increases the need to protect transmitted data becomes more important. UAVs are flying missions that contain crucial data and without the right protection they can be vulnerable to malicious attacks. This project focuses on building a UAV platform and working to protect the data transmitted on it. The platform was able to detect red color and wirelessly transmit the coordinates of the color to a remote laptop. Areas that were focused on for security included the image processing and wireless communications modules

    Enhanced Quantum Key Distribution Algorithm for Underwater Optical Wireless Sensor Network

    Get PDF
    The research aims to develop an attack-free underwater optical communication channel at a distance of 50 meters. In this work, we have emphasized the importance of Quantum Key Distribution (QKD) in Naval and many other applications. An in-detail study of the Benette Brassard QKD protocol proposed in 1984 [BB84] is done with its implementation. Then as the next step, we analyzed the drawbacks of BB84 and the necessity of QKD in Underwater Optical Wireless Sensor Networks [UO-WSN]. As a solution, to identified problems, we have proposed the Enhanced BB84 protocol (EBB84) with considerations of its usage in the UO-WSN. The results showed that the EBB84 algorithm is best suitable algorithm for the underwater environment

    Integrated helicopter survivability

    Get PDF
    A high level of survivability is important to protect military personnel and equipment and is central to UK defence policy. Integrated Survivability is the systems engineering methodology to achieve optimum survivability at an affordable cost, enabling a mission to be completed successfully in the face of a hostile environment. “Integrated Helicopter Survivability” is an emerging discipline that is applying this systems engineering approach within the helicopter domain. Philosophically the overall survivability objective is ‘zero attrition’, even though this is unobtainable in practice. The research question was: “How can helicopter survivability be assessed in an integrated way so that the best possible level of survivability can be achieved within the constraints and how will the associated methods support the acquisition process?” The research found that principles from safety management could be applied to the survivability problem, in particular reducing survivability risk to as low as reasonably practicable (ALARP). A survivability assessment process was developed to support this approach and was linked into the military helicopter life cycle. This process positioned the survivability assessment methods and associated input data derivation activities. The system influence diagram method was effective at defining the problem and capturing the wider survivability interactions, including those with the defence lines of development (DLOD). Influence diagrams and Quality Function Deployment (QFD) methods were effective visual tools to elicit stakeholder requirements and improve communication across organisational and domain boundaries. The semi-quantitative nature of the QFD method leads to numbers that are not real. These results are suitable for helping to prioritise requirements early in the helicopter life cycle, but they cannot provide the quantifiable estimate of risk needed to demonstrate ALARP. The probabilistic approach implemented within the Integrated Survivability Assessment Model (ISAM) was developed to provide a quantitative estimate of ‘risk’ to support the approach of reducing survivability risks to ALARP. Limitations in available input data for the rate of encountering threats leads to a probability of survival that is not a real number that can be used to assess actual loss rates. However, the method does support an assessment across platform options, provided that the ‘test environment’ remains consistent throughout the assessment. The survivability assessment process and ISAM have been applied to an acquisition programme, where they have been tested to support the survivability decision making and design process. The survivability ‘test environment’ is an essential element of the survivability assessment process and is required by integrated survivability tools such as ISAM. This test environment, comprising of threatening situations that span the complete spectrum of helicopter operations requires further development. The ‘test environment’ would be used throughout the helicopter life cycle from selection of design concepts through to test and evaluation of delivered solutions. It would be updated as part of the through life capability management (TLCM) process. A framework of survivability analysis tools requires development that can provide probabilistic input data into ISAM and allow derivation of confidence limits. This systems level framework would be capable of informing more detailed survivability design work later in the life cycle and could be enabled through a MATLAB¼ based approach. Survivability is an emerging system property that influences the whole system capability. There is a need for holistic capability level analysis tools that quantify survivability along with other influencing capabilities such as: mobility (payload / range), lethality, situational awareness, sustainability and other mission capabilities. It is recommended that an investigation of capability level analysis methods across defence should be undertaken to ensure a coherent and compliant approach to systems engineering that adopts best practice from across the domains. Systems dynamics techniques should be considered for further use by Dstl and the wider MOD, particularly within the survivability and operational analysis domains. This would improve understanding of the problem space, promote a more holistic approach and enable a better balance of capability, within which survivability is one essential element. There would be value in considering accidental losses within a more comprehensive ‘survivability’ analysis. This approach would enable a better balance to be struck between safety and survivability risk mitigations and would lead to an improved, more integrated overall design

    Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons

    Get PDF
    The goal of this work is to implement resilience policies for Autonomous Vehicles under attack, based on the context in which the platoon is located. In a platoon model, we define the leader as the fulcrum entity of the whole model, which acts as a guide for the other entities, defined as followers. To allow the vehicles to communicate with each other and exchange the data necessary to establish an autonomous driving scenario, a system of data transmission from and between the entities is implemented. Considering this transmission as unsafe and attackable from the outside, the implemented policies recognize a possible attack and define various rules so that the targeted subject can recover and continue working in a safe driving scenario. The driving contexts are implemented thanks to the Carla simulator and collect the various nuances and meanings of real driving, allowing us to define realistic attacks and scenarios and to observe and analyze the various responses. Each context is therefore repeatedly tested and analyzed, both in situations of regular operation and in the presence of various attacks, to ascertain the functioning and accuracy of the rules above. In conclusion, a report on the mentioned tests is indicated, reporting the precision of the rules and their practical functioning, supported by the data collected during the simulations.The goal of this work is to implement resilience policies for Autonomous Vehicles under attack, based on the context in which the platoon is located. In a platoon model, we define the leader as the fulcrum entity of the whole model, which acts as a guide for the other entities, defined as followers. To allow the vehicles to communicate with each other and exchange the data necessary to establish an autonomous driving scenario, a system of data transmission from and between the entities is implemented. Considering this transmission as unsafe and attackable from the outside, the implemented policies recognize a possible attack and define various rules so that the targeted subject can recover and continue working in a safe driving scenario. The driving contexts are implemented thanks to the Carla simulator and collect the various nuances and meanings of real driving, allowing us to define realistic attacks and scenarios and to observe and analyze the various responses. Each context is therefore repeatedly tested and analyzed, both in situations of regular operation and in the presence of various attacks, to ascertain the functioning and accuracy of the rules above. In conclusion, a report on the mentioned tests is indicated, reporting the precision of the rules and their practical functioning, supported by the data collected during the simulations
    • 

    corecore