Hyppää sisältöön
    • FI
    • ENG
  • FI
  • /
  • EN
OuluREPO – Oulun yliopiston julkaisuarkisto / University of Oulu repository
Näytä viite 
  •   OuluREPO etusivu
  • Oulun yliopisto
  • Avoin saatavuus
  • Näytä viite
  •   OuluREPO etusivu
  • Oulun yliopisto
  • Avoin saatavuus
  • Näytä viite
JavaScript is disabled for your browser. Some features of this site may not work without it.

Security Strategies for Unmanned Aircraft Systems Networks

Hernandez, Marco; Gur, Gurkan; Namuduri, Kamesh (2023-10-23)

 
Avaa tiedosto
nbnfioulu-202401221367.pdf (1.142Mt)
Lataukset: 

URL:
https://doi.org/10.1109/ICCWorkshops57953.2023.10283520

Hernandez, Marco
Gur, Gurkan
Namuduri, Kamesh
IEEE
23.10.2023

M. Hernandez, G. Gür and K. Namuduri, "Security Strategies for Unmanned Aircraft Systems Networks," 2023 IEEE International Conference on Communications Workshops (ICC Workshops), Rome, Italy, 2023, pp. 996-1001, doi: 10.1109/ICCWorkshops57953.2023.10283520.

https://rightsstatements.org/vocab/InC/1.0/
© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
https://rightsstatements.org/vocab/InC/1.0/
doi:https://doi.org/10.1109/ICCWorkshops57953.2023.10283520
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:oulu-202401221367
Tiivistelmä
Abstract

The rapid growth of Unmanned Aircraft Systems (UASs) usage in both commercial and defense areas has increased the requirement for advanced security schemes for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications for UASs. We define a UAS as consisting of a Control Station (CS) on the ground and at least one UAV. The pilot in the CS may have Visual Line-of-Sight (VLOS) or may not have VLOS to the airborne UAVs. The integration of UASs into the National Airspace (NAS) will rely on Unmanned Traffic Management (UTM) systems which can support Detect-And-Avoid (DAA) and de-confliction of flight paths. In case of non-cooperative traffic, tactical (in-flight) deconfliction becomes a critical element. In Beyond Visual Line of Sight (BVLoS) operations, where a remote pilot is unable to visually monitor the airspace beyond LoS, Sense-and-Avoid strategies become necessary. Further, the communication devices and messages must be protected against hacking and cyber-attacks. This paper investigates several use cases for UAS-to-UAS or V2V operations for UASs and the cyber-security strategies for protecting V2V communications addressed by IEEE P1920.2, a new standard for V2V communications for UASs, currently under development. This discussion included authentication of V2V parties, protection of Remote ID, cryptographic key management, and authorization policies based on a zero-trust architecture.
Kokoelmat
  • Avoin saatavuus [38840]
oulurepo@oulu.fiOulun yliopiston kirjastoOuluCRISLaturiMuuntaja
SaavutettavuusselosteTietosuojailmoitusYlläpidon kirjautuminen
 

Selaa kokoelmaa

NimekkeetTekijätJulkaisuajatAsiasanatUusimmatSivukartta

Omat tiedot

Kirjaudu sisäänRekisteröidy
oulurepo@oulu.fiOulun yliopiston kirjastoOuluCRISLaturiMuuntaja
SaavutettavuusselosteTietosuojailmoitusYlläpidon kirjautuminen