Abstract

The escalation in the level of inter-connectivity among multiple devices via internet exacerbates any risk by expanding opportunities for adversaries to execute a successful attack. Digital twin technology assimilation in cyber-physical systems, indeed is a vantage point for defense operational units, however, the way attacks are getting smarter every day is another concern. In light of these growing threats, apparently, it is vital to protect communication between unmanned aircrafts, ground stations, transmission mediums and tracking elements. Denial of service (DoS) attacks and GPS spoofing are capable of taking over communication, including all sorts of resources necessary to interact with flying unmanned aerial vehicles (UAVs) and veering off UAVs from their original path. The primary objective of this research is to gain useful insights of cyber-physical systems along with some aspects of digital twin technology and to make acquaintance with the sensors and different navigational systems embedded in remotely flown target aircrafts. We are engaged in a form of warfare, called cyber warfare, where we need to employ cyber warfare strategy and tactics that require intelligence, effective defense-in-depth approaches, offensive and defensive cyber operations and much more. In a circumstance, where manufacturers do not operate under a security-centric philosophy, the probability of UAVs being vulnerable is very high. Now, how can we reduce the probability of attackers launching a DoS attack on UAVs? Is it possible for us to embed a proactive defense system in an autonomous aerial vehicle to avoid any type of incoming DoS attack? The aim of this research is to study control systems of UAVs that are connected with internet and how the components of control systems or sensors could be used as a weak spot to compromise these autonomous aircrafts. This manuscript discusses various approaches that can detect, locate and mitigate a DoS attack using some penetration testing tools, keeping in mind the need of being proactive and taking both defensive and offensive actions to control DoS attacks of different types.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call