Conception, Design and Implementation of Secured UAV Combining Multi-Agent Systems and Ubiquitous Lightweight IDPS (Intrusion Detection and Prevention System)


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Unmanned aerial vehicles, or drones, are a relatively recent area of research and in full effervescence with more and more amateur and academic projects. Initially associated to the military, these vehicles are way to be used in many other areas. In effect, demand is growing for various applications within of this type of technology. Inspection of buildings, search and rescue of missing or in distress people are some examples. This research paper highlights a lightweight IDPS with the objective to secure UAVs. Our IDPS uses real-time architecture, based on the multi-agent aspect and consisting of two levels of analysis (pre-filtering and full analysis) and is more suited to be embedded in low computation resources devices in general and especially UAVs.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


UAV Security; Intrusion and Prevention Systems; Multi-Agent Systems

Full Text:

PDF


References


J. Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, Sean Smith “Intrusion detection for resource-constrained embedded control systems in the power grid Original Research Article” International Journal of Critical Infrastructure Protection, Volume 5, Issue 2, July 2012, Pages 74-83
http://dx.doi.org/10.1016/j.ijcip.2012.02.002

Book Chapter in the book "Multi-Agent Systems - Modeling, Control, Programming, Simulations and Applications", ISBN 978-953-307-174-9, InTech, April4, 2011

CHAIB-DRAA : « Systèmes multiagents: Vers une approche formelle basée sur l’action et l’interaction » Décembre 2009.

Autonomous and Intelligent Mobile Systems based on Multi-Agent Systems”Auteurs: A. Sayouti and H. Medromi.
http://dx.doi.org/10.5772/15230

Hicham Medromi and Adil Sayouti (2011). Autonomous and Intelligent Mobile Systems based on Multi-Agent Systems, Multi-Agent Systems - Modeling, Control, Programming, Simulations and Applications, Dr. Faisal Alkhateeb (Ed.), ISBN: 978-953-307-174-9, InTech, DOI: 10.5772/15230.
http://dx.doi.org/10.5772/15230

P. Kocher, et al., Security as a new dimension in embedded system design, in: 41st Design Automation Conference, 2004.
http://dx.doi.org/10.1145/996566.996771

Bo Sun; Osborne, L.; Yang Xiao; Guizani, S., "Intrusion detection techniques in mobile ad hoc and wireless sensor networks," Wireless Communications, IEEE , vol.14, no.5, pp.56,63, October 2007
http://dx.doi.org/10.1109/mwc.2007.4396943

Esfandi, A., "Efficient anomaly intrusion detection system in adhoc networks by mobile agents," Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on , vol.7, no., pp.73,77, 9-11 July 2010.
http://dx.doi.org/10.1109/iccsit.2010.5563804

Patrick Traynor, Kevin Butler, William Enck, Patrick McDaniel, Kevin Borders, “malnets: large-scale malicious networks via compromised wireless access points”, Journal of Security and Communication Networks, Special Issue on Security in Mobile Wireless Networks, Vol. 3, Issue 2-3, June 2010.
http://dx.doi.org/10.1002/sec.149

AvielMagnezi, “The Naval Disaster Report”,ynet 01/07/14 http://www.ynet.co.il/articles/0,7340,L-3980739,00.html.

Yaakov Katz 06/12/2012 “IDF encrypting more drones amid hacking concerns” http://www.jpost.com/Defense/IDF-encrypting-more-drones-amid-hacking-concerns.

Siobhan Gorman, Yochi J. Dreazen And August Cole Dec. 17, 2009 “Insurgents Hack U.S. Drones” http://online.wsj.com/news/articles/SB126102247889095011

CNN Wire Staff, “Obama says U.S. has asked Iran to return drone aircraft”, http://www.cnn.com/2011/12/12/world/meast/iran-us-drone

S. Wu and U. Manber, A Fast Algorithm for Multi-pattern Searching, tech. report TR94-17, Dept. of Computer Science, Univ. of Arizona, 1994.

Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese, Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection, Proceedings of the IEEE Infocom Conference, Hong Kong, China, March 2004.
http://dx.doi.org/10.1109/infcom.2004.1354682

O. Kachirski, R.K. Guha, Effective intrusion detection using multiple sensors in wireless ad hoc networks, in: Proceedings of HICSS, 2003, 57 pp.
http://dx.doi.org/10.1109/hicss.2003.1173873

M. Fisk, G. Varghese, Fast content-based packet handling for intrusion detection, Tech. Rep. CS2001-0670, Department of Computer Science, University of California, San Diego, May 2001.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize