Conception, Design and Implementation of Secured UAV Combining Multi-Agent Systems and Ubiquitous Lightweight IDPS (Intrusion Detection and Prevention System)
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
Unmanned aerial vehicles, or drones, are a relatively recent area of research and in full effervescence with more and more amateur and academic projects. Initially associated to the military, these vehicles are way to be used in many other areas. In effect, demand is growing for various applications within of this type of technology. Inspection of buildings, search and rescue of missing or in distress people are some examples. This research paper highlights a lightweight IDPS with the objective to secure UAVs. Our IDPS uses real-time architecture, based on the multi-agent aspect and consisting of two levels of analysis (pre-filtering and full analysis) and is more suited to be embedded in low computation resources devices in general and especially UAVs.
Copyright © 2015 Praise Worthy Prize - All rights reserved.
J. Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, Sean Smith “Intrusion detection for resource-constrained embedded control systems in the power grid Original Research Article” International Journal of Critical Infrastructure Protection, Volume 5, Issue 2, July 2012, Pages 74-83
Book Chapter in the book "Multi-Agent Systems - Modeling, Control, Programming, Simulations and Applications", ISBN 978-953-307-174-9, InTech, April4, 2011
CHAIB-DRAA : « Systèmes multiagents: Vers une approche formelle basée sur l’action et l’interaction » Décembre 2009.
Autonomous and Intelligent Mobile Systems based on Multi-Agent Systems”Auteurs: A. Sayouti and H. Medromi.
Hicham Medromi and Adil Sayouti (2011). Autonomous and Intelligent Mobile Systems based on Multi-Agent Systems, Multi-Agent Systems - Modeling, Control, Programming, Simulations and Applications, Dr. Faisal Alkhateeb (Ed.), ISBN: 978-953-307-174-9, InTech, DOI: 10.5772/15230.
P. Kocher, et al., Security as a new dimension in embedded system design, in: 41st Design Automation Conference, 2004.
Bo Sun; Osborne, L.; Yang Xiao; Guizani, S., "Intrusion detection techniques in mobile ad hoc and wireless sensor networks," Wireless Communications, IEEE , vol.14, no.5, pp.56,63, October 2007
Esfandi, A., "Efficient anomaly intrusion detection system in adhoc networks by mobile agents," Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on , vol.7, no., pp.73,77, 9-11 July 2010.
Patrick Traynor, Kevin Butler, William Enck, Patrick McDaniel, Kevin Borders, “malnets: large-scale malicious networks via compromised wireless access points”, Journal of Security and Communication Networks, Special Issue on Security in Mobile Wireless Networks, Vol. 3, Issue 2-3, June 2010.
AvielMagnezi, “The Naval Disaster Report”,ynet 01/07/14 http://www.ynet.co.il/articles/0,7340,L-3980739,00.html.
Yaakov Katz 06/12/2012 “IDF encrypting more drones amid hacking concerns” http://www.jpost.com/Defense/IDF-encrypting-more-drones-amid-hacking-concerns.
Siobhan Gorman, Yochi J. Dreazen And August Cole Dec. 17, 2009 “Insurgents Hack U.S. Drones” http://online.wsj.com/news/articles/SB126102247889095011
CNN Wire Staff, “Obama says U.S. has asked Iran to return drone aircraft”, http://www.cnn.com/2011/12/12/world/meast/iran-us-drone
S. Wu and U. Manber, A Fast Algorithm for Multi-pattern Searching, tech. report TR94-17, Dept. of Computer Science, Univ. of Arizona, 1994.
Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese, Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection, Proceedings of the IEEE Infocom Conference, Hong Kong, China, March 2004.
O. Kachirski, R.K. Guha, Effective intrusion detection using multiple sensors in wireless ad hoc networks, in: Proceedings of HICSS, 2003, 57 pp.
M. Fisk, G. Varghese, Fast content-based packet handling for intrusion detection, Tech. Rep. CS2001-0670, Department of Computer Science, University of California, San Diego, May 2001.
- There are currently no refbacks.
Please send any question about this web site to firstname.lastname@example.org
Copyright © 2005-2020 Praise Worthy Prize