Skip to main content
Presentation
R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems
6th International Conference on Runtime Verification (2015)
  • Johann Schumann, NASA Ames Research Center
  • Patrick Moosbrugger, NASA Ames Research Center
  • Kristin Yvonne Rozier, University of Cincinnati
Abstract
We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, Realizable, Responsive, Unobtrusive Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.


Keywords
  • Bayesian Network,
  • Temporal Logic,
  • Linear Temporal Logic,
  • Security Threat,
  • Attack Scenario
Publication Date
November 15, 2015
Location
Vienna, Austria
DOI
10.1007/978-3-319-23820-3_15
Comments
This proceeding is published as Schumann J., Moosbrugger P., Rozier K.Y. "R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems." In: Bartocci E., Majumdar R. (eds) Runtime Verification. Lecture Notes in Computer Science, vol 9333. (2015): 233-249.

Works produced by employees of the U.S. Government as part of their official duties are not copyrighted within the U.S. The content of this document is not copyrighted.

Citation Information
Johann Schumann, Patrick Moosbrugger and Kristin Yvonne Rozier. "R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems" 6th International Conference on Runtime Verification (2015)
Available at: http://works.bepress.com/kristin-yvonne-rozier/9/