Font Size: a A A

Implementation of GNSS/GPS Navigation and its Attacks in UAVSim Testbed

Posted on:2016-12-02Degree:M.SType:Thesis
University:The University of ToledoCandidate:Jahan, FarhaFull Text:PDF
GTID:2478390017476922Subject:Computer Engineering
Abstract/Summary:
Unmanned systems or remotely piloted vehicles can easily accomplish tasks where human lives would be at risk. These systems are being deployed in areas which would be time-consuming, expensive and inconclusive if done by human intervention. Air, ground and underwater vehicles are three major classes of unmanned systems based on their operational environment. Clearly, in terms of causing damage, unmanned aerial vehicles (UAVs) are most efficient and have been known to change the course of several recent wars. If security of these systems is compromised, it will pose a serious threat to human lives as well as the nation. Therefore, it is important to analyze various possible attacks that can be attempted on these systems. Federal Aviation Administration (FAA) has limited the use of UAVs to 400 feet or below in the US National Airspace (NAS), primarily, due to the threat to the general population. This makes real world testing difficult in an academic setup. The best solution to this problem is to have a simulation based environment where different operational scenarios, related cyber-attacks, and their impacts on UAVs can be easily studied. Software based simulators are very economical to test different features of a UAV in terms of various defense mechanisms against cyber-attacks. In this thesis, we enhance UAVSim, a simulation test-bed for UAV Network cyber-security analysis, to include the Global Navigation Satellite System (GNSS), or more specifically, the Global Positioning System (GPS). The testbed allows users to perform security experiments by adjusting different parameters of the satellites and UAVs. It also allows implementation of different attacks in attack hosts. In addition, each UAV host works on well-defined mobility framework, radio propagation models, etc., resembling real-world operational scenarios.
Keywords/Search Tags:UAV, Uavs, Systems, Attacks
Related items