Research Article
Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation
@ARTICLE{10.4108/sis.2.4.e4, author={Ahmad Y. Javaid and Weiqing Sun and Mansoor Alam}, title={Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation}, journal={EAI Endorsed Transactions on Scalable Information Systems}, volume={2}, number={4}, publisher={ICST}, journal_a={SIS}, year={2015}, month={2}, keywords={UAV Cyber-security, performance evaluation, simulation, testbed}, doi={10.4108/sis.2.4.e4} }
- Ahmad Y. Javaid
Weiqing Sun
Mansoor Alam
Year: 2015
Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation
SIS
ICST
DOI: 10.4108/sis.2.4.e4
Abstract
Usage of ground, air and underwater unmanned vehicles (UGV, UAV and UUV) has increased exponentially in the recent past with industries producing thousands of these unmanned vehicles every year.With the ongoing discussion of integration of UAVs in the US National Airspace, the need of a cost-effective way to verify the security and resilience of a group of communicating UAVs under attack has become very important. The answer to this need is a simulation testbed which can be used to simulate the UAV Network (UAVNet). One of these attempts is - UAVSim (Unmanned Aerial Vehicle Simulation testbed) developed at the University of Toledo. It has the capability of simulating large UAV networks as well as small UAV networks with large number of attack nodes. In this paper, we analyse the performance of the simulation testbed for two attacks, targeting single and multiple UAVs. Traditional and generic computing resource available in a regular computer laboratory was used. Various evaluation results have been presented and analysed which suggest the suitability of UAVSim for UAVNet attack and swarm simulation applications.
Copyright © 2015 Ahmad Y. Javaid et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited