TY - GEN KW - advanced security assurance case KW - AI KW - ASAC KW - cyberattacks KW - failures KW - ML KW - multi-UAV mission planning KW - reliability-based model AU - Vyacheslav Kharchenko AU - Ihor Kliushnikov AU - Herman Fesenko AU - Oleg Illiashenko AB -

The article presents the state of the art of utilizing unmanned aerial vehicles (UAVs) to monitor critical infrastructures (CI). First, the authors formulate the key CI monitoring tasks and provide examples of multi-UAV system utilization for their performance. The article further presents specifications for reliability-based multi-UAV mission planning, followed by a discussion of respective models. Then it provides a detailed example of planning the monitoring of a nuclear power plant in a post-accident period. Another example includes an analysis of cyberattacks on Internet of Drones (IoD) monitoring systems, with detailed consideration of IoD monitoring systems in view of possible cyberattacks. The potential of implementing artificial intelligence and machine learning methods in UAVs is also discussed. Finally, the authors propose adapting an advanced security assurance case to provide cybersecurity of the multi-UAV mission.

BT - Information & Security: An International Journal DO - https://doi.org/10.11610/isij.4906 N2 -

The article presents the state of the art of utilizing unmanned aerial vehicles (UAVs) to monitor critical infrastructures (CI). First, the authors formulate the key CI monitoring tasks and provide examples of multi-UAV system utilization for their performance. The article further presents specifications for reliability-based multi-UAV mission planning, followed by a discussion of respective models. Then it provides a detailed example of planning the monitoring of a nuclear power plant in a post-accident period. Another example includes an analysis of cyberattacks on Internet of Drones (IoD) monitoring systems, with detailed consideration of IoD monitoring systems in view of possible cyberattacks. The potential of implementing artificial intelligence and machine learning methods in UAVs is also discussed. Finally, the authors propose adapting an advanced security assurance case to provide cybersecurity of the multi-UAV mission.

PY - 2021 T2 - Information & Security: An International Journal TI - Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks VL - 49 ER -