• Login
    View Item 
    •   Home
    • Research from April 2016
    • Computing
    • View Item
    •   Home
    • Research from April 2016
    • Computing
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UOBREPCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartmentThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartment

    My Account

    LoginRegister

    About

    AboutLearning ResourcesResearch Graduate SchoolResearch InstitutesUniversity Website

    Statistics

    Display statistics

    Autonomous arial vehicles in smart cities: potential cyber-physical threats

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Authors
    Dawam, Edward Swarlat
    Feng, Xiaohua
    Li, Dayou
    Affiliation
    University of Bedfordshire
    Issue Date
    2019-01-24
    Subjects
    cyber-attacks
    Smart City
    Autonomous Aerial Vehicles (AAV)
    cyber-physical threats
    security
    H410 Aeronautical Engineering
    
    Metadata
    Show full item record
    Abstract
    Autonomous aerial vehicles (AAV) are aircraft systems whose aircrew is replaced by autonomous computer systems and a radio link, thereby managed remotely from a ground station. This mode of transportation has recently been adopted as a means of transportation in a pioneering initiative by Dubai with more smart cities expected to adopt this mode of transportation shortly as it is believed to show potentials to transform urban transportation and future mobility in smart cities. The concern, however, is, the security of these systems and the smart city infrastructure they depend on for their operations. Certainly, the introduction of AAVs into smart cities raises many new cybersecurity questions that are in need of investigation and answers. It is, therefore, the purpose of this paper to explore potential cyber-physical security threats and the challenges that need to be confronted before this mode of transportation is fully integrated into the smart cities. A methodology to investigate on a large scale the cybersecurity attack vectors of such systems is presented based on four categories of systems that are critical to AAV operations, as well as their impacts and how to counter such attacks. What follows is a summary of the countermeasures that should be implemented to guarantee the safety of those systems.
    Citation
    Dawam E, Feng X, Li D (2019) 'Autonomous arial vehicles in smart cities: potential cyber-physical threats', IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) - Exeter, Institute of Electrical and Electronics Engineers Inc..
    Publisher
    Institute of Electrical and Electronics Engineers Inc.
    URI
    http://hdl.handle.net/10547/623817
    DOI
    10.1109/HPCC/SmartCity/DSS.2018.00247
    Additional Links
    https://ieeexplore.ieee.org/document/8622985
    Type
    Conference papers, meetings and proceedings
    Language
    en
    ISBN
    9781538666142
    ae974a485f413a2113503eed53cd6c53
    10.1109/HPCC/SmartCity/DSS.2018.00247
    Scopus Count
    Collections
    Computing

    entitlement

     
    DSpace software (copyright © 2002 - 2021)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.