Abstract With the recent advancement in technologies, researchers worldwide have a growing interest in unmanned aerial vehicles (UAVs). The last few years have been significant in terms of its global awareness, adoption, and applications across industries. In UAV-aided wireless networks, there are some limitations in terms of power consumption, data computation, data processing, endurance, and security. So, the idea of UAVs and Edge or Fog computing together deals with the limitations and provides intelligence at the network’s edge, which makes it more valuable to use in emergency applications. Fog computing distributes data in a decentralized way and blockchain also works on the principle of decentralization. Blockchain, as a decentralized database, uses cryptographic methods including hash functions and public key encryption to secure the user information. It is a prominent solution to secure the user’s information in blocks and maintain privacy.
Abstract The innovations of vehicle connectivity have been increasing dramatically to enhance the safety and user experience of driving, while the rising numbers of interfaces to the external world also bring security threats to vehicles. Many security countermeasures have been proposed and discussed to protect the systems and services against attacks. To provide an overview of the current states in this research field, we conducted a systematic mapping study (SMS) on the topic area “security countermeasures of in-vehicle communication systems.” A total of 279 papers are identified based on the defined study identification strategy and criteria. We discussed four research questions (RQs) related to the security countermeasures, validation methods, publication patterns, and research trends and gaps based on the extracted and classified data. Finally, we evaluated the validity threats and the whole mapping process.
In the “What’s Next for Aerospace and Defense: A Vision for 2050” study, AIA, New York City-based McKinsey & Company, and other industry partners reveal a comprehensive 30-year, Industry 4.0 forecast of air travel and spaceflight based on improvements in automation and digitization, next-generation materials, alternative energy sources and storage, and increased data throughput.
ARINC Report 679 defines the functional characteristics of an airborne server that will support Electronic Flight Bags (EFBs) and similar peripherals used in the flight deck, cabin, and maintenance applications. The document defines how EFBs will efficiently, effectively, safely, and securely connect to the airborne server in a way that offer expanded capabilities to aircraft operators. The airborne server has two main functions, first to provide specific services to connected systems, and second to provide centralized security for the EFB and its data. This document is a functional airborne server definition. It does not define the physical characteristics of the server.
Abaco Systems Inc. is launching a new family of avionics devices for test and simulation, development, and dataloading that feature Thunderbolt 3 interfaces. The new portable, high-speed, low-latency avionics devices – RCEI-830A-TB and QPM-1553-TB – are designed for a broad range of avionics applications and include Thunderbolt 3-to-PMC/XMC interfacing with ARINC 429 and MIL-STD-1553 protocols.
SAE EDGE Research Reports provide examinations significant topics facing mobility industry today including Connected Automated Vehicle Technologies Electrification Advanced Manufacturing
Access control enforces security policies for controlling critical resources. For V2X (Vehicle to Everything) autonomous military vehicle fleets, network middleware systems such as ROS (Robotic Operating System) expose system resources through networked publisher/subscriber and client/server paradigms. Without proper access control, these systems are vulnerable to attacks from compromised network nodes, which may perform data poisoning attacks, flood packets on a network, or attempt to gain lateral control of other resources. Access control for robotic middleware systems has been investigated in both ROS1 and ROS2. Still, these implementations do not have mechanisms for evaluating a policy's consistency and completeness or writing expressive policies for distributed fleets. We explore an RBAC (Role-Based Access Control) mechanism layered onto ROS environments that uses local permission caches with precomputed truth tables for fast policy evaluation.
New for 2022, AeroTech® will deliver even more robust programming by teaming up with AeroMat to deliver learning opportunities dedicated to: Additive Manufacturing and Materials, Environment and Sustainable Aviation (Sustainability), Autonomy and AI, Safety and Human Factors, Modeling, Simulation and Testing, Cybersecurity / Cyber-Physical Security, Industry 4.0 Smart Manufacturing and Assembly, IDEAL Summit (inclusion, diversity, equity, accessibility and leadership), Advanced Air Mobility (AAM) and Multimodal Mobility (M3)
New for 2022, AeroTech® will deliver even more robust programming by teaming up with AeroMat to deliver learning opportunities dedicated to: Additive Manufacturing and Materials, Environment and Sustainable Aviation (Sustainability), Autonomy and AI, Safety and Human Factors, Modeling, Simulation and Testing, Cybersecurity / Cyber-Physical Security, Industry 4.0 Smart Manufacturing and Assembly, IDEAL Summit (inclusion, diversity, equity, accessibility and leadership), Advanced Air Mobility (AAM) and Multimodal Mobility (M3)
New for 2022, AeroTech® will deliver even more robust programming by teaming up with AeroMat to deliver learning opportunities dedicated to: Additive Manufacturing and Materials, Environment and Sustainable Aviation (Sustainability), Autonomy and AI, Safety and Human Factors, Modeling, Simulation and Testing, Cybersecurity / Cyber-Physical Security, Industry 4.0 Smart Manufacturing and Assembly, IDEAL Summit (inclusion, diversity, equity, accessibility and leadership), Advanced Air Mobility (AAM) and Multimodal Mobility (M3)
Certified Machine Learning-Based Avionics: Unlocking Safer Revolutionizing Electronic Warfare: Unleashing the Power of High-Performance Software Defined Radios Deterministic and Modular Architecture for Embedded Vehicle Systems Approximating the Material Stresses and System Requirements for Hypersonic Flight Design Approaches for Established and Emerging RF Receiver Architectures Rydberg Technologies Shows Potential of Long-Range RF with Quantum Sensor at NetModX23 New Method to Measure Wind Speed Could Unlock Drones' Potential A fundamentally different approach to wind estimation using unmanned aircraft than the vast majority of existing methods. This method uses no on-board flow sensor and does not attempt to estimate thrust or drag forces. Report on Human Factors Issues Likely to Affect Air-Launched Effects This report reviews human factors research on the supervision of multiple unmanned vehicles (UVs) as it affects human integration with Air-Launched Effects (ALE).
Powering Better Battlefield Drones Using Low-Frequency Broadband Sonar on UUVs Experimenting in Realistic Environments Gets NewTechnology to Warfighters Designing Rugged SWaP-Optimized MOSA Solutions for UUVs Does Your UAV Program Need a Transponder? Understanding the Requirements and Guidelines Developing New Anti-Drone Radar Technology Deceiving the Enemy: These Are the Drones You Are Looking For By developing UAVs for physical deception roles to shape an adversary's ability to visually observe and orient to situations, the US military can decrease risk to air and ground combatants during mission execution by causing adversaries to expend resources, delay their reactions, or react incorrectly to tactical situations.
DoD to Deploy Thousands of Low Cost Autonomous Systems Under Replicator Program Top Productivity Improvement Tips for Manufacturing Turbine Discs FACE Technical Standard Offers MOSA Lessons for Safety-Critical Software in Any Sector Adamant: A Soon-to-be Open Source, Mission-Critical Flight Software Framework Written in Ada Benefits and Challenges of Direct-RF Sampling for Avionic Platforms More Airports Test RF as Counter Measure for UAS in Restricted Airspace Adapting U.S. Army Acquisition to Ensure the Reliability and Safety of Autonomous Vehicles This report presents several challenges that the U.S. Army will face in the transition to autonomous vehicles, challenges that are only magnified in the current acquisition environment with limited testing. Artificial intelligence algorithms introduce additional complexity, resulting in systems with a complex combination of human, machine, and autonomous controllers.
Hundreds of aerospace executives, engineers, scientists, and academics are gathering in London this week for Aerospace Systems and Technology Conference (ASTC) 2018 from SAE International in Warrendale, Pennsylvania. Discussions during the three-day industry event center on the theme of innovating air mobility. Aerospace thought leaders are at ASTC discussing current challenges, the latest enabling technologies, and future opportunities, including those related to urban air mobility (UAM) and supersonic aircraft.
Airbus intends to closely cooperate with start-ups in order to unlock new technologies in artificial intelligence, data analytics, and cyber security for France and Germany’s Future Combat Air System (FCAS) program.