Otwarty dostęp

GNU Radio Based Testbed (GRaTe-BED) for Evaluating the Communication Link of Unmanned Aerial Systems


Zacytuj

[1] Kerns, A. J., “Unmanned aircraft capture and control via gps spoofing”, http://radionavlab.ae.utexas.edu/images/stories/files/papers/unmannedCapture.pdf.Search in Google Scholar

[2] United States Air Force Scientific Advisory Board, “Report on operating next-generation remotely piloted aircraft for irregular warfare”, Section 2.4.2 http://info.publicintelligence.net/USAF-RemoteIrregularWarfare.pdf, 2011.Search in Google Scholar

[3] Federal Aviation Administration, “Laser hazards in navigable airspace” https://www.faa.gov/pilots/safety/pilotsafetybrochures/media/laser_hazards_web.pdf.Search in Google Scholar

[4] Makkay, I., “Fight of drones” (“Drónok harca”), 2015 http://www.repulestudomany.hu/folyoirat/2015_1/2015-1-05-0192-Makkay_Imre.pdf.Search in Google Scholar

[5] Bob Kerczewski, Jeff Wilson, Bill Bishop – “Frequency Spectrum for Integration of Unmanned Aircraft”, NASA http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6719706.Search in Google Scholar

[6] Yanmaz, E.; Kuschnig, R.; Bettstetter, C., “Channel Measurements over 802.11a-based UAV-to Ground Links” http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6162389&abstractAccess=no&userType=inst.Search in Google Scholar

[7] Steve Gardner, “A communication link reliability study for small unmanned aerial vehicles”, Enerdyne Technologies, Inc.-COMM OPS Trends in Communication Systems For ISR UAVs, January 2009, http://www.milsatmagazine.com/story.php?number=893938022.Search in Google Scholar

[8] Pywell, M., Midgley-Davies, M. “EW test and evaluation - assuring survivability and operational effectiveness”, Electromagnetic Engineering Department BAE SYSTEMS, Military Air & Information http://tangentlink.com/wp-content/uploads/2014/07/2.-Electronic-Warfare-Test-Evaluation-Mitch-Midgley-Davies.pdf.Search in Google Scholar

[9] Miko, G., Nemeth, A., “Combined communication and radio navigation system for small UAVs”, Radioelektronika 2013 23rd International Conference, pp. 284-288, ISBN: 978-1-4673-5516-2.10.1109/RadioElek.2013.6530932Search in Google Scholar

[10] Turan, M., Gunay, F., Aslan, A., “An analytical approach to the concept of counter-UA ops (CUAOPS)”, Journal of Intelligent & Robotic Systems, January 2012, Volume 65, Issue 1-4, pp 73-91, ISSN 1573-0409, http://link.springer.com/article/10.1007%2Fs10846-011-9580-6.10.1007/s10846-011-9580-6Search in Google Scholar

[11] Zheng, Y., Wang, Y., “Hardware in the Loop Simulation for Low-altitude UAV Link in the Complex Terrain”, Applied Mechanics and Materials Vols. 336-338 (2013), pp. 1907-1912, ISBN:9783037857519.Search in Google Scholar

[12] Yanmaz, E.; Bettstetter, C., “ Channel measurements over 802.11a-based UAV-to-ground links”, GLOBECOM Workshops (GC Wkshps) IEEE, 2011, ISBN:978-1-4673-0039-1.10.1109/GLOCOMW.2011.6162389Search in Google Scholar

[13] Wan, J., Suo, H., Yan, H., Liu, J., “A general test platform for cyber-physical systems:unmanned vehicle with wireless sensor network navigation”, 2011 International Conference on Advances in Engineering, http://ac.els-cdn.com/S1877705811054658/1-s2.0-S1877705811054658-main.pdf?_tid=3c747952-6b8b-11e5-bae9-00000aab0f6b&acdnat=1444068326_18bdf0fe9b500d0fcc69e141753afc30.Search in Google Scholar

[14] Koepke, G., Young, W., Ladbury, J., Coder, J., “Complexities of testing interference and coexistence of wireless systems in critical infrastructure”, 2015, http://nvlpubs.nist.gov/nistpubs/TechnicalNotes/NIST.TN.1885.pdf.10.6028/NIST.TN.1885Search in Google Scholar

[15] Slater, D., Tague, P., Poovendran, R., Li, M., “A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks” http://www.ee.washington.edu/research/nsl/papers/aiaaInfotech09c.pdf.Search in Google Scholar

[16] Jamshidi, M., Jaimes Betancourt, A. S., Gomez, J., “Cyber-physical control of unmanned aerial vehicles”, http://ac.els-cdn.com/S1026309811000691/1-s2.0-S1026309811000691-main.pdf?_tid=71385718-66c6-11e5-9137-00000aab0f6b&acdnat=1443543999_0cc41af19de0b2765c48bdb1e55402c3.Search in Google Scholar

[17] Saeed, A., Neishaboori, A., Mohamed, A., Harras, K. A., “Up and away: a cheap UAV cyber-physical testbed” http://arxiv.org/pdf/1405.1823v1.pdf.Search in Google Scholar

[18] Department of the Army, “Cyber electromagnetic activities, field manual no. 3-38”, Washington, DC, 12 February 2014 http://armypubs.army.mil/doctrine/DR_pubs/dr_a/pdf/fm3_38.pdf.Search in Google Scholar

[19] Zainudin, A., Sudarsono, A., Astaw, I. G. P., “Reliability analysis of digital communication for various data types transmission using GNU Radio and USRP” http://www.researchgate.net/publication/259477837_Reliability_Analysis_of_Digital_Communication_for_Various_Data_Types_Transmission_Using_GNU_Radio_and_USRP.Search in Google Scholar

[20] Javaid, A., Sun, W., and Alam, M., “A Cost-Effective Simulation Testbed for Unmanned Aerial Vehicle Network Cyber Attack Analysis”, Safe & Secure Systems & Software Symposium (S5) June 9-11, 2015, http://www.mys5.org/Proceedings/2015/Day_3/2015-S5-Day3_0805_Sun.pdf.Search in Google Scholar

[21] Ettus Research Application Note, “Selecting an RF Daughterboard”, http://www.ettus.com/content/files/kb/Selecting_an_RF_Daughterboard.pdf.Search in Google Scholar

[22] Tucker, T.W. “Jammer testing and chaos”, Tactical Technologies Inc.http://ttiecm.com/uploads/resources_technical/jammer%20testing%20and%20chaos.pdf.Search in Google Scholar

[23] Chen, J., Zhang, S.†, Wang, H., Zhang, X., “Practicing a record-and-replay system on USRP”, Sigcomm Conference 2013, http://conferences.sigcomm.org/sigcomm/2013/papers/srif/p61.pdf.10.1145/2491246.2491257Search in Google Scholar

[24] O’Shea, T. “GNU Radio channel simulation: trolling sub-par modem algorithms and implementations for fun and profit”, Research Faculty, Virginia Polytechnic Institute and University, Arlington, VA, 1 Oct 2013 http://static1.1.sqspcdn.com/static/f/679473/23654472/1381240802597/grcon13_oshea_chansim.pdf?token=iRbiWsmfTNpfPqITN708izU3fQU%3D.Search in Google Scholar

[25] Department of Electrical and Computer Engineering, Ben-Gurion University of the Negev, “Introduction to USRP”, http://www.researchgate.net/file.PostFileLoader.html?id=545b5550d039b12d7c8b4567&key=80f8366d-3355-40ad-a657-7ffb6b904ff8&assetKey=AS:272121316478982@1441890186007.Search in Google Scholar

[26] Ettus Research, “Latency”, https://github.com/EttusResearch/uhd/wiki/Latency.Search in Google Scholar

[27] Brown, A., Tredway, R., and Taylor, R., “GPS signal simulation using open source GPS receiver platform” https://wireless.vt.edu/symposium/2011/posters/GPS%20Signal%20Simulation_Brown.pdf.Search in Google Scholar

[28] Knudsen, J., Varpiola, M., “What is fuzzing: the poet, the courier, and the oracle”, 2015, http://www.codenomicon.com/resources/white-paper/pdf/WhatisFuzzing.pdf.Search in Google Scholar

[29] “Hijacking DJI Phantom 2 Vision and P2V+”, https://github.com/noahwilliamsson/dji-phantom-vision.Search in Google Scholar

[30] Cencini, A., Yu, K., Chan, T., “Software vulnerabilities: full-, responsible-, and non-disclosure”, December 7, 2005, http://courses.cs.washington.edu/courses/csep590/05au/whitepaper_turnin/software_vulnerabilities_by_cencini_yu_chan.pdf p. 10.Search in Google Scholar