Part of the book series:Lecture Notes in Computer Science ((LNPSE,volume 10548))
Included in the following conference series:
1381Accesses
Abstract
Small unmanned vehicles support many mission critical tasks. However, the provenance of these systems is usually not known, devices may be deployed in contested environments, and operators are often not computer system experts. Yet, the benefits of these systems outweigh the risks, and critical tasks and data are delegated to these systems without a sound basis for assessing trust. This paper describes an approach that can determine an operator’s trust in a mission system and applies continuous monitoring to indicate if the performance is within a trusted operating region. In an early prototype we (a) define a multi-dimensional trusted operating region for a given mission, (b) monitor the system in-mission, and (c) detect when anomalous effects put the mission at risk.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lyons, J.B., Stokes, C.K., Eschleman, K.J., Alarcon, G.M., Barelka, A.: Trustworthiness and IT suspicion: an evaluation of the nomological network. J. Hum. Factors53(3), 219–229 (2011)
Colquitt, J.A., Scott, B.A., LePine, J.A.: Trust, trustworthiness, and trust propensity a meta-analytic test of their unique relationships with risk taking and job performance. J. Appl. Psychol.92(4), 909–927 (2007)
Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev.20(3), 709–734 (1995)
Mayer, R.C., Davis, J.H.: The effects of the performance appraisal system on trust for management: a field quasi-experiment. J. Appl. Psychol.84(1), 123–136 (1999)
Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors46(1), 50–80 (2004)
Madhavan, P., Wiegmann, D.A.: Similarities and differences between human-human and human-automation trust: an integrated review. Theoret. Issues Ergon. Sci.8, 277–301 (2007)
Parasuraman, R., Riley, V.: Humans and automation: use, misuse, disuse, and abuse. Hum. Factors39, 230–253 (1997)
Lee, J.D., Moray, N.: Trust, self-confidence, and operators adaptation to automation. Int. J. Hum Comput Stud.46, 17–30 (1994)
Muir, B.M., Moray, N.: Trust in automation: part II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics39, 429–460 (1996)
Jian, J., Bisantz, A.M., Drury, C.G.: Foundations for an empirically determined scale of trust in automated systems. Int. J. Cogn. Ergon.4, 53–71 (2000)
Sheridan, T.B.: Trustworthiness of command and control systems. In: Proceedings of the IFAC/IFIP/IEA/IFORS Conference on Man Machine Systems, Pergamon, Elmsford (1988)
Lewicki, R.J., McAllister, D.J., Bies, R.J.: Trust and distrust: new relationships and realities. Acad. Manag. Rev.23, 438–458 (1998)
Levine, T.R., McCornack, S.A.: The dark side of trust: conceptualizing and measuring types of communicative suspicion. Commun. Q.39, 325–340 (1991)
Aven, T.: Quantitative Risk Assessment: The Scientific Platform. Cambridge University Press, Cambridge (2011)
Highnam, K., Angstadt, K., Leach, K., Weimer, W., Paulos, A., Hurley, P.: An uncrewed aerial vehicle attack scenario and trustworthy repair architecture. In: Proceedings of the 46th International Conference on Dependable Systems and Networks Workshop (DSN-W), pp. 222–225 (2016)
Harrison McKnight, D., Chervany, N.L.: Trust and distrust definitions: one bite at a time. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) Trust in Cyber-societies. LNCS, vol. 2246, pp. 27–54. Springer, Heidelberg (2001). doi:10.1007/3-540-45547-7_3
Menghi, C.: Verifying incomplete and evolving specifications. In: Proceedings of the 36th International Conference on Software Engineering (ICSE), pp. 670–673 (2014)
Ahmed, I., Gopinath, R., Brindescu, C., Groce, A., Jensen, C.: Can testedness be effectively measured? In: Proceedings of the 24th International Symposium on Foundations of Software Engineering (FSE), pp. 547–558 (2016)
Paar, C.: Hardware trojans and other threats against embedded systems. In: Asia Conference on Computer and Communications Security (Asia CCS) (2017)
Costello, P.: Identifying and exploiting vulnerabilities in civilian unmanned aerial vehicle systems and evaluating and countering potential threats against the United States Airspace. In: ACM SIGCSE Technical Symposium on Computer Science Education, pp. 761–762 (2017)
Salehie, M., Tahvildari, L.: Self-adaptive software: landscape and research challenges. ACM Trans. Auton. Adapt. Syst. (TAAS)4, 14 (2009)
Multari, N., Singhal, A., Manz, D., Cowles, R., Cuellar, J., Oehmen, C., Shannon, G.: Testing, evaluation for active, resilient cyber systems panel verification of active, resilient systems: practical or utopian? In: Workshop on Automated Decision Making for Active Cyber Defense (SafeConfig) (2016)
Kamkar, S.: SkyJack: Autonomous Drone Hacking.http://samy.pl/skyjack/. Accessed 18 Jan 2017
MalDrone - First Ever Backdoor for Drones.http://thehackernews.com/2015/01/MalDrone-backdoor-drone-malware.html. Accessed 18 Jan 2017
Language-theoretic Security.http://langsec.org/. Accessed 18 Jan 2017
Waypoint Protocol - QgroundControl GCS.http://www.qgroundcontrol.org/mavlink/waypointprotocol. Accessed 18 Jan 2017
GitHub - mavlink/mavlink: MAVLink micro air vehicle marshalling/communication library.https://github.com/mavlink/mavlink/. Accessed 18 Jan 2017
GitHub - ArduPilot/ardupilot: ArduPlane, ArduCopter, ArduRover source.https://github.com/ArduPilot/ardupilot/. Accessed 18 Jan 2017
Nuttx Real-Time Operating System.http://nuttx.org. Accessed 18 Jan 2017
Home - blacksphere/blackmagic Wiki - GitHub.https://github.com/blacksphere/blackmagic/wiki. Accessed 18 Jan 2017
Pixhawk Flight Controller Hardware Project.https://pixhawk.org. Accessed 18 Jan 2017
Organizational Information Bylaws of the Academy of Model Aeronautics, Incorporated.www.modelaircraft.org/files/001bylaws.pdf. Accessed 18 Jan 2017
Unmanned Aircraft Systems (UAS) Regulations and Policies.https://www.faa.gov/uas/resources/uas_regulations_policy/. Accessed 18 Jan 2017
RCGroups.com: The ABCs of Radio Control - Aircraft, Boats, and Cars!https://www.rcgroups.com/forums/index.php. Accessed 18 Jan 2017
Flite Test — RC Planes, Quadcopters, Videos, Articles & More.www.flitetest.com. Accessed 18 Jan 2017
GitHub - ArduPilot/MAVProxy.https://github.com/ArduPilot/MAVProxy. Accessed 18 Jan 2017
Acknowledgements
The work presented in this paper is supported by the US Air Force Research Laboratory (AFRL), under contract number FA8750-15-C-0057. The content of the paper does not reflect the official position or policy of the US Air Force or the US Government.
DISTRIBUTION A. Approved for public release: distribution unlimited. 88ABW-2017-2014 on April 27, 2017.
Author information
Authors and Affiliations
Raytheon BBN Technologies, Cambridge, MA, 02138, USA
Aaron Paulos, Partha Pal, Shane S. Clark & Kyle Usbeck
Air Force Research Laboratory, Rome, NY, 13441, USA
Patrick Hurley
- Aaron Paulos
You can also search for this author inPubMed Google Scholar
- Partha Pal
You can also search for this author inPubMed Google Scholar
- Shane S. Clark
You can also search for this author inPubMed Google Scholar
- Kyle Usbeck
You can also search for this author inPubMed Google Scholar
- Patrick Hurley
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toAaron Paulos.
Editor information
Editors and Affiliations
Microsoft Research, Redmond, Washington, USA
Shuvendu Lahiri
The University of Manchester, Manchester, United Kingdom
Giles Reger
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Paulos, A., Pal, P., Clark, S.S., Usbeck, K., Hurley, P. (2017). Trusted Mission Operation - Concept and Implementation. In: Lahiri, S., Reger, G. (eds) Runtime Verification. RV 2017. Lecture Notes in Computer Science(), vol 10548. Springer, Cham. https://doi.org/10.1007/978-3-319-67531-2_28
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-319-67530-5
Online ISBN:978-3-319-67531-2
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative