Preface |
|
ix | |
Introduction and Approach |
|
xi | |
|
Chapter 1 State of the Art of Model-driven Development (MDD) as Applied to Aeronautical Systems |
|
|
1 | (14) |
|
|
1 | (1) |
|
|
2 | (7) |
|
1.2.1 System virtualization: Integrated Modular Avionics |
|
|
3 | (1) |
|
1.2.2 MILS: divide and conquer to ensure security |
|
|
3 | (3) |
|
1.2.3 Combined treatment of safety and security considerations |
|
|
6 | (1) |
|
1.2.4 Certification of an avionics system |
|
|
7 | (2) |
|
1.3 The case of drones (UAS - Unmanned Aerial Systems) |
|
|
9 | (6) |
|
1.3.1 The need for a new rapid prototyping methodology for UAS design |
|
|
9 | (2) |
|
|
11 | (1) |
|
1.3.3 Software development lifecycle |
|
|
12 | (3) |
|
Chapter 2 Original Rapid Prototyping Method for Embedded Systems for UAVs |
|
|
15 | (28) |
|
2.1 Using models to auto-generate a system |
|
|
15 | (3) |
|
2.1.1 Presentation of different steps |
|
|
15 | (3) |
|
2.2 Formal verification of models |
|
|
18 | (3) |
|
|
19 | (2) |
|
2.3 Advantages of MDD (Model-driven Development) methodologies |
|
|
21 | (1) |
|
2.4 MDD contributions to UAS certification |
|
|
22 | (4) |
|
2.5 Choice of tools for applying MDD methodology |
|
|
26 | (6) |
|
2.6 AVISPA: a formal verification tool for security protocols |
|
|
32 | (1) |
|
2.7 The need for verification |
|
|
33 | (3) |
|
|
34 | (2) |
|
2.8 Additional tools: simulation and experimentation |
|
|
36 | (7) |
|
2.8.1 Testing and validation using emulation and network simulations |
|
|
36 | (5) |
|
2.8.2 Testing and validation using real experiments |
|
|
41 | (2) |
|
Chapter 3 Application to Communications in a Drone Fleet |
|
|
43 | (110) |
|
|
43 | (1) |
|
3.2 Cooperating unmanned aeronautical systems |
|
|
44 | (3) |
|
3.2.1 Unmanned Aircraft/Aerial Systems |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
3.3 Ad hoc communications architecture for a drone fleet |
|
|
47 | (5) |
|
3.3.1 Ad hoc drone network |
|
|
49 | (3) |
|
3.4 Routing protocols in an ad hoc drone network |
|
|
52 | (7) |
|
3.4.1 Hierarchical protocols |
|
|
54 | (1) |
|
|
54 | (1) |
|
3.4.3 Proactive protocols |
|
|
55 | (1) |
|
3.4.4 Geographic protocols |
|
|
56 | (1) |
|
3.4.5 UAANET networks and routing protocols: discussion |
|
|
57 | (2) |
|
3.5 Security in an ad hoc drone network |
|
|
59 | (15) |
|
3.5.1 Weaknesses in UAANET networks |
|
|
60 | (2) |
|
3.5.2 Attacks on UAANET networks |
|
|
62 | (6) |
|
3.5.3 SAODV secure ad hoc routing protocols |
|
|
68 | (6) |
|
3.6 Designing a new secure routing protocol for UAANETs (SUAP: Secure UAANET Routing Protocol) |
|
|
74 | (26) |
|
3.6.1 Choosing an initial routing protocol |
|
|
75 | (1) |
|
|
76 | (3) |
|
|
79 | (5) |
|
|
84 | (1) |
|
3.6.5 Single attacker variant |
|
|
84 | (2) |
|
3.6.6 State of the art: solutions for defense against wormhole attacks |
|
|
86 | (5) |
|
3.6.7 A new method for detecting and defending against wormhole attacks |
|
|
91 | (6) |
|
3.6.8 Defense mechanism for single-attacker wormhole attacks |
|
|
97 | (2) |
|
3.6.9 Limitations of the SUAP protocol |
|
|
99 | (1) |
|
3.7 Using the AVISPA tool to verify the security properties of the SUAP protocol |
|
|
100 | (4) |
|
3.7.1 Application of the SUAP protocol |
|
|
101 | (2) |
|
3.7.2 Analysis of the specification of the SUAP protocol |
|
|
103 | (1) |
|
3.8 Implementation of the SUAP protocol |
|
|
104 | (14) |
|
3.8.1 Software architecture of the SUAP algorithm |
|
|
105 | (1) |
|
3.8.2 Modeling the SUAP protocol |
|
|
106 | (8) |
|
3.8.3 Use of the model-driven approach in developing the SUAP protocol |
|
|
114 | (2) |
|
3.8.4 Implementation of the SUAP protocol |
|
|
116 | (2) |
|
3.9 Validation of the SUAP protocol by performance evaluation |
|
|
118 | (35) |
|
3.9.1 Validation of the routing partition |
|
|
119 | (12) |
|
3.9.2 Validation of the security functions of the SUAP protocol |
|
|
131 | (14) |
|
3.9.3 Validation of the wormhole detection mechanism |
|
|
145 | (5) |
|
3.9.4 Validation by performance evaluation: discussion |
|
|
150 | (3) |
Conclusions and Perspectives |
|
153 | (6) |
Bibliography |
|
159 | (10) |
Index |
|
169 | |