Visible to the public Secured Architecture for Unmanned Surface Vehicle Fleets Management and Control

TitleSecured Architecture for Unmanned Surface Vehicle Fleets Management and Control
Publication TypeConference Paper
Year of Publication2018
AuthorsLaso, P. Merino, Brosset, D., Giraud, M.
Conference Name2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
Date PublishedAug. 2018
PublisherIEEE
ISBN Number978-1-5386-7518-2
KeywordsComputer architecture, control engineering computing, Control System, Cyber-physical systems, environmental monitoring, Human Behavior, human factors, Marine vehicles, mobile robots, Monitoring, policy-based governance, pubcrawl, remotely operated vehicles, resilience, Resiliency, risky weather conditions, robot operating systems, SCADA, SCADA systems, Sea surface, search and rescue operations, secured architecture, security, security of data, software architecture, Task Analysis, unmanned surface vehicle fleets control, unmanned surface vehicle fleets management, unmanned surface vehicles, unmanned vehicles, USV, water cleaning
Abstract

Cyber-physical systems contribute to building new infrastructure in the modern world. These systems help realize missions reducing costs and risks. The seas being a harsh and dangerous environment are a perfect application of them. Unmanned Surface vehicles (USV) allow realizing normal and new tasks reducing risk and cost i.e. surveillance, water cleaning, environmental monitoring or search and rescue operations. Also, as they are unmanned vehicles they can extend missions to unpleasing and risky weather conditions. The novelty of these systems makes that new command and control platforms need to be developed. In this paper, we describe an implemented architecture with 5 separated levels. This structure increases security by defining roles and by limiting information exchanges.

URLhttps://ieeexplore.ieee.org/document/8511915
DOI10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00072
Citation Keylaso_secured_2018