Skip to main content

Trusted Mission Operation - Concept and Implementation

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 10548))

Abstract

Small unmanned vehicles support many mission critical tasks. However, the provenance of these systems is usually not known, devices may be deployed in contested environments, and operators are often not computer system experts. Yet, the benefits of these systems outweigh the risks, and critical tasks and data are delegated to these systems without a sound basis for assessing trust. This paper describes an approach that can determine an operator’s trust in a mission system and applies continuous monitoring to indicate if the performance is within a trusted operating region. In an early prototype we (a) define a multi-dimensional trusted operating region for a given mission, (b) monitor the system in-mission, and (c) detect when anomalous effects put the mission at risk.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lyons, J.B., Stokes, C.K., Eschleman, K.J., Alarcon, G.M., Barelka, A.: Trustworthiness and IT suspicion: an evaluation of the nomological network. J. Hum. Factors 53(3), 219–229 (2011)

    Article  Google Scholar 

  2. Colquitt, J.A., Scott, B.A., LePine, J.A.: Trust, trustworthiness, and trust propensity a meta-analytic test of their unique relationships with risk taking and job performance. J. Appl. Psychol. 92(4), 909–927 (2007)

    Article  Google Scholar 

  3. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)

    Google Scholar 

  4. Mayer, R.C., Davis, J.H.: The effects of the performance appraisal system on trust for management: a field quasi-experiment. J. Appl. Psychol. 84(1), 123–136 (1999)

    Article  Google Scholar 

  5. Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors 46(1), 50–80 (2004)

    Article  Google Scholar 

  6. Madhavan, P., Wiegmann, D.A.: Similarities and differences between human-human and human-automation trust: an integrated review. Theoret. Issues Ergon. Sci. 8, 277–301 (2007)

    Article  Google Scholar 

  7. Parasuraman, R., Riley, V.: Humans and automation: use, misuse, disuse, and abuse. Hum. Factors 39, 230–253 (1997)

    Article  Google Scholar 

  8. Lee, J.D., Moray, N.: Trust, self-confidence, and operators adaptation to automation. Int. J. Hum Comput Stud. 46, 17–30 (1994)

    Google Scholar 

  9. Muir, B.M., Moray, N.: Trust in automation: part II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39, 429–460 (1996)

    Article  Google Scholar 

  10. Jian, J., Bisantz, A.M., Drury, C.G.: Foundations for an empirically determined scale of trust in automated systems. Int. J. Cogn. Ergon. 4, 53–71 (2000)

    Article  Google Scholar 

  11. Sheridan, T.B.: Trustworthiness of command and control systems. In: Proceedings of the IFAC/IFIP/IEA/IFORS Conference on Man Machine Systems, Pergamon, Elmsford (1988)

    Google Scholar 

  12. Lewicki, R.J., McAllister, D.J., Bies, R.J.: Trust and distrust: new relationships and realities. Acad. Manag. Rev. 23, 438–458 (1998)

    Google Scholar 

  13. Levine, T.R., McCornack, S.A.: The dark side of trust: conceptualizing and measuring types of communicative suspicion. Commun. Q. 39, 325–340 (1991)

    Article  Google Scholar 

  14. Aven, T.: Quantitative Risk Assessment: The Scientific Platform. Cambridge University Press, Cambridge (2011)

    Book  MATH  Google Scholar 

  15. Highnam, K., Angstadt, K., Leach, K., Weimer, W., Paulos, A., Hurley, P.: An uncrewed aerial vehicle attack scenario and trustworthy repair architecture. In: Proceedings of the 46th International Conference on Dependable Systems and Networks Workshop (DSN-W), pp. 222–225 (2016)

    Google Scholar 

  16. Harrison McKnight, D., Chervany, N.L.: Trust and distrust definitions: one bite at a time. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) Trust in Cyber-societies. LNCS, vol. 2246, pp. 27–54. Springer, Heidelberg (2001). doi:10.1007/3-540-45547-7_3

    Chapter  Google Scholar 

  17. Menghi, C.: Verifying incomplete and evolving specifications. In: Proceedings of the 36th International Conference on Software Engineering (ICSE), pp. 670–673 (2014)

    Google Scholar 

  18. Ahmed, I., Gopinath, R., Brindescu, C., Groce, A., Jensen, C.: Can testedness be effectively measured? In: Proceedings of the 24th International Symposium on Foundations of Software Engineering (FSE), pp. 547–558 (2016)

    Google Scholar 

  19. Paar, C.: Hardware trojans and other threats against embedded systems. In: Asia Conference on Computer and Communications Security (Asia CCS) (2017)

    Google Scholar 

  20. Costello, P.: Identifying and exploiting vulnerabilities in civilian unmanned aerial vehicle systems and evaluating and countering potential threats against the United States Airspace. In: ACM SIGCSE Technical Symposium on Computer Science Education, pp. 761–762 (2017)

    Google Scholar 

  21. Salehie, M., Tahvildari, L.: Self-adaptive software: landscape and research challenges. ACM Trans. Auton. Adapt. Syst. (TAAS) 4, 14 (2009)

    Google Scholar 

  22. Multari, N., Singhal, A., Manz, D., Cowles, R., Cuellar, J., Oehmen, C., Shannon, G.: Testing, evaluation for active, resilient cyber systems panel verification of active, resilient systems: practical or utopian? In: Workshop on Automated Decision Making for Active Cyber Defense (SafeConfig) (2016)

    Google Scholar 

  23. Kamkar, S.: SkyJack: Autonomous Drone Hacking. http://samy.pl/skyjack/. Accessed 18 Jan 2017

  24. MalDrone - First Ever Backdoor for Drones. http://thehackernews.com/2015/01/MalDrone-backdoor-drone-malware.html. Accessed 18 Jan 2017

  25. Language-theoretic Security. http://langsec.org/. Accessed 18 Jan 2017

  26. Waypoint Protocol - QgroundControl GCS. http://www.qgroundcontrol.org/mavlink/waypointprotocol. Accessed 18 Jan 2017

  27. GitHub - mavlink/mavlink: MAVLink micro air vehicle marshalling/communication library. https://github.com/mavlink/mavlink/. Accessed 18 Jan 2017

  28. GitHub - ArduPilot/ardupilot: ArduPlane, ArduCopter, ArduRover source. https://github.com/ArduPilot/ardupilot/. Accessed 18 Jan 2017

  29. Nuttx Real-Time Operating System. http://nuttx.org. Accessed 18 Jan 2017

  30. Home - blacksphere/blackmagic Wiki - GitHub. https://github.com/blacksphere/blackmagic/wiki. Accessed 18 Jan 2017

  31. Pixhawk Flight Controller Hardware Project. https://pixhawk.org. Accessed 18 Jan 2017

  32. Organizational Information Bylaws of the Academy of Model Aeronautics, Incorporated. www.modelaircraft.org/files/001bylaws.pdf. Accessed 18 Jan 2017

  33. Unmanned Aircraft Systems (UAS) Regulations and Policies. https://www.faa.gov/uas/resources/uas_regulations_policy/. Accessed 18 Jan 2017

  34. RCGroups.com: The ABCs of Radio Control - Aircraft, Boats, and Cars! https://www.rcgroups.com/forums/index.php. Accessed 18 Jan 2017

  35. Flite Test — RC Planes, Quadcopters, Videos, Articles & More. www.flitetest.com. Accessed 18 Jan 2017

  36. GitHub - ArduPilot/MAVProxy. https://github.com/ArduPilot/MAVProxy. Accessed 18 Jan 2017

Download references

Acknowledgements

The work presented in this paper is supported by the US Air Force Research Laboratory (AFRL), under contract number FA8750-15-C-0057. The content of the paper does not reflect the official position or policy of the US Air Force or the US Government.

DISTRIBUTION A. Approved for public release: distribution unlimited. 88ABW-2017-2014 on April 27, 2017.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aaron Paulos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Paulos, A., Pal, P., Clark, S.S., Usbeck, K., Hurley, P. (2017). Trusted Mission Operation - Concept and Implementation. In: Lahiri, S., Reger, G. (eds) Runtime Verification. RV 2017. Lecture Notes in Computer Science(), vol 10548. Springer, Cham. https://doi.org/10.1007/978-3-319-67531-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67531-2_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67530-5

  • Online ISBN: 978-3-319-67531-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics