E. Blasch, Ronghua Xu, Yu Chen, Genshe Chen, Dan Shen
{"title":"Blockchain Methods for Trusted Avionics Systems","authors":"E. Blasch, Ronghua Xu, Yu Chen, Genshe Chen, Dan Shen","doi":"10.1109/NAECON46414.2019.9058263","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058263","url":null,"abstract":"Blockchain is a popular method to ensure security for trusted systems. The benefits include an auditable method to provide decentralized security without a trusted third party, but the drawback is the large computational resources needed to process and store the ever-expanding chain of security blocks. The promise of blockchain for edge devices (e.g., internet of things) poses a variety of challenges and strategies before adoption. In this paper, we explore blockchain methods and examples, with experimental data to determine the merits of the capabilities. As for an aerospace example, we address a notional example for Automatic dependent surveillance— broadcast (ADS–B) from Flight24 data (https://www.flightradar24.com/) to determine whether blockchain is feasible for avionics systems. The methods are incorporated into the Lightweight Internet of Things (IoT) based Smart Public Safety (LISPS) framework. By decoupling a complex system into independent sub-tasks, the LISPS system possesses high flexibility in the design process and online maintenance. The Blockchain-enabled decentralized avionics services provide a secured data sharing and access control mechanism. The experimental results demonstrate the feasibility of the approach.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117269287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-referencing in microfluidic with whispering-gallery mode sensors for label-free detection of biomolecules","authors":"Hanyang Li, B. Jin, N. Limberopoulos, V. Astratov","doi":"10.1109/NAECON46414.2019.9057986","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057986","url":null,"abstract":"We report dye-doped polystyrene microspheres (of approximately equal size) are integrated into the microfluidic channel of a microfluidic chip as a self-referencing (SR) biosensing platform. This SR-biosensing device can be used in biomedical diagnostics due to demand for real time non-invasive techniques.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Development and Statistical Analysis for Software in Larger Trusted Embedded Systems","authors":"Jonathan Lockhart, C. Purdy","doi":"10.1109/NAECON46414.2019.9058191","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058191","url":null,"abstract":"Adding software can overcome limitations of hardware-only embedded systems. Here we expand previous results on reliability benchmarks for trusted embedded software to larger, more complex systems.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicolas S. Hamilton, Scott R. Graham, J. Petrosky, T. Carbino, Addison Betances
{"title":"Adaptive-Hybrid Redundancy for Rad-Hardening","authors":"Nicolas S. Hamilton, Scott R. Graham, J. Petrosky, T. Carbino, Addison Betances","doi":"10.1109/NAECON46414.2019.9057989","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057989","url":null,"abstract":"Radiation hardened by design processors are used in space environments to ensure reliability. These processors are difficult to develop, prohibitively expensive, and not state-of-the-art. Researchers now examine commercial processors and field programmable gate arrays for this purpose. Single event upsets are mitigated through redundancy. A novel adaptive-hybrid method is proposed.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131827403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Anomalies in Dismount Tracking Data","authors":"Holly Zelnio","doi":"10.1109/NAECON46414.2019.9058023","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058023","url":null,"abstract":"This effort develops an approach for detecting behavioral anomalies using tracks of pedestrians. This research develops physically meaningful features that are understandable by an operator. The features can be used with standard classifiers such as the one class support vector machine that is used in this research. The one class support vector machine is very stable for this application and provides significant insight into the nature of its decision boundary. Its stability and ease of system use stems from a unique automatic tuning approach that is computationally efficient and compares favorably with competing approaches. This automatic tuning approach is believed to be novel and was developed as part of this research. Results are provided using hand-tracked measured video data.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134121866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Venkata Salini Priyamvada Davuluru, Barath Narayanan Narayanan, E. Balster
{"title":"Convolutional Neural Networks as Classification Tools and Feature Extractors for Distinguishing Malware Programs","authors":"Venkata Salini Priyamvada Davuluru, Barath Narayanan Narayanan, E. Balster","doi":"10.1109/NAECON46414.2019.9058025","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058025","url":null,"abstract":"Classifying malware programs is a research area attracting great interest for Anti-Malware industry. In this research, we propose a system that visualizes malware programs as images and distinguishes those using Convolutional Neural Networks (CNNs). We study the performance of several well-established CNN based algorithms such as AlexNet, ResNet and VGG16 using transfer learning approaches. We also propose a computationally efficient CNN-based architecture for classification of malware programs. In addition, we study the performance of these CNNs as feature extractors by using Support Vector Machine (SVM) and K-nearest Neighbors (kNN) for classification purposes. We also propose fusion methods to boost the performance further. We make use of the publicly available database provided by Microsoft Malware Classification Challenge (BIG 2015) for this study. Our overall performance is 99.4% for a set of 2174 test samples comprising 9 different classes thereby setting a new benchmark.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Eye Guidance Method for UAVs Path Following","authors":"Jeffrey Xu, Thomas Le Pichon, S. Keshmiri","doi":"10.1109/NAECON46414.2019.9058208","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058208","url":null,"abstract":"Improving upon L1 and L2+ guidance laws, this paper introduces a novel solution to the issue of overshoot and sudden acceleration changes in unmanned aerial vehicles (UAVs) during in complex missions (e.g. collision avoidance maneuvers) and/or when it is in tight turns. Nonlinear multi-eye guidance law tracks multiple reference points at once instead of single point tracking, introduced in L1 and L2+ guidance laws. Multi-eye tracking requires the aircraft follow multiple reference points, each at difference distances from the aircraft, which will allow UAVs to anticipate turns sooner with the farther reference points, while being kept stable with the shorter reference points. This method eliminates the need to use switching distance at corners when using to prevent overshoots. The results of this paper show that multi-eye guidance is a robust method giving UAVs capabilities to perform complex missions.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134418276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous Adaptive Runtime Integration Testbed for Complex and Autonomous Systems","authors":"Christopher Stewart","doi":"10.1109/NAECON46414.2019.9058238","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058238","url":null,"abstract":"The integration of complex, distributed systems typically takes thousands of man-hours and years of detailed design and testing. Despite all this effort, the effectiveness of classical system integration becomes a major issue when one adds the runtime adaptive behavior that is increasingly vital for dynamic, autonomous systems influenced by their surroundings. Self-integrating systems proposed in recent research strive to autonomously integrate new components, reducing design and testing costs. However, these systems are challenging to validate, especially at scale. This paper describes CHARIOT, Continuous High-level Adaptive Runtime IntegratiOn Testbed, which allows for different approaches and systems to be dynamically deployed, assessed and compared on a shared common platform. CHARIOT uses self-flying drones and self-driving cars to validate autonomous signal integration. This paper will discuss our early work in designing the CHARIOT architecture and integration protocol.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Wireless Intrusions With RF Watermarks","authors":"J. Betances, Yousuke Z. Matsui","doi":"10.1109/NAECON46414.2019.9057818","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057818","url":null,"abstract":"Validation of devices at the physical layer can be accomplish with radio frequency (RF) watermarks to enhance wireless network security. For this application, RF watermarks are implemented as small signal offsets below the noise floor which are superimposed onto the signal transmitted from a wireless device. A receiver equipped to detect the offsets is then utilized to determine whether the anticipated RF watermarks are present in the received signal. Through this process, the integrity of the originally transmitted data is maintained while simultaneously validating the authenticity of the transmitting device.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130389204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formation Control of UAVs for Connectivity Maintenance and Collision Avoidance","authors":"Srijita Mukherjee, K. Namuduri","doi":"10.1109/NAECON46414.2019.9058089","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058089","url":null,"abstract":"In this paper, a formation control law for Unmanned Air Vehicles (UAVs) is proposed. This model combines the control and communication constraints in a balanced fashion while the UAVs attain formation. Here, a leader-follower structure is implemented with consensus laws along-with social potential functions ensuring collision avoidance and connectivity maintenance.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132188140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}