Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Engineering

Going Airborne: Kent State's Pioneering Leap Into Integrated Advanced Air Mobility, Jason T. Lorenzon Feb 2024

Going Airborne: Kent State's Pioneering Leap Into Integrated Advanced Air Mobility, Jason T. Lorenzon

National Training Aircraft Symposium (NTAS)

This proposal centers on the development of a Concept of Operations in Advanced Air Mobility (AAM). Kent State University's College of Aeronautics and Engineering is poised to pioneer the integration of drones and electric Vertical Takeoff and Landing (eVTOL) systems, bridging the gap between its campus and airport by transporting students and faculty the 3NM distance from campus to the airport and back by a UAV. Beyond a standard research initiative, this proposal signifies a groundbreaking effort to reshape the landscape of educational aeronautics and Advanced Air Mobility and Urban Air Mobility. Our overarching goal is to transcend conventional boundaries …


Disruptive Technologies With Applications In Airline & Marine And Defense Industries, Randall K. Nichols, Hans C. Mumm, Wayne Lonstein, Suzanne Sincavage, Candice M. Carter, John-Paul Hood, Randall Mai, Mark Jackson, Bart Shields Feb 2021

Disruptive Technologies With Applications In Airline & Marine And Defense Industries, Randall K. Nichols, Hans C. Mumm, Wayne Lonstein, Suzanne Sincavage, Candice M. Carter, John-Paul Hood, Randall Mai, Mark Jackson, Bart Shields

NPP eBooks

Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence …


Unmanned Vehicle Systems & Operations On Air, Sea, Land, Randall K. Nichols, Hans. C. Mumm, Wayne D. Lonstein, Julie J.C.H Ryan, Candice M. Carter, John-Paul Hood, Jeremy S. Shay, Randall W. Mai, Mark J. Jackson Oct 2020

Unmanned Vehicle Systems & Operations On Air, Sea, Land, Randall K. Nichols, Hans. C. Mumm, Wayne D. Lonstein, Julie J.C.H Ryan, Candice M. Carter, John-Paul Hood, Jeremy S. Shay, Randall W. Mai, Mark J. Jackson

NPP eBooks

Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; …


Cyber Risk Assessment And Scoring Model For Small Unmanned Aerial Vehicles, Dillon M. Pettit Mar 2020

Cyber Risk Assessment And Scoring Model For Small Unmanned Aerial Vehicles, Dillon M. Pettit

Theses and Dissertations

The commercial-off-the-shelf small Unmanned Aerial Vehicle (UAV) market is expanding rapidly in response to interest from hobbyists, commercial businesses, and military operators. The core commercial mission set directly relates to many current military requirements and strategies, with a priority on short range, low cost, real time aerial imaging, and limited modular payloads. These small vehicles present small radar cross sections, low heat signatures, and carry a variety of sensors and payloads. As with many new technologies, security seems secondary to the goal of reaching the market as soon as innovation is viable. Research indicates a growth in exploits and vulnerabilities …


Counter Unmanned Aircraft Systems Technologies And Operations, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H Ryan, Candice Carter, John-Paul Hood Feb 2020

Counter Unmanned Aircraft Systems Technologies And Operations, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H Ryan, Candice Carter, John-Paul Hood

NPP eBooks

As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) …


Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood Jul 2019

Unmanned Aircraft Systems In The Cyber Domain, Randall K. Nichols, Hans C. Mumm, Wayne D. Lonstein, Julie J.C.H. Ryan, Candice Carter, John-Paul Hood

NPP eBooks

Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; …


Implementing And Testing A Novel Chaotic Cryptosystem, Samuel Jackson, Scott Kerlin, Jeremy Straub Oct 2015

Implementing And Testing A Novel Chaotic Cryptosystem, Samuel Jackson, Scott Kerlin, Jeremy Straub

Jeremy Straub

Cryptography in the domain of small satellites is a relatively new area of research. Compared to typical desktop computers, small satellites have limited bandwidth, processing power, and battery power. Many of the current encryption schemes were developed for desktop computers and servers, and as such may be unsuitable for small satellites. In addition, most cryptographic research in the domain of small satellites focuses on hardware solutions, which can be problematic given the limited space requirements of small satellites.

This paper investigates potential software solutions that could be used to encrypt and decrypt data on small satellites and other devices with …


Testing A Novel Cryptosystem For Use In Securing Small Satellite Communications, Samuel Jackson, Scott Kerlin, Jeremy Straub Aug 2015

Testing A Novel Cryptosystem For Use In Securing Small Satellite Communications, Samuel Jackson, Scott Kerlin, Jeremy Straub

Jeremy Straub

Cryptography in the domain of Small Satellites is a topic of growing importance. While large satellites are likely to have the hardware requirements to run common cryptographic algorithms, small satellites are extremely limited in both hardware capabilities, which limits the speed and security of cryptosystems implemented in software, and available physical space, which limits the ability to include cryptosystems implemented in hardware. However, small satellites are growing in popularity, and as such securing communications becomes a necessity for some. The Department of Defense is exploring the possibility of using CubeSats, a type of small satellite, in their operations, as are …


Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin Aug 2015

Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin

Jeremy Straub

Anomaly detection is a widely used technique to detect system intrusions. Anomaly detection in Intrusion Detection and Prevent Systems (IDPS) works by establishing a baseline of normal behavior and classifying points that are at a farther distance away as outliers. The result is an “anomaly score”, or how much a point is an outlier. Recent work has been performed which has examined use of anomaly detection in data streams [1]. We propose a new incremental anomaly detection algorithm which is up to 57,000x faster than the non-incremental version while slightly sacrificing the accuracy of results. We conclude that our method …


Pattern Recognition And Expert Systems For Microwave Wireless Power Transmission Failure Prevention, Cameron Kerbaugh, Allen Mcdermott, Jeremy Straub, Eunjin Kim Apr 2015

Pattern Recognition And Expert Systems For Microwave Wireless Power Transmission Failure Prevention, Cameron Kerbaugh, Allen Mcdermott, Jeremy Straub, Eunjin Kim

Jeremy Straub

Wireless power transfer (WPT) can be used to deliver space-generated power to ground stations through the use of microwave beams. WPT satellite power delivery systems have two major failure states: misdi-recting a beam and failing to send power to a station. This project has implemented an expert system to perform pattern recognition in an effort to prevent failures by analyzing the system state and predicting potential failures before they happen in support of space-based testing [1] and deployment [2].


Analysis Of Cyberattacks On Unmanned Aerial Systems, Andrew Morris Shull Jan 2013

Analysis Of Cyberattacks On Unmanned Aerial Systems, Andrew Morris Shull

Open Access Theses

With the increasing power and convenience offered by the use of embedded systems in control applications, such systems will undoubtedly continue to be developed and deployed. Recently, however, a focus on data-centric systems and developing network-enabled control systems has emerged, allowing for greater performance, safety, and resource allocation in systems such as smart power grids and unmanned military aircraft. However, this increase in connectivity also introduces vulnerabilities into these systems, potentially providing access to malicious parties seeking to disrupt the operation of those systems or to cause damage. Given the high potential cost of a failure in these systems in …