Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Engineering

Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson Nov 2021

Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson

Faculty Publications

Safety is a simple concept but an abstract task, specifically with aircraft. One critical safety system, the Traffic Collision Avoidance System II (TCAS), protects against mid-air collisions by predicting the course of other aircraft, determining the possibility of collision, and issuing a resolution advisory for avoidance. Previous research to identify vulnerabilities associated with TCAS’s communication processes discovered that a false injection attack presents the most comprehensive risk to veritable trust in TCAS, allowing for a mid-air collision. This research explores the viability of successfully executing a false injection attack against a target aircraft, triggering a resolution advisory. Monetary constraints precluded …


Enterprise Resource Allocation For Intruder Detection And Interception, Adam B. Haywood Sep 2021

Enterprise Resource Allocation For Intruder Detection And Interception, Adam B. Haywood

Theses and Dissertations

This research considers the problem of an intruder attempting to traverse a defender's territory in which the defender locates and employs disparate sets of resources to lower the probability of a successful intrusion. The research is conducted in the form of three related research components. The first component examines the problem in which the defender subdivides their territory into spatial stages and knows the plan of intrusion. Alternative resource-probability modeling techniques as well as variable bounding techniques are examined to improve the convergence of global solvers for this nonlinear, nonconvex optimization problem. The second component studies a similar problem but …


Synthetic Aperture Radar Image Recognition Of Armored Vehicles, Christopher Szul [*], Torrey J. Wagner, Brent T. Langhals Jun 2021

Synthetic Aperture Radar Image Recognition Of Armored Vehicles, Christopher Szul [*], Torrey J. Wagner, Brent T. Langhals

Faculty Publications

Synthetic Aperture Radar (SAR) imagery is not affected by weather and allows for day-and-night observations, however it can be difficult to interpret. This work applies classical and neural network machine learning techniques to perform image classification of SAR imagery. The Moving and Stationary Target Acquisition and Recognition dataset from the Air Force Research Laboratory was used, which contained 2,987 total observations of the BMP-2, BTR-70, and T-72 vehicles. Using a 75%/25% train/test split, the classical model achieved an average multi-class image recognition accuracy of 70%, while a convolutional neural network was able to achieve a 97% accuracy with lower model …


Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson Mar 2021

Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson

Theses and Dissertations

The goal of this thesis is to evaluate a new indoor navigation technique by incorporating floor plans along with monocular camera images into a CNN as a potential means for identifying camera position. Building floor plans are widely available and provide potential information for localizing within the building. This work sets out to determine if a CNN can learn the architectural features of a floor plan and use that information to determine a location. In this work, a simulated indoor data set is created and used to train two CNNs. A classification CNN, which breaks up the floor plan into …


Infiniband Network Monitoring: Challenges And Possibilities, Kyle D. Hintze Mar 2021

Infiniband Network Monitoring: Challenges And Possibilities, Kyle D. Hintze

Theses and Dissertations

Within the realm of High Performance Computing, the InfiniBand Architecture is among the leading interconnects used today. Capable of providing high bandwidth and low latency, InfiniBand is finding applications outside the High Performance Computing domain. One of these is critical infrastructure, encompassing almost all essential sectors as the work force becomes more connected. InfiniBand is not immune to security risks, as prior research has shown that common traffic analyzing tools cannot effectively monitor InfiniBand traffic transmitted between hosts, due to the kernel bypass nature of the IBA in conjunction with Remote Direct Memory Access operations. If Remote Direct Memory Access …


A Framework For Autonomous Cooperative Optimal Assignment And Control Of Satellite Formations, Devin E. Saunders Mar 2021

A Framework For Autonomous Cooperative Optimal Assignment And Control Of Satellite Formations, Devin E. Saunders

Theses and Dissertations

A decentralized, cooperative multi-agent optimal control framework is presented to offer a solution to the assignment and control problems associated with performing multi-agent tasks in a proximity operations environment. However, the framework developed may be applied to a variety domains such as air, space, and sea. The solution presented takes advantage of a second price auction assignment algorithm to optimally task each satellite, while model predictive control is implemented to control the agents optimally while adhering to safety and mission constraints. The solution is compared to a pseudospectral collocation method, and a study on tuning parameters is included.


Display Design To Avoid And Mitigate Limit Cycle Oscillations (Lco) On The F-16c, David J. Feibus Mar 2021

Display Design To Avoid And Mitigate Limit Cycle Oscillations (Lco) On The F-16c, David J. Feibus

Theses and Dissertations

The U.S. Air Force F-16 Fighting Falcons flying characteristics and flight envelope are dynamic and defined by its external weapon stores configuration. The employment of its munitions at certain speeds can put the F-16 into a flutter-like state in which Limit Cycle Oscillations (LCO) are induced. In LCO, a pilots fine motor control might be hindered, and the aircraft may lose combat effectiveness until flight conditions are reduced. The current research attempted to provide pilots with a predictive feedback display to avoid an LCO-susceptible configuration by increasing their situation awareness about the consequences of employing certain munitions to their flight …


Automated Network Exploitation Utilizing Bayesian Decision Networks, Graeme M. Roberts Mar 2021

Automated Network Exploitation Utilizing Bayesian Decision Networks, Graeme M. Roberts

Theses and Dissertations

Computer Network Exploitation (CNE) is the process of using tactics and techniques to penetrate computer systems and networks in order to achieve desired effects. It is currently a manual process requiring significant experience and time that are in limited supply. This thesis presents the Automated Network Discovery and Exploitation System (ANDES) which demonstrates that it is feasible to automate the CNE process. The uniqueness of ANDES is the use of Bayesian decision networks to represent the CNE domain and subject matter expert knowledge. ANDES conducts multiple execution cycles, which build upon previous action results. Cycles begin by modeling the current …


Exploring Fog Of War Concepts In Wargame Scenarios, Dillon N. Tryhorn Mar 2021

Exploring Fog Of War Concepts In Wargame Scenarios, Dillon N. Tryhorn

Theses and Dissertations

This thesis explores fog of war concepts through three submitted journal articles. The Department of Defense and U.S. Air Force are attempting to analyze war scenarios to aid the decision-making process; fog modeling improves realism in these wargame scenarios. The first article "Navigating an Enemy Contested Area with a Parallel Search Algorithm" [1] investigates a parallel algorithm's speedup, compared to the sequential implementation, with varying map configurations in a tile-based wargame. The parallel speedup tends to exceed 50 but in certain situations. The sequential algorithm outperforms it depending on the configuration of enemy location and amount on the map. The …


Laser Illuminated Imaging: Beam And Scene Deconvolution Algorithm, Benjamin W. Davis Mar 2021

Laser Illuminated Imaging: Beam And Scene Deconvolution Algorithm, Benjamin W. Davis

Theses and Dissertations

Laser illuminated imaging systems deal with several physical challenges that must be overcome to achieve high-resolution images of the target. Noise sources like background noise, photon counting noise, and laser speckle noise will all greatly affect the imaging systems ability to produce a high-resolution image. An even bigger challenge to laser illuminated imaging systems is atmospheric turbulence and the effect that it will have on the imaging system. The illuminating beam will experience tilt, causing the beam to wander off the center of the target during propagation. The light returning to the detector will similarly be affected by turbulence, and …


Delayed Authentication System For Civilian Satellite, Sean M. Feschak Mar 2021

Delayed Authentication System For Civilian Satellite, Sean M. Feschak

Theses and Dissertations

This thesis presents the feasibility of a Delayed Authentication System (DAS) for civilian satellite navigation (satnav) receivers. In satnav systems, encrypted signal components are transmitted synchronously with civilian components. Hence, the civilian signals can be authenticated by detecting the presence of encrypted signal components within the received signal. To authenticate, a reference station transmits estimated encrypted signal spreading code symbols processed using a high gain antenna. In this thesis, it is shown that a 1-meter diameter dish antenna is adequate to provide a high probability of successful authentication, thereby reducing overall system complexity and cost.


Low-Cost Terrestrial Demonstration Of Autonomous Satellite Proximity Operations, Zackary R. Hewitt Mar 2021

Low-Cost Terrestrial Demonstration Of Autonomous Satellite Proximity Operations, Zackary R. Hewitt

Theses and Dissertations

The lack of satellite servicing capabilities significantly impacts the development and operation of current orbital assets. With autonomous solutions under consideration for servicing, the purpose of this research is to build and validate a low-cost hardware platform to expedite the development of autonomous satellite proximity operations. This research aims to bridge the gap between simulation and existing higher fidelity hardware testing with an affordable alternative. An omnidirectional variant of the commercially available TurtleBot3 mobile robot is presented as a 3-DOF testbed that demonstrates a satellite servicing inspection scenario. Reference trajectories for the scenario are generated via optimal control using the …


Enumerating And Locating Bluetooth Devices For Casualty Recovery In A First-Responder Environment, Justin M. Durham Mar 2021

Enumerating And Locating Bluetooth Devices For Casualty Recovery In A First-Responder Environment, Justin M. Durham

Theses and Dissertations

It is difficult for first-responders to quickly locate casualties in an emergency environment such as an explosion or natural disaster. In order to provide another tool to locate individuals, this research attempts to identify and estimate the location of devices that would likely be located on or with a person. A variety of devices, such as phones, smartwatches, and Bluetooth-enabled locks, are tested in multiple environments and at various heights to determine the impact that placement and interference played in locating the devices. The hypothesis is that most Bluetooth devices can be successfully enumerated quickly, but cannot be accurately located …


Stereo Camera Calibrations With Optical Flow, Joshua D. Larson Mar 2021

Stereo Camera Calibrations With Optical Flow, Joshua D. Larson

Theses and Dissertations

Remotely Piloted Aircraft (RPA) are currently unable to refuel mid-air due to the large communication delays between their operators and the aircraft. AAR seeks to address this problem by reducing the communication delay to a fast line-of-sight signal between the tanker and the RPA. Current proposals for AAR utilize stereo cameras to estimate where the receiving aircraft is relative to the tanker, but require accurate calibrations for accurate location estimates of the receiver. This paper improves the accuracy of this calibration by improving three components of it: increasing the quantity of intrinsic calibration data with CNN preprocessing, improving the quality …


Remote Monitoring Of Memory Data Structures For Malware Detection In A Talos Ii Architecture, Robert A. Willburn Mar 2021

Remote Monitoring Of Memory Data Structures For Malware Detection In A Talos Ii Architecture, Robert A. Willburn

Theses and Dissertations

New forms of malware, namely xC;leless malware and rootkits, pose a threat to traditional anti-malware. In particular, Rootkits have the capacity to obscure the present state of memory from the user space of a target machine. If thishappens, anti-malware running in the user space of an axB;ected machine cannot be trusted to operate properly. To combat this threat, this research proposes the remote monitoring of memory from a second, secure processor runningOpenBMC, serving as a baseboard management controller for a POWER9 processor, which is assumed vulnerable to exploitation. The baseboard management controller includes an application called pdbg, used for debugging …


Aircraft Inspection By Multirotor Uav Using Coverage Path Planning, Patrick H. Silberberg Mar 2021

Aircraft Inspection By Multirotor Uav Using Coverage Path Planning, Patrick H. Silberberg

Theses and Dissertations

All military and commercial aircraft must undergo frequent visual inspections in order to identify damage that could pose a danger to safety of flight. Currently, these inspections are primarily conducted by maintenance personnel. Inspectors must scrutinize the aircraft’s surface to find and document defects such as dents, hail damage, broken fasteners, etc.; this is a time consuming, tedious, and hazardous process. The goal of this work is to develop a visual inspection system which can be used by an Unmanned Aerial Vehicle (UAV), and to test the feasibility of this system on military aircraft. Using an autonomous system in place …


Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long Mar 2021

Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long

Theses and Dissertations

In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses. The smart home infrastructure has drastically grown to include networked refrigerators, lighting systems, speakers, watches, and more. This increase in the use of wireless protocols provides a larger attack surface for cyber actors than ever before. Wireless loT traffic is susceptible for sniffing by an attacker. The attack platform skypie is upgraded to incorporate Bluetooth Low Energy (BLE) beacon collection for pattern-of-life data, as well as device characteristic enumeration and potential characteristic modification. This platform allows an attacker to mount the skypie to …


Comparison Of Conic Ray Tracing For Occlusion Determination On 3d Point Cloud Data, Henry Cho Mar 2021

Comparison Of Conic Ray Tracing For Occlusion Determination On 3d Point Cloud Data, Henry Cho

Theses and Dissertations

The US Air Force has been increasing the use of automation in its weapon systems to include the remotely piloted aircraft (RPA) platforms. The RPA career field has had issues with poor pilot retention due to job stressors. For example, RPA operators spend a lot of time and attention surveilling a suspect on the ground for many hours, so adding automation to this activity could help improve pilot retention. The research problem in this thesis attempted to automate the process of observing a ground target. This thesis presents a method termed conic ray tracing for determining visibility and occlusion of …


A Cyber Threat Taxonomy And A Viability Analysis For False Injections In The Tcas, John W. Hannah Mar 2021

A Cyber Threat Taxonomy And A Viability Analysis For False Injections In The Tcas, John W. Hannah

Theses and Dissertations

This thesis provided background information on the Traffic Collision Avoidance System (TCAS). Additionally, the thesis developed a threat taxonomy for TCAS, resulting in the determination that a false injection attack presents the most comprehensive risk. Moreover, the thesis presents the development of a program to determine what ranges, altitudes, and relative bearings are most vulnerable to a false injection attack. The program includes test for all requirements of a successful false injection. Furthermore, the thesis presents an analysis of results and creates threat maps as situational awareness tools. Lastly, the thesis discusses potential solutions to the false injection attack, covers …


Optimizing A Bank Of Kalman Filters For Navigation Integrity, Luis E. Sepulveda Mar 2021

Optimizing A Bank Of Kalman Filters For Navigation Integrity, Luis E. Sepulveda

Theses and Dissertations

Alternative navigation is an area of research which employs a variety of sensor technologies to provide a navigation solution in Global Navigation Satellite System degraded or denied environments. The Autonomy and Navigation Technology Center at the Air Force Institute of Technology has recently developed the Autonomous and Resilient Management of All-source Sensors (ARMAS) navigation framework which utilizes an array of Kalman Filters to provide a navigation solution resilient to sensor failures. The Kalman Filter array size increases exponentially as system sensors and detectable faults are scaled up, which in turn increases the computational power required to run ARMAS in areal-world …


Agile Software Development: Creating A Cost Of Delay Framework For Air Force Software Factories, J. Goljan, Jonathan D. Ritschel, Scott Drylie, Edward D. White Jan 2021

Agile Software Development: Creating A Cost Of Delay Framework For Air Force Software Factories, J. Goljan, Jonathan D. Ritschel, Scott Drylie, Edward D. White

Faculty Publications

The Air Force software development environment is experiencing a paradigm shift. The 2019 Defense Innovation Board concluded that speed and cycle time must become the most important software metrics if the US military is to maintain its advantage over adversaries.1 This article proposes utilizing a cost-o­f-d­elay (CoD) framework to prioritize projects toward optimizing readiness. Cost-­of-d­elay is defined as the economic impact resulting from a delaying product delivery or, said another way, opportunity cost. In principle, CoD assesses the negative impacts resulting from changes to the priority of a project.