• Title/Summary/Keyword: vehicle attack

Search Result 159, Processing Time 0.021 seconds

Modeling and coupling characteristics for an airframe-propulsion-integrated hypersonic vehicle

  • Lv, Chengkun;Chang, Juntao;Dong, Yilei;Ma, Jicheng;Xu, Cheng
    • Advances in aircraft and spacecraft science
    • /
    • v.7 no.6
    • /
    • pp.553-570
    • /
    • 2020
  • To address the problems caused by the strong coupling of an airbreathing hypersonic vehicle's airframe and propulsion to the integrated control system design, an integrated airframe-propulsion model is established, and the coupling characteristics between the aircraft and engine are analyzed. First, the airframe-propulsion integration model is established based on the typical nonlinear longitudinal dynamical model of an air-breathing hypersonic vehicle and the one-dimensional dual-mode scramjet model. Thrust, moment, angle of attack, altitude, and velocity are used as transfer variables between the aircraft model and the engine model. The one-dimensional scramjet model can accurately reflect the working state of the engine and provide data to support the coupling analysis. Second, owing to the static instability of the aircraft model, the linear quadratic regulator (LQR) controller of the aircraft is designed to ensure attitude stability and height tracking. Finally, the coupling relationship between the aircraft and the engine is revealed through simulation examples. The interaction between vehicle attitude and engine working condition is analyzed, and the influence of vehicle attitude on engine safety is considered. When the engine is in a critical working state, the attitude change of the aircraft will not affect the engine safety without considering coupling, whereas when coupling is considered, the attitude change of the aircraft may cause the engine unstart, which demonstrates the significance of considering coupling characteristics.

Simulation of Conceptual Designs of a Three-Surface Stealth Strike Fighter

  • Kuizhi, Yue;ShiChun, Chen;Wenlin, Liu;Dazhao, Yu
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.15 no.4
    • /
    • pp.366-373
    • /
    • 2014
  • A conceptual design of a three-surface strike fighter was studied and stealth performance was taken into account to enhance survivability and battle effectiveness. CATIA was used to design the aircraft's three-dimensional prototype model and the weapon carriage arrangement was also studied. The aircraft's RCS characteristics and distributions under X, S, C, and L bands were simulated using the RCSPlus software, which is based on the PO method. Pressure and velocity distributions of the flow field were also simulated using CFD. A turbulence model was based on standard $k-{\varepsilon}$ function and N-S functions were used during the CFD computation. Lift coefficients, drag coefficients, and lift-to-drag ratio were obtained by aerodynamic simulation. The results showed that: (1) the average value of head-on RCS between ${\pm}30^{\circ}$ is below -3.197 dBsm, and (2) the lift coefficient is 0.34674, the drag coefficient is 0.04275, and the lift-to-drag ratio is 8.11087 when the attack angle is $2.5^{\circ}$.

Study on hydrodynamic performance of Heavier-than-water AUV with overlapping grid method

  • Li, Xiang;Zhao, Min;Zhao, Faming;Yuan, Qingqing;Ge, Tong
    • Ocean Systems Engineering
    • /
    • v.4 no.1
    • /
    • pp.1-19
    • /
    • 2014
  • Hydrodynamic coefficients strongly affect the dynamic performance of autonomous underwater vehicles (AUVs). A novel kind of underwater vehicle (Heavier-than-water AUV) with higher density than water is presented, which is different from conventional ones. RANS method and overlapping grids are used to simulate the flow field around the vehicle. Lifts, drags and moments of different attack and drift angles in steady state are calculated. The hydrodynamic performances and how the forces change with the attitude are analyzed according to the flow field structure. The steady-state results using overlapping grid method are compared with those of software FLUENT and wind tunnel tests. The calculation results show that the overlapping grid method can well simulate the viscous flow field around the underwater vehicle. Overlapping grid skills have also been used to figure out the planar-motion-mechanism (PMM) problem of Heavier-than-water AUV and forecast its hydrodynamic performance, verifying its effectiveness in dealing with the dynamic problems, which would be quite helpful for design and control of Heavier-than-water AUV and other underwater vehicles.

A Flow Characteristics for a Separation Behavior of Two-body Vehicle (비행 조건에 따른 비행체 단분리의 주위 유동장 해석)

  • Park, Geunhong;Kim, Kiun
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2017.05a
    • /
    • pp.266-267
    • /
    • 2017
  • A numerical investigation of the stage separation behavior of two-body vehicle focusing on its flow characteristics were carried out. For this simulation, separation of a booster from vehicle was modeled by a chimera grid system and calculated by using commercial code, CFD-FASTRAN$^{TM}$. Consideration of a spring force, gravity and relative acceleration of a booster was the essential factor that simulates the realistic situation. In this study, It was validated that the booster separation time decreases with increase in flight mach number and angle of attack. In view of the results so far achieved, it was expected that the dynamics modeling and boundary condition set up applied in this study will be helpful in a estimation of a safe stage separation and event sequence of flight test.

  • PDF

A Path Planning to Maximize Survivability for Unmanned Aerial Vehicle by using $A^*PS$-PGA ($A^*PS$-PGA를 이용한 무인 항공기 생존성 극대화 경로계획)

  • Kim, Ki-Tae;Jeon, Geon-Wook
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.3
    • /
    • pp.24-34
    • /
    • 2011
  • An Unmanned Aerial Vehicle (UAV) is a powered pilotless aircraft, which is controlled remotely or autonomously. UAVs are an attractive alternative for many scientific and military organizations. UAVs can perform operations that are considered to be risky or uninhabitable for human. UA V s are currently employed in many military missions such as reconnaissance, surveillance, enemy radar jamming, decoying, suppression of enemy air defense (SEAD), fixed and moving target attack, and air-to-air combat. UAVs also are employed in a number of civilian applications such as monitoring ozone depletion, inclement weather, traffic congestion, and taking images of dangerous territory. For accomplishing the UAV's missions, guarantee of survivability should be preceded. The main objective of this study is to suggest a mathematical programming model and a $A^*PS$-PGA (A-star with Post Smoothing-Parallel Genetic Algorithm) for an UAV's path planning to maximize survivability. A mathematical programming model is composed by using MRPP (Most Reliable Path Problem) and TSP (Traveling Salesman Problem). A path planning algorithm for UAV is applied by transforming MRPP into SPP (Shortest Path Problem).

A Study of Numerical Analysis for Stage Separation Behavior of Two-body Vehicle (비행체 단분리 거동 예측에 대한 수치 연구)

  • Park, Geunhong
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.22 no.4
    • /
    • pp.91-98
    • /
    • 2018
  • A numerical investigation of stage separation behavior of a two-body vehicle focusing on its flow characteristics is carried out. For this simulation, the separation of a booster from a vehicle is modeled using a chimera grid system and calculated with commercial code, $CFD-FASTRAN^{TM}$. Consideration of spring force, gravity and relative acceleration of a booster is the essential factor of a realistic simulation. In this study, it is validated that the booster separation time decreases with an increase in flight Mach number and angle of attack. In view of results thus far achieved, it is expected that the dynamics modeling and boundary condition set-up applied in this study will be useful for estimating safe stage separation and event sequencing of flight tests.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.

An Experimental Study on Aircraft Internal Store Separation Characteristics (항공기 내부무장 분리특성 분석을 위한 풍동시험연구)

  • An, Eunhye;Cho, Donghyun;Kim, Jongbum;Jang, Youngil;Jeong, KyeongJin;Kim, Sangjin;Lee, Hokeun;Reu, Taekyu;Chung, Hyoungseog
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.1
    • /
    • pp.81-89
    • /
    • 2017
  • This study investigates store separation characteristics of an unmanned aerial vehicle having generic stealth configuration over unsteady flow of an internal bay. Free-drop wind tunnel tests are conducted to simulate bomb releases from an internal weapons bay while high-speed camera images are taken. The images are analyzed to examine the effects of flow velocity, angle of attack, flap deflection and the ejector force application on the store separation trajectories. For the free-drop wind tunnel tests, Froude Scaling is applied to match the dynamic similarity for the bomb model, and the ejector force is simulated by using small pneumatic cylinders. The results indicate that the test bomb model safely separates from the internal bay at the given test conditions and configurations. It is also observed that the effects of the flow velocity and ejector force application have greater impacts on the separation trajectories than those of angle of attack and flap deflection.

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.