Secure Estimation for Unmanned Aerial Vehicles against Adversarial Attacks

نویسندگان

  • Qie Hu
  • Young Hwan Chang
  • Claire J. Tomlin
چکیده

On February 15, 2015, the Federal Aviation Administration proposed to allow routine use of certain small, non-recreational Unmanned Aerial Vehicles (UAVs) in today’s aviation system [1]. Thus in the near future, we may see UAVs such as Amazon Prime Air [2] and Google Project Wing vehicles [3] sharing the airspace. In order to manage this UAV traffic, we may imagine a scenario in which each UAV periodically sends measurements such as its position and velocity wirelessly to a remote control center, which then estimates the vehicle’s trajectory, for collision avoidance for example. The communications link between the UAV and the control center could be subject to Man-In-The-Middle (MITM) attacks in which a malicious agent spoofs the information being sent and/or received (Channel 1 in Figure 1) [4]. Similar attack scenarios could arise in UAV formation: for formation control, individual UAVs receive information from other UAVs wirelessly in order to estimate other vehicles’ positions (Channel 2 in Figure 1). Maintaining security of UAVs under such cyber attacks is an important and challenging task, since these attacks can be erratic and thus difficult to model. Secure estimation problems study how to estimate the true system states when measurements are corrupted and/or control inputs are compromised by attackers. We focus on secure estimation and control of systems under sensor attack, because this type of attack is relatively easy to perform and thus particularly interesting. Take UAVs for example: actuators are installed onboard with hardwired local feedback loops, which are unlikely to be corrupted by adversarial attacks. Communications with external sources, on the other hand, are much more vulnerable. This includes GPS position measurements and communications between a UAV and a remote control center for UAV traffic management. We do not assume the attack signal to follow any model, in addition, the set of attacked measurements/nodes is allowed to change from time to time. We propose a computationally efficient secure estimator for this problem, and prove the maximum number of attacked nodes that can be corrected by the estimator. Our results show that sensor fusion can be used to increase the number of correctable attacked nodes as well as improving estimation accuracy. Focusing on linear state and measurement feedback, we show that the feedback controller can be designed to achieve a desired trade-off between control and secure estimation performance. Finally, we propose to combine the secure estimator with a Kalman Filter (KF) to improve its practical performance, and demonstrate its effectiveness using two examples of UAVs under adversarial

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Cyber Attacks

In the coming years, usage of Unmanned Aerial Vehicles (UAVs) is expected to grow tremendously. Maintaining security of UAVs under cyber attacks is an important yet challenging task, as these attacks are often erratic and difficult to predict. Secure estimation problems study how to estimate the states of a dynamical system from a set of noisy and maliciously corrupted sensor measurements. The ...

متن کامل

Secure Estimation based Kalman Filter for Cyber-Physical Systems against Adversarial Attacks

Cyber-physical systems (CPSs) are found in many applications such as power networks, manufacturing processes, and air and ground transportation systems. Maintaining security of these systems under cyber attacks is an important and challenging task, since these attacks can be erratic and thus difficult to model. Secure estimation problems study how to estimate the true system states when measure...

متن کامل

Cyber-Physical Attacks on UAS Networks- Challenges and Open Research Problems

Assignment of critical missions to unmanned aerial vehicles (UAV) is bound to widen the grounds for adversarial intentions in the cyber domain, potentially ranging from disruption of command and control links to capture and use of airborne nodes for kinetic attacks. Ensuring the security of electronic and communications in multi-UAV systems is of paramount importance for their safe and reliable...

متن کامل

A Simulation Testbed for Unmanned Aerial Vehicle Network Cyber Attack Analysis

Advances in technology for miniature electronic military equipment and systems have led to the emergence of unmanned aerial vehicles (UAVs) as the new weapons of war and tools used in various other areas. UAVs can easily be controlled from a remote location. They are being used for critical operations, including offensive, reconnaissance, surveillance and other civilian missions. The need to se...

متن کامل

On Visual Real Time Mapping for Unmanned Aerial Vehicles

This paper addresses the challenge of a real-time capable vision system in the task of trajectory and surface reconstruction by aerial image sequences. The goal is to present the design, methods and strategies of a real-time capable vision system solving the mapping task for secure navigation of small UAVs with a single camera. This includes the estimation process, map representation, initializ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016