Defending UAV Networks Against Covert Attacks Using Auxiliary Signal Injections

被引:1
作者
Wang, Xianghua [1 ]
Tan, Chee Pin [2 ]
Wang, Youqing [3 ]
Wang, Xiangrong [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Intelligent Engn & Automat, Beijing 100876, Peoples R China
[2] Monash Univ Malaysia, Sch Engn, Bandar Sunway 47500, Selangor, Malaysia
[3] Beijing Univ Chem Technol, Coll Informat Sci & Technol, Beijing 100029, Peoples R China
[4] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
UAV; secure control; attack detection; network security; robust estimation; SYSTEMS;
D O I
10.1109/TASE.2024.3489609
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicle (UAV) networks, which carry vital information, are prone to various attacks, and hence security issues are a major concern. In this paper, we design and implement a novel covert attack detection and secure control scheme, which operates between the UAV (the physical layer) and ground control station (GCS) (the cyber layer). Covert attacks can alter the UAV states, and yet cause the signals seen by the controller to appear unchanged, resulting in these attacks being more difficult to detect, and hence more dangerous compared to other types of attacks. To unmask the covert attacks, we construct and inject auxiliary signals to both the controller output and the UAV input. The auxiliary signals cause information of the attack to appear in the controller input, which is then fed to a detection observer to detect the attack. Next, we propose an integrated estimation and secure control scheme, comprising a reconstruction observer (which is a sliding mode observer (SMO)) that estimates the system states and attack signal, and an output-feedback controller that utilizes the estimated signals. We perform a series of transformations to the system, such that the design parameters of both reconstruction observer and secure controller are placed in a framework that is solvable using Linear Matrix Inequalities (LMIs). We also prove that the proposed integrated secure controller causes the output tracking errors to satisfy an H(infinity )performance index. We also rigorously analyze the system performance, and present the necessary conditions for the scheme to be feasible. Finally, simulations are conducted to verify the effectiveness of the proposed scheme.
引用
收藏
页码:8805 / 8817
页数:13
相关论文
共 33 条
[1]   Switching model predictive attitude control for a quadrotor helicopter subject to atmospheric disturbances [J].
Alexis, Kostas ;
Nikolakopoulos, George ;
Tzes, Anthony .
CONTROL ENGINEERING PRACTICE, 2011, 19 (10) :1195-1207
[2]  
Barboni A, 2020, IEEE DECIS CONTR P, P5731, DOI 10.1109/CDC42340.2020.9304112
[3]   Detection and Mitigation of Position Spoofing Attacks on Cooperative UAV Swarm Formations [J].
Bi, Siguo ;
Li, Kai ;
Hu, Shuyan ;
Ni, Wei ;
Wang, Cong ;
Wang, Xin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :1883-1895
[4]  
Boyd S., 1994, SIAM FRONTIER SERIES
[5]   Adjustable proportional-integral multivariable observer-based FDI attack dynamic reconstitution and secure control for cyber-physical systems [J].
Dong, Lewei ;
Xu, Huiling ;
Zhang, Liming ;
Li, Zhengcai ;
Chen, Yuqing .
APPLIED MATHEMATICS AND COMPUTATION, 2023, 443
[6]  
Fauser M, 2021, P AMER CONTR CONF, P4631, DOI 10.23919/ACC50511.2021.9483061
[7]   Detection, estimation, and compensation of false data injection attack for UAVs [J].
Gu, Yapei ;
Yu, Xiang ;
Guo, Kexin ;
Qiao, Jianzhong ;
Guo, Lei .
INFORMATION SCIENCES, 2021, 546 :723-741
[8]   Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles [J].
Hassler, Samuel Chase ;
Mughal, Umair Ahmad ;
Ismail, Muhammad .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (06) :6106-6117
[9]  
Hoehn A, 2016, P AMER CONTR CONF, P290, DOI 10.1109/ACC.2016.7524930
[10]  
Hoehn A, 2016, P AMER CONTR CONF, P302, DOI 10.1109/ACC.2016.7524932