Acquisition and Processing of UAV Fault Data Based on Time Line Modeling Method

被引:8
作者
Yang, Tao [1 ]
Lu, Yu [2 ]
Deng, Hongli [1 ]
Chen, Jiangchuan [2 ]
Tang, Xiaomei [3 ]
机构
[1] China West Normal Univ, Educ & Informat Technol Ctr, Nanchong 637001, Peoples R China
[2] China West Normal Univ, Sch Comp Sci, Nanchong 637001, Peoples R China
[3] Nanchong Inst Educ Sci, Nanchong 637000, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 07期
关键词
UAV; UAV anomaly detection; data balance; SITL;
D O I
10.3390/app13074301
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The number of Unmanned Aerial Vehicles (UAVs) used in various industries has increased exponentially, and abnormal detection of UAVs is one of the primary technical means to ensure that UAVs can work normally. Currently, most anomaly detection models are trained using on-board logs from drones. However, in some cases, using these logs can be problematic due to data encryption, inconsistent descriptions of characteristics, and imbalanced positive and negative samples. Consequently, the on-board logs of UAVs may not be directly usable for training anomaly detection models. Given the above problems, this paper proposes a Time Line Modeling (TLM) method based on the UAV software-in-the-loop (SITL) simulation environment to obtain and process the on-board failure logs of drones. The Time Line Modeling method includes two stages: the Fault Time Point Anchoring Method and Fault Time Window Stretching Method. First, based on the SITL simulation environment, multiple flight missions were constructed. Failures of several common components of UAVs are designed. Secondly, the fault's initial location and end location are determined by the method of Fault Time Point Anchoring, and the original collection of tagged UAV's on-board data is realized. Then, in terms of data processing, the features that are not universal are removed, and the flight data of the UAV is optimized by using the data balance method of Time Window Stretching to achieve the balance of normal data and abnormal data. Finally, use of algorithms such as Sequential Minimal Optimization (SMO), Random Forest (RF), and Convolutional Neural Network (CNN) were used to experiment with the processed data. The experimental results showed that the data set obtained based on this method can be effectively applied to the training of machine learning-based anomaly detection models.
引用
收藏
页数:26
相关论文
共 21 条
[1]   High-performance intrusion detection system for networked UAVs via deep learning [J].
Abu Al-Haija, Qasem ;
Al Badawi, Ahmad .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (13) :10885-10900
[2]   ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things [J].
Ahmed, Mohiuddin ;
Cox, David ;
Simpson, Benjamin ;
Aloufi, Aseel .
APPLIED SCIENCES-BASEL, 2022, 12 (04)
[3]   ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things [J].
Ahmed, Mohiuddin ;
Byreddy, Surender ;
Nutakki, Anush ;
Sikos, Leslie F. ;
Haskell-Dowland, Paul .
AD HOC NETWORKS, 2021, 122
[4]  
Air Accidents Investigation Branch Reports, AIR ACC INV BRANCH R
[5]  
Basan E., 2022, CEUR WORKSHOP PROC, V3094, P6
[6]  
Baskaya E, 2017, IEEEAAIA DIGIT AVION
[7]  
Benini A, 2019, 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), P3990, DOI [10.23919/ECC.2019.8796198, 10.23919/ecc.2019.8796198]
[8]   Failure Detection in Quadcopter UAVs Using K-Means Clustering [J].
Cabahug, James ;
Eslamiat, Hossein .
SENSORS, 2022, 22 (16)
[9]  
Development Planning Department of Civil Aviation Administration of China, 2022, STAT B CHIN CIV AV I
[10]  
Farrukh Y. A., 2021, arXiv