Fast Reactive Mechanism for Desired Trajectory Attacks on Unmanned Aerial Vehicles

被引:9
作者
Gu, Yapei [1 ]
Guo, Kexin [2 ,3 ]
Zhao, Chenlong [4 ]
Yu, Xiang [3 ,4 ]
Guo, Lei [3 ,4 ]
机构
[1] Beijing Inst Aerosp Control Devices, Beijing 100048, Peoples R China
[2] Beihang Univ, Sch Aeronaut Sci & Engn, Beijing 100191, Peoples R China
[3] Beihang Univ, Hangzhou Innovat Inst, Key Lab Intelligent Sensing Mat & Chip Integrat Te, Hangzhou 310051, Peoples R China
[4] Beihang Univ, Sch Automat Sci & Elect Engn, Beijing 100191, Peoples R China
关键词
Desired trajectory attacks; fixed-time sliding mode attack observer (FTSMAO); fixed-time unknown input observer (FTUIO); safety control; unmanned aerial vehicles (UAVs); DATA INJECTION ATTACK; DISTURBANCE ATTENUATION; INTRUSION DETECTION; SYSTEMS; STATE;
D O I
10.1109/TII.2022.3224980
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware, exposed on the ground control station, can tamper with the unmanned aerial vehicles (UAVs) interaction information. It makes UAVs vulnerable to the desired trajectory attacks, which deteriorates the flight safety if no timely action is taken. Therefore, this article focus on fast reactive mechanism for desired trajectory attacks on UAVs. A fixed-time detection scheme is proposed based on fixed-time unknown inputs observer and trajectory tracking errors. Subsequently, a fixed-time sliding mode attack observer is developed to compensate the effect caused by attacks. Meanwhile, the estimation errors of attacks can be stabilized within fixed time. Finally, experiment tests are presented to demonstrate the effectiveness of the proposed methods.
引用
收藏
页码:8976 / 8984
页数:9
相关论文
共 36 条
[1]   Detection of Fault Data Injection Attack on UAV Using Adaptive Neural Network [J].
Abbaspour, Alireza ;
Yen, Kang K. ;
Noei, Shirin ;
Sargolzaei, Arman .
COMPLEX ADAPTIVE SYSTEMS, 2016, 95 :193-200
[2]   Mitigating Attacks With Nonlinear Dynamics on Actuators in Cyber-Physical Mechatronic Systems [J].
Al Janaideh, Mohammad ;
Hammad, Eman ;
Farraj, Abdallah ;
Kundur, Deepa .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) :4845-4856
[3]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy, Riham ;
Youssef, Amr M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[4]   An Intrusion Detection Method for Line Current Differential Relays [J].
Ameli, Amir ;
Hooshyar, Ali ;
El-Saadany, Ehab F. ;
Youssef, Amr M. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :329-344
[5]   Adaptive cyber-physical system attack detection and reconstruction with application to power systems [J].
Ao, Wei ;
Song, Yongdong ;
Wen, Changyun .
IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12) :1458-1468
[6]   Robust vision-based tracking control of VTOL unmanned aerial vehicles [J].
Asl, Hamed Jabbari .
AUTOMATICA, 2019, 107 :425-432
[7]   GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network [J].
Chen, Miaojiang ;
Liu, Wei ;
Zhang, Ning ;
Li, Junling ;
Ren, Yingying ;
Yi, Meng ;
Liu, Anfeng .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 210
[8]   A game-based deep reinforcement learning approach for energy-efficient computation in MEC systems [J].
Chen, Miaojiang ;
Liu, Wei ;
Wang, Tian ;
Zhang, Shaobo ;
Liu, Anfeng .
KNOWLEDGE-BASED SYSTEMS, 2022, 235
[9]   Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes [J].
Corradini, Maria Letizia ;
Cristofaro, Andrea .
IET CONTROL THEORY AND APPLICATIONS, 2017, 11 (11) :1756-1766
[10]   Velocity-Tracking Control Based on Refined Disturbance Observer for Gimbal Servo System With Multiple Disturbances [J].
Cui, Yangyang ;
Qiao, Jianzhong ;
Zhu, Yukai ;
Yu, Xiang ;
Guo, Lei .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2022, 69 (10) :10311-10321