Detection of Fault Data Injection Attack on UAV Using Adaptive Neural Network

被引:75
作者
Abbaspour, Alireza [1 ]
Yen, Kang K. [1 ]
Noei, Shirin [2 ]
Sargolzaei, Arman [3 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33199 USA
[2] Univ Florida, Dept Civil & Coastal Engn, Gainesville, FL USA
[3] Florida Polytech Univ, Dept Elect Engn, Lakeland, FL USA
来源
COMPLEX ADAPTIVE SYSTEMS | 2016年 / 95卷
关键词
Cyber-attack; UAV; Sensors; Attacks and Faults Detection; Fault Data Injection; Adaptive Neural Network; PERFORMANCE; ALGORITHM; POWER;
D O I
10.1016/j.procs.2016.09.312
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A resilient and secure control system should be designed to be as safe and robust as possible in face of different types of attacks such as fault data injection (FDI) attacks; thus, nowadays, the control designers should also consider the probable attacks in their control design from the beginning. For this reason, detection of intentional faults and cyber-attacks attracts a great concern among researchers. This issue plays a great role in the safety of unmanned aerial vehicles (UAVs) due to the need of continuous supervision and control of these systems. In order to have a cyber-attack tolerant (CAT) controller, the attack and the type of attack should be detected in the first step. This paper introduces a new algorithm to detect fault data injection attack in UAV. An adaptive neural network is used to detect the injected faults in sensors of an UAV. An embedded Kalman filter (EKF) is used for online tuning of neural networks weights; these online tuning makes the attack detection faster and more accurate. The simulation results show that the proposed method can successfully detect FDI attacks applied to an UAV. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:193 / 200
页数:8
相关论文
共 29 条
  • [1] Nonlinear optimized adaptive trajectory control of helicopter
    Abaspour A.
    Sadati S.H.
    Sadeghi M.
    [J]. Control Theory and Technology, 2015, 13 (4) : 297 - 310
  • [2] [Anonymous], 13 IR C FUZZ SYST IF
  • [3] Chen M., 2015, ADAPTIVE NEURAL FAUL
  • [4] When Failure Analysis Meets Side-Channel Attacks
    Di-Battista, Jerome
    Courrege, Jean-Christophe
    Rouzeyre, Bruno
    Torres, Lionel
    Perdu, Philippe
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 188 - +
  • [5] Strengthening SIMON Implementation Against Intelligent Fault Attacks
    Dofe, Jaya
    Frey, Jonathan
    Pahlevanzadeh, Hoda
    Yu, Qiaoyan
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2015, 7 (04) : 113 - 116
  • [6] Ghanavati M., 2015, AIAA INFOTECH AEROSP
  • [7] Ghanavati M., 2011, CONTR COMM SIBCON 20
  • [8] Ghanavati M., 2011, P INT SIB C CONTR CO
  • [9] Ghanavati M, 2015, P AMER CONTR CONF, P3670, DOI 10.1109/ACC.2015.7171900
  • [10] Electrothermal performance and environmental effects of optimal photovoltaic-thermal system
    Gholami, H.
    Khalilnejad, A.
    Gharehpetian, G. B.
    [J]. ENERGY CONVERSION AND MANAGEMENT, 2015, 95 : 326 - 333