Cyber Attack Detection and Isolation for a Quadrotor UAV With Modified Sliding Innovation Sequences

被引:23
作者
Xiao, Jiaping [1 ]
Feroskhan, Mir [1 ]
机构
[1] Nanyang Technol Univ, Sch Mech & Aerosp Engn, Singapore 639798, Singapore
关键词
Cyberattack; Detectors; Technological innovation; Real-time systems; Autonomous aerial vehicles; Sensors; Vehicle dynamics; Cyber attack detection and isolation; cyber-physical systems; cybersecurity; unmanned aerial vehicle; DATA-INJECTION ATTACK; PHYSICAL SYSTEMS; SENSOR; COMPENSATION; ACTUATOR; FAULTS;
D O I
10.1109/TVT.2022.3170725
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Common vulnerabilities in typical intelligent cyber-physical systems such as unmanned aerial vehicles (UAVs) can be easily exploited by cyber attackers to cause serious accidents and harm. For successful UAV operations, security against cyber attacks is imperative. In this paper, we propose a modified sliding innovation sequences (MSIS) detector, based on the extended Kalman filter optimal state estimation, for a dynamic quadrotor system to detect cyber attacks inflicted on both its actuators and sensors in real time. These cyber attacks include random attacks, false data injection (FDI) attacks and denial-of-service (DoS) attacks. The MSIS detector computes the operator norm of the normalized innovation (residual) sequence within a sliding time window and triggers the alarm if the value is above the preset threshold. For a quadrotor undergoing rapid turns in a complex trajectory, the detector observes a reduced false alarm rate as compared to other state estimation-based detectors. To address the initial estimation error problem, we implement an iteration procedure to initiate and calibrate the detector. By evaluating the sample covariance of the normalized innovation sequence, the MSIS detector has the capability to isolate cyber attacks. Finally, simulation results of a quadrotor in a periodic, complex trajectory flight are provided to verify the effectiveness of the MSIS detection and isolation method.
引用
收藏
页码:7202 / 7214
页数:13
相关论文
共 46 条
  • [1] A Neural Adaptive Approach for Active Fault-Tolerant Control Design in UAV
    Abbaspour, Alireza
    Yen, Kang K.
    Forouzannezhad, Parisa
    Sargolzaei, Arman
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (09): : 3401 - 3411
  • [2] Detection of Fault Data Injection Attack on UAV Using Adaptive Neural Network
    Abbaspour, Alireza
    Yen, Kang K.
    Noei, Shirin
    Sargolzaei, Arman
    [J]. COMPLEX ADAPTIVE SYSTEMS, 2016, 95 : 193 - 200
  • [3] Ayad A, 2018, INNOV SMART GRID TEC
  • [4] Baheti R., 2011, IMPACT CONTROL TECHN, V12, P161, DOI DOI 10.1145/1795194.1795205
  • [5] Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study
    Dey, Vishal
    Pudi, Vikramkumar
    Chattopadhyay, Anupam
    Elovici, Yuval
    [J]. 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 398 - 403
  • [6] Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT
    Farivar, Faezeh
    Haghighi, Mohammad Sayad
    Jolfaei, Alireza
    Alazab, Mamoun
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (04) : 2716 - 2725
  • [7] Detection and Isolation of Replay Attacks through Sensor Watermarking
    Ferrari, Riccardo M. G.
    Teixeira, Andre M. H.
    [J]. IFAC PAPERSONLINE, 2017, 50 (01): : 7363 - 7368
  • [8] Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges
    Fotouhi, Azade
    Qiang, Haoran
    Ding, Ming
    Hassan, Mahbub
    Giordano, Lorenzo Galati
    Garcia-Rodriguez, Adrian
    Yuan, Jinhong
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3417 - 3442
  • [9] Giray SM, 2013, PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SPACE TECHNOLOGIES (RAST 2013), P795, DOI 10.1109/RAST.2013.6581320
  • [10] Gregory M. A., 2013, SECURITY NETWORKED S, P51