Detection, estimation, and compensation of false data injection attack for UAVs

被引:58
作者
Gu, Yapei [1 ]
Yu, Xiang [1 ,2 ]
Guo, Kexin [1 ]
Qiao, Jianzhong [1 ,2 ]
Guo, Lei [1 ,2 ]
机构
[1] Beihang Univ, Sch Automat Sci & Elect Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Big Data Based Precis Med, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicle; False data injection attack; Attack modeling; Attack detection; Attack estimation;
D O I
10.1016/j.ins.2020.08.055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The safety issues of unmanned aerial vehicles (UAVs) are ever increasing in focus due to the vulnerability to attack. This paper investigates the safety problem for UAVs under the false data injection attack (FDIA) through wireless data link. First, the attack characteristics and influencing factors of FDIA are explicitly analyzed. Thus, the models of FDIA can be established. Second, attack detection mechanism is proposed. The average power of received signals and the residual of the authentication signals are utilized to detect whether the system is attacked. Third, to compensate the effect of FDIA on the control system, the FDIA impact on UAV dynamics is formulated and attack observers are developed accordingly. Finally, simulation examples are presented to illustrate the effectiveness of the proposed methods. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:723 / 741
页数:19
相关论文
共 50 条
[1]  
[Anonymous], 2014, 2014 WIR TEL S
[2]  
[Anonymous], 2011, P 6 ACM S INFORM COM
[3]   Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries [J].
Ao, Wei ;
Song, Yongdong ;
Wen, Changyun ;
Lai, Junfeng .
INFORMATION SCIENCES, 2018, 451 :67-82
[4]   Adaptive cyber-physical system attack detection and reconstruction with application to power systems [J].
Ao, Wei ;
Song, Yongdong ;
Wen, Changyun .
IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12) :1458-1468
[5]   Robust vision-based tracking control of VTOL unmanned aerial vehicles [J].
Asl, Hamed Jabbari .
AUTOMATICA, 2019, 107 :425-432
[6]   Disturbance-Observer-Based Control and Related Methods-An Overview [J].
Chen, Wen-Hua ;
Yang, Jun ;
Guo, Lei ;
Li, Shihua .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (02) :1083-1095
[7]   Nonlinear disturbance observer-enhanced dynamic inversion control of missiles [J].
Chen, WH .
JOURNAL OF GUIDANCE CONTROL AND DYNAMICS, 2003, 26 (01) :161-166
[8]   A review of cyber security risk assessment methods for SCADA systems [J].
Cherdantseva, Yulia ;
Burnap, Pete ;
Blyth, Andrew ;
Eden, Peter ;
Jones, Kevin ;
Soulsby, Hugh ;
Stoddart, Kristan .
COMPUTERS & SECURITY, 2016, 56 :1-27
[9]   A Survey of Man In The Middle Attacks [J].
Conti, Mauro ;
Dragoni, Nicola ;
Lesyk, Viktor .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :2027-2051
[10]   Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes [J].
Corradini, Maria Letizia ;
Cristofaro, Andrea .
IET CONTROL THEORY AND APPLICATIONS, 2017, 11 (11) :1756-1766