Combating the Control Signal Spoofing Attack in UAV Systems

被引:52
作者
Huang, Ke-Wen [1 ,2 ]
Wang, Hui-Ming [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Shaanxi, Peoples R China
[2] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian 710049, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical layer authentication; spoofing attack; UAV system; generalized likelihood radio; false alarm rate; PHYSICAL LAYER AUTHENTICATION;
D O I
10.1109/TVT.2018.2830345
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned aerial vehicle (UAV) system is vulnerable to the control signal spoofing attack due to the openness of the wireless communications. In this correspondence, a physical layer approach is proposed to combat the control signal spoofing attack, i.e., to determine whether the received control signal packet is from the ground control station or a potential malicious attacker (MA), which does not need to share any secret key. We consider the worst case where the UAV does not have any prior knowledge about the MA. Utilizing the channel feature of the angles of arrival, the distance-based path loss, and the Rician-kappa factor, we construct a generalized log-likelihood radio test framework to handle the problem. Accurate approximations of the false alarm and successful detection rate are provided to efficiently evaluate the performance.
引用
收藏
页码:7769 / 7773
页数:5
相关论文
共 12 条
  • [11] Zeng Y, 2016, IEEE COMMUN MAG, V54, P36, DOI 10.1109/MCOM.2016.7470933
  • [12] Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming
    Zhang, Haijun
    Xing, Hong
    Cheng, Julian
    Nallanathan, Arumugam
    Leung, Victor C. M.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (05) : 1714 - 1725