Observer based attack detection and security control for UAVs against attacks on desired trajectory

被引:1
|
作者
Pan, Kunpeng [1 ,2 ,3 ]
Yang, Feisheng [1 ,2 ,3 ]
Lyu, Yang [1 ,2 ]
Tan, Zheng [1 ,2 ]
Pan, Quan [1 ,2 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710129, Shaanxi, Peoples R China
[2] Minist Educ, Key Lab Informat Fus Technol, Xian 710129, Peoples R China
[3] Northwestern Polytech Univ, Innovat Ctr NPU Chongqing, Chongqing 400000, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicle; Desired trajectory attack; Attack detection; Attack estimation; Security control; SYSTEMS; SUBJECT; DESIGN;
D O I
10.1016/j.jfranklin.2024.106920
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates an attack detection and security control strategy for unmanned aerial vehicles (UAVs) in the presence of malicious attacks. The detection, estimation, and compensation of the attack are the key points of the proposed scheme. This article considers that the desired trajectory sent by the ground control station (GCS) to the UAV is maliciously tampered with. First, a description of the UAV system and the desired trajectory attack is presented. The mathematical model is constructed by analyzing the characteristics of the desired trajectory attack. Secondly, an unknown input observer (UIO) is designed to generate the state estimation error. The attack detection framework is constructed by taking into account the state estimation error and the trajectory tracking error. Thirdly, an attack estimation observer with a prescribed H infinity performance is designed to compensate for the impact of attacks on the control system. A disturbance observer (DO) is used to compensate for the system disturbance. Finally, the simulation results are presented on Matlab and Gazebo to validate the effectiveness of the proposed security control strategy.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Attack-tolerant control and observer-based trajectory tracking for Cyber-Physical Systems
    Rebai, Souad Bezzaoucha
    Voos, Holger
    Darouach, Mohamed
    EUROPEAN JOURNAL OF CONTROL, 2019, 47 : 30 - 36
  • [22] Finite-time trajectory tracking control of quadrotor UAVs based on neural network disturbance observer and command filter
    Li, Bo-ning
    Chen, Ming
    Qi, Shu-Chang
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024,
  • [23] Robust formation control of UAVs based on nonlinear disturbance observer
    Sun H.
    Song G.
    Liu S.
    Wei Z.
    Zhang Y.
    You J.
    Song, Guangming (mikesong@seu.edu.cn), 1600, Southeast University (47): : 926 - 932
  • [24] Finite-time trajectory tracking control of quadrotor UAVs based on neural network disturbance observer and command filter
    Li, Bo-ning
    Chen, Ming
    Qi, Shu-Chang
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2025, 56 (07) : 1474 - 1488
  • [25] Finite-time trajectory tracking control of quadrotor UAVs based on neural network disturbance observer and command filter
    Li, Bo-ning
    Chen, Ming
    Qi, Shu-Chang
    International Journal of Systems Science, 2024,
  • [26] Disturbance observer-based control of UAVs with prescribed performance
    Sasaki, Kazuya
    Yang, Zi-Jiang
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2020, 51 (05) : 939 - 957
  • [27] Security Against Network Attacks in Supervisory Control Systems
    Lima, Public M.
    Alves, Marcos V. S.
    Carvalho, Lilian K.
    Moreira, Marcos V.
    IFAC PAPERSONLINE, 2017, 50 (01): : 12333 - 12338
  • [28] Disturbance Observer-Based Integral Backstepping Control for UAVs
    Moeini, Amir
    Rafique, Muhammad Awais
    Xue, Zhijun
    Lynch, Alan E.
    Zhao, Qing
    2020 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS'20), 2020, : 382 - 388
  • [29] Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)
    Tlili, Fadhila
    Ayed, Samiha
    Fourati, Lamia Chaari
    COMPUTERS & SECURITY, 2024, 142
  • [30] Securing Commercial WiFi-Based UAVs From Common Security Attacks
    Hooper, Michael
    Tian, Yifan
    Zhou, Runxuan
    Cao, Bin
    Lauf, Adrian P.
    Watkins, Lanier
    Robinson, William H.
    Alexis, Wlajimir
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 1213 - 1218