Observer based attack detection and security control for UAVs against attacks on desired trajectory

被引:1
|
作者
Pan, Kunpeng [1 ,2 ,3 ]
Yang, Feisheng [1 ,2 ,3 ]
Lyu, Yang [1 ,2 ]
Tan, Zheng [1 ,2 ]
Pan, Quan [1 ,2 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710129, Shaanxi, Peoples R China
[2] Minist Educ, Key Lab Informat Fus Technol, Xian 710129, Peoples R China
[3] Northwestern Polytech Univ, Innovat Ctr NPU Chongqing, Chongqing 400000, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicle; Desired trajectory attack; Attack detection; Attack estimation; Security control; SYSTEMS; SUBJECT; DESIGN;
D O I
10.1016/j.jfranklin.2024.106920
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates an attack detection and security control strategy for unmanned aerial vehicles (UAVs) in the presence of malicious attacks. The detection, estimation, and compensation of the attack are the key points of the proposed scheme. This article considers that the desired trajectory sent by the ground control station (GCS) to the UAV is maliciously tampered with. First, a description of the UAV system and the desired trajectory attack is presented. The mathematical model is constructed by analyzing the characteristics of the desired trajectory attack. Secondly, an unknown input observer (UIO) is designed to generate the state estimation error. The attack detection framework is constructed by taking into account the state estimation error and the trajectory tracking error. Thirdly, an attack estimation observer with a prescribed H infinity performance is designed to compensate for the impact of attacks on the control system. A disturbance observer (DO) is used to compensate for the system disturbance. Finally, the simulation results are presented on Matlab and Gazebo to validate the effectiveness of the proposed security control strategy.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Attack Effect Observer-Based Security Control for Cyber-Physical Systems Subjected to False Data Injection Attack
    Miao, Phillip
    Dong, Lewei
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 4738 - 4743
  • [32] Reliable control strategy based on sliding mode observer against FDI attacks in smart grid
    Li, Jian
    Yang, Defu
    Su, Qingyu
    ASIAN JOURNAL OF CONTROL, 2023, 25 (02) : 910 - 920
  • [33] Observer-based security control for distributed cyber-physical systems under replay attacks
    Li, Xiao-Meng
    Xiao, Wenbin
    Lin, Guohuai
    Li, Hongyi
    Lu, Renquan
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (13) : 8015 - 8035
  • [34] Attack Detection and Mitigation Scheme of Load Frequency Control Systems Against False Data Injection Attacks
    Zhao, Xin
    Ma, Zhongjing
    Shi, Xingyu
    Zou, Suli
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (08) : 9952 - 9962
  • [35] An exponent based error detection mechanism against DXDOS attack for improving the security in cloud
    J. Vijayalakshmi
    C. R. Rene Robin
    Cluster Computing, 2019, 22 : 3749 - 3758
  • [36] An exponent based error detection mechanism against DXDOS attack for improving the security in cloud
    Vijayalakshmi, J.
    Robin, C. R. Rene
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3749 - S3758
  • [37] Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure
    Lakshminarayana, Subhash
    Karachiwala, Jabir Shabbir
    Chang, Sang-Yoon
    Revadigar, Girish
    Kumar, Sristi Lakshmi Sravana
    Yau, David K. Y.
    Hu, Yih-Chun
    WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, : 160 - 171
  • [38] Security analysis and fault detection against stealthy replay attacks
    Zaman, Amirreza
    Safarinejadian, Behrouz
    Birk, Wolfgang
    INTERNATIONAL JOURNAL OF CONTROL, 2022, 95 (06) : 1562 - 1575
  • [39] Adaptive task-space cooperative tracking control for manipulators with a desired trajectory estimator and a velocity observer
    Zhao, Jiangbo
    Xiu, Bingkai
    Wang, Junzheng
    Zhang, Xin
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (07) : 4214 - 4235
  • [40] Cooperative Interaction Observer-Based Security Control for T-S Fuzzy Cyber-Physical Systems Against Sensor and Actuator Attacks
    Huang, Xin
    Chang, Chenxu
    Li, Jian
    Xiao, Shuyi
    Su, Qingyu
    IEEE TRANSACTIONS ON RELIABILITY, 2024,