Observer based attack detection and security control for UAVs against attacks on desired trajectory

被引:1
|
作者
Pan, Kunpeng [1 ,2 ,3 ]
Yang, Feisheng [1 ,2 ,3 ]
Lyu, Yang [1 ,2 ]
Tan, Zheng [1 ,2 ]
Pan, Quan [1 ,2 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710129, Shaanxi, Peoples R China
[2] Minist Educ, Key Lab Informat Fus Technol, Xian 710129, Peoples R China
[3] Northwestern Polytech Univ, Innovat Ctr NPU Chongqing, Chongqing 400000, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicle; Desired trajectory attack; Attack detection; Attack estimation; Security control; SYSTEMS; SUBJECT; DESIGN;
D O I
10.1016/j.jfranklin.2024.106920
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates an attack detection and security control strategy for unmanned aerial vehicles (UAVs) in the presence of malicious attacks. The detection, estimation, and compensation of the attack are the key points of the proposed scheme. This article considers that the desired trajectory sent by the ground control station (GCS) to the UAV is maliciously tampered with. First, a description of the UAV system and the desired trajectory attack is presented. The mathematical model is constructed by analyzing the characteristics of the desired trajectory attack. Secondly, an unknown input observer (UIO) is designed to generate the state estimation error. The attack detection framework is constructed by taking into account the state estimation error and the trajectory tracking error. Thirdly, an attack estimation observer with a prescribed H infinity performance is designed to compensate for the impact of attacks on the control system. A disturbance observer (DO) is used to compensate for the system disturbance. Finally, the simulation results are presented on Matlab and Gazebo to validate the effectiveness of the proposed security control strategy.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [42] Nonlinear Robust Adaptive Control of Universal Manipulators Based on Desired Trajectory
    Chen, Yu
    Ding, Jianwan
    Chen, Yu
    Yan, Dong
    APPLIED SCIENCES-BASEL, 2024, 14 (05):
  • [43] Inversion Attacks against CNN Models Based on Timing Attack
    Chen, Zhaohe
    Tang, Ming
    Li, Jinghai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [44] Sensor deception attacks against security in supervisory control systems
    Yao, Jingshi
    Li, Shaoyuan
    Yin, Xiang
    AUTOMATICA, 2024, 159
  • [45] A novel secure observer-based controller and attack detection scheme for Networked Control Systems
    Sadeghikhorami, Ladan
    Varadharajan, Vijay
    Safavi, Ali Akbar
    INFORMATION SCIENCES, 2021, 575 : 185 - 205
  • [46] Interval Observer-Based Detection and Localization Against False Data Injection Attack in Smart Grids
    Luo, Xiaoyuan
    Li, Yating
    Wang, Xinyu
    Guan, Xinping
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 657 - 671
  • [47] A dynamic event-triggered approach to observer-based PID security control subject to deception attacks
    Zhao, Di
    Wang, Zidong
    Wei, Guoliang
    Han, Qing-Long
    AUTOMATICA, 2020, 120
  • [49] Fuzzy observer based adjustable containment control for multi-agent systems against DoS attacks
    Jiang, Mengyi
    Yang, Yonghui
    Liu, Xiaoping
    Wu, Libing
    Gao, Chuang
    NONLINEAR DYNAMICS, 2024, 112 (22) : 20063 - 20080
  • [50] False Report Injection And Remote Attack Detection Method using Security Trajectory in WSN-based Fire Detection IoT
    Kang, Yelim
    Cho, Taeho
    PROCEEDINGS OF 2023 6TH ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE, AICCC 2023, 2023, : 173 - 178