Detection of Stealthy Adversaries for Networked Unmanned Aerial Vehicles

Mohammad Bahrami, Hamidreza Jafarnejadsani

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

A network of unmanned aerial vehicles (UAVs) provides distributed coverage, reconfigurability, and maneuverability in performing complex cooperative tasks. However, it relies on wireless communications that can be susceptible to cyber adversaries and intrusions, disrupting the entire network's operation. This paper develops model-based centralized and decentralized observer techniques for detecting a class of stealthy intrusions, namely zero-dynamics and covert attacks, on networked UAVs in formation control settings. The centralized observer that runs in a control center leverages switching in the UAVs' communication topology for attack detection, and the decentralized observers, implemented onboard each UAV in the network, use the model of networked UAVs and locally available measurements. Experimental results are provided to show the effectiveness of the proposed detection schemes in different case studies.

Original languageEnglish
Title of host publication2022 International Conference on Unmanned Aircraft Systems, ICUAS 2022
Pages1111-1120
Number of pages10
ISBN (Electronic)9781665405935
DOIs
StatePublished - 2022
Event2022 International Conference on Unmanned Aircraft Systems, ICUAS 2022 - Dubrovnik, Croatia
Duration: 21 Jun 202224 Jun 2022

Publication series

Name2022 International Conference on Unmanned Aircraft Systems, ICUAS 2022

Conference

Conference2022 International Conference on Unmanned Aircraft Systems, ICUAS 2022
Country/TerritoryCroatia
CityDubrovnik
Period21/06/2224/06/22

Fingerprint

Dive into the research topics of 'Detection of Stealthy Adversaries for Networked Unmanned Aerial Vehicles'. Together they form a unique fingerprint.

Cite this