Distributed Unknown-Input-Observers for Cyber Attack Detection and Isolation in Formation Flying UAVs

نویسندگان

  • Lebsework Negash
  • Sang-Hyeon Kim
  • Han-Lim Choi
چکیده

In this paper, cyber attack detection and isolation is studied on a network of UAVs in a formation flying setup. As the UAVs communicate to reach consensus on their states while making the formation, the communication network among the UAVs makes them vulnerable to a potential attack from malicious adversaries. Two types of attacks pertinent to a network of UAVs have been considered: a node attack on the UAVs and a deception attack on the communication between the UAVs. UAVs formation control presented using a consensus algorithm to reach a pre-specified formation. A node and a communication path deception cyber attacks on the UAV’s network are considered with their respective models in the formation setup. For these cyber attacks detection, a bank of Unknown Input Observer (UIO) based distributed fault detection scheme proposed to detect and identify the compromised UAV in the formation. A rule based on the residuals generated using the bank of UIOs are used to detect attacks and identify the compromised UAV in the formation. Further, an algorithm developed to remove the faulty UAV from the network once an attack detected and the compromised UAV isolated while maintaining the formation flight with a missing UAV node. ∗PhD Candidate, Department of Aerospace Engineering, KAIST. 291 Daehak-ro, N7-3332, Yuseong, Daejeon 34141, Republic of Korea; [email protected] †PhD Candidate, Department of Aerospace Engineering, KAIST. 291 Daehak-ro, N7-3333, Yuseong, Daejeon 34141, Republic of Korea; [email protected] ‡Associate Professor, Department of Aerospace Engineer, KAIST. 291 Daehak-ro, N7-4303, Yuseong, Daejeon, 34141, Republic of Korea; Tel: +82-42-350-3727; Fax: +82-42-350-3710; [email protected]. AIAA Member. Corresponding Author.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Model- Based Fault Detection and Isolation for V47/660kW Wind Turbine

In this paper, in order to increase the efficiency, to reduce the cost and to prevent the failures of wind turbines, which lead to an extensive break down, a robust fault diagnosis system is proposed for V47/660kW wind turbine operated in Manjil wind farm, Gilan province, Iran. According to the acquired data from Iran wind turbine industry, common faults of the wind turbine such as sensor fault...

متن کامل

Bio-Inspired Vision-Based Leader-Follower Formation Flying in the Presence of Delays

Flocking starlings at dusk are known for the mesmerizing and intricate shapes they generate, as well as how fluid these shapes change. They seem to do this effortlessly. Real-life vision-based flocking has not been achieved in micro-UAVs (micro Unmanned Aerial Vehicles) to date. Towards this goal, we make three contributions in this paper: (i) we used a computational approach to develop a bio-i...

متن کامل

A Fault Tolerant Flight Control System For Sensor And Actuator Faults

The purpose of the paper is to present an approach to detect, isolate and accommodate the sensor or actuator faults using bank of unknown input observers (UIO). Full order observers, reduced order observers, unknown input observers and Kalman Filter are widely used in state estimations [1]. After the estimation of states, fault detection and isolation can be provided by conducting residual anal...

متن کامل

Design of Fault Tolerant Flight Control System

The purpose of the paper is to present an approach to detect, isolate and accommodate the sensor or actuator faults using bank of observer and unknown input observers (UIO). Full order observers, reduced order observers, unknown input observers and Kalman Filter are widely used in state estimations [1]. After the estimation of states, fault detection and isolation can be provided by conducting ...

متن کامل

Cyber Security of Water SCADA Systems: (II) Attack Detection using Enhanced Hydrodynamic Models

This article investigates the problem of detection and isolation of attacks on a water distribution network comprised of cascaded canal pools. The proposed approach employs a bank of delay-differential observer systems. The observers are based on an analytically approximate model of canal hydrodynamics. Each observer is insensitive to one fault/attack mode and sensitive to other modes. Design o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1701.06325  شماره 

صفحات  -

تاریخ انتشار 2017