A Survey on Attack Resilient of UAV Motion Planning*

With the advancement of science and technology, unmanned aerial vehicles (UAVs) have entered the industrial production and people's daily life. In the related studies, security of unmanned aircraft system (UAS) is a major concern in recent year. UAS are vulnerable to various attacks since they have many important information of mission. However, there are few studies focus on attack resilient of UAV motion planning. This paper introduces the current development status of UAS security, the intent of attackers and the weak links in UAS. This study analyzed the security threats faced by the UAS, the existing security protection measures, and the research status at home and abroad from three aspects: physical layer, network communication layer and computer software layer. It also summarizes other research directions related to UAS security. Finally, the future research directions for the security and management of UAVs are prospected.

[1]  Usman Akhtar,et al.  Impact and Detection of GPS Spoofing and Countermeasures against Spoofing , 2019, 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET).

[2]  Jens B. Schmitt,et al.  Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[3]  Muhammad Ali Imran,et al.  IEEE Access Special Section Editorial: Mission Critical Public-Safety Communications: Architectures, Enabling Technologies, and Future Applications , 2018, IEEE Access.

[4]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[5]  Zhenyu Guo,et al.  Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection , 2013, 2013 IEEE Systems and Information Engineering Design Symposium.

[6]  Elisa Bertino,et al.  A Secure Communication Protocol for Drones and Smart Objects , 2015, AsiaCCS.

[7]  Hanwen Li,et al.  Design of Anti-interference System for Fully Autonomous UAV Based on ADRC- EKF Algorithm , 2019, 2019 IEEE 2nd International Conference on Electronics and Communication Engineering (ICECE).

[8]  Mary L. Cummings,et al.  Operator Strategy Model Development in UAV Hacking Detection , 2019, IEEE Transactions on Human-Machine Systems.

[9]  Sidi-Mohammed Senouci,et al.  Efficient data dissemination in cooperative vehicular networks , 2013, Wirel. Commun. Mob. Comput..

[10]  Insup Lee,et al.  Sensor attack detection in the presence of transient faults , 2015, ICCPS.

[11]  Mohsen Guizani,et al.  Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.

[12]  Ling Shi,et al.  Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[13]  Seong-Moo Yoo,et al.  Securing data forwarding against blackhole attacks in mobile ad hoc networks , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).

[14]  Yan Guo,et al.  Covert Spoofing Algorithm of UAV Based on GPS/INS-Integrated Navigation , 2019, IEEE Transactions on Vehicular Technology.

[15]  Ethan M. Puchaty,et al.  A performance study of UAV-based sensor networks under cyber attack , 2011, 2011 6th International Conference on System of Systems Engineering.

[16]  Mohammed Atiquzzaman,et al.  Data Collection for Security Measurement in Wireless Sensor Networks: A Survey , 2019, IEEE Internet of Things Journal.

[17]  Hoon-Jae Lee,et al.  An Overview of Unmanned Aerial Vehicle: Cyber Security Perspective , 2016 .

[18]  Christian Callegari,et al.  A new statistical method for detecting network anomalies in TCP traffic , 2010, Eur. Trans. Telecommun..

[19]  Gérard Lachapelle,et al.  GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N0 measurements , 2012, Int. J. Satell. Commun. Netw..

[20]  Gurveen Vaseer,et al.  Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks: A Single- and Multiattack Case Study , 2019, IEEE Consumer Electronics Magazine.

[21]  Anshuman Bhardwaj,et al.  UAVs as remote sensing platform in glaciology: Present applications and future prospects , 2016 .

[22]  Cameron D. Patterson,et al.  The Trustworthy Autonomic Interface Guardian Architecture for Cyber-Physical Systems , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[23]  Mazen Farhood,et al.  A framework for detection of sensor attacks on small unmanned aircraft systems , 2017, 2017 International Conference on Unmanned Aircraft Systems (ICUAS).

[24]  Zhenhua Wei,et al.  Summary of Research on IT Network and Industrial Control Network Security Assessment , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).

[25]  Xiaochen Guo,et al.  GPS Anti-spoofing Algorithm Based on Improved Particle Filter , 2018, 2018 USNC-URSI Radio Science Meeting (Joint with AP-S Symposium).

[26]  Robin R. Murphy,et al.  A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).

[27]  R. Schroer,et al.  Position, Location, and Navigation Symposium (PLANS) , 2004 .

[28]  Mathieu Joerger,et al.  GPS spoofing detection using RAIM with INS coupling , 2014, 2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014.

[29]  Eray Yağdereli,et al.  A study on cyber-security of autonomous and unmanned vehicles , 2015 .

[30]  Sidi-Mohammed Senouci,et al.  An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.

[31]  Emy Rivera,et al.  A Study On Unmanned Vehicles and Cyber Security , 2014 .

[32]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[33]  Todd E. Humphreys,et al.  Practical cryptographic civil GPS signal authentication , 2011 .

[34]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[35]  Shahryar Sarkani,et al.  Unmanned aerial vehicle smart device ground control station cyber security threat model , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[36]  Saeed Daneshmand,et al.  A Low-Complexity GPS Anti-Spoofing Method Using a Multi-Antenna Array , 2012 .

[37]  Bin Cao,et al.  Securing commercial WiFi-based UAVs from common security attacks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[38]  J. S. Warner,et al.  A Simple Demonstration that the Global Positioning System ( GPS ) is Vulnerable to Spoofing , 2012 .

[39]  Hui-Ming Wang,et al.  Combating the Control Signal Spoofing Attack in UAV Systems , 2018, IEEE Transactions on Vehicular Technology.

[40]  Harsh Kumar Verma,et al.  Improved Detection and Mitigation of DDoS Attack in Vehicular ad hoc Network , 2018, 2018 4th International Conference on Computing Communication and Automation (ICCCA).

[41]  Daniel P. Shepard,et al.  Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .

[42]  Nirwan Ansari,et al.  A router-based technique to mitigate reduction of quality (RoQ) attacks , 2008, Comput. Networks.

[43]  Peter F. Swaszek,et al.  GNSS Spoof Detection Using Shipboard IMU Measurements , 2014 .