Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation

The proliferation of Unmanned Aerial Vehicles (UAVs) brings about many new security concerns. A common concern with UAV security is for an intruder to take control of a UAV, which leads for a need for a real time anomaly detection system. This research resulted in a prototype UAV monitoring system that captures flight data, and then performs real time estimation and tracking of the airframe and controller parameters. The aforementioned is done by utilizing the Recursive Least Squares Method (RLSM). Using statistical validation and trend analysis, parameter estimates are critical for the detection of cyber attacks and incipient hardware failures that can invariably jeopardize mission success. The results demonstrate that achieving efficient anomaly detection during flight is possible through the application of statistical methods to profile system behavior. The anomaly detection system that was designed can be performed in real time while the UAV is in flight, constantly verifying its parameters.

[1]  D. G. Fisher,et al.  Improved least squares identification , 1987 .

[2]  Jeffrey Keller,et al.  Aircraft Flight Envelope Determination using Upset Detection and Physical Modeling Methods , 2009 .

[3]  Jianhua Ge,et al.  Methodologies for Adaptive Flight Envelope Estimation and Protection , 2009 .

[4]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[5]  Gary J. Balas,et al.  Model-Based and Data-Driven Fault Detection Performance for a Small UAV , 2013, IEEE/ASME Transactions on Mechatronics.

[6]  Daniel P. Shepard,et al.  Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .

[7]  Weiyi Liu,et al.  Numerical Analysis of Cyberattacks on Unmanned Aerial Systems , 2012, Infotech@Aerospace.

[8]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[9]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[10]  Nhan T. Nguyen,et al.  Hybrid Intelligent Flight Control with Adaptive Learning Parameter Estimation , 2009, J. Aerosp. Comput. Inf. Commun..

[11]  Inseok Hwang,et al.  Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.

[12]  Dennis K. Nilsson,et al.  A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure , 2009, J. Networks.

[13]  George M Siouris,et al.  Missile Guidance and Control Systems , 2004 .

[14]  D. Hazry,et al.  A simple approach on implementing IMU sensor fusion in PID controller for stabilizing quadrotor flight control , 2011, 2011 IEEE 7th International Colloquium on Signal Processing and its Applications.

[15]  Calton Pu,et al.  Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[16]  G. Conte,et al.  An Integrated UAV Navigation System Based on Aerial Image Matching , 2008, 2008 IEEE Aerospace Conference.

[17]  Victor A. Skormin,et al.  Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks , 2012, MMM-ACNS.