Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems

Cyber security has emerged as one of the most important issues in unmanned aerial systems for which the functionality heavily relies on onboard automation and intervehicle communications. In this paper, potential cyber threats and vulnerabilities in the unmanned aerial system’s state estimator to stealthy cyber attacks are identified, which can avoid being detected by the monitoring system. Specifically, this paper investigates the worst stealthy cyber attack that can maximize the state estimation error of the unmanned aerial system’s state estimator while not being detected. First, the condition that the system is vulnerable to the stealthy cyber attacks is derived, and then an analytical method is provided to identify the worst stealthy cyber attack. The proposed cyber attack analysis methods are demonstrated with illustrative examples of an onboard unmanned aerial system navigation system and an unmanned aerial system tracking application.

[1]  Stephen P. Boyd,et al.  Convex Optimization: Duality , 2004 .

[2]  Zdobysław Goraj,et al.  Security analysis of uav radio communication system , 2009 .

[3]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[4]  Yahya Chetouani Using the Kalman Filtering for the Fault Detection and Isolation (FDI) in the Nonlinear Dynamic Processes , 2008 .

[5]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[6]  Steven X. Ding,et al.  Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools , 2008 .

[7]  Jason L. Speyer,et al.  A generalized Shiryayev sequential probability ratio test for change detection and isolation , 1999, IEEE Trans. Autom. Control..

[8]  Igor V. Nikiforov,et al.  A generalized change detection problem , 1995, IEEE Trans. Inf. Theory.

[9]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[10]  Inseok Hwang,et al.  A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.

[11]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[12]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[13]  Thia Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .

[14]  David Titterton,et al.  Integrated navigation systems , 2004 .

[15]  Virgil D. Gligor A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.

[16]  John Weston,et al.  Strapdown Inertial Navigation Technology , 1997 .

[17]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[18]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[19]  Weiyi Liu,et al.  Numerical Analysis of Cyberattacks on Unmanned Aerial Systems , 2012, Infotech@Aerospace.

[20]  J.J. Gertler,et al.  Survey of model-based failure detection and isolation in complex plants , 1988, IEEE Control Systems Magazine.

[21]  Inseok Hwang,et al.  Stochastic Linear Hybrid Systems: Modeling, Estimation, and Application in Air Traffic Control , 2009, IEEE Transactions on Control Systems Technology.

[22]  Stanley R. Herwitz,et al.  UAV Homeland Security Demonstration , 2004 .

[23]  Anand R. Tripathi,et al.  Security Policies in Distributed CSCW and Workflow Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[24]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[25]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[26]  Inseok Hwang,et al.  Distributed Multitarget Tracking and Identity Management , 2008 .

[27]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[28]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[29]  Weiyi Liu,et al.  Software/Hardware-in-the-Loop Analysis of Cyberattacks on Unmanned Aerial Systems , 2014, J. Aerosp. Inf. Syst..

[30]  Josef Shinar,et al.  Novel Adaptive Generalized Likelihood Ratio Detector with Application to Maneuvering Target Tracking , 2006 .

[31]  Cheolhyeon Kwon,et al.  Real-Time Safety Assessment of Unmanned Aircraft Systems Against Stealthy Cyber Attacks , 2016, J. Aerosp. Inf. Syst..

[32]  John Weston,et al.  Strapdown Inertial Navigation Technology, Second Edition , 2005 .

[33]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[34]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[35]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[36]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.